首页 > 最新文献

2018 19th IEEE International Conference on Mobile Data Management (MDM)最新文献

英文 中文
MDM 2018 Conference Officers MDM 2018会议官员
Pub Date : 2018-06-01 DOI: 10.1109/mdm.2018.00009
{"title":"MDM 2018 Conference Officers","authors":"","doi":"10.1109/mdm.2018.00009","DOIUrl":"https://doi.org/10.1109/mdm.2018.00009","url":null,"abstract":"","PeriodicalId":205319,"journal":{"name":"2018 19th IEEE International Conference on Mobile Data Management (MDM)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121598819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tensor Methods for Group Pattern Discovery of Pedestrian Trajectories 行人轨迹群模式发现的张量方法
Pub Date : 2018-06-01 DOI: 10.1109/MDM.2018.00024
Abdullah M. Sawas, Abdullah Abuolaim, M. Afifi, M. Papagelis
Mining large-scale trajectory data streams (of moving objects) has been of ever increasing research interest due to an abundance of modern tracking devices and its large number of critical applications. In this paper, we are interested in mining group patterns of moving objects. Group pattern mining describes a special type of trajectory mining task that requires to efficiently discover trajectories of objects that are found in close proximity to each other for a period of time. In particular, we focus on trajectories of pedestrians coming from motion video analysis and we are interested in interactive analysis and exploration of group dynamics, including various definitions of group gathering and dispersion. Towards this end, we present a suite of (three) tensor-based methods for efficient discovery of evolving groups of pedestrians. Traditional approaches to solve the problem heavily rely on well-defined clustering algorithms to discover groups of pedestrians at each time point, and then post-process these groups to discover groups that satisfy specific group pattern semantics, including time constraints. In contrast, our proposed methods are based on efficiently discovering pairs of pedestrians that move together over time, under varying conditions. Pairs of pedestrians are subsequently used as a building block for effectively discovering groups of pedestrians. The suite of proposed methods provides the ability to adapt to many different scenarios and application requirements. Furthermore, a query-based search method is provided that allows for interactive exploration and analysis of group dynamics over time and space. Through experiments on real data, we demonstrate the effectiveness of our methods on discovering group patterns of pedestrian trajectories against sensible baselines, for a varying range of conditions. In addition, a visual testing is performed on real motion video to assert the group dynamics discovered by each method.
由于大量的现代跟踪设备及其大量的关键应用,挖掘大规模轨迹数据流(运动物体)已经成为越来越多的研究兴趣。在本文中,我们感兴趣的是挖掘运动物体的群模式。组模式挖掘描述了一种特殊类型的轨迹挖掘任务,该任务要求有效地发现在一段时间内彼此接近的对象的轨迹。我们特别关注来自运动视频分析的行人轨迹,我们对群体动力学的互动分析和探索感兴趣,包括群体聚集和分散的各种定义。为此,我们提出了一套(三)基于张量的方法来有效地发现不断变化的行人群体。传统的解决方法严重依赖于定义良好的聚类算法来发现每个时间点的行人群体,然后对这些群体进行后处理,以发现满足特定群体模式语义(包括时间约束)的群体。相比之下,我们提出的方法是基于有效地发现在不同条件下随时间一起移动的行人对。随后,将行人对用作有效发现行人群的构建块。所建议的方法套件提供了适应许多不同场景和应用程序需求的能力。此外,提供了一种基于查询的搜索方法,该方法允许在时间和空间上对群体动态进行交互式探索和分析。通过对真实数据的实验,我们证明了我们的方法在不同条件下根据合理基线发现行人轨迹组模式的有效性。此外,还对真实运动视频进行了视觉测试,以验证每种方法发现的群体动态。
{"title":"Tensor Methods for Group Pattern Discovery of Pedestrian Trajectories","authors":"Abdullah M. Sawas, Abdullah Abuolaim, M. Afifi, M. Papagelis","doi":"10.1109/MDM.2018.00024","DOIUrl":"https://doi.org/10.1109/MDM.2018.00024","url":null,"abstract":"Mining large-scale trajectory data streams (of moving objects) has been of ever increasing research interest due to an abundance of modern tracking devices and its large number of critical applications. In this paper, we are interested in mining group patterns of moving objects. Group pattern mining describes a special type of trajectory mining task that requires to efficiently discover trajectories of objects that are found in close proximity to each other for a period of time. In particular, we focus on trajectories of pedestrians coming from motion video analysis and we are interested in interactive analysis and exploration of group dynamics, including various definitions of group gathering and dispersion. Towards this end, we present a suite of (three) tensor-based methods for efficient discovery of evolving groups of pedestrians. Traditional approaches to solve the problem heavily rely on well-defined clustering algorithms to discover groups of pedestrians at each time point, and then post-process these groups to discover groups that satisfy specific group pattern semantics, including time constraints. In contrast, our proposed methods are based on efficiently discovering pairs of pedestrians that move together over time, under varying conditions. Pairs of pedestrians are subsequently used as a building block for effectively discovering groups of pedestrians. The suite of proposed methods provides the ability to adapt to many different scenarios and application requirements. Furthermore, a query-based search method is provided that allows for interactive exploration and analysis of group dynamics over time and space. Through experiments on real data, we demonstrate the effectiveness of our methods on discovering group patterns of pedestrian trajectories against sensible baselines, for a varying range of conditions. In addition, a visual testing is performed on real motion video to assert the group dynamics discovered by each method.","PeriodicalId":205319,"journal":{"name":"2018 19th IEEE International Conference on Mobile Data Management (MDM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122382777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Origin-Destination Trajectory Diversity Analysis: Efficient Top-k Diversified Search 出发地轨迹多样性分析:高效Top-k多样化搜索
Pub Date : 2018-06-01 DOI: 10.1109/MDM.2018.00030
Dan He, Boyu Ruan, Bolong Zheng, Xiaofang Zhou
Given a pair of Origin-Destination (OD) locations, the set of trajectories passing from the original to destination, usually possesses the nature to reflect different traveling patterns between OD. In general, the higher diversity these trajectories have, the more various traveling behaviors and greater robustness of the connectivity can be revealed, which highly raises the value of transportation analysis towards the corresponding OD pair. Therefore, in this paper, we introduce a comprehensive and rational measure for trajectory diversity, on top of which we propose a novel query, Top-k Diversified Search (TkDS), that aims to find a set of k OD pairs among all the given OD pairs such that the trajectories traversing in-between have the highest diversity. Owing to the intrinsic characteristics of trajectory data, the computational cost for diversity is considerably high. Thus we present an efficient bounding algorithm with early termination to filter the candidates that are impossible to contribute the result. Finally, we demonstrate some case studies for trajectory diversity on real world dataset and give a comprehensive performance evaluation on the Top-k Diversified Search.
给定一对出发地-目的地(OD)位置,从出发地到目的地的轨迹集通常具有反映不同OD之间的旅行模式的性质。总体而言,这些轨迹的多样性越高,可以揭示出更多的出行行为和更强的连通性,这极大地提高了对相应OD对的运输分析的价值。因此,本文引入了一种全面合理的轨迹多样性度量,并在此基础上提出了一种新的查询——top -k Diversified Search (TkDS),其目的是在所有给定的OD对中找到k个OD对的集合,使得在中间穿越的轨迹具有最高的多样性。由于轨迹数据的固有特性,多样性的计算代价相当高。因此,我们提出了一种有效的提前终止边界算法来过滤不可能贡献结果的候选对象。最后,我们在实际数据集上展示了一些轨迹多样性的案例研究,并对Top-k多样化搜索进行了综合性能评估。
{"title":"Origin-Destination Trajectory Diversity Analysis: Efficient Top-k Diversified Search","authors":"Dan He, Boyu Ruan, Bolong Zheng, Xiaofang Zhou","doi":"10.1109/MDM.2018.00030","DOIUrl":"https://doi.org/10.1109/MDM.2018.00030","url":null,"abstract":"Given a pair of Origin-Destination (OD) locations, the set of trajectories passing from the original to destination, usually possesses the nature to reflect different traveling patterns between OD. In general, the higher diversity these trajectories have, the more various traveling behaviors and greater robustness of the connectivity can be revealed, which highly raises the value of transportation analysis towards the corresponding OD pair. Therefore, in this paper, we introduce a comprehensive and rational measure for trajectory diversity, on top of which we propose a novel query, Top-k Diversified Search (TkDS), that aims to find a set of k OD pairs among all the given OD pairs such that the trajectories traversing in-between have the highest diversity. Owing to the intrinsic characteristics of trajectory data, the computational cost for diversity is considerably high. Thus we present an efficient bounding algorithm with early termination to filter the candidates that are impossible to contribute the result. Finally, we demonstrate some case studies for trajectory diversity on real world dataset and give a comprehensive performance evaluation on the Top-k Diversified Search.","PeriodicalId":205319,"journal":{"name":"2018 19th IEEE International Conference on Mobile Data Management (MDM)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125493142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Privacy-Preserving Spatial Crowdsourcing Based on Anonymous Credentials 基于匿名凭证的隐私保护空间众包
Pub Date : 2018-06-01 DOI: 10.1109/MDM.2018.00036
X. Yi, Fang-Yu Rao, Gabriel Ghinita, E. Bertino
In Spatial Crowdsourcing (SC), a set of spatio-temporal tasks are outsourced to a set of workers, i.e., individuals with mobile devices who physically travel to task locations. The process of matching workers to tasks is performed by a SC server. To perform matching, the SC server needs access to worker locations. However, the SC server may not be trustworthy. Current solutions for protecting locations of workers assume that a trusted cellular service provider (CSP) knows the identities and locations of workers and sanitizes locations before sharing them with the SC server. In practice, the CSP may not have the technical ability, nor the proper incentives to perform the sanitization task. Thus, location protection must be performed by a Location Privacy Provider (LPP). To prevent identity disclosure to the LPP, we propose a novel solution based on anonymous credentials which preserves worker privacy. Our solution allows registered workers to log on to the LPP and receive tasks from the SC-server anonymously. In addition, our solution assures the confidentiality and integrity of spatial tasks. Our implementation and experiments demonstrate that our solution is practical.
在空间众包(SC)中,一组时空任务被外包给一组工人,即拥有移动设备的个人,他们亲自前往任务地点。将工作者与任务匹配的过程由SC服务器执行。要执行匹配,SC服务器需要访问工作人员位置。但是,SC服务器可能不值得信任。当前用于保护工作人员位置的解决方案假设受信任的蜂窝服务提供商(CSP)知道工作人员的身份和位置,并在与SC服务器共享位置之前对位置进行消毒。在实践中,CSP可能没有技术能力,也没有适当的动机来执行消毒任务。因此,位置保护必须由位置隐私提供程序(LPP)执行。为了防止身份泄露给LPP,我们提出了一种基于匿名凭证的新解决方案,该方案保护了工人的隐私。我们的解决方案允许注册工作者登录到LPP并匿名地从sc -服务器接收任务。此外,我们的解决方案确保了空间任务的保密性和完整性。实验结果表明,该方案是可行的。
{"title":"Privacy-Preserving Spatial Crowdsourcing Based on Anonymous Credentials","authors":"X. Yi, Fang-Yu Rao, Gabriel Ghinita, E. Bertino","doi":"10.1109/MDM.2018.00036","DOIUrl":"https://doi.org/10.1109/MDM.2018.00036","url":null,"abstract":"In Spatial Crowdsourcing (SC), a set of spatio-temporal tasks are outsourced to a set of workers, i.e., individuals with mobile devices who physically travel to task locations. The process of matching workers to tasks is performed by a SC server. To perform matching, the SC server needs access to worker locations. However, the SC server may not be trustworthy. Current solutions for protecting locations of workers assume that a trusted cellular service provider (CSP) knows the identities and locations of workers and sanitizes locations before sharing them with the SC server. In practice, the CSP may not have the technical ability, nor the proper incentives to perform the sanitization task. Thus, location protection must be performed by a Location Privacy Provider (LPP). To prevent identity disclosure to the LPP, we propose a novel solution based on anonymous credentials which preserves worker privacy. Our solution allows registered workers to log on to the LPP and receive tasks from the SC-server anonymously. In addition, our solution assures the confidentiality and integrity of spatial tasks. Our implementation and experiments demonstrate that our solution is practical.","PeriodicalId":205319,"journal":{"name":"2018 19th IEEE International Conference on Mobile Data Management (MDM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131208776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Privacy Preserving Reverse k-Nearest Neighbor Queries 保护隐私的反向k近邻查询
Pub Date : 2018-06-01 DOI: 10.1109/MDM.2018.00035
Layla Pournajaf, Farnaz Tahmasebian, Li Xiong, V. Sunderam, C. Shahabi
Reverse k-nearest neighbor (RkNN) queries are prevalent in location-based services to find those locations that have the query point as one of their k nearest neighbors. However, such query requires users to disclose the location of the query point to a service provider who might be untrustworthy. Previous attempts to preserve the privacy of RkNN queries are either based on weaker notions of privacy such as location cloaking or not efficient when k > 1. In this paper, we propose novel solutions based on the private information retrieval (PIR) mechanism to preserve the privacy of RkNN query points. Our solutions include server-side data indexing and client-side query processing methods to facilitate PIR which is an inherently expensive data retrieval mechanism. We experimentally evaluate our approach using real-world datasets and show that it preserves the location privacy of queries with reasonable computation and storage overhead.
反向k近邻查询(RkNN)在基于位置的服务中很流行,用于查找将查询点作为其k近邻之一的位置。然而,这样的查询要求用户将查询点的位置透露给可能不值得信任的服务提供者。以前保护RkNN查询隐私的尝试要么基于较弱的隐私概念,比如位置隐藏,要么在k > 1时效率不高。本文提出了一种基于私有信息检索(PIR)机制的RkNN查询点隐私保护方案。我们的解决方案包括服务器端数据索引和客户端查询处理方法,以促进PIR,这是一种本质上昂贵的数据检索机制。我们使用真实世界的数据集对我们的方法进行了实验评估,并表明它在合理的计算和存储开销下保留了查询的位置隐私。
{"title":"Privacy Preserving Reverse k-Nearest Neighbor Queries","authors":"Layla Pournajaf, Farnaz Tahmasebian, Li Xiong, V. Sunderam, C. Shahabi","doi":"10.1109/MDM.2018.00035","DOIUrl":"https://doi.org/10.1109/MDM.2018.00035","url":null,"abstract":"Reverse k-nearest neighbor (RkNN) queries are prevalent in location-based services to find those locations that have the query point as one of their k nearest neighbors. However, such query requires users to disclose the location of the query point to a service provider who might be untrustworthy. Previous attempts to preserve the privacy of RkNN queries are either based on weaker notions of privacy such as location cloaking or not efficient when k > 1. In this paper, we propose novel solutions based on the private information retrieval (PIR) mechanism to preserve the privacy of RkNN query points. Our solutions include server-side data indexing and client-side query processing methods to facilitate PIR which is an inherently expensive data retrieval mechanism. We experimentally evaluate our approach using real-world datasets and show that it preserves the location privacy of queries with reasonable computation and storage overhead.","PeriodicalId":205319,"journal":{"name":"2018 19th IEEE International Conference on Mobile Data Management (MDM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128773956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Reputation and Credit Based Incentive Mechanism for Data-Centric Message Delivery in DTNs 基于声誉和信用的ddn数据中心消息传递激励机制
Pub Date : 2018-06-01 DOI: 10.1109/MDM.2018.00038
Himanshu Jethawa, S. Madria
In Delay Tolerant Networks (DTNs), to ensure successful message delivery, contribution of mobile nodes in relaying in an opportunistic fashion is essential. In our proposed data-centric dissemination protocol here, messages (images) are annotated with keywords by the source, and then intermediate nodes are presented with an option of adding keyword-based annotations to create higher content strength messages enroute toward the destination. Therefore, the message contents like images get enriched as the ground situation evolves and learned by these intermediate nodes, such as in a disaster situation, or in a battlefield. Due to limited battery and storage capacity in mobile devices, nodes might turn selfish and do not participate in relaying or improving the quality of messages. Thus, additionally, an incentive mechanism is proposed in this paper which considers factors like message quality, level of interests, battery usage, etc for the calculation of incentives. At the same time, in order to prevent the nodes from turning malicious by adding inappropriate message tags in pursuit of acquiring more incentive, a distributed reputation model (DRM) is developed and integrated with the proposed incentive scheme. DRM takes into account inputs from the intermediate users like ratings of the message quality, relevance of annotations in the message, etc. The proposed scheme thus ensures avoidance of congestion due to uncooperative or selfish nodes in the system. The performance evaluations show that our approach delivers more high priority and quality messages with reduced traffic with a slightly lower message delivery ratio compared to a more recent DTN routing like ChitChat, where a source forwards a message to intermediate nodes, which meet or exceed the matching strength of keyword-based interests.
在容忍延迟网络(DTNs)中,为了确保消息的成功传递,移动节点以机会主义的方式在中继中做出贡献是必不可少的。在我们提出的以数据为中心的传播协议中,消息(图像)由源使用关键字进行注释,然后中间节点可以选择添加基于关键字的注释,从而在发送到目的地的途中创建更高内容强度的消息。因此,图像等信息内容随着地面情况的演变和这些中间节点的学习而得到丰富,例如在灾难情况下,或者在战场上。由于移动设备的电池和存储容量有限,节点可能会变得自私,不参与中继或提高消息质量。因此,本文还提出了一种激励机制,该机制考虑了消息质量、兴趣水平、电池使用等因素来计算激励。同时,为了防止节点为了获得更多的激励而添加不适当的消息标签,从而产生恶意行为,开发了分布式声誉模型(DRM),并与所提出的激励方案进行了集成。DRM考虑了来自中间用户的输入,如消息质量的评级、消息中注释的相关性等。因此,所提出的方案可以避免由于系统中不合作或自私节点造成的拥塞。性能评估表明,与最近的DTN路由(如ChitChat)相比,我们的方法以更少的流量和稍低的消息传递率提供了更多高优先级和高质量的消息,其中源将消息转发到中间节点,达到或超过基于关键字的匹配强度兴趣。
{"title":"Reputation and Credit Based Incentive Mechanism for Data-Centric Message Delivery in DTNs","authors":"Himanshu Jethawa, S. Madria","doi":"10.1109/MDM.2018.00038","DOIUrl":"https://doi.org/10.1109/MDM.2018.00038","url":null,"abstract":"In Delay Tolerant Networks (DTNs), to ensure successful message delivery, contribution of mobile nodes in relaying in an opportunistic fashion is essential. In our proposed data-centric dissemination protocol here, messages (images) are annotated with keywords by the source, and then intermediate nodes are presented with an option of adding keyword-based annotations to create higher content strength messages enroute toward the destination. Therefore, the message contents like images get enriched as the ground situation evolves and learned by these intermediate nodes, such as in a disaster situation, or in a battlefield. Due to limited battery and storage capacity in mobile devices, nodes might turn selfish and do not participate in relaying or improving the quality of messages. Thus, additionally, an incentive mechanism is proposed in this paper which considers factors like message quality, level of interests, battery usage, etc for the calculation of incentives. At the same time, in order to prevent the nodes from turning malicious by adding inappropriate message tags in pursuit of acquiring more incentive, a distributed reputation model (DRM) is developed and integrated with the proposed incentive scheme. DRM takes into account inputs from the intermediate users like ratings of the message quality, relevance of annotations in the message, etc. The proposed scheme thus ensures avoidance of congestion due to uncooperative or selfish nodes in the system. The performance evaluations show that our approach delivers more high priority and quality messages with reduced traffic with a slightly lower message delivery ratio compared to a more recent DTN routing like ChitChat, where a source forwards a message to intermediate nodes, which meet or exceed the matching strength of keyword-based interests.","PeriodicalId":205319,"journal":{"name":"2018 19th IEEE International Conference on Mobile Data Management (MDM)","volume":"08 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127273857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
aSTEP: Aau's Spatio-TEmporal Data Analytics Platform 步骤:Aau的时空数据分析平台
Pub Date : 2018-06-01 DOI: 10.1109/MDM.2018.00049
Marcus J. Beuchert, Steffen Hald Jensen, Omar Ali Sheikh-Omar, Mathias Bach Svendsen, B. Yang
We demonstrate aSTEP, a spatio-temporal data management and analytics platform developed at Aalborg University (a.k.a. aau) that aims at providing a range of core functionalities for outdoor location-based service, indoor locationbased service, and location-based social networks, which facilitates application developers to develop their own, specific locationbased services on top of aSTEP. aSTEP also consolidates many recent research results on spatio-temporal data management and analytics, and serves as a testbed for exploring advanced solutions to a range of challenges related to spatio-temporal data management and analytics, e.g., Mobility-as-a-Service, dataintensive routing. In addition, from education perspectives, every spring semester aSTEP accommodates some 30 to 40 software engineering students' group-based bachelor projects at the Department of Computer Science, Aalborg University.
我们展示了aSTEP,一个由奥尔堡大学(aau)开发的时空数据管理和分析平台,旨在为户外基于位置的服务、室内基于位置的服务和基于位置的社交网络提供一系列核心功能,这有助于应用程序开发人员在aSTEP的基础上开发他们自己的、特定的基于位置的服务。aSTEP还整合了许多关于时空数据管理和分析的最新研究成果,并作为探索与时空数据管理和分析相关的一系列挑战的先进解决方案的测试平台,例如移动即服务,数据密集路由。此外,从教育的角度来看,aSTEP每年春季学期在奥尔堡大学计算机科学系容纳约30至40名软件工程专业学生以小组为基础的学士项目。
{"title":"aSTEP: Aau's Spatio-TEmporal Data Analytics Platform","authors":"Marcus J. Beuchert, Steffen Hald Jensen, Omar Ali Sheikh-Omar, Mathias Bach Svendsen, B. Yang","doi":"10.1109/MDM.2018.00049","DOIUrl":"https://doi.org/10.1109/MDM.2018.00049","url":null,"abstract":"We demonstrate aSTEP, a spatio-temporal data management and analytics platform developed at Aalborg University (a.k.a. aau) that aims at providing a range of core functionalities for outdoor location-based service, indoor locationbased service, and location-based social networks, which facilitates application developers to develop their own, specific locationbased services on top of aSTEP. aSTEP also consolidates many recent research results on spatio-temporal data management and analytics, and serves as a testbed for exploring advanced solutions to a range of challenges related to spatio-temporal data management and analytics, e.g., Mobility-as-a-Service, dataintensive routing. In addition, from education perspectives, every spring semester aSTEP accommodates some 30 to 40 software engineering students' group-based bachelor projects at the Department of Computer Science, Aalborg University.","PeriodicalId":205319,"journal":{"name":"2018 19th IEEE International Conference on Mobile Data Management (MDM)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134499186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Adaptive Travel-Time Estimation: A Case for Custom Predicate Selection 自适应旅行时间估计:自定义谓词选择的一个案例
Pub Date : 2018-06-01 DOI: 10.1109/MDM.2018.00026
Robert Waury, Christian S. Jensen, K. Torp
Travel-time estimation for paths in a road network often relies on pre-computed histograms that are usually available on a road segment level. Then the pre-computed histograms of the segments of a path are convolved to obtain a histogram that estimates the travel time. With the growing sizes of trajectory datasets, it becomes possible to compute histograms for increasingly longer sub-paths. Since pre-computation is infeasible for all sub-paths in a road network, we propose computing histograms on-the-fly, i.e., during routing. Such an on-the-fly method must filter the underlying trajectory dataset by spatio-temporal predicates to obtain the relevant trajectories and offers the opportunity to apply additional filtering predicates to the trajectories with little overhead. We report on a study showing that considerable improvements in accuracy of the histograms obtained for paths can be obtained by choosing filtering predicates that not only adapt to the intended start of a trip, but also to the driver and the weather. We also make the cases for a sub-path partitioning based on segment categories since there are significant differences between road types when applying our on-the-fly method.
道路网络中路径的行程时间估计通常依赖于预先计算的直方图,这些直方图通常在路段级别上可用。然后对预先计算的路径段直方图进行卷积,得到一个估计行程时间的直方图。随着轨迹数据集的不断增长,计算越来越长的子路径的直方图成为可能。由于预先计算对于道路网络中的所有子路径都是不可行的,因此我们建议动态计算直方图,即在路由过程中。这种动态方法必须通过时空谓词对底层轨迹数据集进行过滤,以获得相关的轨迹,并提供了在很少开销的情况下对轨迹应用额外过滤谓词的机会。我们报告了一项研究,该研究表明,通过选择过滤谓词,不仅可以适应预定的旅行起点,还可以适应驾驶员和天气,可以获得路径直方图准确性的显著提高。我们还提出了基于路段类别的子路径划分的案例,因为在应用我们的实时方法时,道路类型之间存在显着差异。
{"title":"Adaptive Travel-Time Estimation: A Case for Custom Predicate Selection","authors":"Robert Waury, Christian S. Jensen, K. Torp","doi":"10.1109/MDM.2018.00026","DOIUrl":"https://doi.org/10.1109/MDM.2018.00026","url":null,"abstract":"Travel-time estimation for paths in a road network often relies on pre-computed histograms that are usually available on a road segment level. Then the pre-computed histograms of the segments of a path are convolved to obtain a histogram that estimates the travel time. With the growing sizes of trajectory datasets, it becomes possible to compute histograms for increasingly longer sub-paths. Since pre-computation is infeasible for all sub-paths in a road network, we propose computing histograms on-the-fly, i.e., during routing. Such an on-the-fly method must filter the underlying trajectory dataset by spatio-temporal predicates to obtain the relevant trajectories and offers the opportunity to apply additional filtering predicates to the trajectories with little overhead. We report on a study showing that considerable improvements in accuracy of the histograms obtained for paths can be obtained by choosing filtering predicates that not only adapt to the intended start of a trip, but also to the driver and the weather. We also make the cases for a sub-path partitioning based on segment categories since there are significant differences between road types when applying our on-the-fly method.","PeriodicalId":205319,"journal":{"name":"2018 19th IEEE International Conference on Mobile Data Management (MDM)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133912656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Message from the MDM 2018 Demonstration Track Co-Chairs 2018年MDM示范专题联合主席致辞
Pub Date : 2018-06-01 DOI: 10.1109/MDM.2018.00008
Y. Huang, Goce Trajcevski
{"title":"Message from the MDM 2018 Demonstration Track Co-Chairs","authors":"Y. Huang, Goce Trajcevski","doi":"10.1109/MDM.2018.00008","DOIUrl":"https://doi.org/10.1109/MDM.2018.00008","url":null,"abstract":"","PeriodicalId":205319,"journal":{"name":"2018 19th IEEE International Conference on Mobile Data Management (MDM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129610000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Semi-Supervised Approach for the Semantic Segmentation of Trajectories 轨迹语义分割的半监督方法
Pub Date : 2018-06-01 DOI: 10.1109/MDM.2018.00031
Amílcar Soares Júnior, V. Times, C. Renso, S. Matwin, L. A. Cabral
A first fundamental step in the process of analyzing movement data is trajectory segmentation, i.e., splitting trajectories into homogeneous segments based on some criteria. Although trajectory segmentation has been the object of several approaches in the last decade, a proposal based on a semi-supervised approach remains inexistent. A semi-supervised approach means that a user labels manually a small set of trajectories with meaningful segments and, from this set, the method infers in an unsupervised way the segments of the remaining trajectories. The main advantage of this method compared to pure supervised ones is that it reduces the human effort to label the number of trajectories. In this work, we propose the use of the Minimum Description Length (MDL) principle to measure homogeneity inside segments. We also introduce the Reactive Greedy Randomized Adaptive Search Procedure for semantic Semi-supervised Trajectory Segmentation (RGRASP-SemTS) algorithm that segments trajectories by combining a limited user labeling phase with a low number of input parameters and no predefined segmenting criteria. The approach and the algorithm are presented in detail throughout the paper, and the experiments are carried out on two real-world datasets. The evaluation tests prove how our approach outperforms state-of-the-art competitors when compared to ground truth.
在分析运动数据的过程中,第一个基本步骤是轨迹分割,即根据一定的标准将轨迹分割成均匀的段。尽管在过去的十年中,轨迹分割已经成为几种方法的目标,但基于半监督方法的建议仍然存在。半监督方法意味着用户手动标记一小组有意义的轨迹,并从这组轨迹中,以无监督的方式推断出剩余轨迹的片段。与纯监督方法相比,这种方法的主要优点是它减少了人类标记轨迹数量的工作量。在这项工作中,我们提出使用最小描述长度(MDL)原则来测量片段内部的同质性。我们还介绍了用于语义半监督轨迹分割的反应性贪婪随机自适应搜索程序(RGRASP-SemTS)算法,该算法通过将有限的用户标记阶段与低数量的输入参数和无预定义分割标准相结合来分割轨迹。本文详细介绍了该方法和算法,并在两个真实数据集上进行了实验。评估测试证明了我们的方法如何优于最先进的竞争对手,当与地面真相相比。
{"title":"A Semi-Supervised Approach for the Semantic Segmentation of Trajectories","authors":"Amílcar Soares Júnior, V. Times, C. Renso, S. Matwin, L. A. Cabral","doi":"10.1109/MDM.2018.00031","DOIUrl":"https://doi.org/10.1109/MDM.2018.00031","url":null,"abstract":"A first fundamental step in the process of analyzing movement data is trajectory segmentation, i.e., splitting trajectories into homogeneous segments based on some criteria. Although trajectory segmentation has been the object of several approaches in the last decade, a proposal based on a semi-supervised approach remains inexistent. A semi-supervised approach means that a user labels manually a small set of trajectories with meaningful segments and, from this set, the method infers in an unsupervised way the segments of the remaining trajectories. The main advantage of this method compared to pure supervised ones is that it reduces the human effort to label the number of trajectories. In this work, we propose the use of the Minimum Description Length (MDL) principle to measure homogeneity inside segments. We also introduce the Reactive Greedy Randomized Adaptive Search Procedure for semantic Semi-supervised Trajectory Segmentation (RGRASP-SemTS) algorithm that segments trajectories by combining a limited user labeling phase with a low number of input parameters and no predefined segmenting criteria. The approach and the algorithm are presented in detail throughout the paper, and the experiments are carried out on two real-world datasets. The evaluation tests prove how our approach outperforms state-of-the-art competitors when compared to ground truth.","PeriodicalId":205319,"journal":{"name":"2018 19th IEEE International Conference on Mobile Data Management (MDM)","volume":"AES-19 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132502172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
期刊
2018 19th IEEE International Conference on Mobile Data Management (MDM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1