Author of the publication

A dummy-based anonymization method based on user trajectory with pauses.

, , , , , , and . SIGSPATIAL/GIS, page 249-258. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integration of traffic reduction and sleep scheduling for energy-efficient data gathering in wireless sensor networks., , , and . Comput. Syst. Sci. Eng., (2013)Single Target Tracking in Bionanosensor Networks: Preliminary Simulation Results., , , and . BODYNETS, page 476-477. ICST, (2013)Updated data dissemination methods for updating old replicas in ad hoc networks., , and . Personal and Ubiquitous Computing, 9 (5): 273-283 (2005)Virtual Space Broadcasting based on the Speed of Avatar Movement., , and . EuroIMSA, page 311-317. IASTED/ACTA Press, (2005)Database Compression with Data Mining Methods., , , , and . FODO, page 97-106. (1998)Scheduling and caching strategies for broadcasting correlated data., , , and . SAC, page 504-510. ACM, (2001)An adaptive TDMA slot assignment protocol in ad hoc sensor networks., , and . SAC, page 1160-1165. ACM, (2005)A system for controlling LED blink in wearable fashion., , and . IWCMC, page 665-670. ACM, (2007)A game based approach to assign geographical relevance to web images., , , , and . WWW, page 811-820. ACM, (2009)Communication-efficient preference top-k monitoring queries via subscriptions., , and . SSDBM, page 44:1-44:4. ACM, (2014)