Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1869790.1869849acmconferencesArticle/Chapter ViewAbstractPublication PagesgisConference Proceedingsconference-collections
poster

On continuous monitoring top-k unsafe moving objects

Published: 02 November 2010 Publication History

Abstract

With the wide usage of location tracking systems, continuously tracking relationships among moving objects over their location changes is possible and important to many real applications. This paper proposes a novel continuous location-based query, called the continuous top-k unsafe moving objects query or CTUO. This query continuously monitors the k most unsafe moving objects, where the unsafety of an object (protectee) is defined by the difference between its safety requirement and the protection provided by protection forces (protectors) around it. Compared with the traditional top-k queries where the score of an object represents its own characteristics, CTUO describes the relationships between protectees and protectors, which introduces computational challenges since naively all objects should be inspected to answer such a query. To avoid this, two efficient algorithms, GridPrune and GridPrune-Pro, are proposed based on the basic pruning technology from the Threshold Algorithm. Experiments show that the proposed algorithms outperform the naive solution with nearly two orders of magnitude on I/O savings.

References

[1]
T. Brinkhoff. A framework for generating network-based moving objects. Geoinformatica, 6(2):153--180, 2002.
[2]
R. Fagin. Combining fuzzy information from multiple systems (extended abstract). In PODS '96: Proceedings of the fifteenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems, pages 216--226, New York, NY, USA, 1996. ACM.
[3]
R. Fagin, A. Lotem, and M. Naor. Optimal aggregation algorithms for middleware. Journal of Computer and System Sciences, 66(4):614--656, 2003.
[4]
D. Zhang. Neustore: A simple java package for the construction of disk-based, paginated, and buffered indices. 2005.
[5]
D. Zhang, Y. Du, and L. Hu. On monitoring the top-k unsafe places. In ICDE '08: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering, pages 337--345, Washington, DC, USA, 2008. IEEE Computer Society.

Cited By

View all

Index Terms

  1. On continuous monitoring top-k unsafe moving objects

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    GIS '10: Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems
    November 2010
    566 pages
    ISBN:9781450304283
    DOI:10.1145/1869790
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 November 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. algorithm
    2. continuous
    3. query
    4. relational
    5. top-k

    Qualifiers

    • Poster

    Funding Sources

    Conference

    GIS '10
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 257 of 1,238 submissions, 21%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 18 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media