Quality Aware Privacy Protection for Location-based Services

Size: px
Start display at page:

Download "Quality Aware Privacy Protection for Location-based Services"

Transcription

1 In Poceedings of the th Intenational Confeence on Database Systems fo Advanced Applications (DASFAA 007), Bangkok, Thailand, Apil 9-, 007. Quality Awae Pivacy Potection fo Location-based Sevices Zhen Xiao,, Xiaofeng Meng,, and Jianliang Xu School of Infomation, Renmin Univesity of China Key Laboatoy of Data Engineeing and Knowledge Engineeing, MOE {xiaozhen, Depatment of Compute Science, Hong Kong Baptist Univesity Abstact. Potection of uses pivacy has been a cental issue fo location-based sevices (LBSs). In this pape, we classify two kinds of pivacy potection equiements in LBS: location anonymity and identifie anonymity. While the location cloaking technique unde the k-anonymity model can povide a good potection of uses pivacy, it educes the esolution of location infomation and, hence, may degade the quality of sevice (QoS). To stike a balance between the location pivacy and QoS, we pesent a quality-awae anonymity model fo potecting location pivacy while meeting use specified QoS equiements. In the model, a mobile use can specify the minimum anonymity level equiement upon location pivacy as well as the maximum cloaking latency and the maximum cloaking egion size equiements upon QoS. In accodance with the model, we develop an efficient diected-gaph based cloaking algoithm to achieve both high-quality location anonymity and identifie anonymity. The pefomance objective is to maximize the cloaking success ate unde the pivacy and QoS constaints. Futhemoe, we intoduce an option of using dummy locations to achieve a 00% cloaking success ate at the cost of communication ovehead. Expeimental esults show the effectiveness of ou cloaking algoithm unde vaious pivacy and QoS equiements. Key wods: Pivacy, Location-based Sevices, QoS Intoduction With the advances in wieless communication and mobile positioning technologies, location-based sevices (LBSs) have become inceasingly popula fo mobile uses. In these applications, mobile uses send thei location infomation to sevice povides and enjoy vaious types of location-based sevices, such as mobile yellow page (e.g., Whee is my neaest estauant ), mobile buddy list (e.g., Whee is my neaest fiend ), taffic navigation (e.g., What is my shotest path to the Summe Palace ), and emegency suppot sevices (e.g., I need help and send me the neaest police ) [, ]. While people get much benefit fom the useful and convenient infomation povided by LBSs, the pivacy theat of evealing a mobile use s pesonal infomation (including the identifie and location) has become a sevee issue [, In this pape, we use mobile use, mobile client, and use intechangeably. 7

2 Z. Xiao, X. Meng and J. Xu ]. A taditional solution to potecting pivacy is the use of pseudonymity []. That is, fo any LBS equest, a tusted middlewae is employed to eplace the eal identifie of the use with a pseudonym befoe fowading the equest to a sevice povide [, ]. Howeve, the location infomation enclosed in the equest may lead to pesonal e-identification. An attacke can link the location to some paticula individual based on extenal knowledge. Fo example, if we know the location exclusively belongs to some owne, the coesponding equest can thus be linked to the location owne [8, 9]. In geneal, thee ae two kinds of pivacy potection equiements in LBS: Location anonymity. This is to potect a use s location fom being disclosed when the location infomation is sensitive (e.g., in a clinic o pub). A common technique is to cloak the use s location by an extended egion. Unde the k-anonymity model [6], the egion is lage enough such that it contains at least k othe uses. Identifie anonymity. This is to hide a use s identifie when the message content is sensitive (e.g., political o financial data). Again location cloaking can be applied to povide identifie anonymity. Unde the k-anonymity model [6], use locations ae cloaked such that a location is coveed by at least k othe equests. In this way, a equest is not identifiable fom the othe k equests. While the k-anonymity model can povide a good potection of uses pivacy, it educes the esolution of the location infomation and, hence, may degade the quality of sevice (QoS). It is often desiable to stike a balance between the location pivacy and QoS equiements. In this pape, we pesent a quality-awae anonymity model fo potecting location pivacy while meeting use specified QoS equiements. In ou model, a mobile use can specify the following equiements in each LBS equest: ) the minimum anonymity level k, indicating the location cloaking should satisfy both k-location-anonymity and k-identifieanonymity; ) the maximum cloaking latency t, epesenting the maximum cloaking delay that the use can toleate; ) the maximum cloaking egion size δ, indicating the maximum toleable eo in location data. While k eflects the use s equiement upon location pivacy, t and δ epesent the use s QoS equiements. Since the pivacy/qos tadeoff fo a use may change ove time unde diffeent cicumstances, we allow these equiements to vay fom one equest to anothe even fo the same use. In accodance with the quality-awae anonymity model, we develop an efficient diected-gaph based cloaking algoithm to pefom anonymization ove LBS equests. The pefomance objective is to maximize the cloaking success ate with pivacy potected and QoS guaanteed. Futhemoe, we intoduce an option of using dummy locations to achieve a 00% cloaking success ate at the cost of communication ovehead. Unde this scenaio, we would like to make use of as few dummies as possible to minimize the communication ovehead. We conduct a seies of expeiments to evaluate the effectiveness of the poposed algoithms. The esults show that ou algoithms ae supeio unde vaious pivacy and QoS equiements. The est of this pape is oganized as follows. We fist eview some elated wok on potecting location pivacy in Section. In Section, we descibe ou quality-awae anonymity model. An efficient cloaking algoithm is poposed in 76

3 Quality Awae Pivacy Potection fo Location-based Sevices Section. Some discussions and impovements ae pesented in Section. Section 6 pesents the implementation and expeimental esults of ou poposed algoithms. Finally, Section 7 concludes the pape. Related Wok Seveal diffeent models have been used fo potecting location pivacy. Kido et al. [] poposed a dummy-based appoach, in which a use sends the actual location with seveal fake locations ( dummies ) to a sevice povide. The sevice povide pocesses and etuns an answe fo each eceived location. The use finally efines the esult based on the actual location. The k-anonymity model was oiginally intoduced fo pivacy potection in conventional database applications [7]. As defined in [6], a elease of data povides k-anonymity potection if the infomation fo each individual contained in the elease cannot be distinguished fom at least k individuals whose infomation also appea in the elease. In the context of LBS, Gutese and Gunwald [] fist adopted the k-anonymity model and poposed a quad-tee based cloaking algoithm. They assume a static anonymity equiement k min fo all uses. To achieve k-anonymity, the algoithm ecusively subdivides the aea aound a use s location into fou quadants until the numbe of uses in the aea falls below k min, and then etuns the pevious quadant as the cloaking egion. This technique does not diffeentiate the pivacy equiements of diffeent uses. Moeove, no estiction is imposed on the cloaking egion size. Thus, a cloaking egion can be vey lage, which may lead to an inaccuate quey esult and a poo sevice quality. Gedik and Liu [] ecently poposed the technique of suppoting pesonalized pivacy equiements, captuing the pivacy and QoS equiements on a pe-use basis. A location cloaking algoithm called CliqueCloak was developed. CliqueCloak constucts an undiected gaph fo all the equests that have not been anonymized yet. Each time the seve eceives a new equest, it attempts to identify a clique involving the new equest and some existing equests, and cloak them togethe with the same egion. Howeve, this method has seveal dawbacks. Fist, the effectiveness of this method is limited to uses with small k values (i.e., -). As shown in [], we can hadly find the anonymity set fo equests with lage k values. Second, the cost of seaching a clique in a gaph is costly. Thid, some equests that cannot be anonymized will be dopped when thei lifetimes expie. This will affect the use expeience towads the sevice. Diffeent fom [], ou poposed cloaking algoithm consides the tadeoff between pivacy and QoS equiements to achieve a highe cloaking success ate. A diffeent famewok named Caspe was poposed in []. Caspe employed a gid-based pyamid stuctue to index all use locations. Besides the anonymity level k, a use can specify A min, indicating that the use wants to hide the location infomation within an aea of at least A min. This model has the following concens. Fist, k and A min have a simila functionality. In fact, the highe is the value of k, the lage is the cloaking aea. Second, the cloaking egion may expand abitaily lage if k is set to a lage value and few uses pesent neaby. To addess this poblem, Caspe uses a pivacy-awae quey pocesso to etun a list of candidate quey esults to the anonymizing poxy, who has to locally 77

4 Z. Xiao, X. Meng and J. Xu efine the actual esult fom the candidate list. This appoach incus a high quey pocessing cost, a high communication cost, and a high local computation cost. In contast, to educe such costs, we enfoce some tempoal and spatial QoS equiements when pefoming location cloaking. System Model We conside a LBS system consisting of mobile clients, a tusted anonymizing poxy, and LBS povides [, ]. Upon a use quey, the mobile client fist sends the LBS equest to the anonymizing poxy though an authenticated and encypted connection. The equest consists of the use s identifie id, cuent location l = (l.x, l.y), cuent time t, as well as the sevice elated content such as the quey (denoted by data). Additionally, the mobile client can specify in the equest its pivacy and QoS equiements, which include the desied anonymity level k, the toleable maximum cloaking delay t, and the acceptable maximum cloaking egion size (denoted by a adius of δ). Thus, a equest fom use i is defined as: i = (id, l, k, t, δ, data, t). Based on the equest s pivacy and QoS equiements, the anonymizing poxy expands the location l into a cloaking egion L (to be detailed late in this section). Moeove, the identifie id is eplaced with a pseudonym id (e.g., a secue hash numbe). The oiginal equest is tansfomed into a new anonymized equest, i = (id, L, data), and is fowaded to the LBS povide. Finally, the anonymized equest is pocessed by LBS povide. The quey esult is sent back to the anonymizing poxy, which, afte efining the esult, etuns the final esult to the mobile client. We adopt the k-anonymity model [6] fo potecting location pivacy. Given a set of use equests {,,, n } and thei anonymized equests {,,, n}, the location k-anonymity model is defined as follows: Definition Fo any equest i, the location k-anonymity is satisfied if and only if ) i s cloaking egion i.l coves the locations of at least k othe equests (i.e., {j j.l i.l, j n, j i} k ) and, ) i s location i.l is coveed by the cloaking egions of at least k othe equests (i.e., {j i.l j.l, j n, j i} k ). By this definition, a LBS povide cannot distinguish a use s location i.l fom k othe uses locations since they all pesent in the cloaking egion i.l. Moeove, even knowing the location of a use, a LBS povide cannot tell which equest is made by this use since thee ae k equests all coveing this use s location. As such, both location anonymity and identifie anonymity ae achieved. We efe to the set of uses achieving location anonymity as location anonymity set and the set of uses achieving identifie anonymity as identifie anonymity set. Fo example, Figue shows fou LBS equests fom diffeent uses as well as thei cloaking egions. Since s cloaking egion coves,, and, the location anonymity set of is {,, }. On the othe hand, is coveed by the cloaking egions of though. Thus, the identifie anonymity set of is {,,, }. In summay, fo any equest and its anonymized equest, we specify the pivacy and QoS equiements fom the following thee aspects: 78

5 Quality Awae Pivacy Potection fo Location-based Sevices. Location Pivacy. This equies to expand the use location l into a cloaking egion L such that the k-anonymity model (Definition ) is satisfied.. Tempoal QoS. This states that the equest must be anonymized befoe the pedefined maximum cloaking delay (i.e., t + t).. Spatial QoS. This specifies that the cloaking egion size should not exceed a theshold, i.e., the cloaking egion must be inside a cicle Ω centeed at l and with a adius of δ (i.e., L Ω(l, δ)). In geneal, a lage t (o δ) povides moe flexibility in location anonymization but esults in an extended quey delay (o a less accuate quey esult). cloaking egion of cloaking egion of cloaking egion of cloaking egion of location point of i, i=,,, Fig.. Illustation of Location Anonymity Set and Identifie Anonymity Set Basic Anonymization Algoithm The anonymization algoithm tuns the use location into a cloaking egion based on the pivacy and QoS constaints. In this section, we discuss the following poblems faced by the anonymization algoithm: ) when to anonymize which equest? and ) given a equest unde the cloaking egion size constaint, how to find othe equests (i.e., the location anonymity set and identifie anonymity set) to satisfy the location k-anonymity model? Beaing in mind that ou objective is to maximize the cloaking success ate, we shall delay the anonymization pocess of a equest until ight befoe its deadline (i.e., t + t ɛ), whee ɛ is a small time offset set to be the wost cloaking time. In this way, not only can moe potential equests join a equest s anonymity set, but also othe equests have a highe chance to include this equest in thei anonymity sets. To tackle the second poblem, the CliqueCloak algoithm poposed in [] constucts an undiected gaph to epesent the coelations of all equests. The gaph is defined as: G u = (V, E u ), whee V is the set of the nodes, each epesenting a equest eceived at the anonymizing poxy, and E u is the set of edges, each epesenting the neighboship between the coesponding nodes (equests). Fo any pai of nodes i, j V, thee exists an edge e ij = ( i, j ) E u if and only if the distance between the two equests i j is not moe than both i.δ and j.δ ( i j i.δ and i j j.δ), which indicates the locations of i and j ae within each othe s pedefined maximum cloaking egion size. Fo any equest i, its location anonymity set and identifie anonymity set ae the same i.u that includes all its neighbos except those have k lage than i.k and those have less than k neighbos in i.u. A clique of at least k equests is identified if they shae the same anonymity set. These equests ae then anonymized with the same cloaking egion (the minimum bounding ectangle (MBR) of thei location points) at the same time. This appoach incus a huge seaching cost fo 79

6 6 Z. Xiao, X. Meng and J. Xu identifying cliques with the wost time complexity of O(N N ), whee N is the numbe of nodes in the subgaph of i.u. Moeove, with a esticted definition of the anonymity set, the cloaking success ate is low. Recall that unde ou location k-anonymity model, each equest can have a diffeent anonymity set and hence a diffeent cloaking egion. Thus, in contast to [], we build a diected gaph athe than an undiected gaph. In the diected gaph G d = (V, E d ), fo any pai of nodes i, j V, thee exists an edge e ij = ( i, j ) E d fom i to j, if and only if the distance between the two equests is not moe than i.δ ( i j i.δ), which indicates j s location is within i s pedefined maximum cloaking egion size. Similaly, thee exists an edge e ji = ( j, i ) E d fom j to i, if and only if i s location is within j s pedefined maximum cloaking egion size. The location anonymity set of a equest i, is fomed by all its outgoing neighbos i.u out, i.e., i.u out = { i } { j ( i, j ) G d (V, E d )}, and the identifie anonymity set, is fomed by all its incoming neighbos i.u in, i.e., i.u in = { i } { j ( j, i ) G d (V, E d )}. Fo each equest i, we maintain a flag to identify its status, i.e., flag = unanonymized means i has not been anonymized, and flag = fowaded means i has been anonymized successfully and fowaded to the sevice povide but not yet deleted in the gaph. A equest i can be anonymized immediately if thee ae at least k othe anonymized equests in i.u out (i.e., {j j i.u out, j.flag = fowaded, j i} k ) and k othe anonymized equests in i.u in (i.e., {j j i.u in, j.flag = fowaded, j i} k ). The cloaking egion of i is then epesented by the MBR of the location points of the equests in the location anonymity set (denoted by MBR( i.u out )). 0 0 k= k= (a) CliqueCloak (b) Ou Cloaking Fig.. An Example: the diffeences between CliqueCloak and ou poposed cloaking We use an example to illustate the diffeences between CliqueCloak(Figue (a)) and ou poposed cloaking algoithm (Figue (b)). The same set of use equests with coesponding k values ae shown in the figue, whee they ae numbeed in the ascending ode of thei deadlines. We assume 0 has been anonymized successfully ( 0.flag = fowaded in ou cloaking). With CliqueCloak,,, and fom a clique and ae cloaked with the same egion (thei MBR, epesented by the shaded aea in Figue (a)). Then they will be deleted fom the gaph. Initially, no equests ae flagged as fowaded. We employ CliqueCloak to anonymize equests in the wam-up peiod; ou poposed cloaking algoithm follows afte the wam-up peiod. 80

7 Quality Awae Pivacy Potection fo Location-based Sevices 7 Next, and will be dopped because they cannot find enough neighbos. With ou poposed cloaking algoithm, the neighboships between the equests ae diffeent and some new edges ae added in the diected gaph. Fist, is pocessed with U out = U in = { 0,,, }. Because 0.flag = fowaded, satisfying.k =, we can anonymize with cloaking egion MBR( 0,,, ). Then, is pocessed with U out = { 0,,, } and U in = {,,, }. Because 0 and have been anonymized successfully, satisfying.k =, we can also cloak it with MBR( 0,,, ). Similaly, all the othe equests will be successfully anonymized with.l = MBR(,,,, ),.L = MBR(, ),.L = MBR(,,, ). Obviously, by allowing diffeent cloaking egions fo diffeent equests, ou poposed cloaking algoithm gets a highe success ate than CliqueCloak. Moeove, as shown in Figue (b), the cloaking egions of,, and cove some moe equests in addition to,, and, theeby poviding a highe pivacy level than CliqueCloak. In the following, we descibe the detailed data stuctues and elated algoithms fo anonymizing use equests.. Data Stuctues As mentioned, we employ a dynamic in-memoy diected gaph fo all use equests. To facilitate the constuction and maintenance of the gaph, we build a spatial index (i.e., R-tee) ove the location points ( i.l s) of all equests. Thus, we can use a window quey to quickly find the neighbos of a equest. Additionally, we maintain a min-heap to ode the equests accoding to thei cloaking deadlines (i.e., the key is i.t + i. t).. Algoithms Algoithm : Maintenance ( i = {id, x, y, t, t, k, δ, data}) inset i into the spatial index and the heap; ceate a new node fo i in the gaph; i.n 0; i.u in { i}; i.u out { i}; C a ange quey Q on the spatial index, Q = ((x δ max, y δ max), (x + δ max, y + δ max)); foall j C, j i do if i j i.δ o i j j.δ then if i j i.δ then ceate an edge ( i, j) in the gaph; i.u out i.u out {j}; j.u in j.u in {i}; if i j j.δ then ceate an edge ( j, i) in the gaph; i.u in i.u in {j}; j.u out j.u out {i}; i.n i.n + ; j.n j.n + ; end end Maintenance: Algoithm details the maintenance of the data stuctues. Given a new incoming equest i, we fist update the spatial index and the heap. Next we update the gaph. We stat by seaching the spatial index using a ange quey with i.l as the cental point and δ max as the adius, whee δ max is the 8

8 8 Z. Xiao, X. Meng and J. Xu maximum cloaking egion size equiement of all the equests. The equests in the seach esult C ae the candidates fo being i s neighbos in the gaph. Each j in C is filteed based on whethe the distance between j and i is within i.δ o j.δ. In the fome case, we constuct an edge fom i to j. In the latte case, we constuct an edge fom j to i. In both cases, they ae added to each othe s outgoing neighbo set U out and incoming neighbo set U in. In the algoithm, i.n is used to epesent the cadinality of U in Uout. Algoithm : Cloaking get the top equest in the heap; if t + t t now < ε then foall.u out do if.flag = fowaded then k o + +; foall.u in do if.flag = fowaded then k i + +; if k o k and k i k then send out R = (pid, MBR(.U out),.data) fo ;.flag = fowaded; foall.u out.uin, do.n.n ; if.n = 0 and.flag = fowaded then delete fom the gaph; end if.n = 0 then delete fom the gaph; else delete fom the gaph; delete fom the spatial index and the heap; end Cloaking Algoithm: Algoithm descibes the cloaking algoithm. The input equest is the fist equest appoaching its deadline. We fist compae s cloaking time constaint.t+. t with cuent time t now. If.t+. t t now ε, whee ε is a small time offset set to be the wost cloaking time, we cloak immediately. Othewise, we delay the anonymization of to the time.t+. t ε. In the cloaking algoithm, we compute the numbe of s neighbos that have been anonymized successfully in the outgoing neighbo set and the incoming neighbo set, denoted by k o and k i espectively. If both k o and k i satisfy s minimum anonymity level (k o.k and k i.k ), can be cloaked as = (pid, MBR(.U out ),.data) and its flag is set as fowaded, whee pid is the pseudonym that eplaces.id. Othewise, the cloaking fails and the equest is deleted fom the gaph. This algoithm has a time complexity O(n), whee n is the numbe of s neighbos. Afte is successfully cloaked, we delay the emoval of in the gaph until all its neighbos have been pocessed. This is because othewise the neighboships between and its neighbos will disappea. And when we anonymize s neighbos late, they cannot include in thei anonymity sets and, hence, educe the pivacy level and the cloaking success ate. Thus, we then decease the unpocessed neighbos (n) of each s neighbo j in.u out.uin. If j has been anonymized aleady befoe and is the last neighbo of j to be pocessed, we can emove j fom the gaph. If all neighbos of have been anonymized befoe it, we can emove fom the gaph. No matte whethe the cloaking succeeds 8

9 Quality Awae Pivacy Potection fo Location-based Sevices 9 o fails, finally the equest should be emoved fom the spatial index and the heap. Impovement with Dummy Requests This section discusses an impovement by using dummy equests in case of a cloaking failue. With dummies intoduced, we can guaantee a successful cloaking fo evey equest and a 00% success ate. Theefoe, we only need to maintain fo each node the numbe of incoming neighbos.k i and the numbe of outgoing neighbos.k o (.flag is no longe maintained). If both.k i and.k o satisfy the equied pivacy level.k, the cloaking can poceed with success. Othewise, we use Algoithm to geneate enough dummies such that the dummies and the eal neighbos togethe fom s anonymity set. The time complexity of this cloaking algoithm is O(). We geneate dummies fo a equest based on the following equiements. Fist, dummies should be within both the location anonymity set and the identifie anonymity set such that the pivacy level will be highe. Second, dummies must be indistinguishable fom actual equests. Thid, dummies should satisfy the spatial QoS equiement of. Thus, to avoid expanding the existing cloaking egion, the location of each dummy distibutes andomly within MBR(.U out ). The cloaking egion of each dummy equest, d, which also cove the location point of, is a andom spatial egion between MBR({, d}) and MBR(.U out ). As such, the dummies and become both incoming neighbos and outgoing neighbos, and the sevice povide will have difficulty in identifying dummies. Algoithm : Dummy (x, y, k d, M) 6 7 compute the MBR of M, L = ((x min, y min), (x max, y max)); fo i = to k d do x andom(x min, x); x andom(x, x max); y andom(y min, y); y andom(y, y max); L i ((x, y), (x, y )); send out the ith cloaked dummy equest, R i (pid, L i, data); end Algoithm shows the detailed dummy geneation pocess. The inputs of the pocedue ae: location (l.x, l.y) of equest to be cloaked, the numbe of dummies to be geneated, and s outgoing neighbo set as M. The pseudonym and sevice elated content ae also andomly geneated. Finally, we send the cloaked dummy equests out to the sevice povide. 6 Expeiments In this section, we expeimentally compae the effectiveness of ou cloaking algoithm against CliqueCloak [] unde vaious location pivacy and QoS settings. In all the expeiments, we use Thomas Binkhoff Netwok-based Geneato of Moving Objects [] to geneate a set of moving objects. The input to the geneato is the oad map of Oldenbug County (with an aea of about 00km ). We simulate 0,000 moving objects that ae unifomly distibuted in the spatial 8

10 0 Z. Xiao, X. Meng and J. Xu Poposed(No Dummy) CliqueCloak Poposed(No Dummy) CliqueCloak success ate success ate oveall k value (a) vaying k % % % % maximum cloaking egion size (b) vaying δ Poposed(No Dummy) CliqueCloak 0.8 success ate % % % % maximum cloaking latency (c) vaying t Fig.. Pefomance of Cloaking Success Rate unde Diffeent Settings space at the initial time and aftewads continuously move on the oad netwok. These moving objects issue LBS equests with thei cuent locations at a quey inteval of 0,000 s. In each equest, t, k, and δ ae assigned unifomly between the ange [.0.]% of the update inteval (i.e.,,000-,000), [ ] uses, and [.0-0.0]% of the space (i.e., -0), espectively. We set the wost cloaking time offset ε as 0 s. Recall that the goal of ou cloaking algoithm is to maximize the numbe of equests anonymized successfully in accodance with thei pivacy and QoS equiements. We fist evaluate the cloaking success ate with vaious pivacy and QoS equiements. Figues (a), (b), and (c) show the effect of vaying k, δ, and t on the success ate, espectively. In all cases tested, ou method without using dummies always outpefoms CliqueCloak, by -% in tems of cloaking success ate. By using dummy equests, we can even achieve a 00% success ate. In Figues (a), both CliqueCloak and ou method show that the equests with lage k values ae moe difficult to anonymize, thus getting a lowe success ate. Howeve, the pefomance degadation of ou method is less significant than that of CliqueCloak. This indicates that ou method is moe obust fo lage k values. Figues (b) and (c) show that a lage δ o t impoves the flexibility in location anonymization and thus getting a highe success ate. We then measue the efficiency of ou location-anonymity model in tems of uses pivacy equiements. The elative location anonymity level is measued by k /k, whee k is the numbe of uses actually included in the cloaking egion while k is the use equied numbe. In Figue, we compae the elative anonymity level of ou method against CliqueCloak unde diffeent k values. In ou method, by using dummies, the elative anonymity level can be up to 9 fo k =, meaning that the equests ae actually anonymized with k 8 on 8

11 Quality Awae Pivacy Potection fo Location-based Sevices aveage elative anonymity level Poposed(Dummy) Poposed(No Dummy) CliqueCloak potion 00% 80% 60% 0% 0% Dummies 0 k value oveall k value Fig.. Relative Anonymity Level Fig.. Potion of Dummy Requests aveage cloaking time(millisec) Poposed(Dummy) Poposed(No Dummy) CliqueCloak 0 k value Fig. 6. Cloaking Efficiency aveage. Without using dummies, the elative anonymity level is fom. fo k = to. fo k =, meaning that the equests ae actually anonymized with k 0 on aveage. CliqueCloak povides a lowe level fom. fo k = to.0 fo k =. This esult also demonstates that even without dummies ou method can suppot lage k values up to 0 while CliqueCloak is limited to smalle k values. In Figue, we measue the potion of dummy equests geneated in the total equests unde vaying k values. Requests with lage k equie moe neighbos and hence a highe pecent of dummies. On aveage, we can achieve a 00% success ate with about 0% dummies (and thus 0% of communication ovehead), which we think is acceptable. Finally, Figue 6 shows the effect of k on the cloaking efficiency. In all cases tested, ou method shows a much shote cloaking time than CliqueCloak. When k inceases, (moe neighbos ae fomed), the aveage cloaking time lengths as a esult of inceasing cost of seaching anonymity sets. Howeve, the pefomance degadation of ou method is much less smalle than that of CliqueCloak. 7 Conclusion In this pape, we have discussed the poblem of quality-awae pivacy potection in location-based sevices. We classified the pivacy equiements into location anonymity and identifie anonymity. To potect both of these two anonymities, we have pesented a quality-awae k-anonymity model that allows a mobile use to specify in each LBS equest the location pivacy equiement as well as the tempoal and spatial QoS equiements. We have developed an efficient diectedgaph based cloaking algoithm to achieve a high cloaking success ate while 8

12 Z. Xiao, X. Meng and J. Xu satisfying the pivacy and QoS equiements. Moeove, we have intoduced the use of dummy equests to achieve a 00% cloaking success ate at the cost of communication ovehead. Expeimental evaluation have veified the effectiveness of ou model and the poposed cloaking algoithms unde vaious pivacy and QoS equiements. Acknowledgments This eseach was patially suppoted by the gants fom the Natual Science Foundation of China unde gant numbe 60709, 60708; Pogam fo New Centuy Excellent Talents in Univesity(NCET). Jianliang Xu s wok was suppoted by gants fom the Reseach Gants Council, Hong Kong SAR, China (Poject Nos. HKBU /0E and HKBU /06E). Refeences. R. José, N. Davies. Scalable and Flexible Location-Based Sevices fo Ubiquitous Infomation Access. In Poceedings of Fist Intenational Symposium on Handheld and Ubiquitous Computing, J. Schille and A. Voisad, editos. Location-Based Sevices. Mogan Kaufmann Publishes, 00.. L. Bakhuus and A. K. Dey. Location-Based Sevices fo Mobile Telephony: a Study of Uses Pivacy Concens. In INTERACT, 00.. A. R. Beesfod and F. Stajano. Location Pivacy in Pevasive Computing. IEEE Pevasive Computing, ():6-, 00.. A. Pfitzmann and M. Hansen. Anonymity, Unlinkability, Unobsevability, Pseudonymity, and Identity management - A Consolidated Poposal fo Teminology, L. Sweeney. K-anonymity: A model fo potecting pivacy. Intenational Jounal on Uncetainty, Fuzziness and Knowledge-based Systems, 0():7C70, P. Samaati and L. Sweeney. Potecting pivacy when disclosing infomation: k- anonymity and its enfocement though genealization and suppession. Technical Repot SRI-CSL- 98-0, SRI Intenational, M. Gutese and B. Hoh. On the Anonymity of Peiodic Location Samples. In SPC, A. Machanavajjhala, J. Gehke, and D. Kife. l-divesity: Pivacy Beyond k- Anonymity. In ICDE, M. J. Atallah and Keith B. Fikken.Pivacy-Peseving Location-Dependent Quey Pocessing. In ICPS, 00.. M. Gutese and D. Gunwald. Anonymous usage of location based sevices though spatial and tempoal cloaking. In ACM/USENIX MobiSys, 00.. B. Gedik and L. Liu. Location Pivacy in Mobile Systems: A Pesonalized Anonymization Model. In ICDCS, 00.. H. Kido, Y. Yanagisawa, and T. Satoh. Potection of Location Pivacy using Dummies fo Location-based Sevices. In ICPS, 00.. M. F. Mokbel, C. Chow and W. G. Aef. The New Caspe: Quey Pocessing fo Location Sevices without Compomising Pivacy. In VLDB, T. Binkhoff. A Famewok fo Geneating Netwok-Based Moving Objects. GeoInfomatica, 6():C80,

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

Event-based Location Dependent Data Services in Mobile WSNs

Event-based Location Dependent Data Services in Mobile WSNs Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

Optimal Sporadic Location Privacy Preserving Systems in Presence of Bandwidth Constraints

Optimal Sporadic Location Privacy Preserving Systems in Presence of Bandwidth Constraints Optimal Spoadic Location Pivacy Peseving Systems in Pesence of Bandwidth Constaints ABSTRACT Michael Hemann KU Leuven ESAT/COSIC, iminds Leuven, Belgium michael.hemann@esat.kuleuven.be Claudia Diaz KU

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

An Optimised Density Based Clustering Algorithm

An Optimised Density Based Clustering Algorithm Intenational Jounal of Compute Applications (0975 8887) Volume 6 No.9, Septembe 010 An Optimised Density Based Clusteing Algoithm J. Hencil Pete Depatment of Compute Science St. Xavie s College, Palayamkottai,

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Effective Missing Data Prediction for Collaborative Filtering

Effective Missing Data Prediction for Collaborative Filtering Effective Missing Data Pediction fo Collaboative Filteing Hao Ma, Iwin King and Michael R. Lyu Dept. of Compute Science and Engineeing The Chinese Univesity of Hong Kong Shatin, N.T., Hong Kong { hma,

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

Analysis of Wired Short Cuts in Wireless Sensor Networks

Analysis of Wired Short Cuts in Wireless Sensor Networks Analysis of Wied Shot Cuts in Wieless Senso Netwos ohan Chitaduga Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles 90089, USA Email: chitadu@usc.edu Ahmed Helmy Depatment

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

Embeddings into Crossed Cubes

Embeddings into Crossed Cubes Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

The Dual Round Robin Matching Switch with Exhaustive Service

The Dual Round Robin Matching Switch with Exhaustive Service The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line

More information

Secure Collaboration in Mediator-Free Environments

Secure Collaboration in Mediator-Free Environments Secue Collaboation in Mediato-Fee Envionments Mohamed Shehab School of Electical and Compute Engineeing Pudue Univesity West Lafayette, IN, USA shehab@pudueedu Elisa Betino Depatment of Compute Sciences

More information

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology, (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

View Synthesis using Depth Map for 3D Video

View Synthesis using Depth Map for 3D Video View Synthesis using Depth Map fo 3D Video Cheon Lee and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 1 Oyong-dong, Buk-gu, Gwangju, 500-712, Republic of Koea E-mail: {leecheon, hoyo}@gist.ac.k

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

Shortest Paths for a Two-Robot Rendez-Vous

Shortest Paths for a Two-Robot Rendez-Vous Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal

More information

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Decentalized Tust Management fo Ad-Hoc Pee-to-Pee Netwoks Thomas Repantis Vana Kalogeaki Depatment of Compute Science & Engineeing Univesity of Califonia, Riveside Riveside, CA 92521 {tep,vana}@cs.uc.edu

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

Cardiac C-Arm CT. SNR Enhancement by Combining Multiple Retrospectively Motion Corrected FDK-Like Reconstructions

Cardiac C-Arm CT. SNR Enhancement by Combining Multiple Retrospectively Motion Corrected FDK-Like Reconstructions Cadiac C-Am CT SNR Enhancement by Combining Multiple Retospectively Motion Coected FDK-Like Reconstuctions M. Pümme 1, L. Wigstöm 2,3, R. Fahig 2, G. Lauitsch 4, J. Honegge 1 1 Institute of Patten Recognition,

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

MULTI-TEMPORAL AND MULTI-SENSOR IMAGE MATCHING BASED ON LOCAL FREQUENCY INFORMATION

MULTI-TEMPORAL AND MULTI-SENSOR IMAGE MATCHING BASED ON LOCAL FREQUENCY INFORMATION Intenational Achives of the Photogammety Remote Sensing and Spatial Infomation Sciences Volume XXXIX-B3 2012 XXII ISPRS Congess 25 August 01 Septembe 2012 Melboune Austalia MULTI-TEMPORAL AND MULTI-SENSOR

More information

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer Using the Gow-And-Pune Netwok to Solve Poblems of Lage Dimensionality B.J. Biedis and T.D. Gedeon School of Compute Science & Engineeing The Univesity of New South Wales Sydney NSW 2052 AUSTRALIA bbiedis@cse.unsw.edu.au

More information

Image Registration among UAV Image Sequence and Google Satellite Image Under Quality Mismatch

Image Registration among UAV Image Sequence and Google Satellite Image Under Quality Mismatch 0 th Intenational Confeence on ITS Telecommunications Image Registation among UAV Image Sequence and Google Satellite Image Unde Quality Mismatch Shih-Ming Huang and Ching-Chun Huang Depatment of Electical

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

A General Characterization of Representing and Determining Fuzzy Spatial Relations

A General Characterization of Representing and Determining Fuzzy Spatial Relations 7 The Intenational Aab Jounal of Infomation Technolog A Geneal Chaacteization of Repesenting and Detemining Fuzz Spatial Relations Lui Bai and Li Yan 2 College of Infomation Science and Engineeing, Notheasten

More information

Cryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking

Cryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking Cyptanalysis of Hwang-Chang s a Time-Stamp Potocol fo Digital Watemaking *Jue-Sam Chou, Yalin Chen 2, Chung-Ju Chan 3 Depatment of Infomation Management, Nanhua Univesity Chiayi 622 Taiwan, R.O.C *: coesponding

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

An Identification Protocol based the secure USB

An Identification Protocol based the secure USB An Identification otocol based the secue UB Chol-Un KIM ok-jun AN and u-nam HAN Faculty of Mathematics Kim Il ung Univesity yongyang..r.k. Abstact In this pape we poposed an identification potocol which

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

Color Interpolation for Single CCD Color Camera

Color Interpolation for Single CCD Color Camera Colo Intepolation fo Single CCD Colo Camea Yi-Ming Wu, Chiou-Shann Fuh, and Jui-Pin Hsu Depatment of Compute Science and Infomation Engineeing, National Taian Univesit, Taipei, Taian Email: 88036@csie.ntu.edu.t;

More information

Clustering Interval-valued Data Using an Overlapped Interval Divergence

Clustering Interval-valued Data Using an Overlapped Interval Divergence Poc. of the 8th Austalasian Data Mining Confeence (AusDM'9) Clusteing Inteval-valued Data Using an Ovelapped Inteval Divegence Yongli Ren Yu-Hsn Liu Jia Rong Robet Dew School of Infomation Engineeing,

More information

Lecture # 04. Image Enhancement in Spatial Domain

Lecture # 04. Image Enhancement in Spatial Domain Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency

More information

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number. Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

Journal of Network and Computer Applications

Journal of Network and Computer Applications Jounal of Netwok and Compute Applications 34 (211) 135 142 Contents lists available at ScienceDiect Jounal of Netwok and Compute Applications jounal homepage: www.elsevie.com/locate/jnca Optimization of

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

Extract Object Boundaries in Noisy Images using Level Set. Final Report

Extract Object Boundaries in Noisy Images using Level Set. Final Report Extact Object Boundaies in Noisy Images using Level Set by: Quming Zhou Final Repot Submitted to Pofesso Bian Evans EE381K Multidimensional Digital Signal Pocessing May 10, 003 Abstact Finding object contous

More information

ART GALLERIES WITH INTERIOR WALLS. March 1998

ART GALLERIES WITH INTERIOR WALLS. March 1998 ART GALLERIES WITH INTERIOR WALLS Andé Kündgen Mach 1998 Abstact. Conside an at galley fomed by a polygon on n vetices with m pais of vetices joined by inteio diagonals, the inteio walls. Each inteio wall

More information

MANET QoS support without reservations

MANET QoS support without reservations SECURITY AND COMMUNICATION NETWORKS Secuity Comm. Netwoks (2010) Published online in Wiley InteScience (www.intescience.wiley.com)..183 SPECIAL ISSUE PAPER MANET QoS suppot without esevations Soon Y. Oh,

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

Mobility Pattern Recognition in Mobile Ad-Hoc Networks

Mobility Pattern Recognition in Mobile Ad-Hoc Networks Mobility Patten Recognition in Mobile Ad-Hoc Netwoks S. M. Mousavi Depatment of Compute Engineeing, Shaif Univesity of Technology sm_mousavi@ce.shaif.edu H. R. Rabiee Depatment of Compute Engineeing, Shaif

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

Lecture 27: Voronoi Diagrams

Lecture 27: Voronoi Diagrams We say that two points u, v Y ae in the same connected component of Y if thee is a path in R N fom u to v such that all the points along the path ae in the set Y. (Thee ae two connected components in the

More information

Effective Data Co-Reduction for Multimedia Similarity Search

Effective Data Co-Reduction for Multimedia Similarity Search Effective Data Co-Reduction fo Multimedia Similaity Seach Zi Huang Heng Tao Shen Jiajun Liu Xiaofang Zhou School of Infomation Technology and Electical Engineeing The Univesity of Queensland, QLD 472,

More information

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute

More information

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks Available online at www.sciencediect.com Ad Hoc Netwoks 7 (29) 23 247 www.elsevie.com/locate/adhoc Minimizing spatial and time esevation with Collision-Awae DCF in mobile ad hoc netwoks Lubo Song a, Chansu

More information

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE 5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai

More information

Comparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters

Comparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters Compaisons of Tansient Analytical Methods fo Detemining Hydaulic Conductivity Using Disc Pemeametes 1,,3 Cook, F.J. 1 CSRO Land and Wate, ndoooopilly, Queensland The Univesity of Queensland, St Lucia,

More information

Annales UMCS Informatica AI 2 (2004) UMCS

Annales UMCS Informatica AI 2 (2004) UMCS Pobane z czasopisma Annales AI- Infomatica http://ai.annales.umcs.pl Annales Infomatica AI 2 (2004) 33-340 Annales Infomatica Lublin-Polonia Sectio AI http://www.annales.umcs.lublin.pl/ Embedding as a

More information

A ROI Focusing Mechanism for Digital Cameras

A ROI Focusing Mechanism for Digital Cameras A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula

More information

The International Conference in Knowledge Management (CIKM'94), Gaithersburg, MD, November 1994.

The International Conference in Knowledge Management (CIKM'94), Gaithersburg, MD, November 1994. The Intenational Confeence in Knowledge Management (CIKM'94), Gaithesbug, MD, Novembe 994. Hashing by Poximity to Pocess Duplicates in Spatial Databases Walid G. Aef Matsushita Infomation Technology Laboatoy

More information

The Power-Method: A Comprehensive Estimation Technique for Multi-Dimensional Queries

The Power-Method: A Comprehensive Estimation Technique for Multi-Dimensional Queries The Powe-Method: A Compehensive Estimation Techniue fo Multi-Dimensional Queies Yufei Tao Chistos Faloutsos Dimitis Papadias Depatment of Compute Science City Univesity of Hong Kong Tat Chee Avenue, Hong

More information

A Caching Algorithm using Evolutionary Game Theory in a File-Sharing System

A Caching Algorithm using Evolutionary Game Theory in a File-Sharing System A Caching Algoithm using Evolutionay Game Theoy in a File-Shaing System Masahio Sasabe Cybemedia Cente Osaka Univesity 1-32 Machikaneyama-cho, Toyonaka-shi Osaka 56-43, Japan m-sasabe@cmc.osaka-u.ac.jp

More information

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2 Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

n If S is in convex position, then thee ae exactly k convex k-gons detemined by subsets of S. In geneal, howeve, S may detemine fa fewe convex k-gons.

n If S is in convex position, then thee ae exactly k convex k-gons detemined by subsets of S. In geneal, howeve, S may detemine fa fewe convex k-gons. Counting Convex Polygons in Plana Point Sets Joseph S. B. Mitchell a;1, Günte Rote b, Gopalakishnan Sundaam c, and Gehad Woeginge b a Applied Mathematics and Statistics, SUNY Stony Book, NY 11794-3600.

More information

Also available at ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010)

Also available at  ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) Also available at http://amc.imfm.si ISSN 1855-3966 (pinted edn.), ISSN 1855-3974 (electonic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) 109 120 Fulleene patches I Jack E. Gave Syacuse Univesity, Depatment

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver 1 RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Dive Amit Jain Daji Qiao Kang G. Shin The Univesity of Michigan Ann Abo, MI 4819, USA {amitj,dqiao,kgshin@eecs.umich.edu Abstact The cuent

More information

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation A Minutiae-based Fingepint Matching Algoithm Using Phase Coelation Autho Chen, Weiping, Gao, Yongsheng Published 2007 Confeence Title Digital Image Computing: Techniques and Applications DOI https://doi.og/10.1109/dicta.2007.4426801

More information