62 Hits in 7.3 sec


Gook-Pil Roh, Seung-won Hwang
2011 Proceedings of the 14th International Conference on Extending Database Technology - EDBT/ICDT '11  
To overcome limitations of prior research, TPM supports three types of pattern matching queries-whole, subpattern, and reverse subpattern matching for road-network trajectories.  ...  This paper presents TPM (Trajectory Pattern Miner), a software aimed at pattern matching queries for road-network trajectory data, which complements existing efforts focusing on (a) a spatio-temporal window  ...  Given the query trajectory, TPM shows the top ranked trajectories, superimposed on underlying road network, for all three types of pattern matching queries.  ... 
doi:10.1145/1951365.1951439 dblp:conf/edbt/RohH11 fatcat:2lgp44gk6vgdrd6d6x5urjpxhu

A Survey Paper on Trajectory Pattern Mining for Pattern Matching Query

S. R.Ghule, S. M. Shinde
2014 International Journal of Computer Applications  
Large amount information of moving objects on road network is being collected with the help of various recent technologies.  ...  Pattern matching queries TPM supports three types of pattern matching queries -whole, subpattern, and reverse subpattern matching for road-network trajectories.  ...  PROGRAMMER'S DESIGN We present framework of frequent pattern based classification for trajectories on road network and classified patterns can be used in area like pattern matching queries.  ... 
doi:10.5120/15079-3469 fatcat:etb7ldgjlzatrbploqztvwdceq

Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study

Ishtiaq Rouf, Robert D. Miller, Hossen A. Mustafa, Travis Taylor, Sangho Oh, Wenyuan Xu, Marco Gruteser, Wade Trappe, Ivan Seskar
2010 USENIX Security Symposium  
Finally, the paper concludes with a set of recommendations for improving the privacy and security of tire pressure monitoring systems and other forthcoming in-car wireless sensor networks.  ...  Wireless networks are being integrated into the modern automobile.  ...  : To achieve a match rate of larger than P = 1%, more than 10 15 cars need to be on the road, which is significantly more than 1 billion cars.  ... 
dblp:conf/uss/RoufMMTOXGTS10 fatcat:e2pdeoqyuzepdbn5kzbnthlbbm

Sensing and Connection Systems for Assisted and Autonomous Driving and Unmanned Vehicles

Sergio Saponara
2018 Sensors  
The special issue, "Sensors, Wireless Connectivity and Systems for Autonomous Vehicles and Smart Mobility" on MDPI Sensors presents 12 accepted papers, with authors from North America, Asia, Europe and  ...  Australia, related to the emerging trends in sensing and navigation systems (i.e., sensors plus related signal processing and understanding techniques in multi-agent and cooperating scenarios) for autonomous  ...  Acknowledgments: The author is grateful to the MDPI publisher for the possibility to act as guest editor of this special issue and wants to thank the editorial staff of Sensors for their kind co-operation  ... 
doi:10.3390/s18071999 pmid:29932130 pmcid:PMC6068971 fatcat:pft6ftjaznhjnjzlxept72cm3e

Providing Together Security, Location Privacy and Trust for Moving Objects

Amit Kumar Tyagi, N. Sreenath
2016 International Journal of Hybrid Information Technology  
Hereafter the protocol (or procedure) of this algorithm; simulation result are discussed in detail.Second,it provides a model to maintain trust for vehicle Ad-hoc Network (VANET) users in LBSs.  ...  In last few years, vehicular networks (or moving objects) are gaining more and more attraction from the researchers and the automobile industries.  ...  trust to moving objects over road network.  ... 
doi:10.14257/ijhit.2016.9.3.21 fatcat:6ibvfrimarbsjo3s6gewzv43la

An Introduction to Sensor Data Analytics [chapter]

Charu C. Aggarwal
2012 Managing and Mining Sensor Data  
This requires the development of trajectory mining techniques, which can mine the GPS data for interesting social patterns.  ...  We discuss some of the common approaches used for tracking and examine some recent work which focuses specifically on tracking vehicles using a road network.  ...  Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on.  ... 
doi:10.1007/978-1-4614-6309-2_1 fatcat:pfbx566yfzgqpnjcuzonmxr23q

Spatiotemporal enabled Content-based Image Retrieval

Mariana Belgiu, Martin Sudmanns, Tiede Dirk, Andrea Baraldi, Stefan Lang
2016 International Conference on GIScience Short Paper Proceedings  
This is because raster representations are constrained by their spatial resolution, and their regular shapes result in redundant data for unoccupied areas.  ...  Wireless Sensor Networks (WSNs) are widely used for monitoring and observation of dynamic phenomena.  ...  Acknowledgements Trajectories were provided by the Japan Road Traffic Information Center. This study was supported by JSPS KAKENHI (grants 24241053 and 25249069).  ... 
doi:10.21433/b311729295dw fatcat:fulw4pw3kfh5nmfzcsy3pkisvm

Floating Sensor Networks for River Studies

A. Tinka, M. Rafiee, A. M. Bayen
2013 IEEE Systems Journal  
The experiment was supported by the Caltrans. This study was supported in part by the US NSF under grant CNS-0524475.  ...  ACKNOWLEDGEMENT The authors would like to thank Kenneth Tracton, Carl Snellman, and Cynthia Kuo from Nokia Research Center for helping implement the system in the large scale experiments.  ...  Third, the use of VTLs removes the need for map matching the measurement update to road segments, since each VTL is already associated with a road segment.  ... 
doi:10.1109/jsyst.2012.2204914 fatcat:h6qubuygxbgs3a3atlhfjfg3yi

Enhancing Privacy and Accuracy in Probe Vehicle-Based Traffic Monitoring via Virtual Trip Lines

Baik Hoh, Toch Iwuchukwu, Quinn Jacobson, Daniel Work, Alexandre M. Bayen, Ryan Herring, Juan-Carlos Herrera, Marco Gruteser, Murali Annavaram, Jeff Ban
2012 IEEE Transactions on Mobile Computing  
The experiment was supported by the Caltrans. This study was supported in part by the US NSF under grant CNS-0524475.  ...  ACKNOWLEDGEMENT The authors would like to thank Kenneth Tracton, Carl Snellman, and Cynthia Kuo from Nokia Research Center for helping implement the system in the large scale experiments.  ...  Third, the use of VTLs removes the need for map matching the measurement update to road segments, since each VTL is already associated with a road segment.  ... 
doi:10.1109/tmc.2011.116 fatcat:7ovlqtofzvdsdf6guuschgtygu

Quantitative System-Level Security Verification of the IoV Infrastructure [article]

Jan Lauinger, Mudassar Aslam, Mohammad Hamad, Shahid Raza, Sebastian Steinhorst
2021 arXiv   pre-print
In detail, our methodology decomposes assets of the IoV infrastructure with the help of reference sub-architectures and the 4+1 view model analysis to map identified assets into data, software, networking  ...  Based on our parameterization of CVSS scores and our selection of use cases, remote attacks are less likely to compromise location data compared to attacks from close proximity for authorized and unauthorized  ...  ) [10]2 Unauthorized Infra & Edge Road sign attack (I-HW (a) or I-Net (b)) ⇒ Road sign distortion (I-Data) ⇒ Camera image data modification (V-Data) [25] credentials from dedicated communication devices  ... 
arXiv:2101.06137v1 fatcat:55qilbexpzh3lc6hppynnri35i

Survey on cyberspace security

HuanGuo Zhang, WenBao Han, XueJia Lai, DongDai Lin, JianFeng Ma, JianHua Li
2015 Science China Information Sciences  
Cyberspace is the collection of all information systems; it is the information environment for human survival. Therefore, it is necessary to ensure the security of cyberspace.  ...  introduction to research and development in this field, with a description of existing problems and some currently active research topics in the areas of cyberspace itself, cyberspace security, cryptography, network  ...  We would like to thank the following for their help in writing this article: FU JianMin, ZHANG LiQiang, YUAN Wei, XI Ning, LU Di, WU Jun.  ... 
doi:10.1007/s11432-015-5433-4 fatcat:b2tv6gvovngxhlz7iukug2ehiy

2020 Index IEEE Transactions on Visualization and Computer Graphics Vol. 26

2021 IEEE Transactions on Visualization and Computer Graphics  
., +, TVCG Jan. 2020 938-948 Cohort-based T-SSIM Visual Computing for Radiation Therapy Prediction and Exploration.  ...  Medical image processing CerebroVis: Designing an Abstract yet Spatially Contextualized Cerebral Artery Network Visualization.  ...  Toward Localized Topological Data Structures: Querying the Forest for the Tree.  ... 
doi:10.1109/tvcg.2021.3111804 fatcat:lvhpoz5sqjhclo3roocrdtzs2m

Downloadable Full Issue

2020 Hungarian Journal of Industry and Chemistry  
The toolset of GIS (Geographic Information Systems) provides wide-ranging functionality for spatial data processing, but is yet to offer support for standard formats of road description (OpenDRIVE data  ...  This paper describes a method for gathering and converting road-network information from OpenStreetMap to OpenDRIVE data format.  ...  We also acknowledge the support of the National Research, Development and Innovation Office -NKFIH K124353.  ... 
doi:10.33927/931 fatcat:pgjn46w74vb5djx3koev7lnsty

People-centric urban sensing

Andrew T. Campbell, Shane B. Eisenman, Nicholas D. Lane, Emiliano Miluzzo, Ronald A. Peterson
2006 Proceedings of the 2nd annual international workshop on Wireless internet - WICON '06  
using adaptive multihop, and importantly, providing security and privacy for people-centric sensors and data.  ...  being: how do we develop large-scale general-purpose sensor networks for the general public (e.g., consumers) capable of supporting a wide variety of applications in urban settings (e.g., enterprises,  ...  Acknowledgment The authors would like to thank David Kotz and Sean Smith for their input on this paper.  ... 
doi:10.1145/1234161.1234179 dblp:conf/wicon/CampbellELMP06 fatcat:tj26eywjpbfxzcsna5md6wfuj4

A Deep Learning Perspective on Connected Automated Vehicle (CAV) Cybersecurity and Threat Intelligence [article]

Manoj Basnet, Mohd. Hasan Ali
2021 arXiv   pre-print
deep learning-based threat intelligence for attack detection.  ...  The automation and connectivity of CAV inherit most of the cyber-physical vulnerabilities of incumbent technologies such as evolving network architectures, wireless communications, and AI-based automation  ...  The gyroscope and inclination sensors measure the road gradient and adjust the speed accordingly for safe maneuvering. The spoofed data can generate the false control signal for speed control.  ... 
arXiv:2109.10763v1 fatcat:tigj5x6pnrbmrbf3my46ynr4we
« Previous Showing results 1 — 15 out of 62 results