Author of the publication

GeoPrivacy 2014 workshop report: the First ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis, Dallas, Texas, USA - November 4, 2014.

, , and . SIGSPATIAL Special, 6 (3): 49 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Qualitative Spatial Change.. KI, 16 (4): 44 (2002)Analysis and evaluation of V*-kNN: an efficient algorithm for moving kNN queries., , , and . VLDB J., 19 (3): 307-332 (2010)"Don't trust anyone": Privacy protection for location-based services., and . Pervasive and Mobile Computing, 7 (1): 44-59 (2011)Optimizing query processing using selectivity-awareness in Wireless Sensor Networks., , and . Computers, Environment and Urban Systems, 33 (2): 79-89 (2009)GeoPrivacy 2014 workshop report: the First ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis, Dallas, Texas, USA - November 4, 2014., , and . SIGSPATIAL Special, 6 (3): 49 (2014)Location privacy for group meetups., , and . SIGSPATIAL/GIS, page 73:1-73:4. ACM, (2016)Load Balancing for Moving Object Management in a P2P Network., , , and . DASFAA, volume 4947 of Lecture Notes in Computer Science, page 251-266. Springer, (2008)Trajectory inference for mobile devices using connected cell towers., , , and . SIGSPATIAL/GIS, page 23:1-23:10. ACM, (2015)A Graded Approach to Directions between Extended Objects., , , and . GIScience, volume 2478 of Lecture Notes in Computer Science, page 119-131. Springer, (2002)Detecting unseen anomalies in weight training exercises., , , , and . OZCHI, page 517-526. ACM, (2016)