메뉴 건너뛰기




Volumn , Issue , 2007, Pages 1-12

Ifind: A peer-to-peer application for real-time location monitoring on the MIT campus

Author keywords

Data collection; Geographic information systems; Location based services; Privacy; Wireless internet

Indexed keywords

DATA PRIVACY; ENCODING (SYMBOLS); GEOGRAPHIC INFORMATION SYSTEMS; KNOWLEDGE BASED SYSTEMS; LOCATION BASED SERVICES; RESEARCH; TELECOMMUNICATION SERVICES; URBAN PLANNING;

EID: 84880249819     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (10)

References (20)
  • 2
    • 8344279571 scopus 로고    scopus 로고
    • Analysis of Wireless Information Locality and Association Patterns in a Campus
    • Chinchilla, F., Lindsey, M. and Papadopouli, M. (2004). Analysis of Wireless Information Locality and Association Patterns in a Campus. In IEEE Infocom 04.
    • (2004) IEEE Infocom 04
    • Chinchilla, F.1    Lindsey, M.2    Papadopouli, M.3
  • 3
    • 0033241804 scopus 로고    scopus 로고
    • Privacy Issues in Internet Surveys
    • Cho, H. and LaRose, R. (1999). Privacy Issues in Internet Surveys. Social Science Computer Review, Vol. 17, No. 4, 421-434
    • (1999) Social Science Computer Review , vol.17 , Issue.4 , pp. 421-434
    • Cho, H.1    LaRose, R.2
  • 4
    • 33746037200 scopus 로고    scopus 로고
    • Our data, ourselves: Privacy via distributed noise generation
    • Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I. and Naor, M. (2006). Our data, ourselves: Privacy via distributed noise generation. In EUROCRYPT, 486-503.
    • (2006) EUROCRYPT , pp. 486-503
    • Dwork, C.1    Kenthapadi, K.2    McSherry, F.3    Mironov, I.4    Naor, M.5
  • 5
    • 84903563195 scopus 로고    scopus 로고
    • A customizable k-anonymity model for protecting location privacy
    • Gedik, B. and Liu, L. (2004). A customizable k-anonymity model for protecting location privacy.
    • (2004)
    • Gedik, B.1    Liu, L.2
  • 7
    • 35949007691 scopus 로고
    • Social Force Model for Pedestrian Dynamics
    • Helbing, D. and Molnar, P. (1995). Social Force Model for Pedestrian Dynamics. Physical Review E, vol. 51, 4282-4286.
    • (1995) Physical Review E , vol.51 , pp. 4282-4286
    • Helbing, D.1    Molnar, P.2
  • 9
    • 8344237601 scopus 로고    scopus 로고
    • Analysis of a Campus-wide Wireless Network
    • Tech. Rep. TR2002-432, Dept. of Computer Science, Dartmouth College
    • Kotz, D. and Essien, K. (2002). Analysis of a Campus-wide Wireless Network. Tech. Rep. TR2002-432, Dept. of Computer Science, Dartmouth College.
    • (2002)
    • Kotz, D.1    Essien, K.2
  • 11
    • 84861301596 scopus 로고    scopus 로고
    • Who Gets to Know What When: Configuring Privacy Permissions in an Awareness Application
    • Patil, S. and Lai, J. (2005). Who Gets to Know What When: Configuring Privacy Permissions in an Awareness Application. In CHI 2005. 101-110.
    • (2005) CHI 2005 , pp. 101-110
    • Patil, S.1    Lai, J.2
  • 14
    • 84903556113 scopus 로고    scopus 로고
    • iSPOTS: How Wireless Technology is Changing Life on the MIT Campus
    • Technical Report, SENSEable City Laboratory, MIT, Cambridge, MA
    • Sevtsuk, A. and Ratti, C. (2005). iSPOTS: How Wireless Technology is Changing Life on the MIT Campus. Technical Report, SENSEable City Laboratory, MIT, Cambridge, MA.
    • (2005)
    • Sevtsuk, A.1    Ratti, C.2
  • 15
    • 10044259613 scopus 로고    scopus 로고
    • Detecting Human Motion with Support Vector Machines
    • Sidenbladh, H. (2004). Detecting Human Motion with Support Vector Machines. ICPR, Vol. 02, 188-191.
    • (2004) ICPR , vol.2 , pp. 188-191
    • Sidenbladh, H.1
  • 17
    • 33745836765 scopus 로고    scopus 로고
    • Putting People in their Place: An Anonymous and Privacy-Sensitive Approach to Collecting Sensed Data in Location-Based Applications
    • Tang, K.P., Keyani, P., Fogarty, J. and Hong, J.I. (2006). Putting People in their Place: An Anonymous and Privacy-Sensitive Approach to Collecting Sensed Data in Location-Based Applications. In CHI 2006. 93-102.
    • (2006) CHI 2006 , pp. 93-102
    • Tang, K.P.1    Keyani, P.2    Fogarty, J.3    Hong, J.I.4
  • 18
    • 84903563190 scopus 로고    scopus 로고
    • Tor. Tor: Anonymity Online, accessed 10 Febuary 2007
    • Tor. (2007). Tor: Anonymity Online. http://tor.eff.org/ (accessed 10 Febuary 2007)
    • (2007)
  • 19
    • 84903576965 scopus 로고    scopus 로고
    • Confidentiality
    • U.S.Census Bureau accessed 10 February 2007
    • U.S. Census Bureau. (2007). Confidentiality. http://factfinder.census.gov/jsp/saff/SAFFInfo.jsp?_content=su5_confidentiality.html (accessed 10 February 2007)
    • (2007)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.