Filters








821 Hits in 8.2 sec

Query the trajectory based on the precise track: a Bloom filter-based approach

Zengjie Wang, Wen Luo, Linwang Yuan, Hong Gao, Fan Wu, Xu Hu, Zhaoyuan Yu
2021 Geoinformatica  
And the Bloom Filter-based query method is hardly affected by grid size, original data size, and length of tracks.  ...  Thus, they are not suitable for the time-critical tasks of trajectory big data. In this paper, a query method of trajectory is developed on the Bloom Filter.  ...  For the precise query, the query time based on Bloom Filter is much shorter than that based on the R*Tree index.  ... 
doi:10.1007/s10707-021-00433-2 pmid:33746566 pmcid:PMC7957281 fatcat:2lamqzoyundcnj2vfjors6n24e

Cleansing Indoor RFID Tracking Data [article]

Asif Iqbal Baba
2016 Ph.d.-serien for Det Teknisk-Naturvidenskabelige Fakultet, Aalborg Universitet  
[19] propose a graph based approach for indoor tracking based on the raw positioning data generated by devices like RFID readers.  ...  A trajectory query returns "yes" or "no" depending on if the trajectory query pattern matches the locations traveled by the object.  ...  Abstract The Radio Frequency Identification (RFID) emerges to be one of the key technologies to modernize object tracking and monitoring systems in indoor environments, e.g., airport baggage tracking.  ... 
doi:10.5278/vbn.phd.engsci.00160 fatcat:4fduxphgdrhdlpos2djgiyu2wy

Monocular Model-Based 3D Tracking of Rigid Objects: A Survey

Vincent Lepetit, Pascal Fua
2005 Foundations and Trends in Computer Graphics and Vision  
The survery concludes with the different possible choices that should be made when implementing a 3D tracking system and a discussion of the future of vision-based 3D tracking.  ...  Then a comprehensive study is given of the numerous approaches developed by the Augmented Reality and Robotics communities, beginning with those that are based on point or planar fiducial marks and moving  ...  Here we focus on online model-based 3D tracking using a single camera.  ... 
doi:10.1561/0600000001 fatcat:fhqgklpttrd3hbx6piruzo5yta

A Mosaic of Eyes

Ping Jiang, Zuren Feng, Yongqiang Cheng, Yuanxiang Ji, Jin Zhu, Xiaonian Wang, Feng Tian, John Baruch, Fun Hu
2011 IEEE robotics & automation magazine  
Acknowledgment The authors thank the anonymous reviewers and editors for their constructive and helpful comments. This article  ...  To design L Bloom filters, an intuitive approach is to select the table lengths m(i), i ¼ 1, . . . , L, to meet a common false-positive rate p fp for all branch paths based on (1).  ...  From the working process of a multiple Bloom filter proposed in the "Multiple Bloom Filters for Distributed Routing" section, any query needs to be checked by all the Bloom filters.  ... 
doi:10.1109/mra.2011.942119 fatcat:t7ncxeghgrcfhcx652ratz6nqy

pDCS: Security and Privacy Support for Data-Centric Sensor Networks

M. Shao, S. Zhu, W. Zhang, G. Cao
2007 IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications  
In addition, we propose several query optimization techniques based on Euclidean Steiner Tree and Keyed Bloom Filter to minimize the query overhead while preserving query privacy.  ...  Finally, detailed analysis and simulations show that the Keyed Bloom Filter scheme can significantly reduce the message overhead with the same level of query delay and maintain a very high level of query  ...  In another approach, a novel keyed bloom filter technique is applied to encode the trajectory implicitly, which can achieve destination anonymity while guaranteeing that each query packet reaches its destination  ... 
doi:10.1109/infcom.2007.154 dblp:conf/infocom/ShaoZZC07 fatcat:hddgwxmi6vhebifhplejfd6vi4

pDCS: Security and Privacy Support for Data-Centric Sensor Networks

Min Shao, Sencun Zhu, Wensheng Zhang, Guohong Cao, Yi Yang
2009 IEEE Transactions on Mobile Computing  
In addition, we propose several query optimization techniques based on Euclidean Steiner Tree and Keyed Bloom Filter to minimize the query overhead while preserving query privacy.  ...  Finally, detailed analysis and simulations show that the Keyed Bloom Filter scheme can significantly reduce the message overhead with the same level of query delay and maintain a very high level of query  ...  In another approach, a novel keyed bloom filter technique is applied to encode the trajectory implicitly, which can achieve destination anonymity while guaranteeing that each query packet reaches its destination  ... 
doi:10.1109/tmc.2008.168 fatcat:sdq427gd2bgmdphumjhl4lwqwy

Agent-Based System for Efficient kNN Query Processing with Comprehensive Privacy Protection

Mohamad Shady, Maher Khemakhem, Kamal Jambi
2018 International Journal of Advanced Computer Science and Applications  
In the context of LBS privacy protection, a dummy is a query that is constructed based on a fabricated location or fabricated properties.  ...  To guarantee the efficiency of kNN processing, the agent executes a prediction phase depending on a Cell Based Indexing (CBI) technique.  ...  a bloom filter [24] .  ... 
doi:10.14569/ijacsa.2018.090108 fatcat:oolcyh4qbrgi7amtbzrxbl6lhy

Security and Privacy in Location-Based Services for Vehicular and Mobile Communications: An Overview, Challenges and Countermeasures

Philip Asuquo, Haitham Cruickshank, Jeremy Morley, Chibueze P. Anyigor Ogah, Ao Lei, Waleed Hathal, Shihan Bao, Zhili Sun
2018 IEEE Internet of Things Journal  
Location-based Services (LBS) have gained popularity as a result of the advances in mobile and communication technologies. LBS provide users with relevant information based on their location.  ...  The different approaches proposed in literature are compared and open research areas are identified.  ...  Based on the location where the dummy is generated, the LBS provider can easily filter out the location.  ... 
doi:10.1109/jiot.2018.2820039 fatcat:y2gdcllac5fbpdd2nnxn4tib2i

Sanitization of Call Detail Records via Differentially-private Summaries [article]

Mohammad Alaggan, Sébastien Gambs, Stan Matwin, Eriko Souza, and Mohammed Tuhin
2014 arXiv   pre-print
Bloom filter for the purpose of privately counting the number of mobile service users moving from one area (region) to another in a given time frame.  ...  To answer this issue and to foster the development of such applications in a privacy-preserving manner, we propose in this paper a novel approach in which CDRs are summarized under the form of a differentially-private  ...  Acknowledgments We would like to acknowledge the Call Detail Records datasets provided by the 'D4D Challenge' in Senegal.  ... 
arXiv:1412.8412v2 fatcat:dirhllpmzfhprguy7wsvcwlgbu

Dissemination and Harvesting of Urban Data Using Vehicular Sensing Platforms

Uichin Lee, E. Magistretti, M. Gerla, P. Bellavista, A. Corradi
2009 IEEE Transactions on Vehicular Technology  
challenging urban tracking application where the police reconstructs the movements of a suspicious driver, say, by specifying the car license number.  ...  vehicles and to create a low-cost index to query monitoring data.  ...  ACKNOWLEDGEMENT We would like to thank Xiaoyan Hong and Jiejun Kong for sparing their valuable time to review the security section of the paper.  ... 
doi:10.1109/tvt.2008.928899 fatcat:shlcm35ktng3zgwre6c242rtxy

Accountable Outsourcing Location-based Services With Privacy Preservation

Zhaoman Liu, Lei Wu, Junming Ke, Wenlei Qu, Wei Wang, Hao Wang
2019 IEEE Access  
In the outsourcing scenario, in order to make users interact with cloud server to obtain query data, firstly we construct location hierarchical index and attribute hierarchical index based on Bloom Filter  ...  Among the numerous researches on location privacy preservation, cloud-based location privacy preservation has become a hot topic, but it undoubtedly brings new problems such as data confidentiality and  ...  [11] propose trajectory K anonymity. Moreover, in the aspect of trajectory prediction, [12] designs a K anonymous protection algorithm based on probability inference model Mask-K .  ... 
doi:10.1109/access.2019.2936582 fatcat:63vcoembybfjrpdwbivb2y6lta

Secure and location privacy in geographical data with electronic codebook mode-advanced encryption standard

Nikhil B. Khandare, Narendra S. Chaudhari
2021 International Journal of Vehicle Information and Communication Systems  
As the LBS is associated to the user's location that can be preferred to track the actions of user, a strong privacy concern is elevated.  ...  Location-Based Service (LBS) is considered as one of the utmost encouraging as well as new ways of convergence technologies ensuing in the development of numerous fields together with database systems,  ...  Bloom Filter 0 Knowledge (BL0K) was a novel phase privacy technique that preserved the outline for LBS and integrated a Bloom filter and the Zero knowledge protocol was described (Kuang, et al, 2017)  ... 
doi:10.1504/ijvics.2021.10035872 fatcat:7cam2kawrfgvtjsjkanjc6movi

A Survey of Spatio-Temporal Big Data Indexing Methods in Distributed Environment

Ruijie Tian, Huawei Zhai, Weishi Zhang, Fei Wang, Yao Guan
2022 IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing  
How to construct an effective index for the application requirements of spatio-temporal data in a distributed environment has become one of the hotspots of spatio-temporal big data research.  ...  With the widespread use of mobile and sensing devices, and the popularity of online map-based services, such as navigation services, the volume of spatio-temporal data is growing rapidly.  ...  ACKNOWLEDGMENT The authors would like to thank to X. Du, C. Li, G. Peng, and C. Li, with special thank A. Eldawy, Assistant Professor, with the University of California Riverside.  ... 
doi:10.1109/jstars.2022.3175657 fatcat:tjklpbkfffasjhwillift47k2i

Finding interesting correlations with conditional heavy hitters

K. Mirylenka, T. Palpanas, G. Cormode, D. Srivastava
2013 2013 IEEE 29th International Conference on Data Engineering (ICDE)  
The notion of heavy hitters-items that make up a large fraction of the population-has been successfully used in a variety of applications across sensor and RFID monitoring, network data analysis, event  ...  Here, we are interested in items that are conditionally frequent: when a particular item is frequent within the context of its parent item.  ...  The Bloom Filter strategy, while achieving high recall, always has very poor precision (Figure 3(c) ).  ... 
doi:10.1109/icde.2013.6544898 dblp:conf/icde/MirylenkaPCS13 fatcat:7atraz4vjjc67kxtudptsbbrom

A survey of urban vehicular sensing platforms

Uichin Lee, Mario Gerla
2010 Computer Networks  
The ability to take a smartphone on board a vehicle and to complement the sensors of the latter with advanced smartphone capabilities is of immense interest to the industry.  ...  Vehicular sensing where vehicles on the road continuously gather, process, and share location-relevant sensor data (e.g., road condition, traffic flow) is emerging as a new network paradigm for sensor  ...  for membership checking, i.e., a Bloom filter.  ... 
doi:10.1016/j.comnet.2009.07.011 fatcat:jbbzpx6bvnaozizfmbuj3emcqe
« Previous Showing results 1 — 15 out of 821 results