Database Reference
In-Depth Information
illustrated in Figure 2.2 . Quddus et al. ( 2007 ) proposed a technique for replacing
each position of the original trajectory by the point on the network that is the
most likely position of the moving object. Greenfeld ( 2002 ) proposed a method
based on topological analysis using the observed position of the individual with-
out assuming any knowledge of the expected traveling route and the speed or
heading information supplied by the GPS. Furthermore, Newson and Krumm
( 2009 ) used hidden Markov model approaches to find the most likely road route
corresponding to a sequence of positions.
Meratnia and de By ( 2004 ) proposed the Top-Down Time Ratio (TD-TR)
and Open Window Time Ratio (OPW-TR) algorithms for the compression of
spatio-temporal data. Potamias et al. ( 2006 ) proposed the two algorithms, called
Thresholds and STTrace, respectively, for online trajectory data compression.
Kellaris et al. ( 2009 ) present a different approach by replacing certain episodes
of a trajectory by selected shortest paths between the beginning and ending
position of these episodes. As for the trajectory reconstruction topic, Marketos
et al. ( 2008 ) presented a method for determining different trajectories as part
of a trajectory reconstruction manager. On the other hand, Ya n e t a l . ( 2011 )
presented a technique for reconstructing semantic trajectories from the raw GPS
mobility records.
With regard to privacy issues, Gruteser and Grunwald ( 2003 ) introduced the
concept of location k -anonymity in the context of LBS; Jensen et al. ( 2009 )intro-
duced the dichotomy of identity privacy versus location privacy; Casper ( Chow
et al. , 2009 ) is a major privacy preserving framework supporting location k -
anonymity; the velocity-based attack is described in more detail in Ghinita et al.
( 2009 ); Damiani et al. ( 2010 , 2011 ) introduce the semantic location cloaking
paradigm.
Search WWH ::




Custom Search