About
22
Publications
1,183
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
94
Citations
Introduction
Skills and Expertise
Current institution
Additional affiliations
March 2013 - August 2023
Publications
Publications (22)
This paper addresses the challenge of preserving user privacy in location-based services (LBSs) by proposing a novel, complementary approach to existing privacy-preserving techniques such as k-anonymity and l-diversity. Our approach implements collaborative caching strategies within a mobile ad hoc network (MANET), exploiting the geographic of loca...
Deriving insight from data is a challenging task for researchers and practitioners, especially when working on spatio-temporal domains. If pattern searching is involved, the complications introduced by temporal data dimensions create additional obstacles, as traditional data mining techniques are insufficient to address spatio-temporal databases (S...
Social networks such as Twitter provide thousands of terabytes per day, which can be exploited to find relevant information. This relevant information is used to promote marketing strategies, analyze current political issues, and track market trends, to name a few examples. One instance of relevant information is finding cyclic behavior patterns (i...
This paper focuses on adopting cybersecurity procedures in Chilean manufacturing companies in the context of the Fourth Industrial Revolution’s data-driven demands, which have exposed vulnerabilities in cybersecurity. This analysis is based on data from the Fifth Longitudinal Survey of Companies - ELE 5 - conducted by the National Institute of Stat...
Nowadays, people can access a wide range of applications and services for mobile device users. Among them, location-based services (LBS), where the application needs the user’s position to provide the service. Some examples of these applications are Uber and Waze. Nevertheless, the repetitive use of an LBS can reveal confidential user information;...
Location-based services (LBSs) have become a profitable market because they offer real-time and local information to their users. Although several benefits are obtained from the usage of LBSs, they have opened up many privacy and safety challenges because a user needs to release his/her location. To tackle these challenges, many location-cloaking t...
Location-based services (LBSs) assume that users are willing to release trustworthy and useful details about their whereabouts. However, many location privacy concerns have arisen. For location privacy protection, several algorithms build a cloaking region to hide a user’s location. However, many applications may not operate adequately on cloaked l...
This paper presents a subscription-based overlay network that supports file parallel downloading for cloud collaboration. First, our system lets users to register to a central server and allows this server to incrementally build a topology graph containing the network connections among the subscribers. With this topology graph in place, we plan to...
When requesting location-based services, users can associate their queries with a purposely blurred location such as a circular or rectangular geographic region instead of their exact position. This strategy makes it possible for privacy protection, but presents problems in query processing. Since the server does not know a user's exact position, i...
This paper presents a subscription-based overlay network that supports efficient any-source multicast. The system lets users register to a central server and allows the server to incrementally build a topology graph that contains the network connections among the subscribers. With this topology graph in place, we address the challenges of minimizin...
A spatial monitoring query (SMQ) retrieves the set of mobile nodes that satisfy some spatial constraints, and provides real-time updates whenever this set of nodes changes. Efficient processing of such queries is essential to moving objects database management. Existing techniques rely on one or more central servers for query management and assume...
Overlay multicast streaming is built out of loosely cou- pled end-hosts (peers) that contribute resources to stream media to other peers. Peers, however, can be malicious. They may intentionally wish to disrupt the multicast ser- vice or cause confusions to other peers. We propose two new schemes to detect malicious peers in overlay multicast strea...
In a cluster of many servers containing heterogeneous multimedia learning material and serving users with different backgrounds (e.g. language, interests, previous knowledge, hardware and connectivity) it may be difficult for the learners to find a piece of material which fit their needs. This is the case of the COLDEX project. Recommender systems...