首页 > 最新文献

2007 International Conference on Mobile Data Management最新文献

英文 中文
An Adaptive Control Method in the Hybrid Wireless Broadcast Environment 混合无线广播环境下的自适应控制方法
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.21
Jing Cai, T. Terada, T. Hara, S. Nishio
In this paper, we investigate adaptive control for broadcast scheduling and base station caching in the hybrid wireless broadcast (HWB) environment. The proposed adaptive method can adapt well to different access conditions and bandwidth capabilities and adequately exploit the three data delivery modes: push-based broadcast, pull- based broadcast, and pull-based point-to-point communication. Simulation studies demonstrated that our proposed method achieves significant performance improvement in average waiting time and success rate.
本文研究了混合无线广播(HWB)环境下广播调度和基站缓存的自适应控制。所提出的自适应方法能够很好地适应不同的接入条件和带宽能力,充分利用了三种数据传输模式:基于推送的广播、基于拉的广播和基于拉的点对点通信。仿真研究表明,该方法在平均等待时间和成功率方面都有显著的性能提升。
{"title":"An Adaptive Control Method in the Hybrid Wireless Broadcast Environment","authors":"Jing Cai, T. Terada, T. Hara, S. Nishio","doi":"10.1109/MDM.2007.21","DOIUrl":"https://doi.org/10.1109/MDM.2007.21","url":null,"abstract":"In this paper, we investigate adaptive control for broadcast scheduling and base station caching in the hybrid wireless broadcast (HWB) environment. The proposed adaptive method can adapt well to different access conditions and bandwidth capabilities and adequately exploit the three data delivery modes: push-based broadcast, pull- based broadcast, and pull-based point-to-point communication. Simulation studies demonstrated that our proposed method achieves significant performance improvement in average waiting time and success rate.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127390658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Scalable Hybrid Routing in Very Large Sensor Networks 超大传感器网络中的可扩展混合路由
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.77
Tao Wu, Fan Yu, S. Biswas
This paper presents an architectural solution to address the problem of scalable routing for data intensive applications in very large sensor networks. Due to large routing overheads, the control complexity of the existing sensor routing protocols, both node-centric and data-centric, do not scale well in very large networks with potentially thousands of sensor devices. In this paper, we develop a hybrid architectural solution off-network control processing (ONCP) that achieves scalable routing in large networks by shifting certain amount of routing functions to an "off-network" routing server. A tiered routing approach is proposed to avoid network-wide control message dissemination. Our experimental results indicate that for large sensor networks with realistic data models, the packet drop, latency, energy performance and bandwidth usage of ONCP can be significantly better than those for completely distributed routing protocols such as directed diffusion.
本文提出了一种架构解决方案,以解决超大传感器网络中数据密集型应用的可扩展路由问题。由于路由开销大,现有传感器路由协议的控制复杂性,无论是以节点为中心还是以数据为中心,都不能很好地扩展到具有数千个传感器设备的大型网络中。在本文中,我们开发了一种混合体系结构解决方案,通过将一定数量的路由功能转移到“离网”路由服务器来实现大型网络中的可扩展路由。提出了一种避免全网控制消息分发的分层路由方法。实验结果表明,对于具有真实数据模型的大型传感器网络,ONCP在丢包、延迟、能量性能和带宽使用方面明显优于定向扩散等完全分布式路由协议。
{"title":"Scalable Hybrid Routing in Very Large Sensor Networks","authors":"Tao Wu, Fan Yu, S. Biswas","doi":"10.1109/MDM.2007.77","DOIUrl":"https://doi.org/10.1109/MDM.2007.77","url":null,"abstract":"This paper presents an architectural solution to address the problem of scalable routing for data intensive applications in very large sensor networks. Due to large routing overheads, the control complexity of the existing sensor routing protocols, both node-centric and data-centric, do not scale well in very large networks with potentially thousands of sensor devices. In this paper, we develop a hybrid architectural solution off-network control processing (ONCP) that achieves scalable routing in large networks by shifting certain amount of routing functions to an \"off-network\" routing server. A tiered routing approach is proposed to avoid network-wide control message dissemination. Our experimental results indicate that for large sensor networks with realistic data models, the packet drop, latency, energy performance and bandwidth usage of ONCP can be significantly better than those for completely distributed routing protocols such as directed diffusion.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":"279 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114155700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Energy-Efficient Medium Access for Data Intensive Wireless Sensor Networks 数据密集型无线传感器网络的节能介质接入
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.76
Zdravko Karakehayov, N. Andersen
This paper presents ALS-MAC, a medium access control protocol for wireless sensor networks. ALS-MAC is a single channel MAC protocol suitable for location-aware networks. The protocol employs beacons to synchronize internode communications. Scalability and collision avoidance are achieved via contention-based advertising slots mapped to scheduled-based transmission slots. ALS-MAC has two dedicated modes of operation for data intensive traffic which assign temporary priority to nodes with many or long buffered packets. Beacons and signaling frames are combined to reduce the collision and control packet overhead. We study multihop optimization schemes for non-regular topologies under ALS-MAC.
本文提出了一种用于无线传感器网络的介质访问控制协议ALS-MAC。ALS-MAC是一种适用于位置感知网络的单通道MAC协议。该协议使用信标来同步节点间通信。通过将基于争用的广告槽映射到基于调度的传输槽来实现可扩展性和避免冲突。ALS-MAC有两种专用的操作模式,用于数据密集型流量,为具有许多或长缓冲数据包的节点分配临时优先级。信标和信令帧相结合,以减少碰撞和控制数据包开销。研究了ALS-MAC下非规则拓扑的多跳优化方案。
{"title":"Energy-Efficient Medium Access for Data Intensive Wireless Sensor Networks","authors":"Zdravko Karakehayov, N. Andersen","doi":"10.1109/MDM.2007.76","DOIUrl":"https://doi.org/10.1109/MDM.2007.76","url":null,"abstract":"This paper presents ALS-MAC, a medium access control protocol for wireless sensor networks. ALS-MAC is a single channel MAC protocol suitable for location-aware networks. The protocol employs beacons to synchronize internode communications. Scalability and collision avoidance are achieved via contention-based advertising slots mapped to scheduled-based transmission slots. ALS-MAC has two dedicated modes of operation for data intensive traffic which assign temporary priority to nodes with many or long buffered packets. Beacons and signaling frames are combined to reduce the collision and control packet overhead. We study multihop optimization schemes for non-regular topologies under ALS-MAC.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128934409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Advanced Evasive Data Storage in Sensor Networks 传感器网络中的高级回避数据存储
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.29
Z. Benenson, F. Freiling, Peter M. Cholewinski
In case the data which is stored and processed in a sensor network has some value, it needs to be protected from unauthorized access through a security mechanism. The idea of evasive data storage is that data moves around the sensor network instead of remaining at a fixed location. In this way, an adversary, who has once (through node capture) had access to the data stored at some particular node, must compromise more sensors in order to maintain his illegitimate access to the sensor data. We refine the previously published simple evasive data storage techniques in two ways: (1) we improve the efficiency of data retrieval by bounding the area in which data may move, (2) we introduce data splitting as a technique to protect against sleeper attacks in which the adversary simply takes over a subset of nodes and waits for valuable data to pass by. We demonstrate the effectiveness of our approach using extensive simulations.
如果在传感器网络中存储和处理的数据具有一定的价值,则需要通过安全机制保护这些数据不被未经授权的访问。规避数据存储的概念是数据在传感器网络中移动,而不是停留在固定位置。通过这种方式,攻击者一旦(通过节点捕获)访问了存储在某个特定节点上的数据,就必须破坏更多的传感器,以维持对传感器数据的非法访问。我们以两种方式改进了先前发布的简单回避数据存储技术:(1)我们通过限定数据可能移动的区域来提高数据检索的效率,(2)我们引入数据分割作为一种技术来防止潜伏攻击,在潜伏攻击中,对手只是接管节点子集并等待有价值的数据通过。我们通过大量的模拟来证明我们的方法的有效性。
{"title":"Advanced Evasive Data Storage in Sensor Networks","authors":"Z. Benenson, F. Freiling, Peter M. Cholewinski","doi":"10.1109/MDM.2007.29","DOIUrl":"https://doi.org/10.1109/MDM.2007.29","url":null,"abstract":"In case the data which is stored and processed in a sensor network has some value, it needs to be protected from unauthorized access through a security mechanism. The idea of evasive data storage is that data moves around the sensor network instead of remaining at a fixed location. In this way, an adversary, who has once (through node capture) had access to the data stored at some particular node, must compromise more sensors in order to maintain his illegitimate access to the sensor data. We refine the previously published simple evasive data storage techniques in two ways: (1) we improve the efficiency of data retrieval by bounding the area in which data may move, (2) we introduce data splitting as a technique to protect against sleeper attacks in which the adversary simply takes over a subset of nodes and waits for valuable data to pass by. We demonstrate the effectiveness of our approach using extensive simulations.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129204157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
CADD: A Tool for Context Modeling and Data Tailoring CADD:上下文建模和数据裁剪工具
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.42
C. Bolchini, C. Curino, G. Orsi, E. Quintarelli, F. Schreiber, L. Tanca
Nowadays user mobility requires that both content and services be appropriately personalized, in order for the (mobile) user to be always - and anywhere - equipped with the adequate share of data. Thus, the knowledge about the user, the adopted device and the environment, altogether called context, has to be taken into account in order to minimize the amount of information imported on mobile devices. The Context-ADDICT (Context-Aware Data Design, Integration, Customization and Tailoring) project aims at the definition of a complete framework which, starting from a methodology for the early design phases, supports mobile users through the dynamic hooking and integration of new, available information sources, so that an appropriate context-based portion of data, called data chunk, is delivered to their mobile devices. Data tailoring is needed because of two main reasons: the first is to keep the amount of information manageable, in order for the user not to be confused by too much, possibly noisy, information; the second is the frequent case when the mobile device is a small one, like a palm computer or a cellular phone, and thus only the most significant information must be kept on board. Context is, thus, key metainformation whose role becomes essential within the process of view design. Two main design-time activities are supported by our system in order to provide context-aware data filtering: 1) context design, based on a context model called context dimension tree and 2) definition of the relationship between each context and relevant portions of the application domain data.
如今,用户的移动性要求内容和服务都适当地个性化,以便(移动)用户随时随地配备足够的数据共享。因此,必须考虑到关于用户,所采用的设备和环境的知识,统称为上下文,以便最大限度地减少在移动设备上导入的信息量。Context-ADDICT(上下文感知数据设计、集成、定制和裁剪)项目旨在定义一个完整的框架,该框架从早期设计阶段的方法开始,通过动态连接和集成新的、可用的信息源来支持移动用户,以便将适当的基于上下文的数据部分(称为数据块)传递到他们的移动设备。需要数据裁剪主要有两个原因:第一是保持信息的可管理性,以便用户不会被过多的、可能嘈杂的信息所迷惑;第二种情况是,当移动设备很小的时候,比如掌上电脑或手机,因此只需要保存最重要的信息。因此,上下文是关键的元信息,其作用在视图设计过程中变得至关重要。为了提供上下文感知的数据过滤,我们的系统支持两个主要的设计时活动:1)上下文设计,基于称为上下文维度树的上下文模型;2)定义每个上下文与应用程序域数据的相关部分之间的关系。
{"title":"CADD: A Tool for Context Modeling and Data Tailoring","authors":"C. Bolchini, C. Curino, G. Orsi, E. Quintarelli, F. Schreiber, L. Tanca","doi":"10.1109/MDM.2007.42","DOIUrl":"https://doi.org/10.1109/MDM.2007.42","url":null,"abstract":"Nowadays user mobility requires that both content and services be appropriately personalized, in order for the (mobile) user to be always - and anywhere - equipped with the adequate share of data. Thus, the knowledge about the user, the adopted device and the environment, altogether called context, has to be taken into account in order to minimize the amount of information imported on mobile devices. The Context-ADDICT (Context-Aware Data Design, Integration, Customization and Tailoring) project aims at the definition of a complete framework which, starting from a methodology for the early design phases, supports mobile users through the dynamic hooking and integration of new, available information sources, so that an appropriate context-based portion of data, called data chunk, is delivered to their mobile devices. Data tailoring is needed because of two main reasons: the first is to keep the amount of information manageable, in order for the user not to be confused by too much, possibly noisy, information; the second is the frequent case when the mobile device is a small one, like a palm computer or a cellular phone, and thus only the most significant information must be kept on board. Context is, thus, key metainformation whose role becomes essential within the process of view design. Two main design-time activities are supported by our system in order to provide context-aware data filtering: 1) context design, based on a context model called context dimension tree and 2) definition of the relationship between each context and relevant portions of the application domain data.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131363690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Comparison of Spatial Generalization Algorithms for LBS Privacy Preservation LBS隐私保护的空间泛化算法比较
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.54
S. Mascetti, C. Bettini
Spatial generalization has been recently proposed as a technique for the anonymization of requests in location based services. This paper presents the results of an extensive experimental study, considering known generalization algorithms as well as new ones proposed by the authors.
空间概化最近被提出作为基于位置的服务请求的匿名化技术。本文介绍了一项广泛的实验研究的结果,考虑了已知的泛化算法以及作者提出的新算法。
{"title":"A Comparison of Spatial Generalization Algorithms for LBS Privacy Preservation","authors":"S. Mascetti, C. Bettini","doi":"10.1109/MDM.2007.54","DOIUrl":"https://doi.org/10.1109/MDM.2007.54","url":null,"abstract":"Spatial generalization has been recently proposed as a technique for the anonymization of requests in location based services. This paper presents the results of an extensive experimental study, considering known generalization algorithms as well as new ones proposed by the authors.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":"473 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130593068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Distributive Energy Efficient Adaptive Clustering Protocol for Wireless Sensor Networks 面向无线传感器网络的分布式节能自适应聚类协议
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.69
Udit Sajjanhar, Pabitra Mitra
Clustering sensors into groups, so that sensors communicate information only to cluster-heads and then the cluster-heads communicate the aggregated information to the base station, saves energy and thus prolongs network lifetime. Adapting this approach, we propose a Distributive Energy Efficient Adaptive Clustering (DEEAC) protocol. This protocol is adaptive in terms of data reporting rates and residual energy of each node within the network. Motivated by the LEACH protocol [I], we extend its stochastic cluster selection algorithm for networks having spatio-temporal variations in data reporting rates across different regions. Simulation results demonstrate that DEEAC is able to distribute energy consumption more effectively among the sensors, thereby prolonging the network lifetime by as much as 50% compared to LEACH.
将传感器分组,使传感器只与簇头通信,簇头再将聚合后的信息传递给基站,从而节省了能量,延长了网络的生命周期。基于这种方法,我们提出了一种分布式节能自适应聚类(DEEAC)协议。该协议在数据报告率和网络中每个节点的剩余能量方面具有自适应性。在LEACH协议的激励下[1],我们将其随机聚类选择算法扩展到具有不同区域数据报告率时空变化的网络。仿真结果表明,DEEAC能够更有效地在传感器之间分配能量消耗,从而使网络寿命比LEACH延长多达50%。
{"title":"Distributive Energy Efficient Adaptive Clustering Protocol for Wireless Sensor Networks","authors":"Udit Sajjanhar, Pabitra Mitra","doi":"10.1109/MDM.2007.69","DOIUrl":"https://doi.org/10.1109/MDM.2007.69","url":null,"abstract":"Clustering sensors into groups, so that sensors communicate information only to cluster-heads and then the cluster-heads communicate the aggregated information to the base station, saves energy and thus prolongs network lifetime. Adapting this approach, we propose a Distributive Energy Efficient Adaptive Clustering (DEEAC) protocol. This protocol is adaptive in terms of data reporting rates and residual energy of each node within the network. Motivated by the LEACH protocol [I], we extend its stochastic cluster selection algorithm for networks having spatio-temporal variations in data reporting rates across different regions. Simulation results demonstrate that DEEAC is able to distribute energy consumption more effectively among the sensors, thereby prolonging the network lifetime by as much as 50% compared to LEACH.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129535128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
Privacy in Location-Based Services: State-of-the-Art and Research Directions 基于位置的服务中的隐私:现状与研究方向
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.45
M. Mokbel
The explosive growth of location-detection devices (e.g., GPS-like devices and handheld devices) along with wireless communications and mobile databases results in realizing location-based applications that deliver specific information to their users based on their current locations. Examples of such applications include location-based store finder, location-based traffic reports, and location-based advertisements. Although location-based services promise safety and convenience, they threaten the privacy and security of users as such services explicitly require users to share private location information with the service. If a user wants to keep her location information private, she has to turn off her location-aware device and temporarily unsubscribe from the service. Recent studies show that such privacy concerns - ranging from worries over employers snooping on their workers' whereabouts to fears of tracking by potential stalkers - are a serious obstacle to wider adoption of location-based services. This article aims to provide practitioners, researchers, and graduate students with the state of the art and major research issues in the important and practical research area of location privacy. In general, the tutorial is divided into the following five parts: (1) legislative issues and privacy concerns, (2) location privacy in mobile environments, (3) privacy attack models, (4) privacy-aware location query processing; (5) concluding remarks.
位置检测设备(例如,类似gps的设备和手持设备)以及无线通信和移动数据库的爆炸式增长导致实现基于位置的应用程序,这些应用程序根据用户当前位置向用户提供特定信息。这种应用程序的示例包括基于位置的商店查找器、基于位置的交通报告和基于位置的广告。虽然基于位置的服务承诺安全方便,但由于明确要求用户与服务共享私人位置信息,因此威胁到用户的隐私和安全。如果用户想让自己的位置信息保密,她必须关闭位置感知设备,并暂时取消订阅该服务。最近的研究表明,这种对隐私的担忧——从担心雇主窥探员工的行踪到担心潜在的跟踪者的跟踪——是广泛采用基于位置的服务的一个严重障碍。本文旨在为从业者、研究人员和研究生提供位置隐私这一重要而实用的研究领域的最新进展和主要研究问题。总的来说,本教程分为以下五个部分:(1)立法问题和隐私问题,(2)移动环境下的位置隐私,(3)隐私攻击模型,(4)隐私感知位置查询处理;(5)结束语。
{"title":"Privacy in Location-Based Services: State-of-the-Art and Research Directions","authors":"M. Mokbel","doi":"10.1109/MDM.2007.45","DOIUrl":"https://doi.org/10.1109/MDM.2007.45","url":null,"abstract":"The explosive growth of location-detection devices (e.g., GPS-like devices and handheld devices) along with wireless communications and mobile databases results in realizing location-based applications that deliver specific information to their users based on their current locations. Examples of such applications include location-based store finder, location-based traffic reports, and location-based advertisements. Although location-based services promise safety and convenience, they threaten the privacy and security of users as such services explicitly require users to share private location information with the service. If a user wants to keep her location information private, she has to turn off her location-aware device and temporarily unsubscribe from the service. Recent studies show that such privacy concerns - ranging from worries over employers snooping on their workers' whereabouts to fears of tracking by potential stalkers - are a serious obstacle to wider adoption of location-based services. This article aims to provide practitioners, researchers, and graduate students with the state of the art and major research issues in the important and practical research area of location privacy. In general, the tutorial is divided into the following five parts: (1) legislative issues and privacy concerns, (2) location privacy in mobile environments, (3) privacy attack models, (4) privacy-aware location query processing; (5) concluding remarks.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132637831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 86
Privacy Preserving Computation of Shortest Path in Presence of a Single Convex Polygonal Obstacle 存在单个凸多边形障碍时最短路径的隐私保护计算
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.52
Ananda Swarup, Das Kannan, Srinathan Ritesh, Kumar Tiwari
Shortest path computation has always been a subject of study and research in the history of computer science. In this paper we introduce and initiate the study of the problem of finding the shortest path in a privacy preserving manner, in presence of single convex polygonal obstacle. We also propose an efficient, elegant and simple solution for the problem.
最短路径计算一直是计算机科学史上的一个研究课题。本文引入并研究了在存在单个凸多边形障碍物的情况下,以隐私保护的方式寻找最短路径的问题。我们还提出了一个高效、优雅、简单的解决方案。
{"title":"Privacy Preserving Computation of Shortest Path in Presence of a Single Convex Polygonal Obstacle","authors":"Ananda Swarup, Das Kannan, Srinathan Ritesh, Kumar Tiwari","doi":"10.1109/MDM.2007.52","DOIUrl":"https://doi.org/10.1109/MDM.2007.52","url":null,"abstract":"Shortest path computation has always been a subject of study and research in the history of computer science. In this paper we introduce and initiate the study of the problem of finding the shortest path in a privacy preserving manner, in presence of single convex polygonal obstacle. We also propose an efficient, elegant and simple solution for the problem.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":"22 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133140700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Phenomenon-Aware Stream Query Processing 现象感知流查询处理
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.11
Mohamed H. Ali, M. Mokbel, Walid G. Aref
Spatio-temporal data streams that are generated from mobile stream sources (e.g., mobile sensors) experience similar environmental conditions that result in distinct phenomena. Several research efforts are dedicated to detect and track various phenomena inside a data stream management system (DSMS). In this paper, we use the detected phenomena to reduce the demand on the DSMS resources. The main idea is to let the query processor observe the input data streams at the phenomena level. Then, each incoming continuous query is directed only to those phenomena that participate in the query answer. Two levels of indexing are employed, a phenomenon index and a query index. The phenomenon index provides a fine resolution view of the input streams that participate in a particular phenomenon. The query index utilizes the phenomenon index to maintain a query deployment map in which each input stream is aware of the set of continuous queries that the stream contributes to their answers. Both indices are updated dynamically in response to the evolving nature of phenomena and to the mobility of the stream sources. Experimental results show the efficiency of this approach with respect to the accuracy of the query result and the resource utilization of the DSMS.
由移动流源(例如,移动传感器)产生的时空数据流经历类似的环境条件,导致不同的现象。一些研究工作致力于检测和跟踪数据流管理系统(DSMS)内的各种现象。在本文中,我们利用检测到的现象来减少对DSMS资源的需求。其主要思想是让查询处理器在现象级观察输入数据流。然后,每个传入的连续查询只指向那些参与查询答案的现象。使用了两层索引,现象索引和查询索引。现象索引提供了参与特定现象的输入流的精细分辨率视图。查询索引利用现象索引来维护查询部署映射,其中每个输入流都知道该流为其答案提供的连续查询集。这两个指数都是动态更新的,以响应现象的演变性质和流源的流动性。实验结果表明,该方法在查询结果的准确性和资源利用率方面是有效的。
{"title":"Phenomenon-Aware Stream Query Processing","authors":"Mohamed H. Ali, M. Mokbel, Walid G. Aref","doi":"10.1109/MDM.2007.11","DOIUrl":"https://doi.org/10.1109/MDM.2007.11","url":null,"abstract":"Spatio-temporal data streams that are generated from mobile stream sources (e.g., mobile sensors) experience similar environmental conditions that result in distinct phenomena. Several research efforts are dedicated to detect and track various phenomena inside a data stream management system (DSMS). In this paper, we use the detected phenomena to reduce the demand on the DSMS resources. The main idea is to let the query processor observe the input data streams at the phenomena level. Then, each incoming continuous query is directed only to those phenomena that participate in the query answer. Two levels of indexing are employed, a phenomenon index and a query index. The phenomenon index provides a fine resolution view of the input streams that participate in a particular phenomenon. The query index utilizes the phenomenon index to maintain a query deployment map in which each input stream is aware of the set of continuous queries that the stream contributes to their answers. Both indices are updated dynamically in response to the evolving nature of phenomena and to the mobility of the stream sources. Experimental results show the efficiency of this approach with respect to the accuracy of the query result and the resource utilization of the DSMS.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133798233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2007 International Conference on Mobile Data Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1