Database Reference
In-Depth Information
[26] B. Calmels, S. Canard, M. Girault, H. Sibert. Low-cost cryptog-
raphy for privacy in RFID systems,
Proceedings of IFIP CARIDS
,
2006.
[27] F. Chang et al. Bigtable: A Distributed Storage System for Struc-
tured Data,
OSDI
, 2006.
[28] H. Chen, W.-S. Ku, H. Wang, M.-T. Sun. Leveraging Spatio-
Temporal Redundancy for RFID Data Cleansing.
ACM SIGMOD
Conference
, 2010.
[29] C.-Y. Chow, M. F. Mokbel. Privacy of Spatial Trajectories.
Com-
puting with Spatial Trajectories
, pp. 109-141, 2011.
[30] I. Constandache, R. Choudhury, I. Rhee. Towards mobile phone
localization without war-driving,
INFOCOM Conference
, 2010.
[31] D. Cook, L. Holder. Sensor selection to support practical use of
health-monitoring smart environments.
Wiley Interdisc. Rev.: Data
Mining and Knowledge Discovery
1(4): pp. 339-351, 2011.
[32] R. Cyganiak. A Relational Algebra for SPARQL,
HP-Labs Techni-
cal Report, HPL-2005-170
.
html
.
[33] J. Dean, S. Ghemawat. MapReduce: A flexible data processing took,
Communication of the ACM
, Vol. 53, pp. 72-77, 2010.
[34] A. Deshpande, C. Guestrin, S. Madden, J. Hellerstein, W. Hong.
Model-driven data acquisition in sensor networks.
VLDB
, 2004.
[35] L. Ding et al. Swoogle: A Semantic Web and Metadata Search En-
gine,
ACM CIKM Conference
, 2004.
[36] M. Schmitter-Edgecombe, P. Rashidi, D. Cook, L. Holder. Discover-
ing and Tracking Activities for Assisted Living,
The American Jour-
nal of Geriatric Psychiatry
, In Press, 2011.
[37] M. Feldhofer, S. Dominikus, J. Wolkerstorfer. Strong authentication
for RFID systems using AES algorithm,
Proceedings of Workshop on
Cryptographic Hardware and Embedded Systems
, 2004.
[38] F. Gandon, N. Sadeh. Semantic Web Technologies to Reconcile Pri-
vacy and Context Awareness,
Web Semantics: Science, Services and
Agents on the Worldwide Web
, 1(3), pp. 241-260, 2004.
[39] A. Gangemi. DOLCE UltraLite OWL Ontology,
http://www.
[40] S. L. Garfinkel, A. Juels, R. Pappu. RFID Privacy: An Overview of
Problems and Proposed Solutions,
IEEE Security and Privacy
, 3(3),
2005.