Xinlei Oscar Wang

Learn More
—In this paper, we present a trust model to evaluate the trustworthiness of information as well as the information publishing nodes based on the information provenance. We consider two factors in evaluating the provenance-based information trust: Path Similarity and Information Similarity. In multihop networks, information can flow through multiple hops(More)
—With the proliferation of sensor-embedded mobile computing devices, participatory sensing is becoming popular to collect information from and outsource tasks to participating users. These applications deal with a lot of personal information, e.g., users' identities and locations at a specific time. Therefore, we need to pay a deeper attention to privacy(More)
—The quality of information is crucial for decision making in many dynamic information sharing environments such as sensor and tactical networks. Information trustworthiness is an essential parameter in assessing the information quality. In this paper, we present a trust model to evaluate the trustworthiness of information as well as information publishing(More)
—Location-based services are quickly becoming immensely popular. In addition to services based on users' current location, many potential services rely on users' location history, or their spatial-temporal provenance. Malicious users may lie about their spatial-temporal provenance without a carefully designed security system for users to prove their past(More)
—Mobile sensing is becoming a popular paradigm to collect information from and outsource tasks to mobile users. These applications deal with lot of personal information, e.g., identity and location. Therefore, we need to pay a deeper attention to privacy and anonymity. However, the knowledge of the data source is desired to evaluate the trustworthiness of(More)
—Deployment of public wireless access points (also known as public hotspots) and the prevalence of portable computing devices has made it more convenient for people on travel to access the Internet. On the other hand, it also generates large privacy concerns due to the open environment. However, most users are neglecting the privacy threats because(More)
—In distributed network environments, decisions must often be made based on incomplete or uncertain evidence whose sources may be dependent. Properly fusing potentially unreliable and dependent information from multiple sources is critical to effective decision making. Transferable Belief Model (TBM), an extension of Dempster-Shafer Theory (DST), is a well(More)
—This paper presents a tool ProNet, that is used to obtain the network trust based on incomplete provenance. We consider a multihop scenario where a set of source nodes observe an event and disseminate their observations as an information item through a multihop path to the command center. Nodes are assumed to embed their provenance details on the(More)
—Location-based services are quickly becoming immensely popular. In addition to services based on users' current location, many potential services rely on users' location history, or their spatial-temporal provenance. Malicious users may lie about their spatial-temporal provenance without a carefully designed security system for users to prove their past(More)
Eclipse and Netbeans are two top of the line Integrated Development Environments (IDEs) for Java development. Both of them provide support for a wide variety of development tasks and have a large user base. This paper provides an analysis and comparison for the compatibility and stability of Eclipse and Netbeans on the three most commonly used operating(More)
  • 1