2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware

18-20 May 2009

Filter Results

Displaying Results 1 - 25 of 134
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (437 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (14 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - xiii
    Request permission for commercial reuse | PDF file iconPDF (155 KB)
    Freely Available from IEEE
  • Message from the Conference Chairs

    Publication Year: 2009, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (78 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Conference Program Co-chairs

    Publication Year: 2009, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (82 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organization

    Publication Year: 2009, Page(s):xvi - xix
    Request permission for commercial reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • Workshop Organizations

    Publication Year: 2009, Page(s):xx - xxvii
    Request permission for commercial reuse | PDF file iconPDF (106 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s):xxviii - xxx
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • Keynote 1

    Publication Year: 2009, Page(s): xxxi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (91 KB)

    Summary form only given. It is becoming increasingly clear that the next generation of Web search and advertising will rely on a deeper understanding of user intent and task modeling, and a correspondingly richer interpretation of content on the Web. This should also facilitate better selection and presentation of results on mobile devices. How we get there, in particular, how we understand Web co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote 2

    Publication Year: 2009, Page(s): xxxii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (90 KB)

    A principal aspiration of cloud computing is to create an Internet-based platform that facilitates the development of Web-scale services. By presenting this platform and infrastructure (including datacenters) as a service for developers, together with cloud-based software and data as a service for users, cloud computing promises to "level the playing field" such that small start-up ventures can di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote 3

    Publication Year: 2009, Page(s): xxxiii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    The Internet is going mobile, and indications are that on a global scale, the mobile Internet will soon be "bigger" than the conventional Internet. Due to aspects such as user mobility, much more varied use situations, and the form factor of mobile devices, context awareness is important on the mobile Internet. Focusing on aspects of geo-spatial context awareness, this talk covers research that ai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Invited Seminar

    Publication Year: 2009, Page(s): xxxiv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (93 KB)

    This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in data privacy area, the presenter describes the essential concepts, the alternative models, and the suite of techniques for providing location privacy in mobile and ubiquitous data management systems. The tutorial consists... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Industry Seminar

    Publication Year: 2009, Page(s): xxxv
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • Mining Individual Life Pattern Based on Location History

    Publication Year: 2009, Page(s):1 - 10
    Cited by:  Papers (65)  |  Patents (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1127 KB) | HTML iconHTML

    The increasing pervasiveness of location-acquisition technologies (GPS, GSM networks, etc.) enables people to conveniently log their location history into spatial-temporal data, thus giving rise to the necessity as well as opportunity to discovery valuable knowledge from this type of data. In this paper, we propose the novel notion of individual life pattern, which captures individual's general li... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Message Processing Method for Top-k Query for Traffic Reduction in Ad Hoc Networks

    Publication Year: 2009, Page(s):11 - 20
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (407 KB) | HTML iconHTML

    In ad hoc networks, to acquire only necessary data items, it is effective that each mobile node retrieves data items using a top-k query, in which data items are ordered by the score of a particular attribute, and the query-issuing mobile node acquires data items with the k highest scores. In this paper, we propose a message processing method for a top-k query for reducing traffic and keeping the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Operator Placement for Snapshot Multi-predicate Queries in Wireless Sensor Networks

    Publication Year: 2009, Page(s):21 - 30
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (494 KB) | HTML iconHTML

    This work aims at minimize the cost of answering snapshot multi-predicate queries in high-communication-cost networks. High-communication-cost (HCC) networks is a family of networks where communicating data is very demanding in resources, for example in wireless sensor networks transmitting data drains the battery life of sensors involved. The important class of multi-predicate queries in horizont... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy-Aware Proximity Based Services

    Publication Year: 2009, Page(s):31 - 40
    Cited by:  Papers (34)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (395 KB) | HTML iconHTML

    Proximity based services are location based services (LBS) in which the service adaptation depends on the comparison between a given threshold value and the distance between a user and other (possibly moving) entities. While privacy preservation in LBS has lately received much attention, very limited work has been done on privacy-aware proximity based services. This paper describes the main privac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Capturing of Environmental Data with Mobile RFID Readers

    Publication Year: 2009, Page(s):41 - 51
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (327 KB) | HTML iconHTML

    In this paper we introduce a novel scenario for environmental sensing based on the combination of simple and cheap RFID-based sensors and mobile devices like mobile phones with integrated RFID readers. We envision a system that exploits the availability of these devices to cooperatively read sensors installed in the environment, and transmit the data to a server infrastructure. To achieve quality ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finding Probabilistic Nearest Neighbors for Query Objects with Imprecise Locations

    Publication Year: 2009, Page(s):52 - 61
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (925 KB) | HTML iconHTML

    A nearest neighbor query is an important notion in spatial databases and moving object databases. In the emerging application fields of moving object technologies, such as mobile sensors and mobile robotics, the location of an object is often imprecise due to noise and estimation errors. We propose techniques for processing a nearest neighbor query when the location of the query object is specifie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PLOT: Privacy in Location Based Services: An Open-Ended Toolbox

    Publication Year: 2009, Page(s):62 - 71
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3200 KB) | HTML iconHTML

    The widespread adoption of location based services (LBSs) coupled with recent advances in location tracking technologies, pose serious concerns to user privacy. As a consequence, privacy preserving approaches have been proposed to protect the location information which is communicated during a request for an LBS. Most existing approaches are centralized as they rely on a trusted server to protect ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information-Gradient Based Decentralized Data Management over RFID Tag Clouds

    Publication Year: 2009, Page(s):72 - 81
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB) | HTML iconHTML

    The tasks in the physical environments are mainly information centric processes, such as search and exploration of physical objects. We have developed an informational environment, AURA that supports object searches in the physical world. The goal of AURA is to enable individuals to use the environment in which they function as a living (short-term) memory of their activities and of the objects wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aggregate Location Monitoring for Wireless Sensor Networks: A Histogram-Based Approach

    Publication Year: 2009, Page(s):82 - 91
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    Location monitoring systems are used to detect human activities and provide monitoring services, e.g., aggregate queries. In this paper, we consider an aggregate location monitoring system where wireless sensor nodes are counting sensors that are only capable of detecting the number of objects within their sensing areas. As traditional query processors rely on the knowledge of users' exact locatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Energy Efficiency for Heterogeneous Data Broadcasting

    Publication Year: 2009, Page(s):92 - 101
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB) | HTML iconHTML

    Data broadcast is an advanced technique to realize large scalability and bandwidth utilization in a mobile computing environment. In the heterogeneous data broadcast, the data size is variant with time in multiple broadcast channels. However, traditional indexing schemes do not consider variant data size to design indexing techniques in the multiple channels. Therefore, the above drawback leads to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.