1 |
C. Becker and F. Durr, 2005, "On Location Models for Ubiquitous Computing," Personal and Ubiquitous Computing, vol. 9, no. 1, pp. 20-31.
DOI
ScienceOn
|
2 |
B. Gedik, and L. Liu, 2005, "Location Privacy in Mobile Systems: A Personalized Anonymization Model," In Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, pp. 620-629.
|
3 |
A. Gkoulalas-Divanis, P Kalnis and V.S. Verykios, 2010, "Providing K-anonymity in Location Based Services," ACM SIGKDD Explorations, vol. 12, no. 1, pp. 3-10.
DOI
|
4 |
M. Gruteser, and D. Grunwald, 2003, "Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking," In Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31-42.
|
5 |
B. Hagedorn, M. Trapp, T. Glander, and J. Dollner, 2009, "Towards an Indoor Levelof- Detail Model for Route Visualization," In Proceedings of the 10th International Conference on Mobile Data Management: Systems, Services and Middleware, pp. 692-697.
|
6 |
H. Hu and D. Lee, 2004, "Semantic Location Modeling for Location Navigation in Mobile Environment," In Proceedings of the 5th IEEE International Conference on Mobile Data Management, pp. 52-61.
|
7 |
P. Kalnis, G. Ghinita, K. Mouratidis and D. Papadias, 2007, "Preventing Location-Based Identity Inference in Anonymous Spatial Queries," The IEEE Transactions on Knowledge and Data Engineering, vol. 19, no. 12, pp. 1719-1733.
DOI
|
8 |
K. Li, 2008, "Indoor Space: A New Notion of Space," In Proceedings of the 8th International Symposium on Web and Wireless Geographical Information Systems, pp. 1-3.
|
9 |
M.F. Mokbel, C.Y. Chow, and W.G. Aref, 2006, "The New Casper: Query Processing for Location Services without Compromising Privacy," In Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 763-774.
|
10 |
K. Richter, S. Winter and U. Ruetschi, 2009, "Constructing Hierarchical Representations of Indoor Spaces," In Proceedings of the 10th International Conference on Mobile Data Management: Systems, Services and Middleware, pp. 686-691.
|
11 |
H. Samet, 1990, The Design and Analysis of Spatial Data Structures, p. 510, Addison-Wesley Series in Computer Science.
|
12 |
E. Stoel, K. Schoder and H.J. Ohlbach, 2008, "Applying Hierarchical Graphs to Pedestrian Indoor Navigation," In Proceedings of the 16th ACM SIGSpatial International Conference on Advances in Geographic Information Systems, pp. 54.
|
13 |
강혜영, 김준석, 황정래, 이기준, 2008, "셀룰러 공간에 존재하는 이동객체 궤적의 유사도 측정," 한국 GIS학회지, 제16권, 제3호, pp. 291-301.
|
14 |
김지희, 이아름, 김용기, 엄정호, 장재우, 2008, "위치기반 서비스에서 개인 정보 보호를 위한 Kanonymity 및 L-diversity를 지원하는 Cloaking기법," 한국공간정보시스템학회 논문지, 제10권, 제4호, pp. 1-10.
|
15 |
A. Machanavajjhala, D. Kifer, J. Gehrke and M. Venkitasubramaniam, 2007, "L-diversity: Privacy Beyond k-Anonymity," ACM Transactions on Knowledge Discovery from Data, vol. 1, no. 1, pp. 3:1-3:52.
|
16 |
엄정호, 김지희, 장재우, 2009, "위치기반 서비스에서 개인 정보 보호를 위한 그리드를 이용한 Cloaking 영역 생성 알고리즘," 한국공간정보시스템학회 논문지, 제11권, 제2호, pp. 151-161.
|