1 Jong Hee Kang, William Welbourne, Benjamin Stewart, Gaetano Borriello, October 2004, Proceedings of the 2nd ACM international workshop on Wireless mobile.

Slides:



Advertisements
Similar presentations
Pengfei Zhou, Yuanqing Zheng, Mo Li -twohsien
Advertisements

More Accurate Bus Prediction Allows Passengers to find alternate forms of transportation Do this with energy efficiency in mind Dont use any high level.
By Venkata Sai Pulluri ( ) Narendra Muppavarapu ( )
Enhancing Policy Decision Making with Large-Scale Digital Traces Vanessa Frias-Martinez University of Maryland NFAIS, February 2014.
FM-BASED INDOOR LOCALIZATION TsungYun 1.
1 Error-Free Garbage Collection Traces: How to Cheat and Not Get Caught ACM SIGMETRICS, 2002.
SLAW: A Mobility Model for Human Walks Lee et al..
Error Estimation for Indoor Location Fingerprinting.
Location and Handoff Management Lecture 10. Location and Handoff Management The current point of attachment or location of a subscriber (mobile unit)
Sociological Orbit based Mobility Profiling Lab for Advanced Network Design, Evaluation and Research Exploiting Sociological Orbits in Mobile Users’ Mobility.
May 14, Organization Design and Dynamic Resources Huzaifa Zafar Computer Science Department University of Massachusetts, Amherst.
Dieter Pfoser, LBS Workshop1 Issues in the Management of Moving Point Objects Dieter Pfoser Nykredit Center for Database Research Aalborg University, Denmark.
1 A Dynamic Clustering and Scheduling Approach to Energy Saving in Data Collection from Wireless Sensor Networks Chong Liu, Kui Wu and Jian Pei Computer.
Learning the meaning of places IfGi Location based Services SS 06 Milad Sabersamandari.
16.5 Introduction to Cost- based plan selection Amith KC Student Id: 109.
TrafficView: A Driver Assistant Device for Traffic Monitoring based on Car-to-Car Communication Sasan Dashtinezhad, Tamer Nadeem Department of CS, University.
BluEyes Bluetooth Localization and Tracking Ei Darli Aung Jonathan Yang Dae-Ki Cho Mario Gerla Ei Darli Aung Jonathan Yang Dae-Ki Cho Mario Gerla.
ALBERT PARK EEL 6788: ADVANCED TOPICS IN COMPUTER NETWORKS Energy-Accuracy Trade-off for Continuous Mobile Device Location, In Proc. of the 8th International.
Ubiquitous Advertising: the Killer Application for the 21st Century Author: John Krumm Presenter: Anh P. Nguyen
Wang, Z., et al. Presented by: Kayla Henneman October 27, 2014 WHO IS HERE: LOCATION AWARE FACE RECOGNITION.
Using GPS to learn significant locations and predict movement across multiple users Daniel Ashbrook, Thad Starner College Of Computing, Georgia Institute.
Mining and Summarizing Customer Reviews
A User Experience-based Cloud Service Redeployment Mechanism KANG Yu.
Identifying Significant Locations Petteri Nurmi 1, Johan Koolwaaij 2 1) Helsinki Institute for Information Technology HIIT 2) Telematica Instituut (TELIN)
Extracting Places and Activities from GPS Traces Using Hierarchical Conditional Random Fields Yong-Joong Kim Dept. of Computer Science Yonsei.
Introduction The large amount of traffic nowadays in Internet comes from social video streams. Internet Service Providers can significantly enhance local.
Wrocław University of Technology, Faculty of Fundamental Problems of Technology. 1.
Texas Learning and Computation Center High Performance Systems Lab Automatic Clustering of Grid Nodes Nov 14, 2005 Qiang Xu, Jaspal Subhlok University.
An Integrated Approach to Extracting Ontological Structures from Folksonomies Huairen Lin, Joseph Davis, Ying Zhou ESWC 2009 Hyewon Lim October 9 th, 2009.
Mining Interesting Locations and Travel Sequences from GPS Trajectories IDB & IDS Lab. Seminar Summer 2009 강 민 석강 민 석 July 23 rd,
Sybot: An Adaptive and Mobile Spectrum Survey System for WiFi Networks Kyu-Han Kim Deutsche Telekom R&D Lab USA Alexander W. Min and Kang G. Shin Real-Time.
Converting Macromolecular Regulatory Models from Deterministic to Stochastic Formulation Pengyuan Wang, Ranjit Randhawa, Clifford A. Shaffer, Yang Cao,
黃福銘 (Angus F.M. Huang) ANTS Lab, IIS, Academia Sinica TrajPattern: Mining Sequential Patterns from Imprecise Trajectories.
Efficient mining and prediction of user behavior patterns in mobile web systems Vincent S. Tseng, Kawuu W. Lin Information and Software Technology 48 (2006)
Automatically Generating Models for Botnet Detection Presenter: 葉倚任 Authors: Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel,
Developing Trust Networks based on User Tagging Information for Recommendation Making Touhid Bhuiyan et al. WISE May 2012 SNU IDB Lab. Hyunwoo Kim.
Athanasios Kinalis ∗, Sotiris Nikoletseas ∗, Dimitra Patroumpa ∗, Jose Rolim† ∗ University of Patras and Computer Technology Institute, Patras, Greece.
F INDING M I M O : T RACING A M ISSING M OBILE P HONE USING D AILY O BSERVATIONS Hyojeong Shin, Yohan Chon, Kwanghyo Park and Hojung Cha MobiSys
NextPlace: A Spatio-Temporal Prediction Framework for Pervasive Systems Salvatore Scellato1, Micro Musolesi, Cecilia Mascolo1, Vito Latora, and Andrew.
Image Recognition System in Fields National Agriculture and Food Research Organization and University of Tsukuba Kei Tanaka.
Final Year Project Lego Robot Guided by Wi-Fi (QYA2) Presented by: Li Chun Kit (Ash) So Hung Wai (Rex) 1.
Final Year Project Lego Robot Guided by Wi-Fi (QYA2)
How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots N. Vratonjic, K. Huguenin, V. Bindschaedler, and J.-P. Hubaux PETS.
Distributed Algorithms for Multi-Robot Observation of Multiple Moving Targets Lynne E. Parker Autonomous Robots, 2002 Yousuf Ahmad Distributed Information.
Project Lachesis: Parsing and Modeling Location Histories Daniel Keeney CS 4440.
Analysing Clickstream Data: From Anomaly Detection to Visitor Profiling Peter I. Hofgesang Wojtek Kowalczyk ECML/PKDD Discovery.
MROrder: Flexible Job Ordering Optimization for Online MapReduce Workloads School of Computer Engineering Nanyang Technological University 30 th Aug 2013.
Performance Debugging for Distributed Systems of Black Boxes Marcos K. Aguilera Jeffrey C. Mogul Janet L. Wiener HP Labs Patrick Reynolds, Duke Athicha.
A User Experience-based Cloud Service Redeployment Mechanism KANG Yu Yu Kang, Yangfan Zhou, Zibin Zheng, and Michael R. Lyu {ykang,yfzhou,
Intelligent DataBase System Lab, NCKU, Taiwan Josh Jia-Ching Ying 1, Wang-Chien Lee 2, Tz-Chiao Weng 1 and Vincent S. Tseng 1 1 Department of Computer.
ANALYSIS TOOL TO PROCESS PASSIVELY- COLLECTED GPS DATA FOR COMMERCIAL VEHICLE DEMAND MODELLING APPLICATIONS Bryce Sharman & Matthew Roorda University of.
Automated Conceptual Abstraction of Large Diagrams By Daniel Levy and Christina Christodoulakis December 2012 (2 days before the end of the world)
© 2008 Frans Ekman Mobility Models for Mobile Ad Hoc Network Simulations Frans Ekman Supervisor: Jörg Ott Instructor: Jouni Karvo.
Kun-chan Lan and Chien-Ming Chou National Cheng Kung University
Chapter 14 : Modeling Mobility Andreas Berl. 2 Motivation  Wireless network simulations often involve movements of entities  Examples  Users are roaming.
Scientific Method. Scientific Method continued Scientific Method= allows scientists to draw logical and reliable conclusions about phenomena. Observations=
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Optimizing the Location Obfuscation in Location-Based Mobile Systems Iris Safaka Professor: Jean-Pierre Hubaux Tutor: Berker Agir Semester Project Security.
Extracting Places from Traces of Locations Paper Authors Jong Hee Kang Benjamin Stewart William Welbourne Gaetano Borriello PowerPoint Author Michael Cook.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Instance Discovery and Schema Matching With Applications to Biological Deep Web Data Integration Tantan Liu, Fan Wang, Gagan Agrawal {liut, wangfa,
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
Jacob R. Lorch Microsoft Research
SLAW: A Mobility Model for Human Walks
Place Identification in Location Based Urban VANETs
Extracting Semantic Location from Outdoor Positioning Systems
Efficient Evaluation of k-NN Queries Using Spatial Mashups
Extracting Places from Traces of Locations
University of Washington, Autumn 2018
Botnet Detection by Monitoring Group Activities in DNS Traffic
Presentation transcript:

1 Jong Hee Kang, William Welbourne, Benjamin Stewart, Gaetano Borriello, October 2004, Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots Database Lab. M.S.1 Kim Ji-Young

2 Introduction Related work Extracting places Experimental evaluation Conclusions and future work Outline

3  Locations  Values measured by the underlying location sensing technologies  Expressed in coordinates or landmarks  e.g., coordinates : ( , )  landmarks : nearby cell tower 34  Places  Locales with semantic meanings to individual users  e.g., home, office, coffee shop Location vs. Place

4  Places are more useful to applications than locations  Locations need to be translated into places Translating Locations into Place(1/2) Location Sensing Technology ( , ) My Office Location Place Application Place Translator

5  The ‘Place Translator’ needs mapping information between locations and places  Goal is to generate the mapping information automatically from the user’s behavior (trace of locations) Translating Locations into Place(2/2)

6  Collected using Place Lab, a coordinate-based location system using a database of locations of WiFi hotspots  e.g. User initially stays at place A, then moves to place B and stays there  Important places are those where the user spends a significant amount of time and/or visits frequently Trace of Locations(1/2) AB

7 ImportantPlaces Trace of Locations(2/2)

8 Applying Clustering Algorithms

9  Algorithms require the number of clusters as a parameter  Clusters include unimportant locations (intermediate and transitory locations between truly significant places)  Algorithms require a significant amount of computation Problems Existing Clustering Algorithms

10  Clustering locations along the time axis  A new location is compared with previous locations  If the new location is moving away, starts a new cluster  Then, ignore the clusters with short time duration Time-based Clustering(1/2) Important Places

11 Time-based Clustering(1/2) Time-based Clustering(2/2) Figure2. Existing ClusteringFigure4. Time-based Clustering

12 Two Parameters  Distance threshold (d )  Determines the size of clusters  Time threshold (t )  Determines the number of significant places t d

13 Determining d and t (1/2)

14 Determining d and t (2/2)

15 Experimental Evaluation-Campus Trace

16 Experimental Evaluation-City Scale Trace

17  Our approach can automatically find significant places from the trace of locations  Future work  Connecting to the destination prediction system  To predict a user’s destination from their current location and past observations of their movements (Record the arrival and leaving time to and from the extracted places) Conclusion and Future Work