Cloaking locations for anonymous location based services: a hybrid approach View Full Text


Ontology type: schema:ScholarlyArticle      Open Access: True


Article Info

DATE

2009-06

AUTHORS

Chengyang Zhang, Yan Huang

ABSTRACT

An important privacy issue in Location Based Services is to hide a user’s identity while still provide quality location based services. Previous work has addressed the problem of locational -anonymity either based on centralized or decentralized schemes. However, a centralized scheme relies on an anonymizing server (AS) for location cloaking, which may become the performance bottleneck when there are large number of clients. More importantly, holding information in a centralized place is more vulnerable to malicious attacks. A decentralized scheme depends on peer communication to cloak locations and is more scalable. However, it may pose too much computation and communication overhead to the clients. The service fulfillment rate may also be unsatisfied especially when there are not enough peers nearby. This paper proposes a new hybrid framework called HiSC that balances the load between the AS and mobile clients. HiSC partitions the space into base cells and a mobile client claims a surrounding area consisting of base cells. The number of mobile clients in the surrounding cells is kept and updated at both client and AS sides. A mobile client can either request cloaking service from the centralized AS or use a peer-to-peer approach for spatial cloaking based on personalized privacy, response time, and service quality requirements. HiSC can elegantly distribute the work load between the AS and the mobile clients by tuning one system parameter base cell size and two client parameters - surrounding cell size and tolerance count. By integrating salient features of two schemes, HiSC successfully preserves query anonymity and provides more scalable and consistent service. Both the AS and the clients can enjoy much less work load. Additionally, we propose a simple yet effective random range shifting algorithm to prevent possible privacy leakage that would exist in the original P2P approach. Our experiments show that HiSC can elegantly balance the work load based on privacy requirements and client distribution. HiSC provides close to optimal service quality. Meanwhile, it reduces the response time by more than an order of magnitude from both the P2P scheme and the centralized scheme when anonymity level(value of ) or number of clients is large. It also reduces the update message cost of the AS by nearly 6 times and the peer searching message cost of the clients by more than an order of magnitude. More... »

PAGES

159-182

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/s10707-008-0047-2

DOI

http://dx.doi.org/10.1007/s10707-008-0047-2

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1014524181


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "University of North Texas", 
          "id": "https://www.grid.ac/institutes/grid.266869.5", 
          "name": [
            "Department of Computer Science and Engineering, University of North Texas Research Park, 3940 N. Elm, Room F236, 76207, Denton, TX, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Zhang", 
        "givenName": "Chengyang", 
        "id": "sg:person.016357711751.53", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016357711751.53"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of North Texas", 
          "id": "https://www.grid.ac/institutes/grid.266869.5", 
          "name": [
            "Department of Computer Science and Engineering, University of North Texas Research Park, 3940 N. Elm, Room F236, 76207, Denton, TX, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Huang", 
        "givenName": "Yan", 
        "id": "sg:person.01133501720.03", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01133501720.03"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1145/570705.570711", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1001684707"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/501158.501164", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1015485328"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-45427-6_23", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1022934505", 
          "https://doi.org/10.1007/3-540-45427-6_23"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-45427-6_23", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1022934505", 
          "https://doi.org/10.1007/3-540-45427-6_23"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1023/a:1015231126594", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1024650437", 
          "https://doi.org/10.1023/a:1015231126594"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/1066157.1066164", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1028314326"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/11428572_10", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1033289363", 
          "https://doi.org/10.1007/11428572_10"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/11428572_10", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1033289363", 
          "https://doi.org/10.1007/11428572_10"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/1066116.1189037", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1039158680"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-73540-3_13", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1039944940", 
          "https://doi.org/10.1007/978-3-540-73540-3_13"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-73540-3_13", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1039944940", 
          "https://doi.org/10.1007/978-3-540-73540-3_13"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/1183471.1183500", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1042651000"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/11957454_23", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1048560954", 
          "https://doi.org/10.1007/11957454_23"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/11957454_23", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1048560954", 
          "https://doi.org/10.1007/11957454_23"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/1242572.1242623", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1050164945"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/941326.941331", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1051297556"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/1128817.1128850", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1053234900"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1142/s0218488502001648", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1062976751"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1142/s021848850200165x", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1062976752"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icdcs.2005.48", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093255801"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/percomw.2004.1276918", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093379294"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icde.2005.42", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094339131"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icde.2006.101", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095564469"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/perser.2005.1506394", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095586213"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/securecomm.2005.33", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095642596"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2009-06", 
    "datePublishedReg": "2009-06-01", 
    "description": "An important privacy issue in Location Based Services is to hide a user\u2019s identity while still provide quality location based services. Previous work has addressed the problem of locational -anonymity either based on centralized or decentralized schemes. However, a centralized scheme relies on an anonymizing server (AS) for location cloaking, which may become the performance bottleneck when there are large number of clients. More importantly, holding information in a centralized place is more vulnerable to malicious attacks. A decentralized scheme depends on peer communication to cloak locations and is more scalable. However, it may pose too much computation and communication overhead to the clients. The service fulfillment rate may also be unsatisfied especially when there are not enough peers nearby. This paper proposes a new hybrid framework called HiSC that balances the load between the AS and mobile clients. HiSC partitions the space into base cells and a mobile client claims a surrounding area consisting of base cells. The number of mobile clients in the surrounding cells is kept and updated at both client and AS sides. A mobile client can either request cloaking service from the centralized AS or use a peer-to-peer approach for spatial cloaking based on personalized privacy, response time, and service quality requirements. HiSC can elegantly distribute the work load between the AS and the mobile clients by tuning one system parameter base cell size and two client parameters - surrounding cell size and tolerance count. By integrating salient features of two schemes, HiSC successfully preserves query anonymity and provides more scalable and consistent service. Both the AS and the clients can enjoy much less work load. Additionally, we propose a simple yet effective random range shifting algorithm to prevent possible privacy leakage that would exist in the original P2P approach. Our experiments show that HiSC can elegantly balance the work load based on privacy requirements and client distribution. HiSC provides close to optimal service quality. Meanwhile, it reduces the response time by more than an order of magnitude from both the P2P scheme and the centralized scheme when anonymity level(value of ) or number of clients is large. It also reduces the update message cost of the AS by nearly 6 times and the peer searching message cost of the clients by more than an order of magnitude.", 
    "genre": "research_article", 
    "id": "sg:pub.10.1007/s10707-008-0047-2", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": true, 
    "isPartOf": [
      {
        "id": "sg:journal.1043850", 
        "issn": [
          "1384-6175", 
          "1573-7624"
        ], 
        "name": "GeoInformatica", 
        "type": "Periodical"
      }, 
      {
        "issueNumber": "2", 
        "type": "PublicationIssue"
      }, 
      {
        "type": "PublicationVolume", 
        "volumeNumber": "13"
      }
    ], 
    "name": "Cloaking locations for anonymous location based services: a hybrid approach", 
    "pagination": "159-182", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/s10707-008-0047-2"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "45313964506c9ef302f17d90b160749c9c975330c7ce5a18812292ca36141659"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1014524181"
        ]
      }
    ], 
    "sameAs": [
      "https://doi.org/10.1007/s10707-008-0047-2", 
      "https://app.dimensions.ai/details/publication/pub.1014524181"
    ], 
    "sdDataset": "articles", 
    "sdDatePublished": "2019-04-15T09:13", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000376_0000000376/records_56164_00000000.jsonl", 
    "type": "ScholarlyArticle", 
    "url": "http://link.springer.com/10.1007%2Fs10707-008-0047-2"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s10707-008-0047-2'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s10707-008-0047-2'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s10707-008-0047-2'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s10707-008-0047-2'


 

This table displays all metadata directly associated to this object as RDF triples.

136 TRIPLES      21 PREDICATES      48 URIs      19 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/s10707-008-0047-2 schema:about anzsrc-for:08
2 anzsrc-for:0806
3 schema:author N3ab4f2247dba4561bea81a3f47e018c3
4 schema:citation sg:pub.10.1007/11428572_10
5 sg:pub.10.1007/11957454_23
6 sg:pub.10.1007/3-540-45427-6_23
7 sg:pub.10.1007/978-3-540-73540-3_13
8 sg:pub.10.1023/a:1015231126594
9 https://doi.org/10.1109/icdcs.2005.48
10 https://doi.org/10.1109/icde.2005.42
11 https://doi.org/10.1109/icde.2006.101
12 https://doi.org/10.1109/percomw.2004.1276918
13 https://doi.org/10.1109/perser.2005.1506394
14 https://doi.org/10.1109/securecomm.2005.33
15 https://doi.org/10.1142/s0218488502001648
16 https://doi.org/10.1142/s021848850200165x
17 https://doi.org/10.1145/1066116.1189037
18 https://doi.org/10.1145/1066157.1066164
19 https://doi.org/10.1145/1128817.1128850
20 https://doi.org/10.1145/1183471.1183500
21 https://doi.org/10.1145/1242572.1242623
22 https://doi.org/10.1145/501158.501164
23 https://doi.org/10.1145/570705.570711
24 https://doi.org/10.1145/941326.941331
25 schema:datePublished 2009-06
26 schema:datePublishedReg 2009-06-01
27 schema:description An important privacy issue in Location Based Services is to hide a user’s identity while still provide quality location based services. Previous work has addressed the problem of locational -anonymity either based on centralized or decentralized schemes. However, a centralized scheme relies on an anonymizing server (AS) for location cloaking, which may become the performance bottleneck when there are large number of clients. More importantly, holding information in a centralized place is more vulnerable to malicious attacks. A decentralized scheme depends on peer communication to cloak locations and is more scalable. However, it may pose too much computation and communication overhead to the clients. The service fulfillment rate may also be unsatisfied especially when there are not enough peers nearby. This paper proposes a new hybrid framework called HiSC that balances the load between the AS and mobile clients. HiSC partitions the space into base cells and a mobile client claims a surrounding area consisting of base cells. The number of mobile clients in the surrounding cells is kept and updated at both client and AS sides. A mobile client can either request cloaking service from the centralized AS or use a peer-to-peer approach for spatial cloaking based on personalized privacy, response time, and service quality requirements. HiSC can elegantly distribute the work load between the AS and the mobile clients by tuning one system parameter base cell size and two client parameters - surrounding cell size and tolerance count. By integrating salient features of two schemes, HiSC successfully preserves query anonymity and provides more scalable and consistent service. Both the AS and the clients can enjoy much less work load. Additionally, we propose a simple yet effective random range shifting algorithm to prevent possible privacy leakage that would exist in the original P2P approach. Our experiments show that HiSC can elegantly balance the work load based on privacy requirements and client distribution. HiSC provides close to optimal service quality. Meanwhile, it reduces the response time by more than an order of magnitude from both the P2P scheme and the centralized scheme when anonymity level(value of ) or number of clients is large. It also reduces the update message cost of the AS by nearly 6 times and the peer searching message cost of the clients by more than an order of magnitude.
28 schema:genre research_article
29 schema:inLanguage en
30 schema:isAccessibleForFree true
31 schema:isPartOf N1b5546be16da404c932ef8e51429d151
32 N9d868e01fcf24b2fb6aae0efe5bb4ef4
33 sg:journal.1043850
34 schema:name Cloaking locations for anonymous location based services: a hybrid approach
35 schema:pagination 159-182
36 schema:productId N3c35cfff6e15454eba0c5bf5753d58f3
37 N641e7c35dc2542ab9ecc2a2a1bd77f46
38 Ndfd8a0be366a43f5ba48fb70aa4ec838
39 schema:sameAs https://app.dimensions.ai/details/publication/pub.1014524181
40 https://doi.org/10.1007/s10707-008-0047-2
41 schema:sdDatePublished 2019-04-15T09:13
42 schema:sdLicense https://scigraph.springernature.com/explorer/license/
43 schema:sdPublisher N27ce8ab9933e482cbfa796aa4ee8ca50
44 schema:url http://link.springer.com/10.1007%2Fs10707-008-0047-2
45 sgo:license sg:explorer/license/
46 sgo:sdDataset articles
47 rdf:type schema:ScholarlyArticle
48 N1b5546be16da404c932ef8e51429d151 schema:issueNumber 2
49 rdf:type schema:PublicationIssue
50 N27ce8ab9933e482cbfa796aa4ee8ca50 schema:name Springer Nature - SN SciGraph project
51 rdf:type schema:Organization
52 N3ab4f2247dba4561bea81a3f47e018c3 rdf:first sg:person.016357711751.53
53 rdf:rest Nb88d5e864ecf4c58b019fad232931341
54 N3c35cfff6e15454eba0c5bf5753d58f3 schema:name dimensions_id
55 schema:value pub.1014524181
56 rdf:type schema:PropertyValue
57 N641e7c35dc2542ab9ecc2a2a1bd77f46 schema:name readcube_id
58 schema:value 45313964506c9ef302f17d90b160749c9c975330c7ce5a18812292ca36141659
59 rdf:type schema:PropertyValue
60 N9d868e01fcf24b2fb6aae0efe5bb4ef4 schema:volumeNumber 13
61 rdf:type schema:PublicationVolume
62 Nb88d5e864ecf4c58b019fad232931341 rdf:first sg:person.01133501720.03
63 rdf:rest rdf:nil
64 Ndfd8a0be366a43f5ba48fb70aa4ec838 schema:name doi
65 schema:value 10.1007/s10707-008-0047-2
66 rdf:type schema:PropertyValue
67 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
68 schema:name Information and Computing Sciences
69 rdf:type schema:DefinedTerm
70 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
71 schema:name Information Systems
72 rdf:type schema:DefinedTerm
73 sg:journal.1043850 schema:issn 1384-6175
74 1573-7624
75 schema:name GeoInformatica
76 rdf:type schema:Periodical
77 sg:person.01133501720.03 schema:affiliation https://www.grid.ac/institutes/grid.266869.5
78 schema:familyName Huang
79 schema:givenName Yan
80 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01133501720.03
81 rdf:type schema:Person
82 sg:person.016357711751.53 schema:affiliation https://www.grid.ac/institutes/grid.266869.5
83 schema:familyName Zhang
84 schema:givenName Chengyang
85 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016357711751.53
86 rdf:type schema:Person
87 sg:pub.10.1007/11428572_10 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033289363
88 https://doi.org/10.1007/11428572_10
89 rdf:type schema:CreativeWork
90 sg:pub.10.1007/11957454_23 schema:sameAs https://app.dimensions.ai/details/publication/pub.1048560954
91 https://doi.org/10.1007/11957454_23
92 rdf:type schema:CreativeWork
93 sg:pub.10.1007/3-540-45427-6_23 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022934505
94 https://doi.org/10.1007/3-540-45427-6_23
95 rdf:type schema:CreativeWork
96 sg:pub.10.1007/978-3-540-73540-3_13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039944940
97 https://doi.org/10.1007/978-3-540-73540-3_13
98 rdf:type schema:CreativeWork
99 sg:pub.10.1023/a:1015231126594 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024650437
100 https://doi.org/10.1023/a:1015231126594
101 rdf:type schema:CreativeWork
102 https://doi.org/10.1109/icdcs.2005.48 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093255801
103 rdf:type schema:CreativeWork
104 https://doi.org/10.1109/icde.2005.42 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094339131
105 rdf:type schema:CreativeWork
106 https://doi.org/10.1109/icde.2006.101 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095564469
107 rdf:type schema:CreativeWork
108 https://doi.org/10.1109/percomw.2004.1276918 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093379294
109 rdf:type schema:CreativeWork
110 https://doi.org/10.1109/perser.2005.1506394 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095586213
111 rdf:type schema:CreativeWork
112 https://doi.org/10.1109/securecomm.2005.33 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095642596
113 rdf:type schema:CreativeWork
114 https://doi.org/10.1142/s0218488502001648 schema:sameAs https://app.dimensions.ai/details/publication/pub.1062976751
115 rdf:type schema:CreativeWork
116 https://doi.org/10.1142/s021848850200165x schema:sameAs https://app.dimensions.ai/details/publication/pub.1062976752
117 rdf:type schema:CreativeWork
118 https://doi.org/10.1145/1066116.1189037 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039158680
119 rdf:type schema:CreativeWork
120 https://doi.org/10.1145/1066157.1066164 schema:sameAs https://app.dimensions.ai/details/publication/pub.1028314326
121 rdf:type schema:CreativeWork
122 https://doi.org/10.1145/1128817.1128850 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053234900
123 rdf:type schema:CreativeWork
124 https://doi.org/10.1145/1183471.1183500 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042651000
125 rdf:type schema:CreativeWork
126 https://doi.org/10.1145/1242572.1242623 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050164945
127 rdf:type schema:CreativeWork
128 https://doi.org/10.1145/501158.501164 schema:sameAs https://app.dimensions.ai/details/publication/pub.1015485328
129 rdf:type schema:CreativeWork
130 https://doi.org/10.1145/570705.570711 schema:sameAs https://app.dimensions.ai/details/publication/pub.1001684707
131 rdf:type schema:CreativeWork
132 https://doi.org/10.1145/941326.941331 schema:sameAs https://app.dimensions.ai/details/publication/pub.1051297556
133 rdf:type schema:CreativeWork
134 https://www.grid.ac/institutes/grid.266869.5 schema:alternateName University of North Texas
135 schema:name Department of Computer Science and Engineering, University of North Texas Research Park, 3940 N. Elm, Room F236, 76207, Denton, TX, USA
136 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...