Author of the publication

A dummy-based anonymization method based on user trajectory with pauses.

, , , , , , and . SIGSPATIAL/GIS, page 249-258. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bacterium-based Mobile Bionanosensor Networks for Target Tracking: A Biologically Realistic Model., , , , and . BICT, ICST, (2014)Epidemic Information Dissemination for Molecular Communication among Mobile Bio-nanomachines., , , and . NANOCOM, page 41:1-41:2. ACM, (2016)Target Detection and Tracking by Bionanosensor Networks, , , and . Springer Briefs in Computer Science Springer, (2016)Access Skew Detection for Dynamic Database Relocation., , , , and . Informatica (Slovenia), (2000)Top-k Query Processing and Malicious Node Identification Based on Node Grouping in MANETs., , , and . IEEE Access, (2016)In Silico Experiments of Mobile Bionanosensor Networks for Target Tracking., , , and . NANOCOM, page 14:1-14:6. ACM, (2015)A Replica Allocation Method Adapting to Topology Changes in Ad Hoc Networks., , and . DEXA, volume 3588 of Lecture Notes in Computer Science, page 868-878. Springer, (2005)Monitoring Range Motif on Streaming Time-Series., , , and . DEXA (1), volume 11029 of Lecture Notes in Computer Science, page 251-266. Springer, (2018)Image classification for mobile web browsing., , and . WWW, page 43-52. ACM, (2006)Cooperative caching by mobile clients in push-based information systems.. CIKM, page 186-193. ACM, (2002)