[1] Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking[C]//Proceedings of the International Conference on Mobile Systems, Application, and Services (MobiSys'03). Scan Francisco:[s.n.], 2003: 163-168.
[2] Tao Yufei, Papadias D, Shen Qiongmao. Continuous nearest neighbor search[C]//VLDB Conference. Hongkong:[s.n.], 2002: 287-298.
[3] Hu Haibo, Lee D L. Range nearest-neighbor query[J]. IEEE Trans Knowledge and Date Eng, 2006, 18(1): 78-91.
[4] Mokbel M F, Chow C, Aref W G. The new casper: query processing for location services without compromising privacy[C]//Proceedings of the 33rd International Conference on Very Large Data Bases (VLDB'06). Seoul:[s.n.], 2006: 736-774.
[5] Ghinita G, Kalnis P, Skiadopoulos S. PRIVE: anonymous location-based queries in distributed mobile systems[C]//Proceedings of International Conference on World Wide Web (WWW'07) Banff. Alberta:[s.n.], 2007: 371-380.
[6] Cheng Reynold, Chen Jinchuan, Mokbel M F, et al. Probabilistic verifiers: ebaluating constrained nearest-neighbor queires over uncertain data[C]//Proceedings of the IEEE 24th Conference on Data Engineering (ICDE'08). Cancún: IEEE, 2008.
[7] 朱怀杰, 王佳英, 王斌, 等. 障碍空间中保持位置隐私的最近邻查询方法[J]. 计算机研究与发展, 2014, 51(1): 115-125. Zhu Huaijie, Wang Jiaying, Wang Bin, et al. Location privacy preserving obstructed nearest neighbor queries[J]. Journal of Computer Research and Development, 2014, 51(1): 115-125.
[8] Brinkho T. A framework for generating network-based moving objects[J]. GeoInformatica, 2002, 6(2): 153-180. |