2012
DOI: 10.1002/dac.2409
|View full text |Cite
|
Sign up to set email alerts
|

Nearest surrounder searching in mobile computing environments

Abstract: The key issue in mobile computing environments (MCEs) is how to relieve communication congestion and provide accurate information through location-based services (LBSs). The nearest surrounder (NS) query, used to find all visible objects around a given location, is a type of spatial query that suggests broad application base in LBS domain. However, because existing works for NS query only take into account static query points, the application of the NS query is limited to various LBSs in MCEs requiring frequen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(10 citation statements)
references
References 25 publications
(62 reference statements)
0
10
0
Order By: Relevance
“…Anonymity techniques have been intensively studied for the purpose of preserving users' privacy such as identities (e.g., IP addresses), interests, and location information [17][18][19][20][21][22][23][24]. Amongst these techniques, onion routing [17] is a representative for online connections anonymity by which the encrypted message is repeatedly decrypted by the 'onion routers' before reaching its destinations so as to make it difficult for an eavesdropper to trace a user's online activities.…”
Section: Related Workmentioning
confidence: 99%
“…Anonymity techniques have been intensively studied for the purpose of preserving users' privacy such as identities (e.g., IP addresses), interests, and location information [17][18][19][20][21][22][23][24]. Amongst these techniques, onion routing [17] is a representative for online connections anonymity by which the encrypted message is repeatedly decrypted by the 'onion routers' before reaching its destinations so as to make it difficult for an eavesdropper to trace a user's online activities.…”
Section: Related Workmentioning
confidence: 99%
“…Recall when we do the cell partitioning, we used two variables p l and d l . Cell B is given the range (15+1, 15 C 1 C 4 3 2 1) = (16,19), meaning cell B can accommodate four smallest cells in Figure 4. For cell A in Figure 4, its value of p l is one, while cells B, C, D, and E all have their p l equal to two.…”
Section: Partitioning the Road Sensor Network Into Numbered Grid Cellsmentioning
confidence: 99%
“…Chung. J, et al, [3] proposed a server-client framework for NS query that tracks the NS results of a query trajectory. In framework, once a server processes a full NS query processing, a client caches the NS result.…”
Section: Related Workmentioning
confidence: 99%
“…Formally, for a given query Q and dataset R, NS(Q) returns a set of tuples, , where i≠j. Although the NS query provides a wide spectrum of applications, such as the augmented reality services on mobile devices, it is restricted to be implemented as the real services since the existing work [1][2][3] on NS queries considers only two dimensional spaces. Figure 1 illustrates an example of NS query in 2D spaces and 3D spaces.…”
Section: Introductionmentioning
confidence: 99%