Computer Science ›› 2022, Vol. 49 ›› Issue (11A): 211100268-10.doi: 10.11896/jsjkx.211100268
• Big Data & Data Science • Previous Articles Next Articles
ZHANG Kang-wei1, ZHANG Jing-wei1, YANG Qing2, HU Xiao-li1, SHAN Mei-jing3
CLC Number:
[1]ZHENG Y.Trajectory DataMining:An Overview[M].ACM,2015. [2]BENKERT M,GUDMUNDSSON J,HUBNER F,et al.Repor-ting Flock Patterns[J].Computational Geometry,2010,41(3):111-125. [3]JEUNG H,SHEN H T,ZHOU X.Convoy queries inspation-temporal databases[C]//IEEE 24th International Conference on Data Engineering.New York,IEEE,2008:1457-1459. [4]JEUNG,YIU H,MAN L,et al.Discovery of Convoys in Trajectory Databases[J].Computer Science,2010,1(1):1068-1080. [5]LI Z,DING B L,HAN J W,et al.Swarm:Mining relaxed temporal moving object clusters[J].Processdings of the Very Large Database Endowment,2010,3(1/2):723-734. [6]LI Y,BAILEY J,KU L.Efficient mining of platoon patterns in trajectory databases[J].Data & Knowledge Engineering,2015,100:167-187. [7]ORAKZAI F,CALDERS T,Pedersen T B.Distributed convoy pattern mining[C]//Proc. of the 17th Int. Conf. on Mobile Data Management.Piscataway,NJ:IEEE,2016:122-131. [8]ZHANG J W,LIU S J,YANG Q.DMFUCP:A Distributed Mi-ning Framework for Universal Companion Patterns on Large-Scale Trajectory Data[J].Journal of Computer Research and Development,2022,59(3):647-660. [9]VIEIRA M R,BAKALOV P,TSOTRAS V J.On-line discovery of flock patterns inspatio-temporal data[C]//Procceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Informantion Systems.Seattle,Washington,USA,2009:286-295. [10]TANG L A,ZHENG Y,YUAN J,et al.On Discovery of Traveling Companions form Streaming Trajectories[C]//IEEE 28th International Conference on Data Engineering.Washington,2012:186-197. [11]LI X,CEIKUTE V,JENSEN C S,et al.Effective Online Group Discovey in Trajectory Databases[J].IEEE Transactions on Knowledge & Data Engineering,2013,25(12):2752-2766. [12]LAN R,YUY,CAO L,et al.Discovering Evolving Moving Object Groups from Massive-Scale Trajectory Stream[C]//IEEE International Conference on Mobile Data Management.IEEE,2017:256-265. [13]NASERIAN E,WANG X H,XU X L,et al.A Framework ofLoose Travelling Compnion Discovery from Human Trajectories[J].IEEE Transactionson Moblie Computing,2018,17(11):2497-2511. [14]SHEIN T T,PUNTHEERANURAK S,IMAMURA M.Dis-covery of evolving companion from trajectory data streams[J].Knowledge and Information Systems,2020,62:3509-3533. [15]ZHENG Y,ZHANG L,XIE X,et al.Mining interesting loca-tions and travel sequences from GPS trajectories[C]//Proc. of Int. Conf. on World Wild Web.New York:ACM,2009:791-800. [16]XIAN Y,LIU Y,XU C,et al.Parallel Discovery of Trajectory Companion Pattern and System Evaluation[J].2020,28(10):538-550. [17]ZHENG Y,CHEN Y,XIE X,et al.Understanding mobilitybased on GPS data[C]//Proceedings of ACM Conference on Ubiquitous Computing.New York:ACM,2008:312-321. [18]ZHENG Y,XIE X,MA W.GeoLife:A collaborative social networking service among user,location and trajectory[J].IEEE Data Engineering Bulletin,2010,33(2):32-39. [19]TILMANN R,JONAS T,ASTERIOS K,et al.Apache Flink in current research[J].2016,58(4):157-165. [20]YUAN J,ZHENG Y,ZHANG C.et al.T-Drive:Driving Directions Based on Taxi Trajectories[C]//Proceedings of the 18th Annual ACM International Conference on Advances in Geographic Information Systems.ACM,2010.99-108. |
[1] | LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193. |
[2] | HE Qiang, YIN Zhen-yu, HUANG Min, WANG Xing-wei, WANG Yuan-tian, CUI Shuo, ZHAO Yong. Survey of Influence Analysis of Evolutionary Network Based on Big Data [J]. Computer Science, 2022, 49(8): 1-11. |
[3] | CHEN Jing, WU Ling-ling. Mixed Attribute Feature Detection Method of Internet of Vehicles Big Datain Multi-source Heterogeneous Environment [J]. Computer Science, 2022, 49(8): 108-112. |
[4] | YANG Ya-hong, WANG Hai-rui. DDoS Attack Detection Method in SDN Environment Based on Renyi Entropy and BiGRU Algorithm [J]. Computer Science, 2022, 49(6A): 555-561. |
[5] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[6] | SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295. |
[7] | SUN Xuan, WANG Huan-xiao. Capability Building for Government Big Data Safety Protection:Discussions from Technologicaland Management Perspectives [J]. Computer Science, 2022, 49(4): 67-73. |
[8] | FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339. |
[9] | WANG Mei-shan, YAO Lan, GAO Fu-xiang, XU Jun-can. Study on Differential Privacy Protection for Medical Set-Valued Data [J]. Computer Science, 2022, 49(4): 362-368. |
[10] | TAN Shuang-jie, LIN Bao-jun, LIU Ying-chun, ZHAO Shuai. Load Scheduling Algorithm for Distributed On-board RTs System Based on Machine Learning [J]. Computer Science, 2022, 49(2): 336-341. |
[11] | WANG Qing-xu, DONG Li-jun, JIA Wei, LIU Chao, YANG Guang, WU Tie-jun. Vector Representation and Computation Based Dynamic Access Control in Open Environment [J]. Computer Science, 2022, 49(11A): 210900217-7. |
[12] | LI Hui, HAN Lin, TAO Hong-wei, DONG Ben-song. Study on Office Password Recovery Vectorization Technology Based on Sunway Many-core Processor [J]. Computer Science, 2022, 49(11A): 210900176-5. |
[13] | LI Hui, HAN Lin, YU Zhe, WANG Wei. Acceleration Method for Multidimensional Function Optimization Based on Artificial Bee Colony Algorithm [J]. Computer Science, 2022, 49(11A): 211200075-6. |
[14] | WANG Dong-xia, LEI Yong-mei, ZHANG Ze-yu. Communication Efficient Asynchronous ADMM for General Form Consensus Optimization [J]. Computer Science, 2022, 49(11): 309-315. |
[15] | LI Ming-liang, PANG Jian-min, YUE Feng. Distributed Lock with Inter-core Passing for SW26010 Processor [J]. Computer Science, 2022, 49(10): 52-58. |
|