Fractals for secondary key retrieval
PODS '89 Proceedings of the eighth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
A class of data structures for associative searching
PODS '84 Proceedings of the 3rd ACM SIGACT-SIGMOD symposium on Principles of database systems
Novel Approaches in Query Processing for Moving Object Trajectories
VLDB '00 Proceedings of the 26th International Conference on Very Large Data Bases
Indexing of network constrained moving objects
GIS '03 Proceedings of the 11th ACM international symposium on Advances in geographic information systems
Indexing the Trajectories of Moving Objects in Networks (Extended Abstract)
SSDBM '04 Proceedings of the 16th International Conference on Scientific and Statistical Database Management
Indexing the Trajectories of Moving Objects in Networks*
Geoinformatica
Roads, codes, and spatiotemporal queries
PODS '04 Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Trajectory Indexing Using Movement Constraints
Geoinformatica
Information Sciences: an International Journal
Query processing in spatial network databases
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
Integrated data management for mobile services in the real world
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
Spatio-temporal similarity of web user session trajectories and applications in dark web research
PAISI'11 Proceedings of the 6th Pacific Asia conference on Intelligence and security informatics
Trajectory similarity of network constrained moving objects and applications to traffic security
PAISI'10 Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics
Hi-index | 0.00 |
The advent of modern monitoring applications such as location based services, presents several new challenges when dealing with continuously evolving spatio-temporal information. Spatio-Temporal data analysis plays a central role in many security-related applications including those relevant to transportation infrastructure, border and inland security. This paper reviews a novel binary encoding scheme to store location information and proposes a trigger based security alarming scheme when an object enters into a sensitive area with proper messages to the security people.