This paper addresses how to answer the reversed nearest neighbor (RNN) queries in the location-based services when the privacy of users needs to be protected. We assume that the users' exact locations have been blurred into spatial regions based on user-specified privacy requirements. Inspired by the concept of Voronoi cell of point data, we introduce the concept of Voronoi cell for regions (VCR) and propose the framework to answer the privacy-ware RNN queries based on computing the VCR. We also propose the techniques to compute the VCR under L1 metric efficiently.
{"title":"Privacy-Aware RNN Query Processing on Location-Based Services","authors":"Yang Du","doi":"10.1109/MDM.2007.53","DOIUrl":"https://doi.org/10.1109/MDM.2007.53","url":null,"abstract":"This paper addresses how to answer the reversed nearest neighbor (RNN) queries in the location-based services when the privacy of users needs to be protected. We assume that the users' exact locations have been blurred into spatial regions based on user-specified privacy requirements. Inspired by the concept of Voronoi cell of point data, we introduce the concept of Voronoi cell for regions (VCR) and propose the framework to answer the privacy-ware RNN queries based on computing the VCR. We also propose the techniques to compute the VCR under L1 metric efficiently.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122301120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Data processing in wireless sensor networks is a well-known challenge. The related problems become even more considerable when the sensor applications have high bandwidth requirements and stringent delay constraints. Those requirements are common for data intensive applications of wireless sensor networks, such as structural health monitoring, disaster management, emergency response, etc. The requirements of data intensive applications become especially critical for efficient data delivery in largescale and mobile sensor networks. As the data load increases, the key performance parameters of wireless sensor networks degrade. The large amount of data may result in unacceptable data loss, time delay and overall energy consumption.
{"title":"International Workshop on Data Intensive Sensor Networks (DISN)","authors":"no author","doi":"10.1109/MDM.2007.67","DOIUrl":"https://doi.org/10.1109/MDM.2007.67","url":null,"abstract":"Data processing in wireless sensor networks is a well-known challenge. The related problems become even more considerable when the sensor applications have high bandwidth requirements and stringent delay constraints. Those requirements are common for data intensive applications of wireless sensor networks, such as structural health monitoring, disaster management, emergency response, etc. The requirements of data intensive applications become especially critical for efficient data delivery in largescale and mobile sensor networks. As the data load increases, the key performance parameters of wireless sensor networks degrade. The large amount of data may result in unacceptable data loss, time delay and overall energy consumption.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130251454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Combining the functionality of location-aware devices, wireless and cellular phone technologies, and data management results in enabling a new era of location-based mobile services that aim to provide personalized services to their customers based on their current locations. Examples of such services include location-aware emergency service, location-based advertisement, live traffic reports, and location-based store finder. Although location-based services promise safety and convenience, they threaten the privacy and security for their customers as they rely mainly on the knowledge of their customers' location information. The current model of location-based services trades the customers' privacy with the service. If a user wants to keep her private location information, she has to turn off her location-aware device and temporarily unsubscribe from the service. Recent social studies show that customers become more privacy-aware as they tend to avoid using location-based services in order to keep their privacy. As a result, there is a real concern that the privacy issues may hinder the technological advances in location-based services.
{"title":"The International Workshop on Privacy-Aware Location-Based Mobile Services (PALMS 2007)","authors":"no author","doi":"10.1109/MDM.2007.48","DOIUrl":"https://doi.org/10.1109/MDM.2007.48","url":null,"abstract":"Combining the functionality of location-aware devices, wireless and cellular phone technologies, and data management results in enabling a new era of location-based mobile services that aim to provide personalized services to their customers based on their current locations. Examples of such services include location-aware emergency service, location-based advertisement, live traffic reports, and location-based store finder. Although location-based services promise safety and convenience, they threaten the privacy and security for their customers as they rely mainly on the knowledge of their customers' location information. The current model of location-based services trades the customers' privacy with the service. If a user wants to keep her private location information, she has to turn off her location-aware device and temporarily unsubscribe from the service. Recent social studies show that customers become more privacy-aware as they tend to avoid using location-based services in order to keep their privacy. As a result, there is a real concern that the privacy issues may hinder the technological advances in location-based services.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114615929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The increasing popularity of mobile devices and sensor networks are enabling new classes of applications targeting environments characterized by being dynamic, mobile, reconfigurable, and personalized. This environment raises challenging problems for scientists and developers, as they have to deal with the variations in the execution context such as location, time, users' activities, and devices' capabilities. This also changes the role of context information and semantics as compared to traditional information systems, as now the physical environment immediately affects and interacts with the processing of data and communication. Context within mobile applications has been the topic of active research for many years. A lot of work has been done for capturing and managing context. Considerably less work exists for managing context using semantic techniques which is the main theme of the MCISME workshop.
{"title":"Second International Workshop on Managing Context Information and Semantics in Mobile Environments (MCISME)","authors":"no author","doi":"10.1109/MDM.2007.60","DOIUrl":"https://doi.org/10.1109/MDM.2007.60","url":null,"abstract":"The increasing popularity of mobile devices and sensor networks are enabling new classes of applications targeting environments characterized by being dynamic, mobile, reconfigurable, and personalized. This environment raises challenging problems for scientists and developers, as they have to deal with the variations in the execution context such as location, time, users' activities, and devices' capabilities. This also changes the role of context information and semantics as compared to traditional information systems, as now the physical environment immediately affects and interacts with the processing of data and communication. Context within mobile applications has been the topic of active research for many years. A lot of work has been done for capturing and managing context. Considerably less work exists for managing context using semantic techniques which is the main theme of the MCISME workshop.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":"133134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123717923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This workshop is aiming to novel research results and applications applying them for the support of contents on the mobile devices. Functionalities of recently developed mobile devices are more and more comparable to those of computers, e.g. in processing performance and in multimedia capabilities. As the result, the content used on mobile devices becomes more important. For example, the amount of music files downloaded to mobile phones is now larger than the number of CDs sold in Japan in 2006. So the promotion of new technologies supporting different mobile contents is expected in the near future.
{"title":"2nd Workshop on Tools and Applications for Mobile Contents (TAMC)","authors":"no author","doi":"10.1109/MDM.2007.78","DOIUrl":"https://doi.org/10.1109/MDM.2007.78","url":null,"abstract":"This workshop is aiming to novel research results and applications applying them for the support of contents on the mobile devices. Functionalities of recently developed mobile devices are more and more comparable to those of computers, e.g. in processing performance and in multimedia capabilities. As the result, the content used on mobile devices becomes more important. For example, the amount of music files downloaded to mobile phones is now larger than the number of CDs sold in Japan in 2006. So the promotion of new technologies supporting different mobile contents is expected in the near future.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133680111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Second, service-oriented computing is viewed by many analysts as the computing paradigm of the near future. It allows for the dynamic integration of functionality provided by different parties. This paradigm shift is changing the way the computer software is developed and used (designed, architected, delivered, consumed, and analysed), and this way of reorganizing software applications and infrastructure into a set of interacting services is usually referred to as Serviceoriented Architectures (SOA).
{"title":"International Workshop on Mobile Service-Oriented Architectures and Ontologies (MOSO)","authors":"no author","doi":"10.1109/MDM.2007.82","DOIUrl":"https://doi.org/10.1109/MDM.2007.82","url":null,"abstract":"Second, service-oriented computing is viewed by many analysts as the computing paradigm of the near future. It allows for the dynamic integration of functionality provided by different parties. This paradigm shift is changing the way the computer software is developed and used (designed, architected, delivered, consumed, and analysed), and this way of reorganizing software applications and infrastructure into a set of interacting services is usually referred to as Serviceoriented Architectures (SOA).","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124222351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}