Author of the publication

Navigational path privacy protection: navigational path privacy protection.

, , , and . CIKM, page 691-700. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy-efficient and cost-effective web API invocations with transfer size reduction for mobile mashup applications., , , , , and . Wireless Networks, 20 (3): 361-378 (2014)On Searching Continuous k Nearest Neighbors in Wireless Data Broadcast Systems., , and . IEEE Trans. Mob. Comput., 6 (7): 748-761 (2007)Ranked Reverse Nearest Neighbor Search., , and . IEEE Trans. Knowl. Data Eng., 20 (7): 894-910 (2008)Querying Distributed Spatial Datasets with Unknown Regions., , and . IEEE Trans. Knowl. Data Eng., 26 (10): 2534-2547 (2014)Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks., , , and . IEEE Trans. Knowl. Data Eng., 25 (1): 76-91 (2013)Range-Based Nearest Neighbor Queries with Complex-Shaped Obstacles., , , and . IEEE Trans. Knowl. Data Eng., 30 (5): 963-977 (2018)Tracking Nearest Surrounders in Moving Object Environments., , , , and . ICPS, page 3-12. IEEE Computer Society, (2006)A New Trajectory Indexing Scheme for Moving Objects on Road Networks., , and . BNCOD, volume 4042 of Lecture Notes in Computer Science, page 291-294. Springer, (2006)Newsfeed Screening for Behavioral Therapy to Social Network Mental Disorders., , , , , and . CoRR, (2017)Exploring Social Influence for Recommendation - A Probabilistic Generative Model Approach, , and . CoRR, (2011)