首页 > 最新文献

2007 International Conference on Mobile Data Management最新文献

英文 中文
Audio and Image Browser for Mobile Devices 移动设备的音频和图像浏览器
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.37
T. Lahti, P. Pietarila, Liu Yingfei, Timo Pylvänäinen, Olli Vuorinen
Users expect efficient ways of handling their personal audio and image data using only the mobile device. Data sharing with friends and interest groups is also becoming increasingly important. Browsing and manually searching through your own and a shared data library can be difficult. For example, the simplest traditional attributes like time and date are normally unknown for other people's data. In this paper a search application running on mobile device is described. The application relies on automatic content analysis and metadata generation for audio and image data. Two search paradigms - class based search and example based search - are supported. In mobile devices the small display size makes it difficult to handle large amounts of information quickly. For this reason efficient metadata visualization is important. In our system the content metadata is converted into visual form that is fast to browse through at one glance.
用户希望仅使用移动设备就能有效地处理他们的个人音频和图像数据。与朋友和兴趣团体分享数据也变得越来越重要。浏览和手动搜索您自己的和共享的数据库可能很困难。例如,时间和日期等最简单的传统属性对于其他人的数据来说通常是未知的。本文描述了一个运行在移动设备上的搜索应用程序。该应用程序依赖于音频和图像数据的自动内容分析和元数据生成。支持两种搜索范例——基于类的搜索和基于示例的搜索。在移动设备中,小的显示尺寸使得快速处理大量信息变得困难。因此,高效的元数据可视化非常重要。在我们的系统中,内容元数据被转换成视觉形式,可以快速浏览一眼。
{"title":"Audio and Image Browser for Mobile Devices","authors":"T. Lahti, P. Pietarila, Liu Yingfei, Timo Pylvänäinen, Olli Vuorinen","doi":"10.1109/MDM.2007.37","DOIUrl":"https://doi.org/10.1109/MDM.2007.37","url":null,"abstract":"Users expect efficient ways of handling their personal audio and image data using only the mobile device. Data sharing with friends and interest groups is also becoming increasingly important. Browsing and manually searching through your own and a shared data library can be difficult. For example, the simplest traditional attributes like time and date are normally unknown for other people's data. In this paper a search application running on mobile device is described. The application relies on automatic content analysis and metadata generation for audio and image data. Two search paradigms - class based search and example based search - are supported. In mobile devices the small display size makes it difficult to handle large amounts of information quickly. For this reason efficient metadata visualization is important. In our system the content metadata is converted into visual form that is fast to browse through at one glance.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130672426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On Relaxing Contextual Preference Queries 关于放松上下文偏好查询
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.61
K. Stefanidis, E. Pitoura, Panos Vassiliadis
Personalization systems exploit preferences for providing users with only relevant data from the huge volume of information that is currently available. We consider preferences that dependent on context, such as the location of the user. We model context as a set of attributes, each taking values from hierarchical domains. Often, the context of the query may be too specific to match any of the given preferences. In this paper, we consider possible expansions of the query context produced by relaxing one or more of its context attributes. A hierarchical attribute may be relaxed upwards by replacing its value by a more general one, downwards by replacing its value by a set of more specific values or sideways by replacing its value by sibling values in the hierarchy. We present an algorithm based on a prefix-based representation of context for identifying the preferences whose context matches the relaxed context of the query and some initial performance results.
个性化系统利用用户偏好,从当前可用的海量信息中只为用户提供相关数据。我们考虑依赖于上下文的偏好,比如用户的位置。我们将上下文建模为一组属性,每个属性都从分层域获取值。通常,查询的上下文可能过于特定,无法匹配任何给定的首选项。在本文中,我们考虑通过放松查询上下文的一个或多个上下文属性来产生查询上下文的可能扩展。层次属性可以通过用更一般的值替换其值来向上放松,可以通过用一组更具体的值替换其值来向下放松,也可以通过用层次结构中的兄弟值替换其值来横向放松。我们提出了一种基于基于前缀的上下文表示的算法,用于识别其上下文与查询的宽松上下文和一些初始性能结果相匹配的首选项。
{"title":"On Relaxing Contextual Preference Queries","authors":"K. Stefanidis, E. Pitoura, Panos Vassiliadis","doi":"10.1109/MDM.2007.61","DOIUrl":"https://doi.org/10.1109/MDM.2007.61","url":null,"abstract":"Personalization systems exploit preferences for providing users with only relevant data from the huge volume of information that is currently available. We consider preferences that dependent on context, such as the location of the user. We model context as a set of attributes, each taking values from hierarchical domains. Often, the context of the query may be too specific to match any of the given preferences. In this paper, we consider possible expansions of the query context produced by relaxing one or more of its context attributes. A hierarchical attribute may be relaxed upwards by replacing its value by a more general one, downwards by replacing its value by a set of more specific values or sideways by replacing its value by sibling values in the hierarchy. We present an algorithm based on a prefix-based representation of context for identifying the preferences whose context matches the relaxed context of the query and some initial performance results.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130766290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Energy-Efficient Medium Access for Data Intensive Wireless Sensor Networks 数据密集型无线传感器网络的节能介质接入
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.76
Zdravko Karakehayov, N. Andersen
This paper presents ALS-MAC, a medium access control protocol for wireless sensor networks. ALS-MAC is a single channel MAC protocol suitable for location-aware networks. The protocol employs beacons to synchronize internode communications. Scalability and collision avoidance are achieved via contention-based advertising slots mapped to scheduled-based transmission slots. ALS-MAC has two dedicated modes of operation for data intensive traffic which assign temporary priority to nodes with many or long buffered packets. Beacons and signaling frames are combined to reduce the collision and control packet overhead. We study multihop optimization schemes for non-regular topologies under ALS-MAC.
本文提出了一种用于无线传感器网络的介质访问控制协议ALS-MAC。ALS-MAC是一种适用于位置感知网络的单通道MAC协议。该协议使用信标来同步节点间通信。通过将基于争用的广告槽映射到基于调度的传输槽来实现可扩展性和避免冲突。ALS-MAC有两种专用的操作模式,用于数据密集型流量,为具有许多或长缓冲数据包的节点分配临时优先级。信标和信令帧相结合,以减少碰撞和控制数据包开销。研究了ALS-MAC下非规则拓扑的多跳优化方案。
{"title":"Energy-Efficient Medium Access for Data Intensive Wireless Sensor Networks","authors":"Zdravko Karakehayov, N. Andersen","doi":"10.1109/MDM.2007.76","DOIUrl":"https://doi.org/10.1109/MDM.2007.76","url":null,"abstract":"This paper presents ALS-MAC, a medium access control protocol for wireless sensor networks. ALS-MAC is a single channel MAC protocol suitable for location-aware networks. The protocol employs beacons to synchronize internode communications. Scalability and collision avoidance are achieved via contention-based advertising slots mapped to scheduled-based transmission slots. ALS-MAC has two dedicated modes of operation for data intensive traffic which assign temporary priority to nodes with many or long buffered packets. Beacons and signaling frames are combined to reduce the collision and control packet overhead. We study multihop optimization schemes for non-regular topologies under ALS-MAC.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128934409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Advanced Evasive Data Storage in Sensor Networks 传感器网络中的高级回避数据存储
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.29
Z. Benenson, F. Freiling, Peter M. Cholewinski
In case the data which is stored and processed in a sensor network has some value, it needs to be protected from unauthorized access through a security mechanism. The idea of evasive data storage is that data moves around the sensor network instead of remaining at a fixed location. In this way, an adversary, who has once (through node capture) had access to the data stored at some particular node, must compromise more sensors in order to maintain his illegitimate access to the sensor data. We refine the previously published simple evasive data storage techniques in two ways: (1) we improve the efficiency of data retrieval by bounding the area in which data may move, (2) we introduce data splitting as a technique to protect against sleeper attacks in which the adversary simply takes over a subset of nodes and waits for valuable data to pass by. We demonstrate the effectiveness of our approach using extensive simulations.
如果在传感器网络中存储和处理的数据具有一定的价值,则需要通过安全机制保护这些数据不被未经授权的访问。规避数据存储的概念是数据在传感器网络中移动,而不是停留在固定位置。通过这种方式,攻击者一旦(通过节点捕获)访问了存储在某个特定节点上的数据,就必须破坏更多的传感器,以维持对传感器数据的非法访问。我们以两种方式改进了先前发布的简单回避数据存储技术:(1)我们通过限定数据可能移动的区域来提高数据检索的效率,(2)我们引入数据分割作为一种技术来防止潜伏攻击,在潜伏攻击中,对手只是接管节点子集并等待有价值的数据通过。我们通过大量的模拟来证明我们的方法的有效性。
{"title":"Advanced Evasive Data Storage in Sensor Networks","authors":"Z. Benenson, F. Freiling, Peter M. Cholewinski","doi":"10.1109/MDM.2007.29","DOIUrl":"https://doi.org/10.1109/MDM.2007.29","url":null,"abstract":"In case the data which is stored and processed in a sensor network has some value, it needs to be protected from unauthorized access through a security mechanism. The idea of evasive data storage is that data moves around the sensor network instead of remaining at a fixed location. In this way, an adversary, who has once (through node capture) had access to the data stored at some particular node, must compromise more sensors in order to maintain his illegitimate access to the sensor data. We refine the previously published simple evasive data storage techniques in two ways: (1) we improve the efficiency of data retrieval by bounding the area in which data may move, (2) we introduce data splitting as a technique to protect against sleeper attacks in which the adversary simply takes over a subset of nodes and waits for valuable data to pass by. We demonstrate the effectiveness of our approach using extensive simulations.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129204157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
CADD: A Tool for Context Modeling and Data Tailoring CADD:上下文建模和数据裁剪工具
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.42
C. Bolchini, C. Curino, G. Orsi, E. Quintarelli, F. Schreiber, L. Tanca
Nowadays user mobility requires that both content and services be appropriately personalized, in order for the (mobile) user to be always - and anywhere - equipped with the adequate share of data. Thus, the knowledge about the user, the adopted device and the environment, altogether called context, has to be taken into account in order to minimize the amount of information imported on mobile devices. The Context-ADDICT (Context-Aware Data Design, Integration, Customization and Tailoring) project aims at the definition of a complete framework which, starting from a methodology for the early design phases, supports mobile users through the dynamic hooking and integration of new, available information sources, so that an appropriate context-based portion of data, called data chunk, is delivered to their mobile devices. Data tailoring is needed because of two main reasons: the first is to keep the amount of information manageable, in order for the user not to be confused by too much, possibly noisy, information; the second is the frequent case when the mobile device is a small one, like a palm computer or a cellular phone, and thus only the most significant information must be kept on board. Context is, thus, key metainformation whose role becomes essential within the process of view design. Two main design-time activities are supported by our system in order to provide context-aware data filtering: 1) context design, based on a context model called context dimension tree and 2) definition of the relationship between each context and relevant portions of the application domain data.
如今,用户的移动性要求内容和服务都适当地个性化,以便(移动)用户随时随地配备足够的数据共享。因此,必须考虑到关于用户,所采用的设备和环境的知识,统称为上下文,以便最大限度地减少在移动设备上导入的信息量。Context-ADDICT(上下文感知数据设计、集成、定制和裁剪)项目旨在定义一个完整的框架,该框架从早期设计阶段的方法开始,通过动态连接和集成新的、可用的信息源来支持移动用户,以便将适当的基于上下文的数据部分(称为数据块)传递到他们的移动设备。需要数据裁剪主要有两个原因:第一是保持信息的可管理性,以便用户不会被过多的、可能嘈杂的信息所迷惑;第二种情况是,当移动设备很小的时候,比如掌上电脑或手机,因此只需要保存最重要的信息。因此,上下文是关键的元信息,其作用在视图设计过程中变得至关重要。为了提供上下文感知的数据过滤,我们的系统支持两个主要的设计时活动:1)上下文设计,基于称为上下文维度树的上下文模型;2)定义每个上下文与应用程序域数据的相关部分之间的关系。
{"title":"CADD: A Tool for Context Modeling and Data Tailoring","authors":"C. Bolchini, C. Curino, G. Orsi, E. Quintarelli, F. Schreiber, L. Tanca","doi":"10.1109/MDM.2007.42","DOIUrl":"https://doi.org/10.1109/MDM.2007.42","url":null,"abstract":"Nowadays user mobility requires that both content and services be appropriately personalized, in order for the (mobile) user to be always - and anywhere - equipped with the adequate share of data. Thus, the knowledge about the user, the adopted device and the environment, altogether called context, has to be taken into account in order to minimize the amount of information imported on mobile devices. The Context-ADDICT (Context-Aware Data Design, Integration, Customization and Tailoring) project aims at the definition of a complete framework which, starting from a methodology for the early design phases, supports mobile users through the dynamic hooking and integration of new, available information sources, so that an appropriate context-based portion of data, called data chunk, is delivered to their mobile devices. Data tailoring is needed because of two main reasons: the first is to keep the amount of information manageable, in order for the user not to be confused by too much, possibly noisy, information; the second is the frequent case when the mobile device is a small one, like a palm computer or a cellular phone, and thus only the most significant information must be kept on board. Context is, thus, key metainformation whose role becomes essential within the process of view design. Two main design-time activities are supported by our system in order to provide context-aware data filtering: 1) context design, based on a context model called context dimension tree and 2) definition of the relationship between each context and relevant portions of the application domain data.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131363690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Comparison of Spatial Generalization Algorithms for LBS Privacy Preservation LBS隐私保护的空间泛化算法比较
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.54
S. Mascetti, C. Bettini
Spatial generalization has been recently proposed as a technique for the anonymization of requests in location based services. This paper presents the results of an extensive experimental study, considering known generalization algorithms as well as new ones proposed by the authors.
空间概化最近被提出作为基于位置的服务请求的匿名化技术。本文介绍了一项广泛的实验研究的结果,考虑了已知的泛化算法以及作者提出的新算法。
{"title":"A Comparison of Spatial Generalization Algorithms for LBS Privacy Preservation","authors":"S. Mascetti, C. Bettini","doi":"10.1109/MDM.2007.54","DOIUrl":"https://doi.org/10.1109/MDM.2007.54","url":null,"abstract":"Spatial generalization has been recently proposed as a technique for the anonymization of requests in location based services. This paper presents the results of an extensive experimental study, considering known generalization algorithms as well as new ones proposed by the authors.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130593068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Distributive Energy Efficient Adaptive Clustering Protocol for Wireless Sensor Networks 面向无线传感器网络的分布式节能自适应聚类协议
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.69
Udit Sajjanhar, Pabitra Mitra
Clustering sensors into groups, so that sensors communicate information only to cluster-heads and then the cluster-heads communicate the aggregated information to the base station, saves energy and thus prolongs network lifetime. Adapting this approach, we propose a Distributive Energy Efficient Adaptive Clustering (DEEAC) protocol. This protocol is adaptive in terms of data reporting rates and residual energy of each node within the network. Motivated by the LEACH protocol [I], we extend its stochastic cluster selection algorithm for networks having spatio-temporal variations in data reporting rates across different regions. Simulation results demonstrate that DEEAC is able to distribute energy consumption more effectively among the sensors, thereby prolonging the network lifetime by as much as 50% compared to LEACH.
将传感器分组,使传感器只与簇头通信,簇头再将聚合后的信息传递给基站,从而节省了能量,延长了网络的生命周期。基于这种方法,我们提出了一种分布式节能自适应聚类(DEEAC)协议。该协议在数据报告率和网络中每个节点的剩余能量方面具有自适应性。在LEACH协议的激励下[1],我们将其随机聚类选择算法扩展到具有不同区域数据报告率时空变化的网络。仿真结果表明,DEEAC能够更有效地在传感器之间分配能量消耗,从而使网络寿命比LEACH延长多达50%。
{"title":"Distributive Energy Efficient Adaptive Clustering Protocol for Wireless Sensor Networks","authors":"Udit Sajjanhar, Pabitra Mitra","doi":"10.1109/MDM.2007.69","DOIUrl":"https://doi.org/10.1109/MDM.2007.69","url":null,"abstract":"Clustering sensors into groups, so that sensors communicate information only to cluster-heads and then the cluster-heads communicate the aggregated information to the base station, saves energy and thus prolongs network lifetime. Adapting this approach, we propose a Distributive Energy Efficient Adaptive Clustering (DEEAC) protocol. This protocol is adaptive in terms of data reporting rates and residual energy of each node within the network. Motivated by the LEACH protocol [I], we extend its stochastic cluster selection algorithm for networks having spatio-temporal variations in data reporting rates across different regions. Simulation results demonstrate that DEEAC is able to distribute energy consumption more effectively among the sensors, thereby prolonging the network lifetime by as much as 50% compared to LEACH.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129535128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
Privacy in Location-Based Services: State-of-the-Art and Research Directions 基于位置的服务中的隐私:现状与研究方向
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.45
M. Mokbel
The explosive growth of location-detection devices (e.g., GPS-like devices and handheld devices) along with wireless communications and mobile databases results in realizing location-based applications that deliver specific information to their users based on their current locations. Examples of such applications include location-based store finder, location-based traffic reports, and location-based advertisements. Although location-based services promise safety and convenience, they threaten the privacy and security of users as such services explicitly require users to share private location information with the service. If a user wants to keep her location information private, she has to turn off her location-aware device and temporarily unsubscribe from the service. Recent studies show that such privacy concerns - ranging from worries over employers snooping on their workers' whereabouts to fears of tracking by potential stalkers - are a serious obstacle to wider adoption of location-based services. This article aims to provide practitioners, researchers, and graduate students with the state of the art and major research issues in the important and practical research area of location privacy. In general, the tutorial is divided into the following five parts: (1) legislative issues and privacy concerns, (2) location privacy in mobile environments, (3) privacy attack models, (4) privacy-aware location query processing; (5) concluding remarks.
位置检测设备(例如,类似gps的设备和手持设备)以及无线通信和移动数据库的爆炸式增长导致实现基于位置的应用程序,这些应用程序根据用户当前位置向用户提供特定信息。这种应用程序的示例包括基于位置的商店查找器、基于位置的交通报告和基于位置的广告。虽然基于位置的服务承诺安全方便,但由于明确要求用户与服务共享私人位置信息,因此威胁到用户的隐私和安全。如果用户想让自己的位置信息保密,她必须关闭位置感知设备,并暂时取消订阅该服务。最近的研究表明,这种对隐私的担忧——从担心雇主窥探员工的行踪到担心潜在的跟踪者的跟踪——是广泛采用基于位置的服务的一个严重障碍。本文旨在为从业者、研究人员和研究生提供位置隐私这一重要而实用的研究领域的最新进展和主要研究问题。总的来说,本教程分为以下五个部分:(1)立法问题和隐私问题,(2)移动环境下的位置隐私,(3)隐私攻击模型,(4)隐私感知位置查询处理;(5)结束语。
{"title":"Privacy in Location-Based Services: State-of-the-Art and Research Directions","authors":"M. Mokbel","doi":"10.1109/MDM.2007.45","DOIUrl":"https://doi.org/10.1109/MDM.2007.45","url":null,"abstract":"The explosive growth of location-detection devices (e.g., GPS-like devices and handheld devices) along with wireless communications and mobile databases results in realizing location-based applications that deliver specific information to their users based on their current locations. Examples of such applications include location-based store finder, location-based traffic reports, and location-based advertisements. Although location-based services promise safety and convenience, they threaten the privacy and security of users as such services explicitly require users to share private location information with the service. If a user wants to keep her location information private, she has to turn off her location-aware device and temporarily unsubscribe from the service. Recent studies show that such privacy concerns - ranging from worries over employers snooping on their workers' whereabouts to fears of tracking by potential stalkers - are a serious obstacle to wider adoption of location-based services. This article aims to provide practitioners, researchers, and graduate students with the state of the art and major research issues in the important and practical research area of location privacy. In general, the tutorial is divided into the following five parts: (1) legislative issues and privacy concerns, (2) location privacy in mobile environments, (3) privacy attack models, (4) privacy-aware location query processing; (5) concluding remarks.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132637831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 86
Privacy Preserving Computation of Shortest Path in Presence of a Single Convex Polygonal Obstacle 存在单个凸多边形障碍时最短路径的隐私保护计算
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.52
Ananda Swarup, Das Kannan, Srinathan Ritesh, Kumar Tiwari
Shortest path computation has always been a subject of study and research in the history of computer science. In this paper we introduce and initiate the study of the problem of finding the shortest path in a privacy preserving manner, in presence of single convex polygonal obstacle. We also propose an efficient, elegant and simple solution for the problem.
最短路径计算一直是计算机科学史上的一个研究课题。本文引入并研究了在存在单个凸多边形障碍物的情况下,以隐私保护的方式寻找最短路径的问题。我们还提出了一个高效、优雅、简单的解决方案。
{"title":"Privacy Preserving Computation of Shortest Path in Presence of a Single Convex Polygonal Obstacle","authors":"Ananda Swarup, Das Kannan, Srinathan Ritesh, Kumar Tiwari","doi":"10.1109/MDM.2007.52","DOIUrl":"https://doi.org/10.1109/MDM.2007.52","url":null,"abstract":"Shortest path computation has always been a subject of study and research in the history of computer science. In this paper we introduce and initiate the study of the problem of finding the shortest path in a privacy preserving manner, in presence of single convex polygonal obstacle. We also propose an efficient, elegant and simple solution for the problem.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133140700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Phenomenon-Aware Stream Query Processing 现象感知流查询处理
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.11
Mohamed H. Ali, M. Mokbel, Walid G. Aref
Spatio-temporal data streams that are generated from mobile stream sources (e.g., mobile sensors) experience similar environmental conditions that result in distinct phenomena. Several research efforts are dedicated to detect and track various phenomena inside a data stream management system (DSMS). In this paper, we use the detected phenomena to reduce the demand on the DSMS resources. The main idea is to let the query processor observe the input data streams at the phenomena level. Then, each incoming continuous query is directed only to those phenomena that participate in the query answer. Two levels of indexing are employed, a phenomenon index and a query index. The phenomenon index provides a fine resolution view of the input streams that participate in a particular phenomenon. The query index utilizes the phenomenon index to maintain a query deployment map in which each input stream is aware of the set of continuous queries that the stream contributes to their answers. Both indices are updated dynamically in response to the evolving nature of phenomena and to the mobility of the stream sources. Experimental results show the efficiency of this approach with respect to the accuracy of the query result and the resource utilization of the DSMS.
由移动流源(例如,移动传感器)产生的时空数据流经历类似的环境条件,导致不同的现象。一些研究工作致力于检测和跟踪数据流管理系统(DSMS)内的各种现象。在本文中,我们利用检测到的现象来减少对DSMS资源的需求。其主要思想是让查询处理器在现象级观察输入数据流。然后,每个传入的连续查询只指向那些参与查询答案的现象。使用了两层索引,现象索引和查询索引。现象索引提供了参与特定现象的输入流的精细分辨率视图。查询索引利用现象索引来维护查询部署映射,其中每个输入流都知道该流为其答案提供的连续查询集。这两个指数都是动态更新的,以响应现象的演变性质和流源的流动性。实验结果表明,该方法在查询结果的准确性和资源利用率方面是有效的。
{"title":"Phenomenon-Aware Stream Query Processing","authors":"Mohamed H. Ali, M. Mokbel, Walid G. Aref","doi":"10.1109/MDM.2007.11","DOIUrl":"https://doi.org/10.1109/MDM.2007.11","url":null,"abstract":"Spatio-temporal data streams that are generated from mobile stream sources (e.g., mobile sensors) experience similar environmental conditions that result in distinct phenomena. Several research efforts are dedicated to detect and track various phenomena inside a data stream management system (DSMS). In this paper, we use the detected phenomena to reduce the demand on the DSMS resources. The main idea is to let the query processor observe the input data streams at the phenomena level. Then, each incoming continuous query is directed only to those phenomena that participate in the query answer. Two levels of indexing are employed, a phenomenon index and a query index. The phenomenon index provides a fine resolution view of the input streams that participate in a particular phenomenon. The query index utilizes the phenomenon index to maintain a query deployment map in which each input stream is aware of the set of continuous queries that the stream contributes to their answers. Both indices are updated dynamically in response to the evolving nature of phenomena and to the mobility of the stream sources. Experimental results show the efficiency of this approach with respect to the accuracy of the query result and the resource utilization of the DSMS.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133798233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2007 International Conference on Mobile Data Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1