Filters








984 Hits in 10.1 sec

Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services [article]

George Theodorakopoulos, Reza Shokri, Carmela Troncoso, Jean-Pierre Hubaux, Jean-Yves Le Boudec
2014 arXiv   pre-print
The optimality of the LPPMs in the context of trajectory privacy is a novel contribution, and it is achieved by formulating the LPPM design problem as a Bayesian Stackelberg game between the user and the  ...  By construction, our LPPMs take into account the sequential correlation across the user's exposed locations, providing the maximum possible trajectory privacy, i.e., privacy for the user's present location  ...  The former reveals the whole trajectory to the service provider, while the latter hides some parts.  ... 
arXiv:1409.1716v1 fatcat:2wdcp4iu3nafroln45rcazobha

Prolonging the Hide-and-Seek Game

George Theodorakopoulos, Reza Shokri, Carmela Troncoso, Jean-Pierre Hubaux, Jean-Yves Le Boudec
2014 Proceedings of the 13th Workshop on Privacy in the Electronic Society - WPES '14  
The optimality of the LPPMs in the context of trajectory privacy is a novel contribution, and it is achieved by formulating the LPPM design problem as a Bayesian Stackelberg game between the user and the  ...  By construction, our LPPMs take into account the sequential correlation across the user's exposed locations, providing the maximum possible trajectory privacy, i.e., privacy for the user's past, present  ...  Carmela Troncoso's research is partially supported by EU FP7 projects PRIPARE (GA No 610613) and LIFTGATE (GA No 285901).  ... 
doi:10.1145/2665943.2665946 dblp:conf/wpes/Theodorakopoulos14 fatcat:kxgxn57745ehfh5gdzothkcjei

An Evolutionary Game-Based Mechanism for Routing P2P Network Flow among Selfish Peers

Fang Zuo, Wei Zhang
2014 Journal of Networks  
Telecommunication networks need to support a wide range of services and functionalities with capability of autonomy, scalability and adaptability for managing applications to meet business needs.  ...  Networking devices are increasing in complexity among various services and platforms, from different vendors. The network complexity is required experts' operators.  ...  sink node, in order to optimize the existing network resources, and realize the goals of improving network service quality and prolong the network life cycle, some algorithm needs be proposed to compute  ... 
doi:10.4304/jnw.9.01.10-17 fatcat:tbmafdamk5am7a6ba26gsxzydq

The Sericum Via: A Serious Game For Preserving Tangible And Intangible Heritage Of Iran.pdf [article]

Sepehr Vaez Afshar, Sarvin Eshaghi
2021 figshare.com  
The Sericum Via: A Serious Game For Preserving Tangible And Intangible Heritage Of Iran Conference: ASCAAD 2021 Session: Computational Enculturation I Authors: Sarvin Eshaghi, Sepehr Vaez Afshar, Güzden  ...  Varinlioglu ASCAAD 2021: Architecture in the Age Of Disruptive Technologies Transformation and Challenges 9th International Conference of the Arab Society for Computer Aided Architectural Design Cairo  ...  Ikhwan Kim for his valuable contribution to the paper's process. Additionally, the game is available on https://drweeb.com/game/Sericum_Via.html. N. A. ALI, S. S. HOSNY, AND A. R.  ... 
doi:10.6084/m9.figshare.14384318.v1 fatcat:6hrsxig5efhojhw6m2wu6w7qfm

Sensor Networks for High-Confidence Cyber-Physical Systems

Feng Xia, Tridib Mukherjee, Yan Zhang, Ye-Qiong Song
2011 International Journal of Distributed Sensor Networks  
The energy efficiency optimization of the binary power control scheme for MIMO-OFDM wireless communication systems is formulated by Y.  ...  The selection provides a glimpse of the state-of-the-art research in the field. In the paper "A game theoretic approach for interuser interference reduction in body sensor networks," G.  ...  Universities (DUT10ZD110), the SRF for ROCS, SEM, and DUT Graduate School (JP201006).  ... 
doi:10.1155/2011/245734 fatcat:lswungc2orda5pcqvpyqu7vrna

An Introduction to Sensor Data Analytics [chapter]

Charu C. Aggarwal
2012 Managing and Mining Sensor Data  
Second, for choosing sensors to sample, the BBQ system poses an optimization problem of the following form: min So⊆S and B(So)≥1−δ. C(S o ), (2.2) Ken.  ...  This requires the development of trajectory mining techniques, which can mine the GPS data for interesting social patterns.  ...  The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on.  ... 
doi:10.1007/978-1-4614-6309-2_1 fatcat:pfbx566yfzgqpnjcuzonmxr23q

Game-theoretic and other Algorithmic Aspects of Mobile Crowdsensing

Julia Buwaya, Jose Rolim
2021
The Theory of Search Games and Rendezvous. Inter- national Series in Operations Research & Management Science. Springer US. isbn: 9780306482120. Alpern, Steve (1976). Hide and Seek Games.  ...  Based on this function, we defined three traversal strategies for the MC; a global-knowledge strategy that uses an integer linear program to optimize its trajectory; a global-knowledge strategy which tessellates  ... 
doi:10.13097/archive-ouverte/unige:157618 fatcat:gk6msq7fhbd3tfn3xkvqmu74wq

Smart Environments and Social Robots for Age-Friendly Integrated Care Services

Ionut Anghel, Tudor Cioara, Dorin Moldovan, Marcel Antal, Claudia Daniela Pop, Ioan Salomie, Cristina Bianca Pop, Viorica Rozina Chifu
2020 International Journal of Environmental Research and Public Health  
While demand for care and social services is steadily increasing, the supply is constrained by the decreasing workforce.  ...  In this study, we survey smart environments, machine learning and robot assistive technologies that can offer support for the independent living of older adults and provide age-friendly care services.  ...  Efforts need to be committed to integrate and further develop such technologies to realize advanced care services for prolonging the autonomy and well-being of older adults.  ... 
doi:10.3390/ijerph17113801 pmid:32471108 pmcid:PMC7312538 fatcat:ixzlchr75jg57ogggozteo7ene

State of the Art of Audio- and Video-Based Solutions for AAL

Slavisa ALeksic, Michael Atanasov, Jean Calleja Agius, Kenneth Camilleri, Anto Čartolovni, Pau Climent-Pérez, Sara Colantonio, Stefania Cristina, Vladimir Despotovic, Hazım Kemal Ekenel, Ekrem Erakin, Francisco Florez-Revuelta (+27 others)
2022 Zenodo  
The recent COVID-19 pandemic has stressed this situation even further, thus highlighting the need for taking action.  ...  In this respect, video- and audio-based AAL applications have several advantages, in terms of unobtrusiveness and information richness.  ...  Additionally, the video and audio data may be stored on a server, which can be either located at the premises of a third party (i.e., a cloud service provider), or located at the care and service provider  ... 
doi:10.5281/zenodo.6390708 fatcat:6qfwqd2v2rhe5iuu5zgz77ay4i

D1.4 ChildRescue Integrated Methodology, Release II

NTUA, Frankfurt University, The Smile Of The Child, Hellenic Red Cross, Child Focus, UBITECH, Suite5, SingularLogic
2019 Zenodo  
This deliverable will revise and finalize the ChildRescue integrated missing children investigation cycle methodology, as well as the requirements, taking into account the ChildRescue project advancements  ...  Privacy and Data location points; general mobile phone usage-user trajectories); GPS (log files); social networks (user check-ins e.g. from Foursquare, Facebook; geo-tagged images and videos e.g. from  ...  As already mentioned, people tend to return home daily and thus most daily and weekly trajectories will start and finish at the same location.  ... 
doi:10.5281/zenodo.3568120 fatcat:ln4dymxee5frzb3tvphaywhwwq

The Role of Social Movements, Coalitions, and Workers in Resisting Harmful Artificial Intelligence and Contributing to the Development of Responsible AI [article]

Susan von Struensee
2021 arXiv   pre-print
There is mounting public concern over the influence that AI based systems has in our society. Coalitions in all sectors are acting worldwide to resist hamful applications of AI.  ...  From indigenous people addressing the lack of reliable data, to smart city stakeholders, to students protesting the academic relationships with sex trafficker and MIT donor Jeffery Epstein, the questionable  ...  This paper presents a privacy rule conceptual model with the concepts of smart toy, mobile service, device, location, and guidance with related privacy entities: purpose, recipient, obligation, and retention  ... 
arXiv:2107.14052v1 fatcat:etqo64ksjzaihmt4kr7b6auxiu

Social Implications of Technology: The Past, the Present, and the Future

K. D. Stephan, K. Michael, M. G. Michael, L. Jacob, E. P. Anesta
2012 Proceedings of the IEEE  
This paper reviews the SSIT's contributions since the Society's founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future.  ...  We foresee major social implications in the increasing variety and sophistication of implant technologies, leading to cyborgs and human-machine hybrids.  ...  A five step overview of how the Wherify location based service works.  ... 
doi:10.1109/jproc.2012.2189919 fatcat:ipnfoyj4dnddvmfvgjuoymoiai

Cross-Covariance Models [chapter]

2017 Encyclopedia of GIS  
Efficient tools for extracting information from geo-spatial data are crucial to organizations which make decisions based on large spatial datasets, including the National Aeronautics and Space Administration  ...  The complexity of spatial data and intrinsic spatial relationships limits the usefulness of conventional data mining techniques for extracting spatial patterns.  ...  Cross-References Location-Based Services: Practices and Products Privacy Preservation of GPS Traces Cloaking Algorithms for Location Privacy Definition Spatial cloaking is a technique to blur a user's  ... 
doi:10.1007/978-3-319-17885-1_100240 fatcat:2ojzb7es7rhofinw4abol6dgc4

Framework for Computation Offloading in Mobile Cloud Computing

Dejan Kovachev, Ralf Klamma
2012 International Journal of Interactive Multimedia and Artificial Intelligence  
ACKNOWLEDGMENT The authors would like to thank Professors Omer Rana and José Cardoso e Cunha for the initial ideas on pattern and service abstractions, which ultimately conduced to this work.  ...  We thank Tian Yu for the prototype implementation.  ...  For privacy (requirement P1) the activation and resumption of a service should be password protected operations. 5) Multiple user service management: The interface is described in the multiple user service  ... 
doi:10.9781/ijimai.2012.171 fatcat:zeqxsym4f5ashmjkiivje2uoau

A Unified Approach to Preserving Cultural Software Objects and Their Development Histories A Unified Approach to Preserving Cultural Software Objects and Their Development Histories A Case Study in Academic Computer Games GAMES AND PLAYABLE MEDIA

Eric Kaltman, Santa Cruz, Noah Wardrip-Fruin, Santa Cruz, Henry Lowood, Stanford Caldwell, Santa Cruz
unpublished
This study of Prom Week seeks to do the same for small-scale software development work.  ...  Many services provide robust features for search and organization based on tags, keywords, and other service specific functionality.  ...  Library of Congress and the Institute of Museum and Library Services, and the Cabrinety Collection imaging project, funded by the National Institute for Standards and Technology.  ... 
fatcat:p7wigc2dpjd65lbjgosakkoaue
« Previous Showing results 1 — 15 out of 984 results