Learn More
We present a new approach for if-anonymity protection in Location-Based Services (LBSs). Specifically, we depersonalize location information by ensuring that each location reported for LBSs is a cloaking area that contains K different footprints-historical locations of different mobile nodes. Therefore, the exact identity and location of the service(More)
Unlike conventional range queries, a range-monitoring query is a continuous query. It requires retrieving mobile objects inside a user-defined region and providing continuous updates as the objects move into and out of the region. In this paper, we present an efficient technique for real-time processing of such queries. In our approach, each mobile object(More)
A major concern for large-scale deployment of location-based services (LBSs) is the potential abuse of their client location data, which may imply sensitive personal information. Location privacy protection is challenging because a location itself may reveal a subject's identity. To support location anonymity, existing research reduces location resolution(More)
Anonymous location information may be correlated with restricted spaces such as home and office for subject re-identification. This makes it a great challenge to provide location privacy protection for users of location-based services. Existing work adopts traditional <i>K</i>-anonymity model and ensures that each location disclosed in service requests is a(More)
Today's Internet is incapable of handling information like a stop sign. Such information stays in a geographic region, consistently beams to the people who move into from certain direction. This paper presents a system aimed at bridging the Internet with the physical world. The hardware platform of the system consists of a central server and a set of(More)
Our physical environment is a natural storage where we can store and share information. For instance, a stop sign is a piece of information implanted in a particular location. In this paper, we propose a storage underlay platform called &#x201C;ELIAS&#x201D; (Every Location Is A Storage) for a mobile peer-to-peer system. ELIAS enables user applications to(More)
While location information is crucial to design efficient and scalable ad hoc networks, the exposure of such information presents them significant safety threats. This paper investigates the problem of preventing an adversary from locating (and thus destroying) nodes based on their location information revealed explicitly in communications. Our idea is to(More)
Intravascular ultrasound (IVUS) and intracardiac echography (ICE) catheters with real-time volumetric ultrasound imaging capability can provide unique benefits to many interventional procedures used in the diagnosis and treatment of coronary and structural heart diseases. Integration of capacitive micromachined ultrasonic transducer (CMUT) arrays with(More)
One of the most important promises of capacitive micromachined ultrasonic transducer (CMUT) technology is integration with electronics. This approach is required to minimize the parasitic capacitances in the receive mode, especially in catheter-based volumetric imaging arrays, for which the elements must be small. Furthermore, optimization of the available(More)
Multimedia streaming applications can signifincantly boost the value of mobile ad hoc networks (MANET). Live streaming, however, means continuous data delivery, which is a major challenge in MANET. Because of host mobility, a streaming path may be broken easily, causing streaming interruption. In this paper, we address this problem with a light-weighted yet(More)