2008 Ninth International Conference on Mobile Data Management Workshops, MDMW最新文献

筛选
英文 中文
Leveraging Multi-Agent Systems Backed by Semantic Web for the Delivery of Innovative Value Added Mobile Telecommunications Services 利用以语义网为支援的多代理系统提供创新增值流动电讯服务
Ahmet Feyzi Ateú
{"title":"Leveraging Multi-Agent Systems Backed by Semantic Web for the Delivery of Innovative Value Added Mobile Telecommunications Services","authors":"Ahmet Feyzi Ateú","doi":"10.1109/MDMW.2008.11","DOIUrl":"https://doi.org/10.1109/MDMW.2008.11","url":null,"abstract":"In this paper we propose an architecture to enable the development of innovative personalized value added telecommunications services. Our proposed architecture is built on a multi-agent platform, and utilizes semantically enriched data stores, i.e., data stores with proper support for ontology development and associated reasoning capabilities. The proposed architecture is evaluated in terms of its capacity to support the delivery of personalized services. A simple ontology modeling user profiles has been developed and used in a case study scenario to assist the evaluation. Several commercial and freely available tools have been utilized in order to focus our contribution on the higher application levels in terms of the added value achieved. The preliminary results indicate that the proposed architecture is highly promising in terms of the problem being attacked, and opens up the way for numerous future research and application areas.","PeriodicalId":242324,"journal":{"name":"2008 Ninth International Conference on Mobile Data Management Workshops, MDMW","volume":"601 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133236332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Much Room before you Rely: Balancing Privacy Control and Fidelity in the Location-based Pervasive Applications 在你依赖之前有多大的空间:在基于位置的普及应用程序中平衡隐私控制和保真度
N. Talukder, S. Ahamed
{"title":"How Much Room before you Rely: Balancing Privacy Control and Fidelity in the Location-based Pervasive Applications","authors":"N. Talukder, S. Ahamed","doi":"10.1109/MDMW.2008.9","DOIUrl":"https://doi.org/10.1109/MDMW.2008.9","url":null,"abstract":"Rapid development of innovative location-centric applications promoted through widespread proliferation of wireless technology and availability of small handheld devices have brought about a new era in pervasive computing. Besides, they are constantly challenged by individual privacy protection necessities as the location information are stored and exchanged among entities and service providers. In this paper, we attempt to categorize location-centric pervasive applications based on the utility and flexibility on imposing privacy measures. Our first category of applications \"Services based on location constraints\" provide less options for privacy protection, while the second one \"Location-centric statistical query services\" allows more control of privacy on the clients' side. But once again giving away too much control to regulate priva.cy on the client side also undermines the quality and fidelity of the applications. We discuss some of the research issues of the privacy flexible framework for location-centric application, ,the costs incurred upon losing fidelity and wayouts to cope with them without compromising privacy in the first place. The framework introduces an interesting class of applications where users relish on the balance of location privacy protection and fidelity of the application.","PeriodicalId":242324,"journal":{"name":"2008 Ninth International Conference on Mobile Data Management Workshops, MDMW","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130003947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Generating Virtual Users with Real Path Information to Improve Location Privacy 生成具有真实路径信息的虚拟用户,提高位置隐私
H. Kreuzpointner, R. Eigner
{"title":"Generating Virtual Users with Real Path Information to Improve Location Privacy","authors":"H. Kreuzpointner, R. Eigner","doi":"10.1109/MDMW.2008.8","DOIUrl":"https://doi.org/10.1109/MDMW.2008.8","url":null,"abstract":"In this paper, we propose a system to ensure privacy for users of mobile location based services. The system is based on doubles i. e. are virtual users in the vicinity of the real user. In order to camouflage the identity of a user and its movements, we introduce changing zones based on mix zones which exploit the fuzziness of GPS location positioning. The doubles themselves have access to real movement data in order to provide a realistic view of their movements. Whenever the movement of users (no matter if real or double) crosses in a changing zone, new movement pieces, so-called stitches are generated and serve as bases for future movement data of other doubles. We also show a synopsis of a possible architecture and how system subcomponents could interact in order to obtain certain levels of privacy. The proposed system is also able to provide new movement information to doubles in a dynamic manner. In addition, we outline a plan on how to evaluate the system.","PeriodicalId":242324,"journal":{"name":"2008 Ninth International Conference on Mobile Data Management Workshops, MDMW","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114194120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Lineage-based Probabilistic Event Stream Processing 基于谱系的概率事件流处理
Zhitao Shen, H. Kawashima, H. Kitagawa
{"title":"Lineage-based Probabilistic Event Stream Processing","authors":"Zhitao Shen, H. Kawashima, H. Kitagawa","doi":"10.1109/MDMW.2008.12","DOIUrl":"https://doi.org/10.1109/MDMW.2008.12","url":null,"abstract":"In this paper, we propose a query language to support probabilistic queries for composite event stream matching. The language allows users to express Kleene closure patterns for complex event detection in physical world. We also propose a working framework for query processing over probabilistic event streams. Our method first detects sequence patterns over probabilistic data streams by using a new data structure, AIG which handles a record sets of active states with a NFA-based approach. After detecting active states, our method then computes the probability of each detected sequence pattern on its lineage. That is, query processing and confidence computation are decoupled. By the benefit of lineage, the probability of an output event can be directly calculated without considering the query plan. We conduct a performance evaluation of our method comparing with naive one which is called possible worlds approach. The result clearly shows the effectiveness of our approach. While our approach shows scalable throughput, naive approach degrades its performance rapidly. The experiments are conducted with the window size, the number of event types and the number of alternatives.","PeriodicalId":242324,"journal":{"name":"2008 Ninth International Conference on Mobile Data Management Workshops, MDMW","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125320201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
p-Sensitivity: A Semantic Privacy-Protection Model for Location-based Services p-敏感性:基于位置服务的语义隐私保护模型
Zhengyan Xiao, Jianliang Xu, Xiaofeng Meng
{"title":"p-Sensitivity: A Semantic Privacy-Protection Model for Location-based Services","authors":"Zhengyan Xiao, Jianliang Xu, Xiaofeng Meng","doi":"10.1109/MDMW.2008.20","DOIUrl":"https://doi.org/10.1109/MDMW.2008.20","url":null,"abstract":"Several methods have been proposed to support location-based services without revealing mobile users' privacy information. There are two types of privacy concerns in location-based services: location privacy and query privacy. Existing work, based on location k-anonymity, mainly focused on location privacy and are insufficient to protect query privacy. In particular, due to lack of semantics, location k-anonymity suffers from query homogeneity attack. In this paper, we introduce p-sensitivity, a novel privacy-protection model that considers query diversity and semantic information in anonymizing user locations. We propose a PE-tree for implementing the p-sensitivity model. Search algorithms and heuristics are developed to efficiently find the optimal p-sensitivity anonymization in the tree. Preliminary experiments show that p-sensitivity provides high-quality services without compromising users' query privacy.","PeriodicalId":242324,"journal":{"name":"2008 Ninth International Conference on Mobile Data Management Workshops, MDMW","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114310373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Cache Management Techniques for Privacy Preserving Location-based Services 保护隐私的基于位置服务缓存管理技术
Yu Chen, Jie Bao, Wei-Shinn Ku, Jiun-Long Huang
{"title":"Cache Management Techniques for Privacy Preserving Location-based Services","authors":"Yu Chen, Jie Bao, Wei-Shinn Ku, Jiun-Long Huang","doi":"10.1109/MDMW.2008.2","DOIUrl":"https://doi.org/10.1109/MDMW.2008.2","url":null,"abstract":"In order to access location-based services, mobile users have to disclose their exact locations to service providers. However, adversaries could collect the location information for purposes against mobile users' privacy. There are existing solutions for privacy protection by utilizing the K-anonymity model. However, the computational and communication costs are high. This research proposes cache management techniques for further improving user privacy protection, saving computational power, and decreasing communication costs.","PeriodicalId":242324,"journal":{"name":"2008 Ninth International Conference on Mobile Data Management Workshops, MDMW","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121651536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Proactive Replica Placement Using Mobility Prediction 使用移动性预测的主动副本放置
J. Gossa, A. Janecek, K. Hummel, W. Gansterer, J. Pierson
{"title":"Proactive Replica Placement Using Mobility Prediction","authors":"J. Gossa, A. Janecek, K. Hummel, W. Gansterer, J. Pierson","doi":"10.1109/MDMW.2008.21","DOIUrl":"https://doi.org/10.1109/MDMW.2008.21","url":null,"abstract":"In mobile distributed computing scenarios, data replication management can be enhanced by considering client mobility. This work introduces a mobility model for mobile clients which enables proactive replica placement based on mobility predictions to increase the responsiveness of data access for mobile end users and to reduce the network load in the system. The concept is applied to a flexible replica placement algorithm and is evaluated using GPS traces generated by taxis in the city of Vienna, Austria. We show results demonstrating that replica placement can be improved by adding mobility prediction and discuss the influences of prediction accuracy on the accuracy of the placement strategy.","PeriodicalId":242324,"journal":{"name":"2008 Ninth International Conference on Mobile Data Management Workshops, MDMW","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127136958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Real-Time Monitoring of Mobile Biological Sensor Data-Streams: Architecture and Cost-Model 移动生物传感器数据流的实时监测:架构和成本模型
A. Goñi, J. Rodriguez, A. Burgos, A. Illarramendi, L. Dranca
{"title":"Real-Time Monitoring of Mobile Biological Sensor Data-Streams: Architecture and Cost-Model","authors":"A. Goñi, J. Rodriguez, A. Burgos, A. Illarramendi, L. Dranca","doi":"10.1109/MDMW.2008.22","DOIUrl":"https://doi.org/10.1109/MDMW.2008.22","url":null,"abstract":"In this paper an architecture useful to build systems that monitor data streams generated by biological sensors attached to mobile users is presented. In order to illustrate the suitability and applicability of our proposal, we introduce two particular real systems: an anywhere and at any time monitoring system of heart arrhythmias and a portable and light system that monitor sleep apneas. We also propose a cost model that takes into account three aspects related to the system efficiency: selection of the optimal granularity, that is, the selection of the size of the input data stream package that has to be acquired in order to start a new processing cycle; the possible use of compression techniques to store and send the acquired input data stream and; finally, the performance of a local analysis versus a remote one.","PeriodicalId":242324,"journal":{"name":"2008 Ninth International Conference on Mobile Data Management Workshops, MDMW","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116767209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Ontology-based Use Cases for Design-time and Runtime Composition of Mobile Services 基于本体的移动服务设计时和运行时组合用例
M. Rój, P. H. Meland, J. Floch, J. Domaszewicz
{"title":"Ontology-based Use Cases for Design-time and Runtime Composition of Mobile Services","authors":"M. Rój, P. H. Meland, J. Floch, J. Domaszewicz","doi":"10.1109/MDMW.2008.19","DOIUrl":"https://doi.org/10.1109/MDMW.2008.19","url":null,"abstract":"This paper presents application of ontology-based modelling and reasoning related to the different phases of the lifecycle of mobile services. Ontology-based descriptions complement traditional design-time and runtime models allowing more complex reasoning. We present use cases for ontologies that may be applied at design time, deployment time and/or runtime. Some important characteristics of our approach are: 1. ontological descriptions define complex artefacts that are built from simpler ones defined in an ontology; 2. a single ontology can be used for specifying various artefacts and for reasoning on various aspects at different phases of the service lifecycle; 3. an artefact can be used for various purposes. This paper provides examples of ontological descriptions along with use cases, and discusses the applicability of the approach.","PeriodicalId":242324,"journal":{"name":"2008 Ninth International Conference on Mobile Data Management Workshops, MDMW","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114398170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network Distance Based Cache Replacement Policy for Location-Dependent Data in Mobile Environment 移动环境下基于网络距离的位置依赖数据缓存替换策略
M. Magdalene, Jane F, Yaser Nouh, R. Nadarajan, Maytham Safar
{"title":"Network Distance Based Cache Replacement Policy for Location-Dependent Data in Mobile Environment","authors":"M. Magdalene, Jane F, Yaser Nouh, R. Nadarajan, Maytham Safar","doi":"10.1109/MDMW.2008.17","DOIUrl":"https://doi.org/10.1109/MDMW.2008.17","url":null,"abstract":"Data caching in mobile clients is an important technique to enhance data availability and to improve data access time. Due to cache size limitations, cache replacement policies are used to find a suitable subset of items for eviction from the cache. The existing policies focus on Euclidean space and consider Euclidean distance as a spatial parameter for eviction. However, in practice the position and movement of objects are constrained to spatial networks where the important distance measure is the network distance. In this paper we propose a cache replacement policy, which considers the network density, network distance and probability of access as important factors for eviction. A series of simulation experiments have been conducted to evaluate the performance of the policy. Results indicate that the proposed cache replacement scheme performs significantly better than the existing policies FAR and PAID.","PeriodicalId":242324,"journal":{"name":"2008 Ninth International Conference on Mobile Data Management Workshops, MDMW","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114764199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信