-
5
-
-
0016998643
-
The distribution of the distance between random points
-
V. S. Alagar. The distribution of the distance between random points. Journal of Applied Probability, pages 558-566, 1976
-
(1976)
Journal of Applied Probability
, pp. 558-566
-
-
Alagar, V.S.1
-
6
-
-
77952741387
-
Matrix completion with noise
-
E. J. Candes and Y. Plan. Matrix completion with noise. Proceedings of the IEEE, 98(6):925-936, 2010
-
(2010)
Proceedings of the IEEE
, vol.98
, Issue.6
, pp. 925-936
-
-
Candes, E.J.1
Plan, Y.2
-
7
-
-
76149103618
-
Casper: Query processing for location services without compromising privacy
-
C.-Y. Chow, M. F. Mokbel, and W. G. Aref. Casper: Query processing for location services without compromising privacy. ACM Transactions on Database Systems, 34(4):24-48, 2009
-
(2009)
ACM Transactions on Database Systems
, vol.34
, Issue.4
, pp. 24-48
-
-
Chow, C.-Y.1
Mokbel, M.F.2
Aref, W.G.3
-
10
-
-
84904438519
-
Trac: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing
-
Z. Feng, Y. Zhu, Q. Zhang, L. M. Ni, and A. V. Vasilakos. Trac: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing. In IEEE INFOCOM, 2014
-
(2014)
IEEE INFOCOM
-
-
Feng, Z.1
Zhu, Y.2
Zhang, Q.3
Ni, L.M.4
Vasilakos, A.V.5
-
11
-
-
81355138524
-
Mobile crowdsensing: Current state and future challenges
-
R. K. Ganti, F. Ye, and H. Lei. Mobile crowdsensing: current state and future challenges. IEEE Communications Magazine, 49(11):32-39, 2011
-
(2011)
IEEE Communications Magazine
, vol.49
, Issue.11
, pp. 32-39
-
-
Ganti, R.K.1
Ye, F.2
Lei, H.3
-
12
-
-
57149129292
-
Private queries in location based services: Anonymizers are not necessary
-
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan. Private queries in location based services: anonymizers are not necessary. In ACM SIGMOD, 2008
-
(2008)
ACM SIGMOD
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.-L.5
-
13
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In ACM MobiSys, 2003
-
(2003)
ACM MobiSys
-
-
Gruteser, M.1
Grunwald, D.2
-
14
-
-
84902108760
-
Approximation-tolerant modelbased compressive sensing
-
C. Hegde, P. Indyk, and L. Schmidt. Approximation-tolerant modelbased compressive sensing. In ACM/SIAM SODA, 2014
-
(2014)
ACM/SIAM SODA
-
-
Hegde, C.1
Indyk, P.2
Schmidt, L.3
-
15
-
-
84924469685
-
Protecting location privacy through path confusion
-
B. Hoh and M. Gruteser. Protecting location privacy through path confusion. In IEEE SecureComm, 2005
-
(2005)
IEEE SecureComm
-
-
Hoh, B.1
Gruteser, M.2
-
16
-
-
84865622135
-
Neteye: A user-centered wireless sensor network testbed for high-fidelity, robust experimentation
-
X. Ju, H. Zhang, and D. Sakamuri. Neteye: a user-centered wireless sensor network testbed for high-fidelity, robust experimentation. International Journal of Communication Systems, 25(9):1213-1229, 2012
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.9
, pp. 1213-1229
-
-
Ju, X.1
Zhang, H.2
Sakamuri, D.3
-
17
-
-
84905695725
-
Socialloc: Improving indoor localization with social sensing
-
J. Jun, Y. Gu, L. Cheng, B. Lu, J. Sun, T. Zhu, and J. Niu. Socialloc: Improving indoor localization with social sensing. In ACM SenSys, 2013
-
(2013)
ACM SenSys
-
-
Jun, J.1
Gu, Y.2
Cheng, L.3
Lu, B.4
Sun, J.5
Zhu, T.6
Niu, J.7
-
18
-
-
84883115549
-
Search me if you can: Privacy-preserving location query service
-
T. Jung and X.-Y. Li. Search me if you can: privacy-preserving location query service. In IEEE INFOCOM, 2013
-
(2013)
IEEE INFOCOM
-
-
Jung, T.1
Li, X.-Y.2
-
19
-
-
79956336345
-
An anonymous communication technique using dummies for location-based services
-
H. Kido, Y. Yanagisawa, and T. Satoh. An anonymous communication technique using dummies for location-based services. In IEEE ICPS, 2005
-
(2005)
IEEE ICPS
-
-
Kido, H.1
Yanagisawa, Y.2
Satoh, T.3
-
20
-
-
84883073410
-
Data loss and reconstruction in sensor networks
-
L. Kong, M. Xia, X.-Y. Liu, M.-Y. Wu, and X. Liu. Data loss and reconstruction in sensor networks. In IEEE INFOCOM, 2013
-
(2013)
IEEE INFOCOM
-
-
Kong, L.1
Xia, M.2
Liu, X.-Y.3
Wu, M.-Y.4
Liu, X.5
-
21
-
-
11244265269
-
Structural analysis of network traffic flows
-
A. Lakhina, K. Papagiannaki, M. Crovella, C. Diot, E. D. Kolaczyk, and N. Taft. Structural analysis of network traffic flows. In ACM SIGMETRICS, 2004
-
(2004)
ACM SIGMETRICS
-
-
Lakhina, A.1
Papagiannaki, K.2
Crovella, M.3
Diot, C.4
Kolaczyk, E.D.5
Taft, N.6
-
22
-
-
84873449721
-
Energy efficient GPS sensing with cloud offloading
-
J. Liu, B. Priyantha, T. Hart, H. S. Ramos, A. A. Loureiro, and Q. Wang. Energy efficient GPS sensing with cloud offloading. In ACM SenSys, 2012
-
(2012)
ACM SenSys
-
-
Liu, J.1
Priyantha, B.2
Hart, T.3
Ramos, H.S.4
Loureiro, A.A.5
Wang, Q.6
-
23
-
-
84901259803
-
Todmis: Mining communities from trajectories
-
S. Liu, S. Wang, K. Jayarajah, A. Misra, and R. Krishnan. Todmis: Mining communities from trajectories. In ACM CIKM, 2013
-
(2013)
ACM CIKM
-
-
Liu, S.1
Wang, S.2
Jayarajah, K.3
Misra, A.4
Krishnan, R.5
-
24
-
-
78649253198
-
Privacy vulnerability of published anonymous mobility traces
-
C. Y. Ma, D. K. Yau, N. K. Yip, and N. S. Rao. Privacy vulnerability of published anonymous mobility traces. In ACM MOBICOM, 2010
-
(2010)
ACM MOBICOM
-
-
Ma, C.Y.1
Yau, D.K.2
Yip, N.K.3
Rao, N.S.4
-
25
-
-
84893434897
-
Hidden markov map matching through noise and sparseness
-
P. Newson and J. Krumm. Hidden markov map matching through noise and sparseness. In ACM SIGSPATIAL, 2009
-
(2009)
ACM SIGSPATIAL
-
-
Newson, P.1
Krumm, J.2
-
26
-
-
1542358974
-
Trajectory based forwarding and its applications
-
D. Niculescu and B. Nath. Trajectory based forwarding and its applications. In ACM MOBICOM, 2003
-
(2003)
ACM MOBICOM
-
-
Niculescu, D.1
Nath, B.2
-
27
-
-
84904104432
-
Spotme if you can: Randomized responses for location obfuscation on mobile phones
-
D. Quercia, I. Leontiadis, L. McNamara, C. Mascolo, and J. Crowcroft. Spotme if you can: Randomized responses for location obfuscation on mobile phones. In IEEE ICDCS, 2011
-
(2011)
IEEE ICDCS
-
-
Quercia, D.1
Leontiadis, I.2
McNamara, L.3
Mascolo, C.4
Crowcroft, J.5
-
28
-
-
80053581300
-
Sociablesense: Exploring the trade-offs of adaptive sampling and computation offloading for social sensing
-
K. K. Rachuri, C. Mascolo, M. Musolesi, and P. J. Rentfrow. Sociablesense: exploring the trade-offs of adaptive sampling and computation offloading for social sensing. In ACM MOBICOM, 2011
-
(2011)
ACM MOBICOM
-
-
Rachuri, K.K.1
Mascolo, C.2
Musolesi, M.3
Rentfrow, P.J.4
-
29
-
-
78649262078
-
Exploiting temporal stability and low-rank structure for localization in mobile networks
-
S. Rallapalli, L. Qiu, Y. Zhang, and Y.-C. Chen. Exploiting temporal stability and low-rank structure for localization in mobile networks. In ACM MOBICOM, 2010
-
(2010)
ACM MOBICOM
-
-
Rallapalli, S.1
Qiu, L.2
Zhang, Y.3
Chen, Y.-C.4
-
30
-
-
24644477726
-
3D trajectory recovery for tracking multiple objects and trajectory guided recognition of actions
-
R. Rosales and S. Sclaroff. 3D trajectory recovery for tracking multiple objects and trajectory guided recognition of actions. In IEEE CVPR, 1999
-
(1999)
IEEE CVPR
-
-
Rosales, R.1
Sclaroff, S.2
-
31
-
-
77249085569
-
A linearinterpolation-based controller design for trajectory tracking of mobile robots
-
G. Scaglia, A. Rosales, L. Quintero, V. Mut, and R. Agarwal. A linearinterpolation-based controller design for trajectory tracking of mobile robots. Elsevier Control Engineering Practice, 18(3):318-329, 2010
-
(2010)
Elsevier Control Engineering Practice
, vol.18
, Issue.3
, pp. 318-329
-
-
Scaglia, G.1
Rosales, A.2
Quintero, L.3
Mut, V.4
Agarwal, R.5
-
32
-
-
84878726112
-
Twitsper: Tweeting privately
-
I. Singh, M. Butkiewicz, H. V. Madhyastha, S. V. Krishnamurthy, and S. Addepalli. Twitsper: Tweeting privately. IEEE Security & Privacy, 11(3):46-50, 2013
-
(2013)
IEEE Security & Privacy
, vol.11
, Issue.3
, pp. 46-50
-
-
Singh, I.1
Butkiewicz, M.2
Madhyastha, H.V.3
Krishnamurthy, S.V.4
Addepalli, S.5
-
33
-
-
84883076420
-
Accurate, low-energy trajectory mapping for mobile devices
-
A. Thiagarajan, L. Ravindranath, H. Balakrishnan, S. Madden, L. Girod, et al. Accurate, low-energy trajectory mapping for mobile devices. In USENIX NSDI, 2011
-
(2011)
USENIX NSDI
-
-
Thiagarajan, A.1
Ravindranath, L.2
Balakrishnan, H.3
Madden, S.4
Girod, L.5
-
35
-
-
84904430836
-
Electronic frog eye: Counting crowd using wifi
-
W. Xi, J. Zhao, X.-Y. Li, K. Zhao, S. Tang, X. Liu, and Z. Jiang. Electronic frog eye: Counting crowd using wifi. In IEEE INFOCOM, 2014
-
(2014)
IEEE INFOCOM
-
-
Xi, W.1
Zhao, J.2
Li, X.-Y.3
Zhao, K.4
Tang, S.5
Liu, X.6
Jiang, Z.7
-
36
-
-
84944330619
-
Effective real-time android application auditing
-
M. Xia, L. Gong, Y. Lv, Z. Qi, and X. Liu. Effective real-time android application auditing. In IEEE S&P, 2015
-
(2015)
IEEE S&P
-
-
Xia, M.1
Gong, L.2
Lv, Y.3
Qi, Z.4
Liu, X.5
-
37
-
-
74049157401
-
Feeling-based location privacy protection for locationbased services
-
T. Xu and Y. Cai. Feeling-based location privacy protection for locationbased services. In ACM CCS, 2009
-
(2009)
ACM CCS
-
-
Xu, T.1
Cai, Y.2
-
38
-
-
80053584816
-
Anonymization of location data does not work: A large-scale measurement study
-
H. Zang and J. Bolot. Anonymization of location data does not work: A large-scale measurement study. In ACM MOBICOM, 2011
-
(2011)
ACM MOBICOM
-
-
Zang, H.1
Bolot, J.2
-
39
-
-
79960852449
-
Sparse target counting and localization in sensor networks based on compressive sensing
-
B. Zhang, X. Cheng, N. Zhang, Y. Cui, Y. Li, and Q. Liang. Sparse target counting and localization in sensor networks based on compressive sensing. In IEEE INFOCOM, 2011
-
(2011)
IEEE INFOCOM
-
-
Zhang, B.1
Cheng, X.2
Zhang, N.3
Cui, Y.4
Li, Y.5
Liang, Q.6
-
40
-
-
84890886307
-
An adaptive privacypreserving scheme for location tracking of a mobile user
-
J. Zhu, K.-H. Kim, P. Mohapatra, and P. Congdon. An adaptive privacypreserving scheme for location tracking of a mobile user. In IEEE SECON, 2013
-
(2013)
IEEE SECON
-
-
Zhu, J.1
Kim, K.-H.2
Mohapatra, P.3
Congdon, P.4
|