Results 1 - 10
of
363
T-Drive: Driving directions based on taxi trajectories
- ACM SIGSPATIAL GIS
, 2010
"... GPS-equipped taxis can be regarded as mobile sensors probing traffic flows on road surfaces, and taxi drivers are usually experienced in finding the fastest (quickest) route to a destination based on their knowledge. In this paper, we mine smart driving directions from the historical GPS trajectorie ..."
Abstract
-
Cited by 96 (21 self)
- Add to MetaCart
GPS-equipped taxis can be regarded as mobile sensors probing traffic flows on road surfaces, and taxi drivers are usually experienced in finding the fastest (quickest) route to a destination based on their knowledge. In this paper, we mine smart driving directions from the historical GPS
Discovering Popular Routes from Trajectories
- In ICDE
, 2011
"... Abstract—The booming industry of location-based services has accumulated a huge collection of users ’ location trajectories of driving, cycling, hiking, etc. In this work, we investigate the problem of discovering the Most Popular Route (MPR) between two locations by observing the traveling behavior ..."
Abstract
-
Cited by 28 (0 self)
- Add to MetaCart
Abstract—The booming industry of location-based services has accumulated a huge collection of users ’ location trajectories of driving, cycling, hiking, etc. In this work, we investigate the problem of discovering the Most Popular Route (MPR) between two locations by observing the traveling
Identifying Unsafe Routes for Network-Based Trajectory Privacy
"... In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. The privacy model has been implemented as a framework that (i) reconstructs the user movement from a series of independen ..."
Abstract
-
Cited by 7 (1 self)
- Add to MetaCart
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. The privacy model has been implemented as a framework that (i) reconstructs the user movement from a series
The BikeNet Mobile Sensing System for Cyclist Experience Mapping
- In Proc. of 5th ACM Conf. on Embedded Networked Sensor Systems
, 2007
"... We describe our experiences deploying BikeNet, an extensible mobile sensing system for cyclist experience mapping leveraging opportunistic sensor networking principles and techniques. BikeNet represents a multifaceted sensing system and explores personal, bicycle, and environmental sensing using dyn ..."
Abstract
-
Cited by 147 (13 self)
- Add to MetaCart
dynamically role-assigned bike area networking based on customized Moteiv Tmote Invent motes and sensor-enabled Nokia N80 mobile phones. We investigate real-time and delay-tolerant uploading of data via a number of sensor access points (SAPs) to a networked repository. Among bicycles that rendezvous en route
Symbolic trajectory description in mobile robotics
"... Abstract. Autonomous mobile robot navigation systems are based on three principal kinds of techniques: map-based navigation, map-building-based navigation and mapless navigation. We propose a method for symbolic trajectory description in unknown indoor environments. The chosen form uses a panoramic ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
Abstract. Autonomous mobile robot navigation systems are based on three principal kinds of techniques: map-based navigation, map-building-based navigation and mapless navigation. We propose a method for symbolic trajectory description in unknown indoor environments. The chosen form uses a panoramic
1 Route pattern mining from personal trajectory data*
"... The discovery of route patterns from trajectory data generated by moving objects is an essential problem for location-aware computing. However, the high degree of uncertainty of personal trajectory data significantly disturbs the existing route pattern mining approaches, and results in finding only ..."
Abstract
- Add to MetaCart
the trips. Based on the real-world personal trajectory data, we conducted a number of experi-ments to evaluate the performance of our framework. The experimental results demonstrate that our framework is more efficient and effective as compared with the existing route pat-tern mining approaches
Secure Border Gateway Protocol (Secure-BGP
- IEEE Journal on Selected Areas in Communications
, 2000
"... Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be ..."
Abstract
-
Cited by 116 (1 self)
- Add to MetaCart
of this architecture with other approaches that have been proposed, analyzes the performance implications of the proposed countermeasures, and addresses operational issues. Index Terms–security, public-key cryptography, routing, digital signatures, denial of service I. Problem Description Internet routing is based
Materials for an exploratory theory of the network society.
- The British Journal of Sociology
, 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract
-
Cited by 122 (0 self)
- Add to MetaCart
/consumption, experience, and power, as expressed in meaningful interaction framed by culture. By Information Age I refer to a historical period in which human societies perform their activities in a technological paradigm constituted around microelectronics-based information/communication technologies, and genetic
Accurate, Low-Energy Trajectory Mapping for Mobile Devices
"... CTrack is an energy-efficient system for trajectory mapping using raw position tracks obtained largely from cellular base station fingerprints. Trajectory mapping, which involves taking a sequence of raw position samples and producing the most likely path followed by the user, is an important compon ..."
Abstract
-
Cited by 33 (1 self)
- Add to MetaCart
component in many locationbased services including crowd-sourced traffic monitoring, navigation and routing, and personalized trip management. Using only cellular (GSM) fingerprints instead of power-hungry GPS and WiFi radios, the marginal energy consumed for trajectory mapping is zero. This approach is non
A. Trajectory Based Forwarding and Massively Dense Networks
, 2006
"... Abstract — We study routing for massively dense wireless networks, i.e., wireless networks that contain so many nodes that, in addition to their usual microscopic description, a novel macroscopic description becomes possible. The macroscopic description is not detailed, but nevertheless contains eno ..."
Abstract
- Add to MetaCart
Abstract — We study routing for massively dense wireless networks, i.e., wireless networks that contain so many nodes that, in addition to their usual microscopic description, a novel macroscopic description becomes possible. The macroscopic description is not detailed, but nevertheless contains
Results 1 - 10
of
363