A Probabilistic Method for Mining Sequential Rules from Sequences of LBS Cloaking Regions
نویسندگان
چکیده
Digital Library; Australian Business Deans Council (ABDC); Bacon’s Media Directory; Burrelle’s Media Directory; Cabell’s Directories; Compendex (Elsevier Engineering Index); CSA Illumina; Current
منابع مشابه
Mining Spatio-Temporal Patterns in Trajectory Data
Spatio-temporal patterns extracted from historical trajectories of moving objects reveal important knowledge about movement behavior for high quality LBS services. Existing approaches transform trajectories into sequences of location symbols and derive frequent subsequences by applying conventional sequential pattern mining algorithms. However, spatio-temporal correlations may be lost due to th...
متن کاملMining Trajectory Patterns by Incorporating Temporal Properties
Spatio-temporal patterns extracted from historical trajectories of moving objects unveil important knowledge about movement behavior for high quality LBS services. Existing approaches transform trajectories into sequences of regional symbols and discover frequent subsequences by applying conventional sequential pattern mining algorithms. However, spatio-temporal correlations in the original dat...
متن کاملFrom Sequence Mining to Multidimensional Sequence Mining
Sequential pattern mining has been broadly studied and many algorithms have been proposed. The first part of this chapter proposes a new algorithm for mining frequent sequences. This algorithm processes only one scan of the database thanks to an indexed structure associated to a bit map representation. Thus, it allows a fast data access and a compact storage in main memory. Experiments have bee...
متن کاملMining Sequential Rules Based on Prefix-Tree
We consider the problem of discovering sequential rules between frequent sequences in sequence databases. A sequential rule expresses a relationship of two event series happening one after another. As well as sequential pattern mining, sequential rule mining has broad applications such as the analyses of customer purchases, web log, DNA sequences, and so on. In this paper, for mining sequential...
متن کاملOn the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS
Privacy preservation in location based services (LBS) has received extensive attention in recent years. One of the less explored problems in this domain is associated with services that rely on continuous updates from the mobile object. Cloaking algorithms designed to hide user locations in single requests perform poorly in this scenario. The historical k-anonymity property is therefore enforce...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJDWM
دوره 13 شماره
صفحات -
تاریخ انتشار 2017