Fig. 8
From: Location privacy protection algorithm for mobile networks

Looking for a relative maximum boundary tree for a user under complex mobile network
From: Location privacy protection algorithm for mobile networks
Looking for a relative maximum boundary tree for a user under complex mobile network