Table of Contents Author Guidelines Submit a Manuscript
Journal of Computer Networks and Communications
Volume 2012, Article ID 675605, 12 pages
http://dx.doi.org/10.1155/2012/675605
Research Article

Route Anomaly Detection Using a Linear Route Representation

1Department of Computer Science, The University of North Dakota, Grand Forks, ND 58202, USA
2Department of Electrical Engineering, The University of North Dakota, Grand Forks, ND 58202, USA
3Industrial Technology Educational Department, National Kaohsiung Normal University, Kaohsiung City 80201, Taiwan
4Department of Electrical Engineering, Idaho State University, Pocatello, ID 83209, USA

Received 18 March 2012; Accepted 2 June 2012

Academic Editor: MoonBae Song

Copyright © 2012 Wen-Chen Hu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. W.-C. Hu, “Worldwide: Computer and Device Sales,” 2012, http://www.handheldresearch.org/.
  2. F. Hillard, “Digital Influence Study,” 2012, http://www.factbrowser.com/facts/4671/.
  3. JiWire, “JiWire Mobile Audience Insights Report Q2 2011,” 2011, http://www.factbrowser.com/facts/3196/.
  4. C. C. Chang, E. Jungert, and G. Tortora, Intelligent Image Database System, World Scientific, Singapore, 1996.
  5. K. Kolodziej and J. Hjelm, Local Positioning Systems: LBS Applications and Services, CRC Taylor & Francis, 2006.
  6. A. Kupper, Location-Based Services: Fundamentals and Operation 2005, John Wiley & Sons.
  7. S. Steiniger, M. Neun, and A. Edwardes, “Foundations of Location-Based Services,” 2006, http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.94.1844.
  8. S. Wang, J. Min, and B. K. Yi, “Location based services for mobiles: technologies and standards,” in Proceedings of the IEEE International Conference on Communication (ICC '08), Beijing, China, May 2008.
  9. Y. Zheng, L. Zhang, X. Xie, and W.-Y. Ma, “Mining interesting locations and travel sequences from GPS trajectories,” in Proceedings of the 18th International World Wide Web Conference (WWW '09), Madrid, Spain, April 2009.
  10. Y. Zheng, L. Liu, L. Wang, and X. Xie, “Learning transportation mode from raw GPS data for geographic applications on the web,” in Proceedings of the 17th International Conference on World Wide Web (WWW '08), pp. 247–256, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  11. H. Yoon, Y. Zheng, X. Xie, and W. Woo, “Smart itinerary recommendation based on user-generated GPS trajectories,” Lecture Notes in Computer Science, vol. 6406, pp. 19–34, 2010. View at Publisher · View at Google Scholar · View at Scopus
  12. D. Liu and M. Chang, “Recommend touring routes to travelers according to their sequential wandering behaviours,” in Proceedings of the 10th International Symposium on Pervasive Systems, Algorithms, and Networks (ISPAN '09), pp. 350–355, Kaohsiung, Taiwan, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  13. M. Duckham, S. Winter, and M. Robinson, “Including landmarks in routing instructions,” Journal of Location Based Services, vol. 4, no. 1, pp. 28–52, 2010. View at Publisher · View at Google Scholar · View at Scopus
  14. F. Giannotti, M. Nanni, F. Pinelli, and D. Pedreschi, “Trajectory pattern mining,” in Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '07), pp. 330–339, San Jose, Calif, USA, August 2007. View at Publisher · View at Google Scholar · View at Scopus
  15. W. Liu, Y. Zheng, S. Chawla, J. Yuan, and X. Xie, “Discovering spatio-temporal cal interactions in traffic data streams,” in Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '11), San Diego, Calif, USA, August 2011.
  16. G. Myles, A. Friday, and N. Davies, “Preserving privacy in environments with location-based applications,” IEEE Pervasive Computing, vol. 2, no. 1, pp. 56–64, 2003. View at Publisher · View at Google Scholar · View at Scopus
  17. H. Tootell, “Location-based services and the price of security,” in Proceedings of the IEEE Internaional Symposium on Technology and Society (ISTAS '06), Queens, NY, USA, June 2006. View at Publisher · View at Google Scholar · View at Scopus
  18. L. X. Pang, S. Chawla, W. Liu, and Y. Zheng, “On mining anomalous patterns in road traffic streams,” in Proceedings of the 7th International Conference on Advanced Data Mining and Applications (ADMA '11), pp. 237–251, Beijing, China, December 2011.
  19. S. Y. Lee and F. J. Hsu, “2D C-string: a new spatial knowledge representation for image database systems,” Pattern Recognition, vol. 23, no. 10, pp. 1077–1087, 1990. View at Publisher · View at Google Scholar · View at Scopus
  20. P. W. Huang and Y. R. Jean, “Using 2D C+-strings as spatial knowledge representation for image database systems,” Pattern Recognition, vol. 27, no. 9, pp. 1249–1257, 1994. View at Publisher · View at Google Scholar · View at Scopus
  21. S. Y. Lee, M. K. Shan, and W. P. Yang, “Similarity retrieval of iconic image database,” Pattern Recognition, vol. 22, no. 6, pp. 675–682, 1989. View at Google Scholar · View at Scopus
  22. T. C. Wu and C. C. Chang, “Application of geometric hashing to iconic database retrieval,” Pattern Recognition Letters, vol. 15, no. 9, pp. 871–876, 1994. View at Google Scholar · View at Scopus
  23. A. V. Aho and M. J. Corasick, “Efficient string matching: an aid to bibliographic search,” Communications of the ACM, vol. 18, no. 6, pp. 333–340, 1975. View at Publisher · View at Google Scholar · View at Scopus
  24. B. Meyer, “Incremental string matching,” Information Processing Letters, vol. 21, no. 5, pp. 219–227, 1985. View at Google Scholar · View at Scopus
  25. K. Tsuda, M. Fuketa, and J. I. Aoe, “An incremental algorithm for string pattern matching machines,” International Journal of Computer Mathematics, vol. 58, no. 1-2, pp. 33–42, 1995. View at Publisher · View at Google Scholar
  26. S. Koenig, M. Likhachev, and D. Furcy, “Lifelong planning A*,” Artificial Intelligence, vol. 155, no. 1-2, pp. 93–146, 2004. View at Publisher · View at Google Scholar · View at Scopus
  27. S. Koenig, M. Likhachev, Y. Liu, and D. Furcy, “Incremental heuristic search in AI,” AI Magazine, vol. 25, no. 2, pp. 99–112, 2004. View at Google Scholar · View at Scopus
  28. Y. Chen, K. Jiang, Y. Zheng, C. Li, and N. Yu, “Trajectory simplification method for location-based social networking services,” in Proceedings of the International Workshop on Location Based Social Networks (LBSN '09), pp. 33–40, 2009.
  29. T. Pavlidis, Structural Pattern Recognition, Spring, New York, NY, USA, 1977.