-
1
-
-
0345826314
-
Selectivity Estimation in Spatial Databases
-
ACHARYA, S., POOSALA, V., AND RAMASWAMY, S. 1999. Selectivity estimation in spatial databases. In Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD). 13-24. (Pubitemid 129597320)
-
(1999)
SIGMOD Record (ACM Special Interest Group on Management of Data)
, vol.28
, Issue.2
, pp. 13-24
-
-
Acharya, S.1
Poosala, V.2
Ramaswamy, S.3
-
2
-
-
37849032496
-
Location privacy protection through obfuscation-based techniques
-
ARDAGNA, C. A., CREMONINI, M.,DAMIANI, E., DI VIMERCATI, S. D. C., AND SAMARATI, P. 2007. Location privacy protection through obfuscation-based techniques. In Proceedings of the Conference on Data and Applications Security and Privacy (DBSec). 47-60.
-
(2007)
Proceedings of the Conference on Data and Applications Security and Privacy (DBSec)
, pp. 47-60
-
-
Ardagna, C.A.1
Cremonini, M.2
Damiani, E.3
Di Vimercati, S.D.C.4
Samarati, P.5
-
3
-
-
57349191501
-
Supporting anonymous location queries in mobile environments with privacygrid
-
BAMBA, B., LIU, L., PESTI, P., AND WANG, T. 2008. Supporting anonymous location queries in mobile environments with privacygrid. In Proceedings of the International World Wide Web Conference (WWW). 237-246.
-
(2008)
Proceedings of the International World Wide Web Conference (WWW)
, pp. 237-246
-
-
Bamba, B.1
Liu, L.2
Pesti, P.3
Wang, T.4
-
4
-
-
34547617879
-
SaLSa: Computing the skyline without scanning the whole sky
-
DOI 10.1145/1183614.1183674, Proceedings of the 15th ACM Conference on Information and Knowledge Management, CIKM 2006
-
BARTOLINI, I., CIACCIA, P., AND PATELLA, M. 2006. SaLSa: Computing the skyline without scanning the whole sky. In Proceedings of the International Conference on Information and KnowledgeManagement (CIKM). 405-414. (Pubitemid 47203586)
-
(2006)
International Conference on Information and Knowledge Management, Proceedings
, pp. 405-414
-
-
Bartolini, I.1
Ciaccia, P.2
Patella, M.3
-
5
-
-
0016557674
-
Multidimensional binary search trees used for associative searching
-
BENTLEY, J. L. 1975. Multidimensional binary search trees used for associative searching. Comm. ACM 18, 9, 509-517.
-
(1975)
Comm. ACM
, vol.18
, Issue.9
, pp. 509-517
-
-
Bentley, J.L.1
-
6
-
-
85020160358
-
Anonymity in location-based services: Towards a general framework
-
BETTINI, C.,MASCETTI, S.,WANG, X. S., AND JAJODIA, S. 2007. Anonymity in location-based services: Towards a general framework. In Proceedings of the International Conference on Mobile Data Management (MDM). 69-76.
-
(2007)
Proceedings of the International Conference on Mobile Data Management (MDM)
, pp. 69-76
-
-
Bettini, C.1
Mascetti, S.2
Wang, X.S.3
Jajodia, S.4
-
7
-
-
0036606530
-
A framework for generating network-based moving objects
-
DOI 10.1023/A:1015231126594
-
BRINKHOFF, T. 2002. A framework for generating network-based moving objects. GeoInformatica 6, 2, 153-180. (Pubitemid 34609430)
-
(2002)
GeoInformatica
, vol.6
, Issue.2
, pp. 153-180
-
-
Brinkhoff, T.1
-
8
-
-
66549090154
-
Preserving user location privacy in mobile data management infrastructures
-
CHENG, R., ZHANG, Y., BERTINO, E., AND PRABHAKAR, S. 2006. Preserving user location privacy in mobile data management infrastructures. In Proceedings of the Privacy Enhancing Technology Workshop. 393-412.
-
(2006)
Proceedings of the Privacy Enhancing Technology Workshop
, pp. 393-412
-
-
Cheng, R.1
Zhang, Y.2
Bertino, E.3
Prabhakar, S.4
-
10
-
-
34547474184
-
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
-
DOI 10.1145/1183471.1183500, Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems, ACM-GIS'06
-
CHOW, C.-Y., MOKBEL, M. F., AND LIU, X. 2006. A peer-to-peer spatial cloaking algorithm for anonymous location-based services. In Proceedings of the ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL GIS). 171-178. (Pubitemid 47168545)
-
(2006)
GIS: Proceedings of the ACM International Symposium on Advances in Geographic Information Systems
, pp. 171-178
-
-
Chow, C.-Y.1
Mokbel, M.F.2
Liu, X.3
-
12
-
-
24944432404
-
A formal model of obfuscation and negotiation for location privacy
-
Pervasive Computing: Third International Conference, PERVASIVE 2005, Proceedings
-
DUCKHAM, M. AND KULIK, L. 2005a. A formal model of obfuscation and negotiation for location privacy. In Proceedings of the International Conference on Pervasive Computing (PERVASIVE). 152-170. (Pubitemid 41313330)
-
(2005)
Lecture Notes in Computer Science
, vol.3468
, pp. 152-170
-
-
Duckham, M.1
Kulik, L.2
-
15
-
-
57149129292
-
Private queries in location based services: Anonymizers are not necessary
-
GHINITA, G., KALNIS, P., KHOSHGOZARAN, A., SHAHABI, C., AND TAN, K.-L. 2008. Private queries in location based services: Anonymizers are not necessary. In Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD). 121-132.
-
(2008)
Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD)
, pp. 121-132
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.-L.5
-
17
-
-
35348924316
-
PRIVE: Anonymous location-based queries in distributed mobile systems
-
DOI 10.1145/1242572.1242623, 16th International World Wide Web Conference, WWW2007
-
GHINITA, G.,KALNIS, P., AND SKIADOPOULOS, S. 2007b. PRIVÉ : Anonymous location-based queries in distributed mobile systems. In Proceedings of the World Wide Web Conference (WWW). 371-380. (Pubitemid 47582266)
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 371-380
-
-
Ghinita, G.1
Kalnis, P.2
Skiadopoulos, S.3
-
18
-
-
84944318804
-
Approximate string joins in a database (almost) for free
-
GRAVANO, L., IPEIROTIS, P. G., JAGADISH, H. V., KOUDAS, N.,MUTHUKRISHNAN, S., AND SRIVASTAVA, D. 2001. Approximate string joins in a database (almost) for free. In Proceedings of the International Conference on Very Large Databases (VLDB). 491-500.
-
(2001)
Proceedings of the International Conference on Very Large Databases (VLDB)
, pp. 491-500
-
-
Gravano, L.1
Ipeirotis, P.G.2
Jagadish, H.V.3
Koudas, N.4
Muthukrishnan, S.5
Srivastava, D.6
-
20
-
-
2342562393
-
Protecting privacy in continuous location-tracking applications
-
GRUTESER,M. AND LIU, X. 2004. Protecting privacy in continuous location-tracking applications. IEEE Security Privacy 2, 2, 28-34.
-
(2004)
IEEE Security Privacy
, vol.2
, Issue.2
, pp. 28-34
-
-
Gruteser, M.1
Liu, X.2
-
22
-
-
0000701994
-
Distance browsing in spatial databases
-
HJALTASON, G. R. AND SAMET, H. 1999. Distance browsing in spatial databases. Trans. Datab. Syst. 24, 2, 265-318.
-
(1999)
Trans. Datab. Syst.
, vol.24
, Issue.2
, pp. 265-318
-
-
Hjaltason, G.R.1
Samet, H.2
-
24
-
-
33846192864
-
Adaptive rank-aware query optimization in relational databases
-
DOI 10.1145/1189769.1189772
-
ILYAS, I. F., AREF, W. G., ELMAGARMID, A. K., ELMONGUI, H. G., SHAH, R., AND VITTER, J. S. 2006. Adaptive rank-aware query optimization in relational databases. Trans. Datab. Syst. 31, 4, 1257-1304. (Pubitemid 46103271)
-
(2006)
ACM Transactions on Database Systems
, vol.31
, Issue.4
, pp. 1257-1304
-
-
Ilyas, I.F.1
Aref, W.G.2
Elmagarmid, A.K.3
Elmongui, H.G.4
Shah, R.5
Vitter, J.S.6
-
25
-
-
3142724907
-
Rank-aware query optimization
-
ILYAS, I. F., SHAH, R., AREF, W. G., VITTER, J. S., AND ELMAGARMID, A. K. 2004. Rank-aware query optimization. In Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD). 203-214.
-
(2004)
Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD)
, pp. 203-214
-
-
Ilyas, I.F.1
Shah, R.2
Aref, W.G.3
Vitter, J.S.4
Elmagarmid, A.K.5
-
27
-
-
23944466912
-
+-tree based indexing method for nearest neighbor search
-
DOI 10.1145/1071610.1071612
-
JAGADISH, H. V., OOI, B. C., TAN, K.-L., YU, C., AND ZHANG, R. 2005. iDistance: An adaptive B+-tree based indexing method for nearest neighbor search. Trans. Datab. Syst. 30, 2, 364-397. (Pubitemid 41204994)
-
(2005)
ACM Transactions on Database Systems
, vol.30
, Issue.2
, pp. 364-397
-
-
Jagadish, H.V.1
Ooi, B.C.2
Tan, K.-L.3
Yu, C.4
Zhang, R.5
-
28
-
-
70349131217
-
Location privacy techniques in client-server architectures
-
C. Bettini, S. Jajodia, P. Samarati, and X. S.Wong, Eds. Springer, Berlin
-
JENSEN, C. S.,LU,H., AND YIU,M. L. 2009. Location privacy techniques in client-server architectures. In Privacy in Location-Based Applications. C. Bettini, S. Jajodia, P. Samarati, and X. S.Wong, Eds. Springer, Berlin, 31-58.
-
(2009)
Privacy in Location-Based Applications
, pp. 31-58
-
-
Jensen, C.S.1
Lu, H.2
Yiu, M.L.3
-
29
-
-
35648982949
-
Preventing location-based identity inference in anonymous spatial queries
-
DOI 10.1109/TKDE.2007.190662
-
KALNIS, P., GHINITA, G.,MOURATIDIS, K., AND PAPADIAS, D. 2007. Preventing location-based identity inference in anonymous spatial queries. IEEE Trans. Knowl. Data Eng. 19, 12, 1719-1733. (Pubitemid 350025504)
-
(2007)
IEEE Transactions on Knowledge and Data Engineering
, vol.19
, Issue.12
, pp. 1719-1733
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
33
-
-
48349108205
-
Privacy protected query processing on spatial networks
-
KU, W.-S., ZIMMERMANN, R., PENG, W.-C., AND SHROFF, S. 2007. Privacy protected query processing on spatial networks. In Proceedings of the IEEE 23rd International Conference on Data Engineering Workshop. 215-220.
-
(2007)
Proceedings of the IEEE 23rd International Conference on Data Engineering Workshop
, pp. 215-220
-
-
Ku, W.-S.1
Zimmermann, R.2
Peng, W.-C.3
Shroff, S.4
-
34
-
-
34250630995
-
Dynamic authenticated index structures for outsourced databases
-
DOI 10.1145/1142473.1142488, SIGMOD 2006 - Proceedings of the ACM SIGMOD International Conference on Management of Data
-
LI, F., HADJIELEFTHERIOU, M., KOLLIOS, G., AND REYZIN, L. 2006. Dynamic authenticated index structures for outsourced databases. In Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD). 121-132. (Pubitemid 46946507)
-
(2006)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 121-132
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
35
-
-
50949111715
-
A cloaking algorithm based on spatial networks for location privacy
-
LI, P.-Y., PENG, W.-C., WANG, T.-W., KU, W.-S., XU, J., AND HAMILTON, J. A. 2008. A cloaking algorithm based on spatial networks for location privacy. In Proceedings of the IEEE International Conference on Sensor Networks Obiquitous, and Trustworthy Computing (SUTC). 90-97.
-
(2008)
Proceedings of the IEEE International Conference on Sensor Networks Obiquitous, and Trustworthy Computing (SUTC)
, pp. 90-97
-
-
Li, P.-Y.1
Peng, W.-C.2
Wang, T.-W.3
Ku, W.-S.4
Xu, J.5
Hamilton, J.A.6
-
36
-
-
70349144789
-
PAD: Privacy-area aware, dummy-based location privacy in mobile services
-
LU, H., JENSEN, C. S., AND YIU, M. L. 2008. PAD: Privacy-area aware, dummy-based location privacy in mobile services. In Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access (MobiDE). 16-23.
-
(2008)
Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access (MobiDE)
, pp. 16-23
-
-
Lu, H.1
Jensen, C.S.2
Yiu, M.L.3
-
39
-
-
79960775841
-
-
Research rep. R-2010-03, Department ofMathematical Sciences, Aalborg University. To appear in Advances in Applied Probability
-
MøLLER, J. AND YIU, M. L. 2010. Probabilistic results for a mobile service scenario. Research rep. R-2010-03, Department ofMathematical Sciences, Aalborg University. To appear in Advances in Applied Probability.
-
(2010)
Probabilistic Results for a Mobile Service Scenario
-
-
Møller, J.1
Yiu, M.L.2
-
40
-
-
72949110369
-
Anonymous query processing in road networks
-
MOURATIDIS, K. AND YIU, M. L. 2010. Anonymous query processing in road networks. IEEE Trans. Knowl. Data Eng. 22, 1, 2-15.
-
(2010)
IEEE Trans. Knowl. Data Eng.
, vol.22
, Issue.1
, pp. 2-15
-
-
Mouratidis, K.1
Yiu, M.L.2
-
41
-
-
0003760944
-
-
2nd Ed. Wiley
-
OKABE, A., BOOTS, B., SUGIHARA, K., AND CHIU, S. 2000. Spatial Tessellations: Concepts and Applications of Voronoi Diagrams, 2nd Ed. Wiley.
-
(2000)
Spatial Tessellations: Concepts and Applications of Voronoi Diagrams
-
-
Okabe, A.1
Boots, B.2
Sugihara, K.3
Chiu, S.4
-
42
-
-
29844457793
-
Verifying completeness of relational query results in data publishing
-
PANG, H., JAIN, A., RAMAMRITHAM, K., AND TAN, K.-L. 2005. Verifying completeness of relational query results in data publishing. In Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD).
-
(2005)
Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD)
-
-
Pang, H.1
Jain, A.2
Ramamritham, K.3
Tan, K.-L.4
-
43
-
-
85012217314
-
Query processing in spatial network databases
-
PAPADIAS, D., ZHANG, J., MAMOULIS, N., AND TAO, Y. 2003. Query processing in spatial network databases. In Proceedings of the International Conference on Very Large Databases (VLDB). 802-813.
-
(2003)
Proceedings of the International Conference on Very Large Databases (VLDB)
, pp. 802-813
-
-
Papadias, D.1
Zhang, J.2
Mamoulis, N.3
Tao, Y.4
-
44
-
-
70350362298
-
Continuous spatial authentication
-
PAPADOPOULOS, S., YANG, Y., BAKIRAS, S., AND PAPADIAS, D. 2009. Continuous spatial authentication. In Proceedings of the Conference of Advances in Spatial and Temporal Databases (SSTD). 62-79.
-
(2009)
Proceedings of the Conference of Advances in Spatial and Temporal Databases (SSTD)
, pp. 62-79
-
-
Papadopoulos, S.1
Yang, Y.2
Bakiras, S.3
Papadias, D.4
-
45
-
-
0021496754
-
Radial generation of n-dimensional poisson processes
-
QUINE, M. P. AND WATSON, D. F. 1984. Radial generation of n-dimensional poisson processes. J. Appl. Prob. 21, 548-557. (Pubitemid 14664499)
-
(1984)
Journal of Applied Probability
, vol.21
, Issue.3
, pp. 548-557
-
-
Quine, M.P.1
Watson, D.F.2
-
48
-
-
13844298845
-
An efficient cost model for optimization of nearest neighbor search in low and medium dimensional spaces
-
DOI 10.1109/TKDE.2004.48
-
TAO, Y., ZHANG, J., PAPADIAS, D., AND MAMOULIS, N. 2004. An Efficient Cost Model for Optimization of Nearest Neighbor Search in Low and Medium Dimensional Spaces. IEEE Trans. Knowl. Data Eng. 16, 10, 1169-1184. (Pubitemid 40242332)
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.10
, pp. 1169-1184
-
-
Tao, Y.1
Zhang, J.2
Papadias, D.3
Mamoulis, N.4
-
49
-
-
77953980631
-
Privacy-aware mobile services over road networks
-
WANG, T. AND LIU, L. 2009. Privacy-aware mobile services over road networks. Proc. PVLDB 2, 1, 1042-1053.
-
(2009)
Proc. PVLDB
, vol.2
, Issue.1
, pp. 1042-1053
-
-
Wang, T.1
Liu, L.2
-
50
-
-
35448935270
-
Progressive and selective merge: Computing top-k with ad-hoc ranking functions
-
DOI 10.1145/1247480.1247494, SIGMOD 2007: Proceedings of the ACM SIGMOD International Conference on Management of Data
-
XIN, D., HAN, J., AND CHANG, K. C.-C. 2007. Progressive and selective merge: Computing top-k with Ad hoc ranking functions. In Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD). 103-114. (Pubitemid 47630800)
-
(2007)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 103-114
-
-
Xin, D.1
Han, J.2
Chang, K.C.3
-
51
-
-
35448932726
-
Answering Top-k queries with multi-dimensional selections: The ranking cube approach
-
XIN, D.,HAN, J., CHENG, H., AND LI, X. 2006. Answering Top-k queries with multi-dimensional selections: The ranking cube approach. In Proceedings of the International Conference on Very Large Databases (VLDB). 463-475.
-
(2006)
Proceedings of the International Conference on Very Large Databases (VLDB)
, pp. 463-475
-
-
Xin, D.1
Han, J.2
Cheng, H.3
Li, X.4
-
52
-
-
76749103805
-
Privacy-conscious location-based queries in mobile environments
-
XU, J., TANG, X., HU, H., AND DU, J. 2010. Privacy-conscious location-based queries in mobile environments. IEEE Trans. Parall. Distrib. Syst. 21, 3, 313-326.
-
(2010)
IEEE Trans. Parall. Distrib. Syst.
, vol.21
, Issue.3
, pp. 313-326
-
-
Xu, J.1
Tang, X.2
Hu, H.3
Du, J.4
-
53
-
-
67649510426
-
Authenticated indexing for outsourced spatial databases
-
YANG, Y., PAPADOPOULOS, S., PAPADIAS, D., AND KOLLIOS, G. 2009. Authenticated indexing for outsourced spatial databases. VLDB J. 18, 3, 631-648.
-
(2009)
VLDB J.
, vol.18
, Issue.3
, pp. 631-648
-
-
Yang, Y.1
Papadopoulos, S.2
Papadias, D.3
Kollios, G.4
-
55
-
-
52649118020
-
SpaceTwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services
-
YIU, M. L., JENSEN, C. S., HUANG, X., AND LU, H. 2008. SpaceTwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In Proceedings of the Conference on Data Engineering ICDE. 366-375.
-
(2008)
Proceedings of the Conference on Data Engineering ICDE
, pp. 366-375
-
-
Yiu, M.L.1
Jensen, C.S.2
Huang, X.3
Lu, H.4
|