A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services
[article]
2014
arXiv
pre-print
The optimality of the LPPMs in the context of trajectory privacy is a novel contribution, and it is achieved by formulating the LPPM design problem as a Bayesian Stackelberg game between the user and the ...
By construction, our LPPMs take into account the sequential correlation across the user's exposed locations, providing the maximum possible trajectory privacy, i.e., privacy for the user's present location ...
The former reveals the whole trajectory to the service provider, while the latter hides some parts. ...
arXiv:1409.1716v1
fatcat:2wdcp4iu3nafroln45rcazobha
Prolonging the Hide-and-Seek Game
2014
Proceedings of the 13th Workshop on Privacy in the Electronic Society - WPES '14
The optimality of the LPPMs in the context of trajectory privacy is a novel contribution, and it is achieved by formulating the LPPM design problem as a Bayesian Stackelberg game between the user and the ...
By construction, our LPPMs take into account the sequential correlation across the user's exposed locations, providing the maximum possible trajectory privacy, i.e., privacy for the user's past, present ...
Carmela Troncoso's research is partially supported by EU FP7 projects PRIPARE (GA No 610613) and LIFTGATE (GA No 285901). ...
doi:10.1145/2665943.2665946
dblp:conf/wpes/Theodorakopoulos14
fatcat:kxgxn57745ehfh5gdzothkcjei
An Evolutionary Game-Based Mechanism for Routing P2P Network Flow among Selfish Peers
2014
Journal of Networks
Telecommunication networks need to support a wide range of services and functionalities with capability of autonomy, scalability and adaptability for managing applications to meet business needs. ...
Networking devices are increasing in complexity among various services and platforms, from different vendors. The network complexity is required experts' operators. ...
sink node, in order to optimize the existing network resources, and realize the goals of improving network service quality and prolong the network life cycle, some algorithm needs be proposed to compute ...
doi:10.4304/jnw.9.01.10-17
fatcat:tbmafdamk5am7a6ba26gsxzydq
The Sericum Via: A Serious Game For Preserving Tangible And Intangible Heritage Of Iran.pdf
[article]
2021
figshare.com
The Sericum Via: A Serious Game For Preserving Tangible And Intangible Heritage Of Iran Conference: ASCAAD 2021 Session: Computational Enculturation I Authors: Sarvin Eshaghi, Sepehr Vaez Afshar, Güzden ...
Varinlioglu ASCAAD 2021: Architecture in the Age Of Disruptive Technologies Transformation and Challenges 9th International Conference of the Arab Society for Computer Aided Architectural Design Cairo ...
Ikhwan Kim for his valuable contribution to the paper's process. Additionally, the game is available on https://drweeb.com/game/Sericum_Via.html.
N. A. ALI, S. S. HOSNY, AND A. R. ...
doi:10.6084/m9.figshare.14384318.v1
fatcat:6hrsxig5efhojhw6m2wu6w7qfm
Sensor Networks for High-Confidence Cyber-Physical Systems
2011
International Journal of Distributed Sensor Networks
The energy efficiency optimization of the binary power control scheme for MIMO-OFDM wireless communication systems is formulated by Y. ...
The selection provides a glimpse of the state-of-the-art research in the field. In the paper "A game theoretic approach for interuser interference reduction in body sensor networks," G. ...
Universities (DUT10ZD110), the SRF for ROCS, SEM, and DUT Graduate School (JP201006). ...
doi:10.1155/2011/245734
fatcat:lswungc2orda5pcqvpyqu7vrna
An Introduction to Sensor Data Analytics
[chapter]
2012
Managing and Mining Sensor Data
Second, for choosing sensors to sample, the BBQ system poses an optimization problem of the following form: min So⊆S and B(So)≥1−δ. C(S o ), (2.2) Ken. ...
This requires the development of trajectory mining techniques, which can mine the GPS data for interesting social patterns. ...
The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on. ...
doi:10.1007/978-1-4614-6309-2_1
fatcat:pfbx566yfzgqpnjcuzonmxr23q
Game-theoretic and other Algorithmic Aspects of Mobile Crowdsensing
2021
The Theory of Search Games and Rendezvous. Inter-
national Series in Operations Research & Management Science. Springer US.
isbn: 9780306482120.
Alpern, Steve (1976). Hide and Seek Games. ...
Based on this function, we defined three traversal strategies for
the MC; a global-knowledge strategy that uses an integer linear program to optimize
its trajectory; a global-knowledge strategy which tessellates ...
doi:10.13097/archive-ouverte/unige:157618
fatcat:gk6msq7fhbd3tfn3xkvqmu74wq
Smart Environments and Social Robots for Age-Friendly Integrated Care Services
2020
International Journal of Environmental Research and Public Health
While demand for care and social services is steadily increasing, the supply is constrained by the decreasing workforce. ...
In this study, we survey smart environments, machine learning and robot assistive technologies that can offer support for the independent living of older adults and provide age-friendly care services. ...
Efforts need to be committed to integrate and further develop such technologies to realize advanced care services for prolonging the autonomy and well-being of older adults. ...
doi:10.3390/ijerph17113801
pmid:32471108
pmcid:PMC7312538
fatcat:ixzlchr75jg57ogggozteo7ene
State of the Art of Audio- and Video-Based Solutions for AAL
2022
Zenodo
The recent COVID-19 pandemic has stressed this situation even further, thus highlighting the need for taking action. ...
In this respect, video- and audio-based AAL applications have several advantages, in terms of unobtrusiveness and information richness. ...
Additionally, the video and audio data may be stored on a server, which can be either located at the premises of a third party (i.e., a cloud service provider), or located at the care and service provider ...
doi:10.5281/zenodo.6390708
fatcat:6qfwqd2v2rhe5iuu5zgz77ay4i
D1.4 ChildRescue Integrated Methodology, Release II
2019
Zenodo
This deliverable will revise and finalize the ChildRescue integrated missing children investigation cycle methodology, as well as the requirements, taking into account the ChildRescue project advancements ...
Privacy and Data
location points; general mobile phone usage-user trajectories); GPS (log files); social networks (user check-ins e.g. from Foursquare, Facebook; geo-tagged images and videos e.g. from ...
As already mentioned, people tend to return home daily and thus most daily and weekly trajectories will start and finish at the same location. ...
doi:10.5281/zenodo.3568120
fatcat:ln4dymxee5frzb3tvphaywhwwq
The Role of Social Movements, Coalitions, and Workers in Resisting Harmful Artificial Intelligence and Contributing to the Development of Responsible AI
[article]
2021
arXiv
pre-print
There is mounting public concern over the influence that AI based systems has in our society. Coalitions in all sectors are acting worldwide to resist hamful applications of AI. ...
From indigenous people addressing the lack of reliable data, to smart city stakeholders, to students protesting the academic relationships with sex trafficker and MIT donor Jeffery Epstein, the questionable ...
This paper presents a privacy rule conceptual model with the concepts of smart toy, mobile service, device, location, and guidance with related privacy entities: purpose, recipient, obligation, and retention ...
arXiv:2107.14052v1
fatcat:etqo64ksjzaihmt4kr7b6auxiu
Social Implications of Technology: The Past, the Present, and the Future
2012
Proceedings of the IEEE
This paper reviews the SSIT's contributions since the Society's founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. ...
We foresee major social implications in the increasing variety and sophistication of implant technologies, leading to cyborgs and human-machine hybrids. ...
A five step overview of how the Wherify location based service works. ...
doi:10.1109/jproc.2012.2189919
fatcat:ipnfoyj4dnddvmfvgjuoymoiai
Cross-Covariance Models
[chapter]
2017
Encyclopedia of GIS
Efficient tools for extracting information from geo-spatial data are crucial to organizations which make decisions based on large spatial datasets, including the National Aeronautics and Space Administration ...
The complexity of spatial data and intrinsic spatial relationships limits the usefulness of conventional data mining techniques for extracting spatial patterns. ...
Cross-References Location-Based Services: Practices and Products Privacy Preservation of GPS Traces
Cloaking Algorithms for Location Privacy
Definition Spatial cloaking is a technique to blur a user's ...
doi:10.1007/978-3-319-17885-1_100240
fatcat:2ojzb7es7rhofinw4abol6dgc4
Framework for Computation Offloading in Mobile Cloud Computing
2012
International Journal of Interactive Multimedia and Artificial Intelligence
ACKNOWLEDGMENT The authors would like to thank Professors Omer Rana and José Cardoso e Cunha for the initial ideas on pattern and service abstractions, which ultimately conduced to this work. ...
We thank Tian Yu for the prototype implementation. ...
For privacy (requirement P1) the activation and resumption of a service should be password protected operations. 5) Multiple user service management: The interface is described in the multiple user service ...
doi:10.9781/ijimai.2012.171
fatcat:zeqxsym4f5ashmjkiivje2uoau
A Unified Approach to Preserving Cultural Software Objects and Their Development Histories A Unified Approach to Preserving Cultural Software Objects and Their Development Histories A Case Study in Academic Computer Games GAMES AND PLAYABLE MEDIA
unpublished
This study of Prom Week seeks to do the same for small-scale software development work. ...
Many services provide robust features for search and organization based on tags, keywords, and other service specific functionality. ...
Library of Congress and the Institute of Museum and Library Services, and the Cabrinety Collection imaging project, funded by the National Institute for Standards and Technology. ...
fatcat:p7wigc2dpjd65lbjgosakkoaue
« Previous
Showing results 1 — 15 out of 984 results