A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Query the trajectory based on the precise track: a Bloom filter-based approach
2021
Geoinformatica
And the Bloom Filter-based query method is hardly affected by grid size, original data size, and length of tracks. ...
Thus, they are not suitable for the time-critical tasks of trajectory big data. In this paper, a query method of trajectory is developed on the Bloom Filter. ...
For the precise query, the query time based on Bloom Filter is much shorter than that based on the R*Tree index. ...
doi:10.1007/s10707-021-00433-2
pmid:33746566
pmcid:PMC7957281
fatcat:2lamqzoyundcnj2vfjors6n24e
Cleansing Indoor RFID Tracking Data
[article]
2016
Ph.d.-serien for Det Teknisk-Naturvidenskabelige Fakultet, Aalborg Universitet
[19] propose a graph based approach for indoor tracking based on the raw positioning data generated by devices like RFID readers. ...
A trajectory query returns "yes" or "no" depending on if the trajectory query pattern matches the locations traveled by the object. ...
Abstract The Radio Frequency Identification (RFID) emerges to be one of the key technologies to modernize object tracking and monitoring systems in indoor environments, e.g., airport baggage tracking. ...
doi:10.5278/vbn.phd.engsci.00160
fatcat:4fduxphgdrhdlpos2djgiyu2wy
Monocular Model-Based 3D Tracking of Rigid Objects: A Survey
2005
Foundations and Trends in Computer Graphics and Vision
The survery concludes with the different possible choices that should be made when implementing a 3D tracking system and a discussion of the future of vision-based 3D tracking. ...
Then a comprehensive study is given of the numerous approaches developed by the Augmented Reality and Robotics communities, beginning with those that are based on point or planar fiducial marks and moving ...
Here we focus on online model-based 3D tracking using a single camera. ...
doi:10.1561/0600000001
fatcat:fhqgklpttrd3hbx6piruzo5yta
A Mosaic of Eyes
2011
IEEE robotics & automation magazine
Acknowledgment The authors thank the anonymous reviewers and editors for their constructive and helpful comments. This article ...
To design L Bloom filters, an intuitive approach is to select the table lengths m(i), i ¼ 1, . . . , L, to meet a common false-positive rate p fp for all branch paths based on (1). ...
From the working process of a multiple Bloom filter proposed in the "Multiple Bloom Filters for Distributed Routing" section, any query needs to be checked by all the Bloom filters. ...
doi:10.1109/mra.2011.942119
fatcat:t7ncxeghgrcfhcx652ratz6nqy
pDCS: Security and Privacy Support for Data-Centric Sensor Networks
2007
IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications
In addition, we propose several query optimization techniques based on Euclidean Steiner Tree and Keyed Bloom Filter to minimize the query overhead while preserving query privacy. ...
Finally, detailed analysis and simulations show that the Keyed Bloom Filter scheme can significantly reduce the message overhead with the same level of query delay and maintain a very high level of query ...
In another approach, a novel keyed bloom filter technique is applied to encode the trajectory implicitly, which can achieve destination anonymity while guaranteeing that each query packet reaches its destination ...
doi:10.1109/infcom.2007.154
dblp:conf/infocom/ShaoZZC07
fatcat:hddgwxmi6vhebifhplejfd6vi4
pDCS: Security and Privacy Support for Data-Centric Sensor Networks
2009
IEEE Transactions on Mobile Computing
In addition, we propose several query optimization techniques based on Euclidean Steiner Tree and Keyed Bloom Filter to minimize the query overhead while preserving query privacy. ...
Finally, detailed analysis and simulations show that the Keyed Bloom Filter scheme can significantly reduce the message overhead with the same level of query delay and maintain a very high level of query ...
In another approach, a novel keyed bloom filter technique is applied to encode the trajectory implicitly, which can achieve destination anonymity while guaranteeing that each query packet reaches its destination ...
doi:10.1109/tmc.2008.168
fatcat:sdq427gd2bgmdphumjhl4lwqwy
Agent-Based System for Efficient kNN Query Processing with Comprehensive Privacy Protection
2018
International Journal of Advanced Computer Science and Applications
In the context of LBS privacy protection, a dummy is a query that is constructed based on a fabricated location or fabricated properties. ...
To guarantee the efficiency of kNN processing, the agent executes a prediction phase depending on a Cell Based Indexing (CBI) technique. ...
a bloom filter [24] . ...
doi:10.14569/ijacsa.2018.090108
fatcat:oolcyh4qbrgi7amtbzrxbl6lhy
Security and Privacy in Location-Based Services for Vehicular and Mobile Communications: An Overview, Challenges and Countermeasures
2018
IEEE Internet of Things Journal
Location-based Services (LBS) have gained popularity as a result of the advances in mobile and communication technologies. LBS provide users with relevant information based on their location. ...
The different approaches proposed in literature are compared and open research areas are identified. ...
Based on the location where the dummy is generated, the LBS provider can easily filter out the location. ...
doi:10.1109/jiot.2018.2820039
fatcat:y2gdcllac5fbpdd2nnxn4tib2i
Sanitization of Call Detail Records via Differentially-private Summaries
[article]
2014
arXiv
pre-print
Bloom filter for the purpose of privately counting the number of mobile service users moving from one area (region) to another in a given time frame. ...
To answer this issue and to foster the development of such applications in a privacy-preserving manner, we propose in this paper a novel approach in which CDRs are summarized under the form of a differentially-private ...
Acknowledgments We would like to acknowledge the Call Detail Records datasets provided by the 'D4D Challenge' in Senegal. ...
arXiv:1412.8412v2
fatcat:dirhllpmzfhprguy7wsvcwlgbu
Dissemination and Harvesting of Urban Data Using Vehicular Sensing Platforms
2009
IEEE Transactions on Vehicular Technology
challenging urban tracking application where the police reconstructs the movements of a suspicious driver, say, by specifying the car license number. ...
vehicles and to create a low-cost index to query monitoring data. ...
ACKNOWLEDGEMENT We would like to thank Xiaoyan Hong and Jiejun Kong for sparing their valuable time to review the security section of the paper. ...
doi:10.1109/tvt.2008.928899
fatcat:shlcm35ktng3zgwre6c242rtxy
Accountable Outsourcing Location-based Services With Privacy Preservation
2019
IEEE Access
In the outsourcing scenario, in order to make users interact with cloud server to obtain query data, firstly we construct location hierarchical index and attribute hierarchical index based on Bloom Filter ...
Among the numerous researches on location privacy preservation, cloud-based location privacy preservation has become a hot topic, but it undoubtedly brings new problems such as data confidentiality and ...
[11] propose trajectory K anonymity. Moreover, in the aspect of trajectory prediction, [12] designs a K anonymous protection algorithm based on probability inference model Mask-K . ...
doi:10.1109/access.2019.2936582
fatcat:63vcoembybfjrpdwbivb2y6lta
Secure and location privacy in geographical data with electronic codebook mode-advanced encryption standard
2021
International Journal of Vehicle Information and Communication Systems
As the LBS is associated to the user's location that can be preferred to track the actions of user, a strong privacy concern is elevated. ...
Location-Based Service (LBS) is considered as one of the utmost encouraging as well as new ways of convergence technologies ensuing in the development of numerous fields together with database systems, ...
Bloom Filter 0 Knowledge (BL0K) was a novel phase privacy technique that preserved the outline for LBS and integrated a Bloom filter and the Zero knowledge protocol was described (Kuang, et al, 2017) ...
doi:10.1504/ijvics.2021.10035872
fatcat:7cam2kawrfgvtjsjkanjc6movi
A Survey of Spatio-Temporal Big Data Indexing Methods in Distributed Environment
2022
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing
How to construct an effective index for the application requirements of spatio-temporal data in a distributed environment has become one of the hotspots of spatio-temporal big data research. ...
With the widespread use of mobile and sensing devices, and the popularity of online map-based services, such as navigation services, the volume of spatio-temporal data is growing rapidly. ...
ACKNOWLEDGMENT The authors would like to thank to X. Du, C. Li, G. Peng, and C. Li, with special thank A. Eldawy, Assistant Professor, with the University of California Riverside. ...
doi:10.1109/jstars.2022.3175657
fatcat:tjklpbkfffasjhwillift47k2i
Finding interesting correlations with conditional heavy hitters
2013
2013 IEEE 29th International Conference on Data Engineering (ICDE)
The notion of heavy hitters-items that make up a large fraction of the population-has been successfully used in a variety of applications across sensor and RFID monitoring, network data analysis, event ...
Here, we are interested in items that are conditionally frequent: when a particular item is frequent within the context of its parent item. ...
The Bloom Filter strategy, while achieving high recall, always has very poor precision (Figure 3(c) ). ...
doi:10.1109/icde.2013.6544898
dblp:conf/icde/MirylenkaPCS13
fatcat:7atraz4vjjc67kxtudptsbbrom
A survey of urban vehicular sensing platforms
2010
Computer Networks
The ability to take a smartphone on board a vehicle and to complement the sensors of the latter with advanced smartphone capabilities is of immense interest to the industry. ...
Vehicular sensing where vehicles on the road continuously gather, process, and share location-relevant sensor data (e.g., road condition, traffic flow) is emerging as a new network paradigm for sensor ...
for membership checking, i.e., a Bloom filter. ...
doi:10.1016/j.comnet.2009.07.011
fatcat:jbbzpx6bvnaozizfmbuj3emcqe
« Previous
Showing results 1 — 15 out of 821 results