2007 International Conference on Mobile Data Management

1-1 May 2007

Filter Results

Displaying Results 1 - 25 of 88
  • [Title page]

    Publication Year: 2007, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2007, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2007, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2007, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (64 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2007, Page(s): vi
    Request permission for commercial reuse | PDF file iconPDF (94 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2007, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (94 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2007, Page(s):viii - xii
    Request permission for commercial reuse | PDF file iconPDF (169 KB)
    Freely Available from IEEE
  • How to Build Your Own Moving Objects Database System

    Publication Year: 2007, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (231 KB) | HTML iconHTML

    Representing descriptions of movements in databases and querying them is a basic capability required in mobile data management. In this article we present a prototype of a moving objects database system and an environment for building such prototypes called Secondo. The Secondo environment is freely available on the Web. The prototype of a moving objects DBMS is based on the concept of spatio-temp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart Earth: From Pervasive Observation to Trusted Information

    Publication Year: 2007, Page(s):3 - 7
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB) | HTML iconHTML

    We introduce a model for information management in a world where information from the physical environment is gathered through a ubiquitous wireless infrastructure. Thus the Internet information space and the physical environment become increasingly entangled in what we call a smart Earth. We illustrate technical challenges and applications from the work of the Swiss national competence centre of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Phenomenon-Aware Stream Query Processing

    Publication Year: 2007, Page(s):8 - 15
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    Spatio-temporal data streams that are generated from mobile stream sources (e.g., mobile sensors) experience similar environmental conditions that result in distinct phenomena. Several research efforts are dedicated to detect and track various phenomena inside a data stream management system (DSMS). In this paper, we use the detected phenomena to reduce the demand on the DSMS resources. The main i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Peer-to-Peer Data Dissemination with Resource Constraints

    Publication Year: 2007, Page(s):16 - 23
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    Peer-to-peer data dissemination in a mobile ad-hoc environment is characterized by three resource constraints, including energy, communication bandwidth, and storage. Most of the existing studies deal with these constraints separately. In this paper we propose an algorithm called RANk-based dissemination (RANDI), which provides an integral treatment to the three constraints. The contribution is in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing Energy-Efficient Query Processing in Wireless Sensor Networks

    Publication Year: 2007, Page(s):24 - 29
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    This paper studies the issues of energy-efficient query optimization for wireless sensor networks. Different from existing query optimization techniques that consider only query plans for extracting data from sensors at individual nodes, our approach takes into account both of the sensing and communication cost in query plans. Central to our study is a cost-based analysis, based on which the energ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collaboratively Querying Sensor Networks through Handheld Devices

    Publication Year: 2007, Page(s):30 - 35
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    We envision that in some wireless sensor network applications, such as environmental monitoring, assisted living, and industrial control, handheld devices will be used from time to time to query the sensor networks. However, there is no full-fledged query processor for this purpose. Therefore, we propose WinyDB, a relational query processing system on Windows-CE based PDAs (Personal Digital Assist... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BORA: Routing and Aggregation for Distributed Processing of Spatio-Temporal Range Queries

    Publication Year: 2007, Page(s):36 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (215 KB) | HTML iconHTML

    This work tackles the problem of answer-aggregation for continuous spatio-temporal range queries in distributed settings. We assume a grid-like coverage of the spatial universe of discourse, in which each cell is governed by a Base Station (BS) that communicates with the mobile users in its zone, and is also equipped with a server that has Moving Objects Database (MOD) capabilities. The MOD server... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Place: A Distributed Spatio-Temporal Data Stream Management System for Moving Objects

    Publication Year: 2007, Page(s):44 - 51
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (387 KB) | HTML iconHTML

    In this paper, we introduce PLACE*, a distributed spatio-temporal data stream management system for moving objects. PLACE* supports continuous spatio-temporal queries that hop among a network of regional servers. To minimize the execution cost, a new Query-Track- Participate (QTP) query processing model is proposed inside PLACE*. In the QTP model, a query is continuously answered by a querying ser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantics of Spatially-Aware Windows Over Streaming Moving Objects

    Publication Year: 2007, Page(s):52 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    Several window constructs are usually specified in continuous queries over data streams as a means of limiting the amount of data processed each time and thus providing real-time responses. Current research has mostly focused on tackling the temporal volatility of the stream, overlooking other inherent features of incoming items. In this paper, we argue that novel window types, other than strictly... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy-Preserving Data Mining on Moving Object Trajectories

    Publication Year: 2007, Page(s):60 - 68
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (665 KB) | HTML iconHTML

    The popularity of embedded positioning technologies in mobile devices and the development of mobile communication technology have paved the way for powerful location-based services (LBSs). To make LBSs useful and user- friendly, heavy use is made of context information, including patterns in user location data which are extracted by data mining methods. However, there is a potential conflict of in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anonymity in Location-Based Services: Towards a General Framework

    Publication Year: 2007, Page(s):69 - 76
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    A general consensus is that the proliferation of location- aware devices will result in a diffusion of location-based services. Privacy preservation is a challenging research issue for this kind of service. A possible solution consists of ensuring users' anonymity, i.e., ensuring that the user issuing a request is indistinguishable, among a group of users, by any attacker who has access to the ser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enforcing Data Integrity in Very Large Ad Hoc Networks

    Publication Year: 2007, Page(s):77 - 85
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (201 KB) | HTML iconHTML

    Ad hoc networks rely on nodes forwarding each other's packets, making trust and cooperation key issues for ensuring network performance. As long as all nodes in the network belong to the same organization and share the same goal (in military scenarios, for example), it can generally be expected that all nodes can be trusted. However, as wireless technology becomes more commonplace, we can foresee ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Adaptive Control Method in the Hybrid Wireless Broadcast Environment

    Publication Year: 2007, Page(s):86 - 93
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB) | HTML iconHTML

    In this paper, we investigate adaptive control for broadcast scheduling and base station caching in the hybrid wireless broadcast (HWB) environment. The proposed adaptive method can adapt well to different access conditions and bandwidth capabilities and adequately exploit the three data delivery modes: push-based broadcast, pull- based broadcast, and pull-based point-to-point communication. Simul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Variant Bandwidth Channel Allocation in the Data Broadcasting Environment

    Publication Year: 2007, Page(s):94 - 101
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (355 KB) | HTML iconHTML

    Data broadcast is a technique to realize energy saving and bandwidth utilization in a mobile computing environment. However, traditional schemes schedule data items without considering channel bandwidth. Therefore, the above drawback leads to the unfair broadcasting rate of each item of the different access frequency. In this paper, we address the problem of generating a broadcast program to disse... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-Resolution Data Management for Opportunistic Networking

    Publication Year: 2007, Page(s):102 - 109
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    In this work, we present a multi-resolution data management scheme for efficiently storing and diffusing information, which is originating from sensors and augmenting mobile applications. The proposed mechanism exploits the discrete wavelet transform properties for providing a location-dependent data management scheme, which alleviates the constraints on the storage resources needed for running co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting Our Computational Surroundings for Better Mobile Collaboration

    Publication Year: 2007, Page(s):110 - 117
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    Mobile collaborative environments, being naturally loosely-coupled, call for optimistic replication solutions in order to attain the requirement of decentralized highly available access to data. However, such connectivity assumptions are also a decisive hindrance to the ability of optimistic replication protocols to rapidly guarantee consistency among the set of loosely-coupled replicas. This pape... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Replication Considering Power Consumption in Ad Hoc Networks

    Publication Year: 2007, Page(s):118 - 125
    Cited by:  Papers (17)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    In mobile ad hoc networks, a mobile host holding data items frequently accessed by other hosts needs to transmit them many times and consumes more power than other hosts. In this paper, we propose replica allocation methods for not only improving data availability but also balancing the power consumption among mobile hosts. In these methods, each mobile host replicates data items taking into accou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.