Infrastructure Engineering - Research Publications

Permanent URI for this collection

Search Results

Now showing 1 - 8 of 8
  • Item
    Thumbnail Image
    Qualitative reasoning about consistency in geographic information
    Duckham, M ; Lingham, J ; Mason, K ; Worboys, M (Elsevier BV, 2006-03)
  • Item
    Thumbnail Image
    Monitoring qualitative spatiotemporal change for geosensor networks
    Worboys, Mike ; DUCKHAM, MATT (Taylor & Francis, 2006)
    Recent technological advances in geosensor networks demand new models of distributed computation with dynamic spatial information. This paper presents a computational model of spatial change in dynamic regions (such as may be derived from discretizations of continuous fields) founded on embeddings of graphs in orientable surfaces. Continuous change, connectedness, and regularity of dynamic regions are defined and local transition rules are used to constrain region evolution and enable more efficient inference of a region’s state. The model provides a framework for the detection of global high-level events based on local low-level “snapshot” spatiotemporal data. The approach has particular relevance to environmental monitoring with geosensor networks, where technological constraints make the detection of global behavior from local conditions highly advantageous.
  • Item
    Thumbnail Image
    Location privacy and location-aware computing
    Duckham, M ; Kulik, L ; Drummond, J ; Billen, R ; Jo ao, E ; Forrest, D (CRC Press, 2006)
  • Item
    Thumbnail Image
    Automated geographic information fusion and ontology alignment
    DUCKHAM, MATT ; Worboys, Mike (Springer, Berlin, 2007)
  • Item
    Thumbnail Image
    What is the region occupied by a set of points?
    Galton, Antony ; DUCKHAM, MATT (Springer, Berlin, 2006)
    There are many situations in GIScience where it would beuseful to be able to assign a region to characterize the space occupied bya set of points. Such a region should represent the location or configurationof the points as an aggregate, abstracting away from the individualpoints themselves. In this paper, we call such a region a ‘footprint’ forthe points. We investigate and compare a number of methods for producingsuch footprints, with respect to nine general criteria. The discussionidentifies a number of potential choices and avenues for further research.Finally, we contrast the related research already conducted in this area,highlighting differences between these existing constructs and our ‘footprints’.
  • Item
    Thumbnail Image
    A spatiotemporal model of obfuscation strategies and counter strategies for location privacy
    DUCKHAM, MATT ; KULIK, LARS ; Birtley, Athol ( 2006)
    Safeguarding location privacy is becoming a critical issue in location based services and location-aware computing generally. Two drawbacks of many previous models of location privacy are: 1) the models only consider a person’slocation privacy protection, but not the invasion of location privacy by external agents; and 2) the models are static and do not consider the spatiotemporal aspectsof movement. We argue that, to be complete, any model of location privacy needs to enable the analysis and identification of techniques both to protect and toinvade an individual’s location privacy over time. One way to protect an individual’s location privacy is to minimize the information revealed about a person’s location, termed obfuscation. This paper presents an explicitly spatiotemporalmodel of location privacy that models a third party’s limited knowledge of a mobileindividual’s location. We identify two core strategies that a third party canuse to refine its knowledge, so potentially invading that mobile individual’s locationprivacy. A global refinement strategy uses the entire history of knowledgeabout an agent’s location in a single step. A local refinement strategy iterativelyconstructs refined knowledge over time.We present a formal model of global andlocal refinement operators, and show how this formal model can be translatedinto a computational model in a simulation environment.
  • Item
    Thumbnail Image
    A spatiotemporal model of strategies and counter strategies for location privacy protection
    Duckham, M ; Kulik, L ; Birtley, A ; Raubal, M ; Miller, HJ ; Frank, AU ; Goodchild, MF (SPRINGER-VERLAG BERLIN, 2006)
  • Item
    Thumbnail Image
    Efficient generation of simple polygons for characterizing the shape of a set of points in the plane
    Duckham, M ; Kulik, L ; Worboys, M ; Galton, A (ELSEVIER SCI LTD, 2008-10)