Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Introduction to Linear Optimization
Introduction to Linear Optimization
Multi-Objective Optimization Using Evolutionary Algorithms
Multi-Objective Optimization Using Evolutionary Algorithms
R-trees: a dynamic index structure for spatial searching
SIGMOD '84 Proceedings of the 1984 ACM SIGMOD international conference on Management of data
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Proceedings of the 17th International Conference on Data Engineering
Algorithms for Querying by Spatial Structure
VLDB '98 Proceedings of the 24rd International Conference on Very Large Data Bases
Progressive skyline computation in database systems
ACM Transactions on Database Systems (TODS) - Special Issue: SIGMOD/PODS 2003
Maximal vector computation in large data sets
VLDB '05 Proceedings of the 31st international conference on Very large data bases
An identity-based security framework For VANETs
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Swing & swap: user-centric approaches towards maximizing location privacy
Proceedings of the 5th ACM workshop on Privacy in electronic society
Securing vehicular ad hoc networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Preventing Profile Generation in Vehicular Networks
WIMOB '08 Proceedings of the 2008 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication
REP: Location Privacy for VANETs Using Random Encryption Periods
Mobile Networks and Applications
On the effectiveness of changing pseudonyms to provide location privacy in VANETS
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Constructing and exploring composite items
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
Top-k combinatorial skyline queries
DASFAA'10 Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part II
Towards modeling wireless location privacy
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Silent cascade: enhancing location privacy without communication QoS degradation
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
SECURING VEHICULAR COMMUNICATIONS
IEEE Wireless Communications
Security in vehicular ad hoc networks
IEEE Communications Magazine
Secure vehicular communication systems: design and architecture
IEEE Communications Magazine
AMOEBA: Robust Location Privacy Scheme for VANET
IEEE Journal on Selected Areas in Communications
Transactions on Large-Scale Data- and Knowledge-Centered Systems VI
Hi-index | 0.00 |
Multi-objective optimization problem finds out optimal objects w.r.t. several objectives rather than a single objective. We propose a new problem called a multi-objective optimal combination problem (MOC problem) which finds out object combinations w.r.t. multiple objectives. A combination dominates another combination if it is not worse than anther one in all attributes and better than another one in one attribute at least. The combinations, which cannot be dominated by any other combinations, are optimal. We propose an efficient algorithm to find out optimal combinations by reducing the search space with a lower bound reduction method and an upper bound reduction method based on the R-tree index. We implemented the proposed algorithm and conducted experiments on synthetic data sets.