• Full Text
    • Scholarly Journal

    k-Nearest Neighbor Query Processing Algorithms for a Query Region in Road Networks

    . 
    ; Beijing Vol. 28, Iss. 4,  (Jul 2013): 585-596.
    DOI:10.1007/s11390-013-1359-8
    PDF CiteCite
    Copy URLPrintAll Options

    Documents with shared references (163)

    • 1.

      Location Privacy Preserving k Nearest Neighbor Query Method on Road Network in Presence of User's Preference

      Ni, Wei-Wei; Chen, Xiao; Ma, Zhong-Xi.  Jisuanji Xuebao (Chinese Journal of Computers) Vol. 38, Iss. 4,  (Apr 2015): 884-896.
      3 reference(s) in common
    • 2.

      Protecting location privacy in vehicular networks against location-based attacks

      Ying, Bidi; Makrakis, Dimitrios.  International Journal of Parallel, Emergent and Distributed Systems; Abingdon Vol. 30, Iss. 2,  (Apr 2015): 101-117.
      3 reference(s) in common
    • 3.

      A Privacy-Preserving Continuous Location Monitoring System for Location-Based Services

      Song, Doohee; Sim, Jongwon; Park, Kwangjin; Song, Moonbae.  International Journal of Distributed Sensor Networks; Abingdon (2015).
      3 reference(s) in common
    • 4.

      A k-anonymous algorithm in location privacy protection based on circular zoning

      Zhao, Zemao; Hu, Huidong; Zhang, Fan; Zhang, Pin; Zhou, Jianqin.  Beijing Jiaotong Daxue Xuebao (Journal of Beijing Jiaotong University) Vol. 37, Iss. 5,  (Oct 2013): 13-18.
      3 reference(s) in common
    • 5.

      Location K-anonymity in indoor spaces

      Kim, Joon-seok; Li, Ki-joune.  GeoInformatica; Dordrecht Vol. 20, Iss. 3,  (Jul 2016): 415-451.
      2 reference(s) in common
    • 6.

      Efficient Processing of Moving k-Range Nearest Neighbor Queries in Directed and Dynamic Spatial Networks

      Hyung-Ju, Cho; Jin, Rize.  Mobile Information Systems; Amsterdam Vol. 2016,  (2016).
      2 reference(s) in common
    • 7.

      Survey of location privacy protection over road networks

      Li, Min; Qin, Zhi-Guang.  Jisuanji Yingyong Yanjiu / Application Research of Computers Vol. 31, Iss. 9,  (Sep 2014): 2576-2580.
      2 reference(s) in common
    • 8.

      Protecting query privacy in location-based services

      Chen, Xihui; Pang, Jun.  GeoInformatica Vol. 18, Iss. 1,  (Jan 2014): 95-133.
      2 reference(s) in common
    • 9.

      Continuous queries attacking algorithms of location based service

      Yang, Qiong; Yu, Lifeng.  Jisuanji Yingyong / Journal of Computer Applications Vol. 34, Iss. 1,  (Jan 2014): 95-98, 170.
      2 reference(s) in common
    • 10.

      Location privacy protection algorithm for preventing replay attack in road networks

      Sun, Lan; Wu, Yingjie; Luo, Zhao; Wang, Yilei.  Huazhong Keji Daxue Xuebao (Ziran Kexue Ban) / Journal of Huazhong University of Science and Technology (Nature Science Edition) Vol. 41, Iss. SUPPL.2,  (Dec 2013): 285-290.
      2 reference(s) in common
    • 11.

      A Survey of Location-Based Privacy Preserving

      Yang, Gaoming; Li, Jingzhao; Zhang, Shunxiang; Zhou, Huaping.  Journal of Convergence Information Technology Vol. 8, Iss. 11,  (Jun 2013): 27.
      2 reference(s) in common
    • 12.

      Query-aware location anonymization for road networks

      Chow, Chi-yin; Mokbel, Mohamed F; Bao, Jie; Liu, Xuan.  GeoInformatica; Dordrecht Vol. 15, Iss. 3,  (Jul 2011): 571-607.
      2 reference(s) in common
    • 13.

      Privacy in location-based applications; going beyond K-anonymity, cloaking and anonymizers

      Khoshgozaran, Jaffar. University of Southern California, ProQuest Dissertations and Theses, 2010.
      2 reference(s) in common
    • 14.

      Visually exploring movement data via similarity-based analysis

      Pelekis, Nikos; Andrienko, Gennady; Andrienko, Natalia; Kopanakis, Ioannis; Marketos, Gerasimos; et al.  Journal of Intelligent Information Systems; New York Vol. 38, Iss. 2,  (Apr 2012): 343-391.
      1 reference(s) in common
    • 15.

      Location privacy through anonymous chain in dynamic P2P network

      Xu, Jian; Huang, Xiao-Xi; Guo, Ming; Jin, Zheng-Ping; Zheng, Ning.  Journal of Zhejiang University. Engineering Science Vol. 46, Iss. 4,  (Apr 2012): 712-718.
      1 reference(s) in common
    • 16.

      Efficient Index Model of Moving Object Full-time State for Road Network

      Tan Xiao-tian; Yu Jian-qiao.  Computer Engineering Vol. 38, Iss. 6,  (Mar 2012): 53-5, 59.
      1 reference(s) in common
    • 17.

      Quality optimizing real-time scheduling for incremental context services

      Yang, Zhao Hui; Li, Shan-Ping; Lin, Xin.  Journal of Zhejiang University. Engineering Science Vol. 46, Iss. 1,  (Jan 2012): 90-97, 111.
      1 reference(s) in common
    • 18.

      Efficient Evaluation of Monitoring Top-t Most Influential Places

      Li, Zhicheng; Gao, Yunjun; Lu, Yansheng.  Wuhan University Journal of Natural Sciences Vol. 17, Iss. 1,  (20120100): 25-30.
      1 reference(s) in common
    • 19.

      Two anonymous algorithms based on Quad-Tree

      Wang, Yong; Cao, Jinfeng; Dong, Yihong; Chen, Huahui; Qian, Jiangbo.  Jisuanji Gongcheng yu Yingyong (Computer Engineering and Applications) Vol. 47, Iss. 36,  (Dec 21, 2011): 99-101, 108.
      1 reference(s) in common
    • 20.

      Metadata-guided evaluation of resource-constrained queries in content caching based wireless networks

      Liu, Ruilin; Zheng, Xiuyuan; Liu, Hongbo; Wang, Hui; Chen, Yingying.  Wireless Networks; New York Vol. 17, Iss. 8,  (Nov 2011): 1833-1850.
      1 reference(s) in common