A quantum-inspired hybrid intelligent position monitoring system in wireless networks
暂无分享,去创建一个
[1] Zbigniew Michalewicz,et al. Genetic Algorithms + Data Structures = Evolution Programs , 1996, Springer Berlin Heidelberg.
[2] Jong-Hwan Kim,et al. Genetic quantum algorithm and its application to combinatorial optimization problem , 2000, Proceedings of the 2000 Congress on Evolutionary Computation. CEC00 (Cat. No.00TH8512).
[3] L. Zadeh. A COMPUTATIONAL APPROACH TO FUZZY QUANTIFIERS IN NATURAL LANGUAGES , 1983 .
[4] Mark S. Ackerman,et al. Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.
[5] Jianliang Xu,et al. Nearby Friend Alert: Location Anonymity in Mobile Geosocial Networks , 2013, IEEE Pervasive Computing.
[6] Michael Lindenbaum,et al. A Generic Grouping Algorithm and Its Quantitative Analysis , 1998, IEEE Trans. Pattern Anal. Mach. Intell..
[7] Ren-Hung Hwang,et al. A Novel Time-Obfuscated Algorithm for Trajectory Privacy Protection , 2014, IEEE Transactions on Services Computing.
[8] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[9] Tamir Tassa,et al. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering , 2013, IEEE Transactions on Knowledge and Data Engineering.
[10] Frederic T. Chong,et al. A Practical Architecture for Reliable Quantum Computers , 2002, Computer.
[11] Milena Radenkovic,et al. Efficient Location Privacy-Aware Forwarding in Opportunistic Mobile Networks , 2014, IEEE Transactions on Vehicular Technology.
[12] Kyriakos N. Sgarbas,et al. The Road to Quantum Artificial Intelligence , 2007, ArXiv.
[13] Arun Kumar Sangaiah,et al. Source Node Position Confidentiality (SNPC) Conserving Position Monitoring System for Wireless Networks , 2015 .
[14] Basel Alomair,et al. Toward a Statistical Framework for Source Anonymity in Sensor Networks , 2013, IEEE Transactions on Mobile Computing.
[15] Bor-Sen Chen,et al. Fuzzy tracking control design for nonlinear dynamic systems via T-S fuzzy model , 2001, IEEE Trans. Fuzzy Syst..
[16] Dong Hoon Lee,et al. Efficient Privacy-Preserving Authentication in Wireless Mobile Networks , 2014, IEEE Transactions on Mobile Computing.
[17] Zvi Drezner,et al. Facility location - applications and theory , 2001 .
[18] Jelena V. Misic,et al. Lightweight Privacy-Preserving and Secure Communication Protocol for Hybrid Ad Hoc Wireless Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[19] I. Chuang,et al. Quantum Computation and Quantum Information: Bibliography , 2010 .
[20] Anind K. Dey,et al. Who wants to know what when? privacy preference determinants in ubiquitous computing , 2003, CHI Extended Abstracts.
[21] Xiaohui Liang,et al. CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service , 2014, IEEE Internet of Things Journal.
[22] Sushil Jajodia,et al. Anonymity in Location-Based Services: Towards a General Framework , 2007, 2007 International Conference on Mobile Data Management.