Computer Science ›› 2016, Vol. 43 ›› Issue (Z6): 291-294.doi: 10.11896/j.issn.1002-137X.2016.6A.070
Previous Articles Next Articles
LI Xiang and SUN Hua-zhi
[1] Gedik B,Liu Ling.Protecting Location Privacy with Persona-lized k-Anonymity:Architecture and Algorithms[J].IEEE Transactions on Mobile Computing,2008,7(1):1-18 [2] Gruteser M,Grunwald D.Anonymous usage of location based services through spatial and temporal cloaking[C]∥ACM/USENIX MobiSys.2003 [3] Culler D,Estrin D,Srivastava M.Overview of Sensor Networks[J].IEEE Computer Society,2004,37(8):41-49 [4] Tan H P,Lee W K G,Zhi A E.Impact of Power Control in Wireless Sensor Networks Powered by Ambient Energy Harvesting (WSN-HEAP) for Railroad Health Monitoring[C]∥Advanced Information Networking and Applications Workshops.2009 [5] Wei Cao,Ge Xu,Gao Yan-qing.Using Wireless Sensor Networking (WSN) to Manage Micro-Climate in Greenhouse[J].Ma-nufacturing Enterprise Solutions Association,2008,7(3):6360641 [6] Matusik J,Scholtzova E,Tunega D.Influence of Synthesis Conditions on the Formation of a Icaolinite-Methand Complex and Simulations of ITS Uibrational Spectra[J].Clays and Clay Mine-rals,2012,0(3):227 [7] Campo Y,Llibre E,J F.WSNHM:Energy-efficient WirelessSensor Network for home monitoring[C]∥2009 5th International Conference on Intelligent Sensors,Sensor Networks and Information Processing (ISSNIP).2009 [8] Tang Ming,Wu Qian-hong,Zhang Guo-ping.A New Scheme of LBS Privacy Protection[C]∥ Proceedings of the 5th InternationalConference on Wireless Communications,Networking and Mobile Computing.2009:1-6 |
No related articles found! |
|