[1]
AR Beresford, J Bacon. Intelligent Transportation System. Pervasive Computing, IEEE, 2006. Volume5 , Issue4: 63- 67.
Google Scholar
[2]
Khaled Ibrahim, Michele C Weigle. Accurate data aggregation for VANETs. VANET '07 Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks: 71-72.
DOI: 10.1145/1287748.1287761
Google Scholar
[3]
Yixin Chen, Guozhu Dong, Jiawei Han, BW Wah, J Wang. Multi-dimensional regression analysis of time-series data streams. VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases: 323-334.
DOI: 10.1016/b978-155860869-6/50036-6
Google Scholar
[4]
Umeshwar Dayal, Malu Castellanos, Alkis Simitsis. Data integration flows for business intelligence. EDBT '09 Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology: 1-11.
DOI: 10.1145/1516360.1516362
Google Scholar
[5]
Mohamed Medhat Gaber, Arkady Zaslavsky, Shonali Krishnaswamy. Mining Data Streams: A Review. ACM SIGMOD Record Homepage archive, June 2005, Volume 34 Issue 2: 18- 26.
DOI: 10.1145/1083784.1083789
Google Scholar
[6]
Antonios Deligiannakis, Yannis Kotidis and Nick Roussopoulos. Hierarchical In-Network Data Aggregation with Quality Guarantees. ADVANCES IN DATABASE TECHNOLOGY-EDBT 2004, Lecture Notes in Computer Science, Volume 2992/2004, pp.577-578.
DOI: 10.1007/978-3-540-24741-8_38
Google Scholar
[7]
Siani Paarson. Taking account of Privacy when Designing Cloud Computing Service. Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, Vancouver: 119-126.
DOI: 10.1109/cloud.2009.5071532
Google Scholar
[8]
T. Grandison, M.A. Sloman. Survey of Trust in Internet Application. IEEE Communications Surveys, 2000, 3(4): 2-16.
Google Scholar
[9]
Duan Y, Canny J. Protecting user data in ubiquitous computing environments: Towards trustworthy environment. Lecture Notes in Computer Science, Springer, 2005,: 167-185.
DOI: 10.1007/11423409_11
Google Scholar
[10]
Markus Miettinen. Measuring Privacy in a Ubiquitous Computing Enviroment. University of Helsinki, (2006).
Google Scholar
[11]
Michael Fahrmair, Wassiou Sitou, and Bernd Spanfelner. Security and privacy rights management for mobile and ubiquitous computing. Workshop on UbiComp Privacy, Tokyo, Japan September 11, (2005).
Google Scholar
[12]
E. Huang, C. Antoniou, Y. Wen, M. Ben-Akiva. Real-Time Multi-Sensor Multi-Source Network Data Fusion Using Dynamic Traffic Assignment Models. Intelligent Transportation Systems, 2009. ITSC 1-6.
DOI: 10.1109/itsc.2009.5309859
Google Scholar
[13]
Yeonjung Kang, Hyangjin Lee, Kilsoo Chun, Junghwan Song. Classification of Privacy Enhancing Technologies on Life-cycle of Information, in proceeding of The International Conference on Emerging Security Information, Systems, and Technologies, 2007, pp.66-70.
DOI: 10.1109/secureware.2007.4385312
Google Scholar
[14]
Martimiano, L.A. F, Goncalves, M.R.P. An ontology for privacy policy management in ubiquitous environments, IEEE Network Operations and Management Symposium, 2008, pp.947-950.
DOI: 10.1109/noms.2008.4575254
Google Scholar
[15]
Girts Strazdins. Location based information storage and dissemination in vehicular ad hoc networks, Proceedings of the 13th East European conference on Advances in Databases and Information Systems, September, 2009, Riga, Latvia.
DOI: 10.1007/978-3-642-12082-4_27
Google Scholar
[16]
Svetlana Mansmann, Thomas Neumuth and Marc H. Scholl. OLAP technology for business process intelligence: Challenges and solutions. DATA WAREHOUSING AND KNOWLEDGE DISCOVERY Lecture Notes in Computer Science, 2007, Volume 4654/2007, 111-122.
DOI: 10.1007/978-3-540-74553-2_11
Google Scholar