메뉴 건너뛰기




Volumn 22, Issue 1, 2010, Pages 2-15

Anonymous query processing in road networks

Author keywords

Location privacy; Location based services.; Query processing; Road networks; Spatial anonymity; Spatial databases

Indexed keywords

ALTERNATIVE DESIGNS; EUCLIDEAN SPACES; EXISTING METHOD; LARGE REGIONS; LOCATION PRIVACY; LOCATION-AWARE; LOCATION-BASED SERVICES; NETWORK DATABASE; NETWORK DISTANCE; REAL ROAD NETWORKS; ROAD NETWORK; SPATIAL DATABASE; SPATIAL QUERIES; STORAGE SCHEMES; USER LOCATION;

EID: 72949110369     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/TKDE.2009.48     Document Type: Article
Times cited : (73)

References (36)
  • 1
    • 72949107720 scopus 로고    scopus 로고
    • http://www.anonymizer.com/, 2009.
    • (2009)
  • 2
    • 72949117549 scopus 로고    scopus 로고
    • http://www.mailshell.com, 2009.
    • (2009)
  • 3
    • 72949086069 scopus 로고    scopus 로고
    • http://www.spamgourmet.com/, 2009.
    • (2009)
  • 7
    • 0036606530 scopus 로고    scopus 로고
    • A framework for generating network-based moving objects
    • T. Brinkhoff, "A Framework for Generating Network-Based Moving Objects," GeoInformatica, vol.6, no.2, pp. 153-180, 2002.
    • (2002) GeoInformatica , vol.6 , Issue.2 , pp. 153-180
    • Brinkhoff, T.1
  • 8
    • 0015050308 scopus 로고
    • Alternative algorithm for hilbert's space-filling curve
    • Apr.
    • A.R. Butz, "Alternative Algorithm for Hilbert's Space-Filling Curve," IEEE Trans. Computers, vol.20, no.4, pp. 424-426, Apr. 1971.
    • (1971) IEEE Trans. Computers , vol.20 , Issue.4 , pp. 424-426
    • Butz, A.R.1
  • 11
    • 34147120474 scopus 로고
    • A note on two problems in connection with graphs
    • E.W. Dijkstra, "A Note on Two Problems in Connection with Graphs," Numerische Math., vol.1, pp. 269-271, 1959.
    • (1959) Numerische Math. , vol.1 , pp. 269-271
    • Dijkstra, E.W.1
  • 13
    • 0002293349 scopus 로고
    • Matching, euler tours and the Chinese Postman
    • J. Edmonds and E. Johnson, "Matching, Euler Tours and the Chinese Postman," Math. Programming, vol.5, pp. 88-124, 1973.
    • (1973) Math. Programming , vol.5 , pp. 88-124
    • Edmonds, J.1    Johnson, E.2
  • 17
    • 1642286258 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • M. Gruteser and D. Grunwald, "Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking," Proc. MobiSys, 2003.
    • (2003) Proc. MobiSys
    • Gruteser, M.1    Grunwald, D.2
  • 22
    • 0032071072 scopus 로고    scopus 로고
    • Hierarchical encoded path views for path query processing: An optimal model and its performance evaluation
    • May/June
    • N. Jing, Y.W. Huang, and E.A. Rundensteiner, "Hierarchical Encoded Path Views for Path Query Processing: An Optimal Model and Its Performance Evaluation," IEEE Trans. Knowledge and Data Eng., vol.10, no.3, pp. 409-432, May/June 1998.
    • (1998) IEEE Trans. Knowledge and Data Eng. , vol.10 , Issue.3 , pp. 409-432
    • Jing, N.1    Huang, Y.W.2    Rundensteiner, E.A.3
  • 23
    • 35648982949 scopus 로고    scopus 로고
    • Preserving location-based identity inference in anonymous spatial queries
    • Dec.
    • P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, "Preserving Location-Based Identity Inference in Anonymous Spatial Queries," IEEE Trans. Knowledge and Data Eng., vol.19, no.12, pp. 1719-1733, Dec. 2007.
    • (2007) IEEE Trans. Knowledge and Data Eng. , vol.19 , Issue.12 , pp. 1719-1733
    • Kalnis, P.1    Ghinita, G.2    Mouratidis, K.3    Papadias, D.4
  • 27
    • 84976768905 scopus 로고
    • Query processing in main memory database management systems
    • T.J. Lehman and M.J. Carey, "Query Processing in Main Memory Database Management Systems," Proc. ACM SIGMOD, 1986.
    • (1986) Proc. ACM SIGMOD
    • Lehman, T.J.1    Carey, M.J.2
  • 31
    • 0030734554 scopus 로고    scopus 로고
    • CCAM: A connectivity-clustered access method for networks and network computations
    • Jan./Feb.
    • S. Shekhar and D. Liu, "CCAM: A Connectivity-Clustered Access Method for Networks and Network Computations," IEEE Trans. Knowledge and Data Eng., vol.9, no.1, pp. 102-119, Jan./Feb. 1997.
    • (1997) IEEE Trans. Knowledge and Data Eng. , vol.9 , Issue.1 , pp. 102-119
    • Shekhar, S.1    Liu, D.2
  • 34
    • 84986462345 scopus 로고
    • An eulerian trail through konigsberg
    • R.J. Wilson, "An Eulerian Trail through Konigsberg," J. Graph Theory, vol.10, pp. 265-275, 1986.
    • (1986) J. Graph Theory , vol.10 , pp. 265-275
    • Wilson, R.J.1
  • 35
    • 52649118020 scopus 로고    scopus 로고
    • Space twist: Managing the trade offs among location privacy, query performance, and query accuracy in mobile services
    • M.L. Yiu, C.S. Jensen, X. Huang, and H. Lu, "Space Twist: Managing the Trade Offs among Location Privacy, Query Performance, and Query Accuracy in Mobile Services," Proc. Int'l Conf. Data Eng. (ICDE), 2008.
    • (2008) Proc. Int'l Conf. Data Eng. (ICDE)
    • Yiu, M.L.1    Jensen, C.S.2    Huang, X.3    Lu, H.4
  • 36
    • 3142660421 scopus 로고    scopus 로고
    • Clustering objects on a spatial network
    • M.L. Yiu and N. Mamoulis, "Clustering Objects on a Spatial Network," Proc. ACM SIGMOD, 2004.
    • (2004) Proc. ACM SIGMOD
    • Yiu, M.L.1    Mamoulis, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.