-
2
-
-
77952725798
-
A model for enriching trajectories with semantic geographical information
-
L.O. Alvares, V. Bogorny, B. Kuijpers, J. Antônio Fernandes de Macêdo, B. Moelans and A.A. Vaisman, "A model for enriching trajectories with semantic geographical information, " ACMGIS, pp. 22, 2007.
-
(2007)
ACMGIS
, pp. 22
-
-
Alvares, L.O.1
Bogorny, V.2
Kuijpers, B.3
de Macêdo, J.A.F.4
Moelans, B.5
Vaisman, A.A.6
-
3
-
-
0033559186
-
Geographically masking health data to preserve confidentiality
-
M. P. Armstrong, G. Rushton, and D. L. Zimmerman, "Geographically masking health data to preserve confidentiality, " Statistics in Medicine, vol. 18, pp. 497-525, 1999.
-
(1999)
Statistics in Medicine
, vol.18
, pp. 497-525
-
-
Armstrong, M.P.1
Rushton, G.2
Zimmerman, D.L.3
-
6
-
-
19544376847
-
Discovering personal gazetteers: An interactive clustering approach
-
in
-
Z. Changqing, D. Frankowski, P. Ludford, S. Shekhar, and L. Terveen, "Discovering personal gazetteers: an interactive clustering approach, " in Proceedings of the ACM International Workshop on Geographic Information Systems, 2004, pp. 266-273.
-
(2004)
Proceedings of the ACM International Workshop on Geographic Information Systems
, pp. 266-273
-
-
Changqing, Z.1
Frankowski, D.2
Ludford, P.3
Shekhar, S.4
Terveen, L.5
-
7
-
-
77954770667
-
GEPETO: A GEoPrivacy Enhancing Toolkit
-
in, Perth, Australia, April
-
S. Gambs, M.-O. Killijian, and M. N. del Prado, "GEPETO: a GEoPrivacy Enhancing Toolkit, " in Proceedings of the International Workshop on Advances in Mobile Computing and Applications: Security, Privacy and Trust, held in conjunction with the 24th IEEE AINA conference, Perth, Australia, April 2010.
-
(2010)
Proceedings of the International Workshop on Advances in Mobile Computing and Applications: Security, Privacy and Trust, held in conjunction with the 24th IEEE AINA conference
-
-
Gambs, S.1
Killijian, M.-O.2
del Prado, M.N.3
-
9
-
-
67650312114
-
On the anonymity of home/work location pairs
-
May
-
P. Golle and K. Partridge, "On the anonymity of home/work location pairs, " Pervasive Computing, pp. 390-397, May 2009.
-
(2009)
Pervasive Computing
, pp. 390-397
-
-
Golle, P.1
Partridge, K.2
-
10
-
-
44849122540
-
Understanding individual human mobility patterns
-
June
-
M. C. Gonzalez, C. A. Hidalgo, and A.-L. Barabasi, "Understanding individual human mobility patterns, " Nature, vol. 453, no. 7196, pp. 779-782, June 2008.
-
(2008)
Nature
, vol.453
, Issue.7196
, pp. 779-782
-
-
Gonzalez, M.C.1
Hidalgo, C.A.2
Barabasi, A.-L.3
-
12
-
-
67650320950
-
A survey of computational location privacy
-
J. Krumm, "A survey of computational location privacy, " Personal and Ubiquitous Computing, vol. 13, no. 6, pp. 391-399, 2009.
-
(2009)
Personal and Ubiquitous Computing
, vol.13
, Issue.6
, pp. 391-399
-
-
Krumm, J.1
-
15
-
-
33750879264
-
Enhancing security and privacy in trafficmonitoring systems
-
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Enhancing security and privacy in trafficmonitoring systems, " IEEE Pervasive Computing, vol. 5, no. 4, pp. 38-46, 2006.
-
(2006)
IEEE Pervasive Computing
, vol.5
, Issue.4
, pp. 38-46
-
-
Hoh, B.1
Gruteser, M.2
Xiong, H.3
Alrabady, A.4
-
16
-
-
77956260820
-
-
Department of Computing Faculty of Mathematics, Computing and Technology The Open University, November
-
L. Jedrzejczyk, B. A. Price, A. K. Bandara, and B. Nuseibeh, "I know what you did last summer: risks of location data leakage in mobile and social computing, " Department of Computing Faculty of Mathematics, Computing and Technology The Open University, November 2009.
-
(2009)
I know what you did last summer: Risks of location data leakage in mobile and social computing
-
-
Jedrzejczyk, L.1
Price, B.A.2
Bandara, A.K.3
Nuseibeh, B.4
-
17
-
-
11244258314
-
Extracting places from traces of locations
-
in
-
J. H. Kang, B. Stewarta, G. Borriello, and W. Welbourne, "Extracting places from traces of locations, " in Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots, 2004, pp. 110-118.
-
(2004)
Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
, pp. 110-118
-
-
Kang, J.H.1
Stewarta, B.2
Borriello, G.3
Welbourne, W.4
-
19
-
-
38049035427
-
Inference attacks on location tracks
-
J. Krumm, "Inference attacks on location tracks, " Pervasive Computing, pp. 127-143, 2007.
-
(2007)
Pervasive Computing
, pp. 127-143
-
-
Krumm, J.1
-
20
-
-
84880747814
-
Location-based activity recognition using relational Markov networks
-
in
-
L. Liao, D. Fox, and H. Kautz, "Location-based activity recognition using relational Markov networks, " in Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI), 2005, pp. 773-778.
-
(2005)
Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI)
, pp. 773-778
-
-
Liao, L.1
Fox, D.2
Kautz, H.3
-
21
-
-
78650869043
-
A spatiotemporal model of obfuscation strategies and counter strategies for location privacy
-
D. Matt, K. Lars, and B. Athol, "A spatiotemporal model of obfuscation strategies and counter strategies for location privacy, " Lectures Notes in Computer Science, vol. 4197, no. 4, pp. 47-64, 2006.
-
(2006)
Lectures Notes in Computer Science
, vol.4197
, Issue.4
, pp. 47-64
-
-
Matt, D.1
Lars, K.2
Athol, B.3
-
23
-
-
33745883087
-
-
February
-
A. Pfitzmann and M. Hansen, "Anonymity, unlinkability, unobservability, pseudonymity, and identity management-a consolidated proposal for terminology, " February 2008.
-
(2008)
Anonymity, unlinkability, unobservability, pseudonymity, and identity management-a consolidated proposal for terminology
-
-
Pfitzmann, A.1
Hansen, M.2
-
24
-
-
19944372788
-
Keeping ubiquitous computing to yourself: A practical model for user control of privacy
-
B. A. Price, K. Adam, and B. Nuseibeh, "Keeping ubiquitous computing to yourself: A practical model for user control of privacy, " Int. J. Human-Computer Studies, pp. 228-253, 2005.
-
(2005)
Int. J. Human-Computer Studies
, pp. 228-253
-
-
Price, B.A.1
Adam, K.2
Nuseibeh, B.3
-
25
-
-
0018689571
-
An algorithm for tracking multiple targets
-
D. Reiter, "An algorithm for tracking multiple targets, " IEEE Transactions on Automatic Control, vol. 24, no. 6, pp. 843-854, 1979.
-
(1979)
IEEE Transactions on Automatic Control
, vol.24
, Issue.6
, pp. 843-854
-
-
Reiter, D.1
-
26
-
-
77149139158
-
Limits of predictability in human mobility
-
C. Song, Z. Qu, N. Blumm, and A.-L. Barabasi, "Limits of predictability in human mobility, " Science, vol. 327, no. 5968, pp. 1018-1021, 2010.
-
(2010)
Science
, vol.327
, Issue.5968
, pp. 1018-1021
-
-
Song, C.1
Qu, Z.2
Blumm, N.3
Barabasi, A.-L.4
-
27
-
-
39749177364
-
A conceptual view on trajectories
-
S. Spaccapietra, C. Parent, M.L. Damiani, J. Macedo, F. Porto and C. Vangenot, "A conceptual view on trajectories, " DKE Journal, vol. 65, no. 1, pp. 126-146, 2008.
-
(2008)
DKE Journal
, vol.65
, Issue.1
, pp. 126-146
-
-
Spaccapietra, S.1
Parent, C.2
Damiani, M.L.3
McEdo, J.4
Porto, F.5
Vangenot, C.6
-
28
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney, "k-anonymity: a model for protecting privacy, " Int. J. Uncertain. Fuzziness Knowl.-Based Syst., vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
Int. J. Uncertain. Fuzziness Knowl.-Based Syst
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
30
-
-
79953858084
-
SeMiTri: A framework for semantic annotation of heterogeneous trajectories
-
in
-
Z. Yan, D. Chakraborty, C. Parent, S. Spaccapietra and K. Aberer, "SeMiTri: a framework for semantic annotation of heterogeneous trajectories, " in Proceedings of the 14th International Conference on Extending Database Technology (EDBT'11), 2011, pp. 259-270.
-
(2011)
Proceedings of the 14th International Conference on Extending Database Technology (EDBT'11)
, pp. 259-270
-
-
Yan, Z.1
Chakraborty, D.2
Parent, C.3
Spaccapietra, S.4
Aberer, K.5
-
31
-
-
48649103506
-
Protecting moving trajectories with dummies
-
in, IEEE Computer Society
-
T.-H. You, W.-C. Peng, and W.-C. Lee, "Protecting moving trajectories with dummies, " in Proceedings of the 2007 International Conference on Mobile Data Management. IEEE Computer Society, 2007, pp. 278-282.
-
(2007)
Proceedings of the 2007 International Conference on Mobile Data Management
, pp. 278-282
-
-
You, T.-H.1
Peng, W.-C.2
Lee, W.-C.3
|