Skip to main content

2009 | Buch

Advances in Spatial and Temporal Databases

11th International Symposium, SSTD 2009 Aalborg, Denmark, July 8-10, 2009 Proceedings

herausgegeben von: Nikos Mamoulis, Thomas Seidl, Torben Bach Pedersen, Kristian Torp, Ira Assent

Verlag: Springer Berlin Heidelberg

Buchreihe : Lecture Notes in Computer Science

insite
SUCHEN

Über dieses Buch

SSTD 2009 was the 11th in a series of biannual events that discuss new and exciting research in spatio-temporal data management and related technologies. PrevioussymposiaweresuccessfullyheldinSantaBarbara(1989),Zurich(1991), Singapore (1993), Portland (1995), Berlin (1997), Hong Kong (1999), Los An- les (2001), Santorini, Greece (2003), Angra dos Reis, Brazil (2005), and Boston (2007). Before 2001, the series was devoted solely to spatial database mana- ment, and called SSD. From 2001, the scope was extended in order to also accommodate temporal database management, in part due to the increasing importance of research that considers spatial and temporal aspects jointly. SSTD2009introducedseveralinnovativeaspectscomparedtopreviousevents. There was a demonstrations track which included ten presentations of systems related to the topics of interest. In addition to that, the event included a poster session with seven presentations of innovative research developed at an early stage. For the ?rst time in the SSTD series, the best paper of the symposium was awarded and a few high-quality papers were selected and the authors were invited to submit extended versionsof their work to a special issue of the Geo- formatica journal (Springer). Prior to the symposium, there was a two-day - vanced seminar, which hosted three half-day tutorials on state-of-the-art topics within spatio-temporal data management, held by distinguished international researchers.

Inhaltsverzeichnis

Frontmatter

Keynotes

Spatio-Tempo-Social: Learning from and about Humans with Social Media

Social media – online services that encourage content sharing through individual participation – have encouraged and enabled people to share various types of information in social and public settings. Flickr, Twitter, Facebook, YouTube, Blogger, MySpace and their likes have become platforms where millions of participants share nuggets of their life, their knowledge, their creations and their opinions in various manners: from blog posts, to status updates, to multimedia content such as photos and videos.

Mor Naaman
Recent Advances in Worst-Case Efficient Range Search Indexing
(Invited Talk)

Range search indexing is the problem of storing a set of data points on disk such that the points in a axis-parallel (hyper-) query rectangle can be found efficiently (with as few disk accesses - or I/Os - as possible). The problem is arguably one of the most fundamental problems in spatial databases. Many indexes have been proposed for the problem and its variants.The R-tree for example can be used to solve the more general version of the problem where the data is rectangles.

Lars Arge
Design and Architecture of GIS Servers for Web Based Information Systems – The ArcGIS Server System

This talk provides an overview of the design and architecture of GIS Servers for web based information systems, using ESRI’s ArcGIS Server system as a concrete example. A GIS Server allows customers to compile, manage and disseminate geographic information. Information is compiled into and stored within object relational spatial databases using a geodatabase information model that supports the key types needed by applications including features, relationships, networks, imagery, terrains, maps and layers. Information is managed using both short and long transaction models that include support for versioning, archiving and replication. The GIS Server allows administrators to selectively publish this information to clients using stateless web services based on REST and SOAP as well as via OGC interfaces. These geospatial web services support visualization, analysis, data access and replication. Key GIS services include Mapping, Query, Location, Network Analysis, Editing, Geoprocessing and Imaging. These services run on clusters, can access data from local caches, and can be scaled out by growing the cluster. These web services allow information to be exchanged using optimized representations based on JSON and XML as well as client specific optimized protocols. The GIS Server supports a role based authorization model that allows access to services to be controlled, leverages standard web based authentication mechanisms, and allows information to be securely exchanged by leveraging standard transport level security. The GIS Server supports a variety of client architectures including Rich Internet clients based on Flex, Silverlight and Javacript, occasionally connected Mobile Devices that are used for field work, as well as Desktop clients built using .Net and Java. The key to success is simple and elegant Web APIs and online SDKs that allow customers to easily exploit the value of the information managed by their servers. This talk will highlight specific areas of interest to researchers working on spatial and temporal databases as it spans the above aspects of GIS server technology.

Sudhakar Menon

Research Sessions

Spatial and Flow Networks

Versioning of Network Models in a Multiuser Environment

The standard database mechanisms for concurrency control, which include transactions and locking protocols, do not provide the support needed for updating complex geographic data in a multiuser environment. The preferred method to resolve conflicts in GIS systems is to encapsulate the modifications generated by the end users through the use of multiple versions. Multiuser (or versioned) geographic databases allow users to operate as though they have full access to the entire dataset. Instead of relying upon row locking, versioned databases allow multiple users to simultaneously edit the same row. They implement a model for conflict detection and resolution where the first to commit the change wins by default (though clients can manually intervene and select the latter change as the winner).

Network models are frequently used as a mechanism to describe the connectivity information between spatial features in many emerging GIS applications. Supporting networks within the context of a versioned database imposes additional requirements – the complex network model must retain integrity irrespective of the sequence of simultaneous edits by various clients. In this paper, we review our network model and discuss the enhancements necessary to maintaining topological network integrity in this complex environment. Our solution is based on the notion of dirty areas and dirty objects (i.e., regions or elements that contain edits that have not been reflected in the network connectivity index). The dirty areas and objects are identified and marked during editing of the network feature data. They are then subsequently cleaned as a byproduct of the incremental update of the connectivity network.

Petko Bakalov, Erik Hoel, Sudhakar Menon, Vassilis J. Tsotras
Efficient Continuous Nearest Neighbor Query in Spatial Networks Using Euclidean Restriction

In this paper, we propose an efficient method to answer continuous

k

nearest neighbor (C

k

NN) queries in spatial networks. Assuming a moving query object and a set of data objects that make frequent and arbitrary moves on a spatial network with dynamically changing edge weights, C

k

NN continuously monitors the nearest (in network distance) neighboring objects to the query. Previous C

k

NN methods are inefficient and, hence, fail to scale in large networks with numerous data objects because: 1) they heavily rely on Dijkstra-based

blind expansion

for network distance computation that incurs excessively redundant cost particularly in large networks, and 2) they

blindly map

all object location updates to the network disregarding whether the updates are relevant to the C

k

NN query result. With our method, termed ER-C

k

NN (short for

Euclidian Restriction

based C

k

NN), we utilize ER to address both of these shortcomings. Specifically, with ER we enable 1)

guided search

(rather than blind expansion) for efficient network distance calculation, and 2)

localized mapping

(rather than blind mapping) to avoid the intolerable cost of redundant object location mapping. We demonstrate the efficiency of ER-C

k

NN via extensive experimental evaluations with real world datasets consisting of a variety of large spatial networks with numerous moving objects.

Ugur Demiryurek, Farnoush Banaei-Kashani, Cyrus Shahabi
Discovering Teleconnected Flow Anomalies: A Relationship Analysis of Dynamic Neighborhoods (RAD) Approach

Given a collection of sensors monitoring a flow network, the problem of discovering teleconnected flow anomalies aims to identify strongly connected pairs of events (e.g., introduction of a contaminant and its removal from a river). The ability to mine teleconnected flow anomalies is important for applications related to environmental science, video surveillance, and transportation systems. However, this problem is computationally hard because of the large number of time instants of measurement, sensors, and locations. This paper characterizes the computational structure in terms of three critical tasks, (1) detection of flow anomaly events, (2) identification of candidate pairs of events, and (3) evaluation of candidate pairs for possible teleconnection. The first task was addressed in our recent work. In this paper, we propose a RAD (Relationship Analysis of spatio-temporal Dynamic neighborhoods) approach for steps 2 and 3 to discover teleconnected flow anomalies. Computational overhead is brought down significantly by utilizing our proposed spatio-temporal dynamic neighborhood model as an index and a pruning strategy. We prove correctness and completeness for the proposed approaches. We also experimentally show the efficacy of our proposed methods using both synthetic and real datasets.

James M. Kang, Shashi Shekhar, Michael Henjum, Paige J. Novak, William A. Arnold

Integrity and Security

Continuous Spatial Authentication

Recent advances in wireless communications and positioning devices have generated a tremendous amount of interest in the continuous monitoring of spatial queries. However, such applications can incur a heavy burden on the

data owner

(DO), due to very frequent location updates. Database outsourcing is a viable solution, whereby the DO delegates its database functionality to a

service provider

(SP) that has the infrastructure and resources to handle the high workload. In this framework,

authenticated query processing

enables the clients to verify the correctness of the query results that are returned by the SP. In addition to correctness, the dynamic nature of the monitored data requires the provision for

temporal completeness

, i.e., the clients must be able to verify that there are no missing results in between data updates. This paper constitutes the first work that deals with the authentication of continuous spatial queries, focusing on ranges. We first introduce a baseline solution (BSL) that achieves correctness and temporal completeness, but incurs false transmissions; that is, the SP has to notify clients whenever there is a data update, even if it does not affect their results. Then, we propose CSA, a mechanism that minimizes the processing and transmission overhead through an elaborate indexing scheme and a virtual caching mechanism. Finally, we derive analytical models to optimize the performance of our methods, and evaluate their effectiveness through extensive experiments.

Stavros Papadopoulos, Yin Yang, Spiridon Bakiras, Dimitris Papadias
Query Integrity Assurance of Location-Based Services Accessing Outsourced Spatial Databases

Outsourcing data to third party data providers is becoming a common practice for data owners to avoid the cost of managing and maintaining databases. Meanwhile, due to the popularity of location-based-services (LBS), the need for spatial data (e.g., gazetteers, vector data) is increasing exponentially. Consequently, we are witnessing a new trend of outsourcing spatial datasets by data collectors. Two main challenges with outsourcing datasets is to keep the data private (from the data provider) and ensure the integrity of the query result (for the clients). Unfortunately, most of the techniques proposed for privacy and integrity do not extend to spatial data in a straightforward manner. Hence, recent studies proposed various techniques to support either privacy or integrity (but not both) on spatial datasets. In this paper, for the first time, we propose a technique that can ensure both privacy and integrity for outsourced spatial data. In particular, we first use a one-way spatial transformation method based on Hilbert curves, which encrypts the spatial data before outsourcing and hence ensures its privacy. Next, by probabilistically replicating a portion of the data and encrypting it with a different encryption key, we devise a technique for the client to audit the trustworthiness of the query results. We show the applicability of our approach for both

k

-nearest-neighbor and spatial range queries, the building blocks of any LBS application. Finally, we evaluate the validity and performance of our algorithms with real-world datasets.

Wei-Shinn Ku, Ling Hu, Cyrus Shahabi, Haixun Wang
A Hybrid Technique for Private Location-Based Queries with Database Protection

Mobile devices with global positioning capabilities allow users to retrieve points of interest (POI) in their proximity. To protect user privacy, it is important not to disclose exact user coordinates to un-trusted entities that provide location-based services. Currently, there are two main approaches to protect the location privacy of users:

(i)

hiding locations inside cloaking regions (CRs) and

(ii)

encrypting location data using private information retrieval (PIR) protocols. Previous work focused on finding good trade-offs between privacy and performance of user protection techniques, but disregarded the important issue of protecting the POI dataset

D

. For instance, location cloaking requires large-sized CRs, leading to excessive disclosure of POIs (

O

(|

D

|) in the worst case). PIR, on the other hand, reduces this bound to

$O(\sqrt{|D|})$

, but at the expense of high processing and communication overhead.

We propose a hybrid, two-step approach to private location-based queries, which provides protection for both the users and the database. In the first step, user locations are generalized to coarse-grained CRs which provide strong privacy. Next, a PIR protocol is applied with respect to the obtained query CR. To protect excessive disclosure of POI locations, we devise a cryptographic protocol that privately evaluates whether a point is enclosed inside a rectangular region. We also introduce an algorithm to efficiently support PIR on dynamic POI sub-sets. Our method discloses

O

(1) POI, orders of magnitude fewer than CR- or PIR-based techniques. Experimental results show that the hybrid approach is scalable in practice, and clearly outperforms the pure-PIR approach in terms of computational and communication overhead.

Gabriel Ghinita, Panos Kalnis, Murat Kantarcioglu, Elisa Bertino
Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity

Location-based services (LBS) are receiving increasing popularity as they provide convenience to mobile users with on-demand information. The use of these services, however, poses privacy issues as the user locations and queries are exposed to untrusted LBSs.

Spatial cloaking

techniques provide privacy in the form of

k

-anonymity; i.e., they guarantee that the (location of the) querying user

u

is indistinguishable from at least

k

-1 others, where

k

is a parameter specified by

u

at query time. To achieve this, they form a group of

k

users, including

u

, and forward their minimum bounding rectangle (termed

anonymizing spatial region

, ASR) to the LBS. The rationale behind sending an ASR instead of the distinct

k

locations is that exact user positions (querying or not) should not be disclosed to the LBS. This results in large ASRs with considerable dead-space, and leads to unnecessary performance degradation. Additionally, there is no guarantee regarding the amount of location information that is actually revealed to the LBS. In this paper, we introduce the concept of

information leakage

in spatial cloaking. We provide measures of this leakage, and show how we can trade it for better performance in a tunable manner. The proposed methodology directly applies to centralized and decentralized cloaking models, and is readily deployable on existing systems.

Kar Way Tan, Yimin Lin, Kyriakos Mouratidis

Uncertain Data and New Technologies

Analyzing Trajectories Using Uncertainty and Background Information

A key issue in clustering data, regardless the algorithm used, is the definition of a distance function. In the case of trajectory data, different distance functions have been proposed, with different degrees of complexity. All these measures assume that trajectories are error-free, which is essentially not true. Uncertainty is present in trajectory data, which is usually obtained through a series of GPS of GSM observations. Trajectories are then reconstructed, typically using linear interpolation. A well-known model to deal with

uncertainty

in a trajectory sample, uses the notion of

space-time prisms

(also called

beads

), to estimate the positions where the object could have been, given a maximum speed. Thus, we can replace a (reconstructed) trajectory by a necklace (intuitively, a

a chain of prisms

), connecting consecutive trajectory sample points. When it comes to clustering, the notion of uncertainty requires appropriate distance functions. The main contribution of this paper is the definition of a distance function that accounts for uncertainty, together with the proof that this function is also a metric, and therefore it can be used in clustering. We also present an algorithm that computes the distance between the chains of prisms corresponding to two trajectory samples. Finally, we discuss some preliminary results, obtained clustering a set of trajectories of cars in the center of the city of Milan, using the distance function introduced in this paper.

Bart Kuijpers, Bart Moelans, Walied Othman, Alejandro Vaisman
Route Search over Probabilistic Geospatial Data

In a

route search

over geospatial data, a user provides terms for specifying types of geographical entities that she wishes to visit. The goal is to find a route that

(1)

starts at a given location,

(2)

ends at a given location, and

(3)

travels via geospatial entities that are relevant to the provided search terms. Earlier work studied the problem of finding a route that is

effective

in the sense that its length does not exceed a given limit, the relevancy of the objects is as high as possible, and the route visits a single object from each specified type. This paper investigates route search over

probabilistic geospatial data

. It is shown that the notion of an effective route requires a new definition and, specifically, two alternative semantics are proposed. Computing an effective route is more complicated, compared to the non-probabilistic case, and hence necessitates new algorithms. Heuristic methods for computing an effective route, under either one of the two semantics, are developed. (Note that the problem is NP-hard.) These methods are compared analytically and experimentally. In particular, experiments on both synthetic and real-world data illustrate the efficiency and effectiveness of these methods in computing a route under the two semantics.

Yaron Kanza, Eliyahu Safra, Yehoshua Sagiv
Utilizing Wireless Positioning as a Tracking Data Source

Tracking data has become a valuable resource for establishing speed profiles for road networks, i.e., travel-time maps. While methods to derive travel time maps from GPS tracking data sources, such as floating car data (FCD), are available, the critical aspect in this process is to obtain amounts of data that fully cover all geographic areas of interest. In this work, we introduce Wireless Positioning Systems (WPS) based on 802.11 networks (WiFi), as an additional technology to extend the number of available tracking data sources. Featuring increased ubiquity but lower accuracy than GPS, this technology has the potential to produce travel time maps comparable to GPS data sources. Specifically, we adapt and apply readily available algorithms for (a) WPS (centroid and fingerprinting) to derive position estimates, and (b) map matching to derive travel times. Further, we introduce map matching as a means to improve WPS accuracy. We present an extensive experimental evaluation on real data comparing our approach to GPS-based techniques. We demonstrate that the exploitation of WPS tracking data sources is feasible with existing tools and techniques.

Spiros Athanasiou, Panos Georgantas, George Gerakakis, Dieter Pfoser

Indexing and Monitoring Moving Objects

Indexing Moving Objects Using Short-Lived Throwaway Indexes

With the exponential growth of moving objects data to the Gigabyte range, it has become critical to develop effective techniques for indexing, updating, and querying these massive data sets. To meet the high update rate as well as low query response time requirements of moving object applications, this paper takes a novel approach in moving object indexing. In our approach we do

not

require a sophisticated index structure that needs to be adjusted for each incoming update. Rather we construct conceptually simple

short-lived throwaway indexes

which we only keep for a very short period of time (sub-seconds) in main memory. As a consequence, the resulting technique

MOVIES

supports at the same time high query rates

and

high update rates and trades this for query result staleness. Moreover,

MOVIES

is the first main memory method supporting time-parameterized predictive queries. To support this feature we present two algorithms: non-predictive

MOVIES

and predictive

MOVIES

. We obtain the surprising result that a predictive indexing approach — considered state-of-the-art in an external-memory scenario — does not scale well in a main memory environment. In fact our results show that

MOVIES

outperforms state-of-the-art moving object indexes like a main-memory adapted B

x

-tree by orders of magnitude w.r.t. update rates and query rates. Finally, our experimental evaluation uses a workload unmatched by any previous work. We index the complete road network of Germany consisting of 40,000,000 road segments and 38,000,000 nodes. We scale our workload up to 100,000,000 moving objects, 58,000,000 updates per second and 10,000 queries per second which is unmatched by any previous work.

Jens Dittrich, Lukas Blunschi, Marcos Antonio Vaz Salles
Indexing the Trajectories of Moving Objects in Symbolic Indoor Space

Indoor spaces accommodate large populations of individuals. With appropriate indoor positioning, e.g., Bluetooth and RFID, in place, large amounts of trajectory data result that may serve as a foundation for a wide variety of applications, e.g., space planning, way finding, and security. This scenario calls for the indexing of indoor trajectories. Based on an appropriate notion of indoor trajectory and definitions of pertinent types of queries, the paper proposes two R-tree based structures for indexing object trajectories in symbolic indoor space. The RTR-tree represents a trajectory as a set of line segments in a space spanned by positioning readers and time. The TP

2

R-tree applies a data transformation that yields a representation of trajectories as points with extension along the time dimension. The paper details the structure, node organization strategies, and query processing algorithms for each index. An empirical performance study suggests that the two indexes are effective, efficient, and robust. The study also elicits the circumstances under which our proposals perform the best.

Christian S. Jensen, Hua Lu, Bin Yang
Monitoring Orientation of Moving Objects around Focal Points

We consider a setting with numerous location-aware moving objects that communicate with a central server. Assuming a set of focal points of interest, we aim at continuously monitoring object orientations and hence detect situations where many objects get closer to or move away from any such site. Towards this goal, we propose a streaming approach that delegates part of the processing to objects, which relay positional updates upon significant deviations at their course. The central processor maintains the changing distribution of current object headings around each focal point and may issue alerts once it observes many objects moving along a direction (e.g., increased northbound traffic near the stadium). To efficiently answer such navigational queries, we introduce a novel access method that indexes object headings influencing a specific site. Furthermore, we extent this scheme to examine trajectory movements around sites over the recent past. Experimental results verify that this framework is able to cope with scalable numbers of objects at reduced communication cost, while offering instant notification of important trends along diverse directions for multiple focal points.

Kostas Patroumpas, Timos Sellis

Advanced Queries

Spatial Skyline Queries: An Efficient Geometric Algorithm

As more data-intensive applications emerge, advanced retrieval semantics, such as ranking and skylines, have attracted attention. Geographic information systems are such an application with massive spatial data. Our goal is to efficiently support skyline queries over massive spatial data. To achieve this goal, we first observe that the best known algorithm

VS

2

, despite its claim, may fail to deliver correct results. In contrast, we present a simple and efficient algorithm that computes the correct results. To validate the effectiveness and efficiency of our algorithm, we provide an extensive empirical comparison of our algorithm and

VS

2

in several aspects.

Wanbin Son, Mu-Woong Lee, Hee-Kap Ahn, Seung-won Hwang
Incremental Reverse Nearest Neighbor Ranking in Vector Spaces

In this paper, we formalize the novel concept of incremental reverse nearest neighbor ranking and suggest an original solution for this problem. We propose an efficient approach for reporting the results incrementally without the need to restart the search from scratch. Our approach can be applied to a multi-dimensional feature database which is hierarchically organized by any R-tree like index structure. Our solution does not assume any preprocessing steps which makes it applicable for dynamic environments where updates of the database frequently occur. Experiments show that our approach reports the ranking results with much less page accesses than existing approaches designed for traditional reverse nearest neighbor search applied to the ranking problem.

Tobias Emrich, Hans-Peter Kriegel, Peer Kröger, Matthias Renz, Andreas Züfle
Approximate Evaluation of Range Nearest Neighbor Queries with Quality Guarantee

The range nearest-neighbor (NN) query is an important query type in location-based services, as it can be applied to the case that an NN query has a spatial region, instead of a location point, as the query location. Examples of the applications of range NN queries include uncertain locations and privacy-preserving queries. Given a set of objects, the range NN answer is a set of objects that includes the nearest object(s) to every point in a given spatial region. The answer set size would significantly increase as the spatial region gets larger. Unfortunately, mobile users in wireless environments suffer from scarce bandwidth and low-quality communication, transmitting a large answer set from a database server to the user would pose very high response time. To this end, we propose an approximate range NN query processing algorithm to balance a performance tradeoff between query response time and the quality of answers. The distinct features of our algorithm are that (1) it allows the user to specify an approximation tolerance level

k

, so that we guarantee to provide an answer set

${\cal A}$

such that each object in

${\cal A}$

is one of the

k

nearest objects to every point in a given query region; and (2) it minimizes the number of objects returned in an answer set, in order to minimize the transmission time of sending the answer set to the user. Extensive experimental results show that our proposed algorithm is scalable and effectively reduces query response time while providing approximate query answers that satisfy the user specified approximation tolerance level.

Chi-Yin Chow, Mohamed F. Mokbel, Joe Naps, Suman Nath
Time-Aware Similarity Search: A Metric-Temporal Representation for Complex Data

Recent advances in information technology demand handling complex data types, such as images, video, audio, time series and genetic sequences. Distinctly from traditional data (such as numbers, short strings and dates), complex data do not possess the total ordering property, yielding relational comparison operators useless. Even equality comparisons are of little help, as it is very unlikely to have two complex elements exactly equal. Therefore, the similarity among elements has emerged as the most important property for comparisons in such domains, leading to the growing relevance of metric spaces to data search. Regardless of the data domain properties, the systems need to track evolution of data over time. When handling multidimensional data, temporal information is commonly treated as just one or more dimensions. However, metric data do not have the concept of dimensions, thus adding a plain “temporal dimension” does not make sense. In this paper we propose a novel metric-temporal data representation and exploit its properties to compare elements by similarity taking into account time-related evolution. We also present experimental evaluation, which confirms that our technique effectively takes into account the contributions of both the metric and temporal data components. Moreover, the experiments showed that the temporal information always improves the precision of the answer.

Renato Bueno, Daniel S. Kaster, Agma Juci Machado Traina, Caetano Traina Jr.

Models and Languages

Adaptive Management of Multigranular Spatio-Temporal Object Attributes

In applications involving spatio-temporal modelling, granularities of data may have to adapt according to the evolving semantics and significance of data. In this paper we define

ST

2

_ODMGe, a multigranular spatio-temporal model supporting

evolutions

, which encompass the dynamic adaptation of attribute granularities, and the deletion of attribute values. Evolutions are specified as

Event - Condition - Action

rules and are executed at run-time. The event, the condition, and the action may refer to a period of time and a geographical area. The evolution may also be constrained by the attribute values. The ability of dynamically evolving the object attributes results in a more flexible management of multigranular spatio-temporal data but it requires revisiting the notion of object consistency with respect to class definitions and access to multigranular object values. Both issues are formally investigated in the paper.

Elena Camossi, Elisa Bertino, Giovanna Guerrini, Michela Bertolotto
TOQL: Temporal Ontology Querying Language

We introduce TOQL, a query language for querying time information in ontologies. TOQL is a high level query language that handles ontologies almost like relational databases. Queries are issued as SQL-like statements involving time (i.e., time points or intervals) or high-level ontology concepts that vary in time. Although independent from TOQL, this work suggests a mechanism for representing time evolving concepts in ontologies based on the four-dimensional perdurantist mechanism. However, TOQL prevents users from being familiar with the representation of time in ontologies. To show proof of concept, an application has been developed that supports translation and execution of TOQL queries on temporal ontologies combined with a reasoning mechanism based on event calculus. A real world temporal ontology is also implemented on which several TOQL example queries are processed and discussed.

Evdoxios Baratis, Euripides G. M. Petrakis, Sotiris Batsakis, Nikolaos Maris, Nikolaos Papadakis
Supporting Frameworks for the Geospatial Semantic Web

A lot of information on the web is geographically referenced. Discovering and linking this information poses eminent research challenges to the geospatial semantic web, with regards to the representation and manipulation of geographic data. Towards addressing these challenges, this work explores the potential of the current semantic web languages and tools. In particular, an integrated logical framework of rules and ontologies, using current W3C standards, is assessed for modeling geospatial ontologies of place encoding both symbolic and geometric references to place locations. Spatial reasoning is incorporated in the framework to facilitate the deduction of implicit semantics and for expressing spatial integrity constraints. The logical framework is then extended with geo-computation engines that offer more effective manipulations of geometric information. Example data sets mined from web resources are used to demonstrate and evaluate both frameworks, offering insights to their potentials and limitations.

Alia I. Abdelmoty, Philip D. Smart, Baher A. El-Geresy, Christopher B. Jones

Short Papers

Efficient Construction of Safe Regions for Moving kNN Queries over Dynamic Datasets

The concept of

safe region

has been used to reduce the computation and communication cost for the continuous monitoring of

k

nearest neighbor (

k

NN) queries. A safe region is an area such that as long as a query remains in it, the set of its

k

NNs does not change. In this paper, we present an efficient technique to construct the safe region by using cheap

RangeNN

queries. We also extend our approach for dynamic datasets (the objects may appear or disappear from the dataset). Our proposed algorithm outperforms existing algorithms and scales better with the increase in

k

.

Mahady Hasan, Muhammad Aamir Cheema, Xuemin Lin, Ying Zhang
Robust Adaptable Video Copy Detection

Video copy detection should be capable of identifying video copies subject to alterations e.g. in video contrast or frame rates. We propose a video copy detection scheme that allows for adaptable detection of videos that are altered temporally (e.g. frame rate change) and/or visually (e.g. change in contrast). Our query processing combines filtering and indexing structures for efficient multistep computation of video copies under this model. We show that our model successfully identifies altered video copies and does so more reliably than existing models.

Ira Assent, Hardy Kremer
Efficient Evaluation of Static and Dynamic Optimal Route Queries

We investigate the problem of how to evaluate efficiently, with a general algorithm, static or dynamic optimal route queries on a massive graph. A graph is said to be

dynamic

if its edge weights are changed (increased or decreased) over time. Otherwise, it is

static

. A route query is

static

(

dynamic

) if the underlying graph is static (dynamic, respectively). The answer to an optimal route query is a shortest path that satisfies certain constraints imposed on paths in a graph. Under such a setting, a general and efficient algorithm called

DiskOP

HBR

is proposed to evaluate classes of static or dynamic optimal route queries. The classes of queries that can be evaluated by the algorithm are exactly those the constraints of which can be expressed as a set of edge weight changes. Experiments are conducted on this algorithm to show its desirability.

Edward P. F. Chan, Jie Zhang
Trajectory Compression under Network Constraints

The wide usage of location aware devices, such as GPS-enabled cellphones or PDAs, generates vast volumes of spatiotemporal streams modeling objects movements, raising management challenges, such as efficient storage and querying. Therefore, compression techniques are inevitable also in the field of moving object databases. Moreover, due to erroneous measurements from GPS devices, the problem of matching the location recordings with the underlying traffic network has recently gained the attention of the research community. So far, the proposed compression techniques are not designed for network constrained moving objects, while map matching algorithms do not consider compression issues. In this paper, we propose solutions tackling the combined, map matched trajectory compression problem, the efficiency of which is demonstrated through an experimental evaluation using a real trajectory dataset.

Georgios Kellaris, Nikos Pelekis, Yannis Theodoridis
Exploring Spatio-Temporal Features for Traffic Estimation on Road Networks

In this paper, given a query that indicates a query road segment and a query time, we intend to accurately estimate the traffic status (i.e., the driving speed) on the query road segment at the query time from traffic databases. Note that a traffic behavior in the same time usually reflects similar patterns (referring to the temporal feature), and nearby road segments have the similar traffic behaviors (referring to the spatial feature). By exploring the temporal and spatial features, more GPS data points are retrieved. In light of these GPS data retrieved, we exploit the weighted moving average approach to estimate traffic status on road networks. Experimental results show the effectiveness of our proposed algorithm.

Ling-Yin Wei, Wen-Chih Peng, Chun-Shuo Lin, Chen-Hen Jung
A Location Privacy Aware Friend Locator

A location-based service called friend-locator notifies a user if the user is geographically close to any of the user’s friends. Services of this kind are getting increasingly popular due to the penetration of GPS in mobile phones, but existing commercial friend-locator services require users to trade their location privacy for quality of service, limiting the attractiveness of the services. The challenge is to develop a communication-efficient solution such that (i) it detects proximity between a user and the user’s friends, (ii) any other party is not allowed to infer the location of the user, and (iii) users have flexible choices of their proximity detection distances. To address this challenge, we develop a client-server solution for proximity detection based on an encrypted, grid-based mapping of locations. Experimental results show that our solution is indeed efficient and scalable to a large number of users.

Laurynas Šikšnys, Jeppe R. Thomsen, Simonas Šaltenis, Man Lung Yiu, Ove Andersen
Semantic Trajectory Compression

In the light of rapidly growing repositories capturing the movement trajectories of people in spacetime, the need for trajectory compression becomes obvious. This paper argues for

semantic trajectory compression

(STC) as a means of substantially compressing the movement trajectories in an urban environment with acceptable information loss. STC exploits that human urban movement and its large–scale use (LBS, navigation) is embedded in some geographic context, typically defined by transportation networks. STC achieves its compression rate by replacing raw, highly redundant position information from, for example, GPS sensors with a semantic representation of the trajectory consisting of a sequence of

events

. The paper explains the underlying principles of STC and presents an example use case.

Falko Schmid, Kai-Florian Richter, Patrick Laube

Demonstrations

Pretty Easy Pervasive Positioning

With the increasing availability of positioning based on GPS, Wi-Fi, and cellular technologies and the proliferation of mobile devices with GPS, Wi-Fi and cellular connectivity, ubiquitous positioning is becoming a reality. While offerings by companies such as Google, Skyhook, and Spotigo render positioning possible in outdoor settings, including urban environments with limited GPS coverage, they remain unable to offer accurate indoor positioning.

We will demonstrate a software infrastructure that makes it easy for anybody to build support for accurate Wi-Fi based positioning in buildings. All that is needed is a building with Wi-Fi coverage, access to the building, a floor plan of the building, and a Wi-Fi enabled device. Specifically, we will explain the software infrastructure and the steps that must be completed to obtain support for positioning. And we will demonstrate the positioning obtained, including how it interoperates with outdoor GPS positioning.

René Hansen, Rico Wind, Christian S. Jensen, Bent Thomsen
Spatiotemporal Pattern Queries in Secondo

We describe an initial implementation for spatiotemporal pattern queries in

Secondo

. That is, one can specify for example temporal order constraints on the fulfillment of predicates on moving objects. It is shown how the query optimizer is extended to support spatiotemporal pattern queries by suitable indexes.

Mahmoud Attia Sakr, Ralf Hartmut Güting
Nearest Neighbor Search on Moving Object Trajectories in Secondo

In the context of databases storing histories of movement (also called trajectories), we present two query processing operators to compute the

k

nearest neighbors of a moving query point within a set of moving points. Data moving points are represented as collections of point units (i.e., a time interval together with a linear movement function). The first operator,

knearest

, processes a stream of units arriving ordered by start time and returns the set of units representing the

k

nearest neighbors over time. It can be used to process a set of moving point candidates selected by other conditions. The second operator,

knearestfilter

, operates on a set of units indexed in an R-tree and uses some novel pruning techniques. It returns a set of candidates that can be further processed by

knearest

to obtain the final answer. These nearest neighbor algorithms are presented within

Secondo

, a complete DBMS environment for handling moving object histories. For example, candidates and final results can be visualized and animated at the user interface.

Ralf Hartmut Güting, Angelika Braese, Thomas Behr, Jianqiu Xu
A Visual Analytics Toolkit for Cluster-Based Classification of Mobility Data

In this paper we propose a demo of a Visual Analytics Toolkit to cope with the complexity of analysing a large dataset of moving objects, in a step wise manner. We allow the user to sample a small subset of objects, that can be handled in main memory, and to perform the analysis on this small group by means of a density based clustering algorithm. The GUI is designed in order to exploit and facilitate the human interaction during this phase of the analysis, to select interesting clusters among the candidates. The selected groups are used to build a classifier that can be used to label other objects from the original dataset. The classifier can then be used to efficiently associate all objects in the database to clusters. The tool has been tested using a large set of GPS tracked cars.

Gennady Andrienko, Natalia Andrienko, Salvatore Rinzivillo, Mirco Nanni, Dino Pedreschi
ELKI in Time: ELKI 0.2 for the Performance Evaluation of Distance Measures for Time Series

ELKI is a unified software framework, designed as a tool suitable for evaluation of different algorithms on high dimensional real-valued feature-vectors. A special case of high dimensional real-valued feature-vectors are time series data where traditional distance measures like

L

p

-distances can be applied. However, also a broad range of specialized distance measures like, e.g., dynamic time-warping, or generalized distance measures like second order distances, e.g., shared-nearest-neighbor distances, have been proposed. The new version ELKI 0.2 now is extended to time series data and offers a selection of these distance measures. It can serve as a visualization- and evaluation-tool for the behavior of different distance measures on time series data.

Elke Achtert, Thomas Bernecker, Hans-Peter Kriegel, Erich Schubert, Arthur Zimek
Hide & Crypt: Protecting Privacy in Proximity-Based Services

A particular class of location based services, called

friend finder

, is becoming very popular. Using this kind of service, a subscriber obtains to know location information about other participants (called buddies). Current commercial applications of this service imply the acquisition by the service provider of the user location at the best possible precision. This can discourage many users to use this service, since the precise location is a private information. We present a privacy-aware friend finder system called

Hide&Crypt

that notifies a user whether her buddies are within a user-specified threshold distance. The user can specify her location privacy requirements both with respect to the service provider and to the other buddies. The system includes a server application, and clients for mobile devices and desktop computers.

Dario Freni, Sergio Mascetti, Claudio Bettini
ROOTS, The ROving Objects Trip Simulator

This paper introduces a new trip simulator, ROOTS. ROOTS creates moving objects with distinct characteristics in terms of driving style and route preference. It also creates a road network and associates each road with some characteristics. The route taken and the moving object speeds during the trip are determined based on both the characteristics of the moving object, those of the road being travelled, and other contextual data such as weather conditions and time of day.

Wegdan Abdelsalam, Siu-Cheung Chau, David Chiu, Maher Ahmed, Yasser Ebrahim
The TOQL System

TOQL, is a query language for querying time information in ontologies. An application has been developed that supports translation and execution of TOQL queries on temporal ontologies. A Graphical User Interface (GUI) has been also developed to facilitate user interaction and supports operations such as syntax highlighting, code autosuggestion, loading of the ontology into the main memory, results and error display.

Evdoxios Baratis, Nikolaos Maris, Euripides G. M. Petrakis, Sotiris Batsakis, Nikolaos Papadakis
PDA: A Flexible and Efficient Personal Decision Assistant

Despite a rich set of techniques designed to process specific types of optimization queries such as top-k, skyline, NN/kNN and dominant relationship analysis queries, a unified system for a general process of such kinds of queries has not been addressed in the literature. In this paper, we propose PDA, a interactive personal decision assistant system, for people to get the desired optimal decision easily. In addition to supporting the basic queries mentioned above, PDA can also support some sophisticated queries. Several novel technologies are employed to improve the flexibility and efficiency of the system and a visualization interface like google map is provided for people to view the query result interactively.

Jing Yang, Xiyao Kong, Cuiping Li, Hong Chen, Guoming He, Jinghua Tian
A Refined Mobile Map Format and Its Application

Byte-Map is a kind of vector format with different blocks through different levels. The basic cell of Byte-Map is a block, which is fixed in size of 255 units*255 units according to different coordinates systems and thus the coordinates of all the features in a certain block can be encoded with only two bytes. Based on Byte-Map, a LBS supporting platform LBS-p is built to illustrate mobile online map service.

Yingwei Luo, Xiaolin Wang, Xiao Pang
Backmatter
Metadaten
Titel
Advances in Spatial and Temporal Databases
herausgegeben von
Nikos Mamoulis
Thomas Seidl
Torben Bach Pedersen
Kristian Torp
Ira Assent
Copyright-Jahr
2009
Verlag
Springer Berlin Heidelberg
Electronic ISBN
978-3-642-02982-0
Print ISBN
978-3-642-02981-3
DOI
https://doi.org/10.1007/978-3-642-02982-0

Premium Partner