-
1
-
-
84866503594
-
Nericell: Using mobile smartphones for rich monitoring of road and traffic conditions
-
P. Mohan, V. N. Padmanabhan, and R. Ramjee, "Nericell: using mobile smartphones for rich monitoring of road and traffic conditions," in Proceedings of the 6th ACM conference on Embedded network sensor systems, 2008, pp. 357-358.
-
(2008)
Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems
, pp. 357-358
-
-
Mohan, P.1
Padmanabhan, V.N.2
Ramjee, R.3
-
2
-
-
79961085450
-
Signalguru: Leveraging mobile phones for collaborative traffic signal schedule advisory
-
E. Koukoumidis, L.-S. Peh, and M. R. Martonosi, "Signalguru: leveraging mobile phones for collaborative traffic signal schedule advisory," in Proceedings of the 9th international conference on Mobile systems, applications, and services, 2011, pp. 127-140.
-
(2011)
Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services
, pp. 127-140
-
-
Koukoumidis, E.1
Peh, L.-S.2
Martonosi, M.R.3
-
3
-
-
74549148439
-
Vtrack: Accurate, energy-aware road traffic delay estimation using mobile phones
-
A. Thiagarajan, L. Ravindranath, K. LaCurts, S. Madden, H. Balakrishnan, S. Toledo, and J. Eriksson, "Vtrack: Accurate, energy-aware road traffic delay estimation using mobile phones," in Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems, 2009, pp. 85-98.
-
(2009)
Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems
, pp. 85-98
-
-
Thiagarajan, A.1
Ravindranath, L.2
Lacurts, K.3
Madden, S.4
Balakrishnan, H.5
Toledo, S.6
Eriksson, J.7
-
4
-
-
77954528580
-
Ear-phone: An end-to-end participatory urban noise mapping system
-
R. K. Rana, C. T. Chou, S. S. Kanhere, N. Bulusu, and W. Hu, "Ear-phone: An end-to-end participatory urban noise mapping system," in Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2010, pp. 105-116.
-
(2010)
Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks
, pp. 105-116
-
-
Rana, R.K.1
Chou, C.T.2
Kanhere, S.S.3
Bulusu, N.4
Hu, W.5
-
5
-
-
84879668465
-
Noisetube: Measuring and mapping noise pollution with mobile phones
-
N. Maisonneuve, M. Stevens, M. E. Niessen, and L. Steels, "Noisetube: Measuring and mapping noise pollution with mobile phones," in Infor-mation Technologies in Environmental Engineering. Springer, 2009, pp. 215-228.
-
(2009)
Infor-mation Technologies in Environmental Engineering. Springer
, pp. 215-228
-
-
Maisonneuve, N.1
Stevens, M.2
Niessen, M.E.3
Steels, L.4
-
6
-
-
78751557867
-
Budget feasible mechanisms
-
Y. Singer, "Budget feasible mechanisms," in Proceedings of IEEE FOCS, 2010, pp. 765-774.
-
(2010)
Proceedings of IEEE FOCS
, pp. 765-774
-
-
Singer, Y.1
-
7
-
-
84893063797
-
Pricing mechanisms for crowdsourcing markets
-
Y. Singer and M. Mittal, "Pricing mechanisms for crowdsourcing markets," in Proceedings of ACM WWW, 2013, pp. 1157-1166.
-
(2013)
Proceedings of ACM WWW
, pp. 1157-1166
-
-
Singer, Y.1
Mittal, M.2
-
8
-
-
84863507274
-
Learning on a budget: Posted price mechanisms for online procurement
-
A. Badanidiyuru, R. Kleinberg, and Y. Singer, "Learning on a budget: Posted price mechanisms for online procurement," in Proceedings of the 13th ACM Conference on Electronic Commerce, 2012, pp. 128-145.
-
(2012)
Proceedings of the 13th ACM Conference on Electronic Commerce
, pp. 128-145
-
-
Badanidiyuru, A.1
Kleinberg, R.2
Singer, Y.3
-
9
-
-
84904400435
-
How to crowdsource tasks truthfully without sacrificing utility: Online incentive mechanisms with budget constraint
-
D. Zhao, X. Li, and H. Ma, "How to crowdsource tasks truthfully without sacrificing utility: online incentive mechanisms with budget constraint," in Proceedings of IEEE INFOCOM, 2014.
-
(2014)
Proceedings of IEEE INFOCOM
-
-
Zhao, D.1
Li, X.2
Ma, H.3
-
10
-
-
52049124778
-
Practical secrecy-preserving, verifiably correct and trustworthy auctions
-
D. C. Parkes, M. O. Rabin, S. M. Shieber, and C. Thorpe, "Practical secrecy-preserving, verifiably correct and trustworthy auctions," Elec-tronic Commerce Research and Applications, vol. 7, no. 3, pp. 294-312, 2008.
-
(2008)
Elec-tronic Commerce Research and Applications
, vol.7
, Issue.3
, pp. 294-312
-
-
Parkes, D.C.1
Rabin, M.O.2
Shieber, S.M.3
Thorpe, C.4
-
11
-
-
79960871684
-
Secure friend discovery in mobile social networks
-
W. Dong, V. Dave, L. Qiu, and Y. Zhang, "Secure friend discovery in mobile social networks," in Proceedings of IEEE INFOCOM, 2011, pp. 1647-1655.
-
(2011)
Proceedings of IEEE INFOCOM
, pp. 1647-1655
-
-
Dong, W.1
Dave, V.2
Qiu, L.3
Zhang, Y.4
-
12
-
-
84883058458
-
Spring: A strategy-proof and privacy preserving spectrum auction mechanism
-
Q. Huang, Y. Tao, and F. Wu, "Spring: A strategy-proof and privacy preserving spectrum auction mechanism," in Proceedings of IEEE IN-FOCOM, 2013, pp. 827-835.
-
(2013)
Proceedings of IEEE IN-FOCOM
, pp. 827-835
-
-
Huang, Q.1
Tao, Y.2
Wu, F.3
-
13
-
-
84908161548
-
-
arXiv preprint arXiv:1308.6202
-
T. Jung, X.-Y. Li, L. Zhang, and H. Huang, "Efficient, verifiable and privacy-preserving combinatorial auction design," arXiv preprint arXiv:1308.6202, 2013.
-
(2013)
Efficient, Verifiable and Privacy-preserving Combinatorial Auction Design
-
-
Jung, T.1
Li, X.-Y.2
Zhang, L.3
Huang, H.4
-
16
-
-
77956442705
-
Sell your experiences: A market mechanism based incentive for participatory sensing
-
J.-S. Lee and B. Hoh, "Sell your experiences: A market mechanism based incentive for participatory sensing," in Proceedings of IEEE PerCom, 2010, pp. 60-68.
-
(2010)
Proceedings of IEEE PerCom
, pp. 60-68
-
-
Lee, J.-S.1
Hoh, B.2
-
17
-
-
70449601749
-
Bargain-based stimulation mechanism for selfish mobile nodes in participatory sensing network
-
X. Xie, H. Chen, and H. Wu, "Bargain-based stimulation mechanism for selfish mobile nodes in participatory sensing network," in Proceedings of IEEE SECON, 2009.
-
(2009)
Proceedings of IEEE SECON
-
-
Xie, X.1
Chen, H.2
Wu, H.3
-
18
-
-
84861598178
-
Incentive mechanisms for smartphone collaboration in data acquisition and distributed computing
-
L. Duan, T. Kubo, K. Sugiyama, J. Huang, T. Hasegawa, and J. Walrand, "Incentive mechanisms for smartphone collaboration in data acquisition and distributed computing," in Proceedings of IEEE INFOCOM, 2012, pp. 1701-1709.
-
(2012)
Proceedings of IEEE INFOCOM
, pp. 1701-1709
-
-
Duan, L.1
Kubo, T.2
Sugiyama, K.3
Huang, J.4
Hasegawa, T.5
Walrand, J.6
-
19
-
-
80052804290
-
Incentive-aware data dissemination in delay-tolerant mobile networks
-
T. Ning, Z. Yang, X. Xie, and H. Wu, "Incentive-aware data dissemination in delay-tolerant mobile networks," in Proceedings of IEEE SECON, 2011.
-
(2011)
Proceedings of IEEE SECON
-
-
Ning, T.1
Yang, Z.2
Xie, X.3
Wu, H.4
-
20
-
-
84861633626
-
A location-based incentive mechanism for participatory sensing systems with budget constraints
-
L. G. Jaimes, I. Vergara-Laurens, and M. A. Labrador, "A location-based incentive mechanism for participatory sensing systems with budget constraints," in Proceedings of IEEE PerCom, 2012, pp. 103-108.
-
(2012)
Proceedings of IEEE PerCom
, pp. 103-108
-
-
Jaimes, L.G.1
Vergara-Laurens, I.2
Labrador, M.A.3
-
21
-
-
84883113649
-
Self-interest-drive incentives for ad dissemination in autonomous mobile social networks
-
T. Ning, Z. Yang, H. Wu, and Z. Han, "Self-interest-drive incentives for ad dissemination in autonomous mobile social networks," in Proceedings of IEEE INFOCOM, 2013.
-
(2013)
Proceedings of IEEE INFOCOM
-
-
Ning, T.1
Yang, Z.2
Wu, H.3
Han, Z.4
-
22
-
-
84878812412
-
Efficient crowdsourcing of unknown experts using multi-armed bandits
-
L. Tran-Thanh, S. Stein, A. Rogers, and N. R. Jennings, "Efficient crowdsourcing of unknown experts using multi-armed bandits," in European Conference on Artificial Intelligence, 2012, pp. 768-773.
-
(2012)
European Conference on Artificial Intelligence
, pp. 768-773
-
-
Tran-Thanh, L.1
Stein, S.2
Rogers, A.3
Jennings, N.R.4
-
23
-
-
84866627852
-
Crowdsourcing to smartphones: Incentive mechanism design for mobile phone sensing
-
D. Yang, G. Xue, X. Fang, and J. Tang, "Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing," Proceedings of ACM MobiCom, 2012.
-
(2012)
Proceedings of ACM MobiCom
-
-
Yang, D.1
Xue, G.2
Fang, X.3
Tang, J.4
-
24
-
-
84906996359
-
A behavior-based incentive mechanism for crowd sensing with budget constraints
-
J. Sun and H. Ma, "A behavior-based incentive mechanism for crowd sensing with budget constraints," in Proceedings of IEEE ICC, 2014.
-
(2014)
Proceedings of IEEE ICC
-
-
Sun, J.1
Ma, H.2
-
25
-
-
35648982949
-
Preventing location-based identity inference in anonymous spatial queries
-
P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, "Preventing location-based identity inference in anonymous spatial queries," IEEE Transactions on Knowledge and Data Engineering, vol. 19, no. 12, pp. 1719-1733, 2007.
-
(2007)
IEEE Transactions on Knowledge and Data Engineering
, vol.19
, Issue.12
, pp. 1719-1733
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
26
-
-
36549043405
-
Protecting location privacy with personalized kanonymity: Architecture and algorithms
-
B. Gedik and L. Liu, "Protecting location privacy with personalized kanonymity: Architecture and algorithms," IEEE Transactions on Mobile Computing, vol. 7, no. 1, pp. 1-18, 2008.
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.1
, pp. 1-18
-
-
Gedik, B.1
Liu, L.2
-
27
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney, "k-anonymity: A model for protecting privacy," Interna-tional Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 05, pp. 557-570, 2002.
-
(2002)
Interna-tional Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
28
-
-
84905648159
-
-
K. Shilton, J. A. Burke, D. Estrin, M. Hansen, and M. Srivastava, "Participatory privacy in urban sensing," 2008.
-
(2008)
Participatory Privacy in Urban Sensing
-
-
Shilton, K.1
Burke, J.A.2
Estrin, D.3
Hansen, M.4
Srivastava, M.5
-
29
-
-
79551682845
-
Anonysense: A system for anonymous opportunistic sensing
-
M. Shin, C. Cornelius, D. Peebles, A. Kapadia, D. Kotz, and N. Triandopoulos, "Anonysense: A system for anonymous opportunistic sensing," Pervasive and Mobile Computing, vol. 7, no. 1, pp. 16-30, 2011.
-
(2011)
Pervasive and Mobile Computing
, vol.7
, Issue.1
, pp. 16-30
-
-
Shin, M.1
Cornelius, C.2
Peebles, D.3
Kapadia, A.4
Kotz, D.5
Triandopoulos, N.6
-
32
-
-
84883898504
-
Privacy preserving auctions and mechanism design
-
M. Naor, B. Pinkas, and R. Sumner, "Privacy preserving auctions and mechanism design," in Proceedings of the 1st ACM conference on Electronic commerce, 1999, pp. 129-139.
-
(1999)
Proceedings of the 1st ACM Conference on Electronic Commerce
, pp. 129-139
-
-
Naor, M.1
Pinkas, B.2
Sumner, R.3
-
34
-
-
84866489018
-
Private and verifiable interdomain routing decisions
-
M. Zhao, W. Zhou, A. J. Gurney, A. Haeberlen, M. Sherr, and B. T. Loo, "Private and verifiable interdomain routing decisions," in Proceedings of the ACM SIGCOMM, 2012, pp. 383-394.
-
(2012)
Proceedings of the ACM SIGCOMM
, pp. 383-394
-
-
Zhao, M.1
Zhou, W.2
Gurney, A.J.3
Haeberlen, A.4
Sherr, M.5
Loo, B.T.6
-
36
-
-
1342345050
-
Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters
-
W.-G. Tzeng, "Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters," IEEE Transactions on Computers, vol. 53, no. 2, pp. 232-240, 2004.
-
(2004)
IEEE Transactions on Computers
, vol.53
, Issue.2
, pp. 232-240
-
-
Tzeng, W.-G.1
-
37
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Advances in cryptologyŁEUROCRYPT99. Springer, 1999, pp. 223-238.
-
(1999)
Advances in cryptologyŁEUROCRYPT99. Springer
, pp. 223-238
-
-
Paillier, P.1
-
38
-
-
3142716056
-
Order preserving encryption for numeric data
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "Order preserving encryption for numeric data," in Proceedings of the 2004 ACM SIGMOD international conference on Management of data, 2004, pp. 563-574.
-
(2004)
Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
|