• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 363
Next 10 →

T-Drive: Driving directions based on taxi trajectories

by Jing Yuan, Yu Zheng, Chengyang Zhang, Wenlei Xie, Xing Xie, Guangzhong Sun, Yan Huang - ACM SIGSPATIAL GIS , 2010
"... GPS-equipped taxis can be regarded as mobile sensors probing traffic flows on road surfaces, and taxi drivers are usually experienced in finding the fastest (quickest) route to a destination based on their knowledge. In this paper, we mine smart driving directions from the historical GPS trajectorie ..."
Abstract - Cited by 96 (21 self) - Add to MetaCart
GPS-equipped taxis can be regarded as mobile sensors probing traffic flows on road surfaces, and taxi drivers are usually experienced in finding the fastest (quickest) route to a destination based on their knowledge. In this paper, we mine smart driving directions from the historical GPS

Discovering Popular Routes from Trajectories

by Zaiben Chen, Heng Tao Shen, Xiaofang Zhou - In ICDE , 2011
"... Abstract—The booming industry of location-based services has accumulated a huge collection of users ’ location trajectories of driving, cycling, hiking, etc. In this work, we investigate the problem of discovering the Most Popular Route (MPR) between two locations by observing the traveling behavior ..."
Abstract - Cited by 28 (0 self) - Add to MetaCart
Abstract—The booming industry of location-based services has accumulated a huge collection of users ’ location trajectories of driving, cycling, hiking, etc. In this work, we investigate the problem of discovering the Most Popular Route (MPR) between two locations by observing the traveling

Identifying Unsafe Routes for Network-Based Trajectory Privacy

by Aris Gkoulalas-divanis, Vassilios S. Verykios, Mohamed F. Mokbel
"... In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. The privacy model has been implemented as a framework that (i) reconstructs the user movement from a series of independen ..."
Abstract - Cited by 7 (1 self) - Add to MetaCart
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. The privacy model has been implemented as a framework that (i) reconstructs the user movement from a series

The BikeNet Mobile Sensing System for Cyclist Experience Mapping

by S. B. Eisenman, E. Miluzzo, N. D. Lane, R. A. Peterson, G-s. Ahn, A. T. Campbell - In Proc. of 5th ACM Conf. on Embedded Networked Sensor Systems , 2007
"... We describe our experiences deploying BikeNet, an extensible mobile sensing system for cyclist experience mapping leveraging opportunistic sensor networking principles and techniques. BikeNet represents a multifaceted sensing system and explores personal, bicycle, and environmental sensing using dyn ..."
Abstract - Cited by 147 (13 self) - Add to MetaCart
dynamically role-assigned bike area networking based on customized Moteiv Tmote Invent motes and sensor-enabled Nokia N80 mobile phones. We investigate real-time and delay-tolerant uploading of data via a number of sensor access points (SAPs) to a networked repository. Among bicycles that rendezvous en route

Symbolic trajectory description in mobile robotics

by Gilbert Pradel
"... Abstract. Autonomous mobile robot navigation systems are based on three principal kinds of techniques: map-based navigation, map-building-based navigation and mapless navigation. We propose a method for symbolic trajectory description in unknown indoor environments. The chosen form uses a panoramic ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
Abstract. Autonomous mobile robot navigation systems are based on three principal kinds of techniques: map-based navigation, map-building-based navigation and mapless navigation. We propose a method for symbolic trajectory description in unknown indoor environments. The chosen form uses a panoramic

1 Route pattern mining from personal trajectory data*

by Mingqi Lv, Zhenming Yuan, Qihui Wang
"... The discovery of route patterns from trajectory data generated by moving objects is an essential problem for location-aware computing. However, the high degree of uncertainty of personal trajectory data significantly disturbs the existing route pattern mining approaches, and results in finding only ..."
Abstract - Add to MetaCart
the trips. Based on the real-world personal trajectory data, we conducted a number of experi-ments to evaluate the performance of our framework. The experimental results demonstrate that our framework is more efficient and effective as compared with the existing route pat-tern mining approaches

Secure Border Gateway Protocol (Secure-BGP

by Stephen Kent, Charles Lynn, Karen Seo - IEEE Journal on Selected Areas in Communications , 2000
"... Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be ..."
Abstract - Cited by 116 (1 self) - Add to MetaCart
of this architecture with other approaches that have been proposed, analyzes the performance implications of the proposed countermeasures, and addresses operational issues. Index Terms–security, public-key cryptography, routing, digital signatures, denial of service I. Problem Description Internet routing is based

Materials for an exploratory theory of the network society.

by Manuel Castells , Anthony Giddens , Alain Touraine , Anthony Smith , Benjamin Barber , Peter Hall , Roger-Pol Droit , Sophie Watson , Frank Webster , Krishan Kumar , David Lyon , Craig Calhoun , Jeffrey Henderson , Ramon Ramos , Jose E Rodrigues-Ibanez , Jose F Tezanos , Mary Kaldor , Stephen Jones , Christopher Freeman - The British Journal of Sociology , 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract - Cited by 122 (0 self) - Add to MetaCart
/consumption, experience, and power, as expressed in meaningful interaction framed by culture. By Information Age I refer to a historical period in which human societies perform their activities in a technological paradigm constituted around microelectronics-based information/communication technologies, and genetic

Accurate, Low-Energy Trajectory Mapping for Mobile Devices

by Arvind Thiagarajan, Lenin Ravindranath, Hari Balakrishnan, Samuel Madden, Lewis Girod
"... CTrack is an energy-efficient system for trajectory mapping using raw position tracks obtained largely from cellular base station fingerprints. Trajectory mapping, which involves taking a sequence of raw position samples and producing the most likely path followed by the user, is an important compon ..."
Abstract - Cited by 33 (1 self) - Add to MetaCart
component in many locationbased services including crowd-sourced traffic monitoring, navigation and routing, and personalized trip management. Using only cellular (GSM) fingerprints instead of power-hungry GPS and WiFi radios, the marginal energy consumed for trajectory mapping is zero. This approach is non

A. Trajectory Based Forwarding and Massively Dense Networks

by Roberto Catanuto, Stavros Toumpis, Giacomo Morabito , 2006
"... Abstract — We study routing for massively dense wireless networks, i.e., wireless networks that contain so many nodes that, in addition to their usual microscopic description, a novel macroscopic description becomes possible. The macroscopic description is not detailed, but nevertheless contains eno ..."
Abstract - Add to MetaCart
Abstract — We study routing for massively dense wireless networks, i.e., wireless networks that contain so many nodes that, in addition to their usual microscopic description, a novel macroscopic description becomes possible. The macroscopic description is not detailed, but nevertheless contains
Next 10 →
Results 1 - 10 of 363
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University