In digital humanities projects, particularly for historical research and cultural heritage, GIS has played an increasingly important role. However, most implementations have conce...
Fredric C. Gey, Ryan Shaw, Ray R. Larson, Barry Pa...
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
An interesting issue in moving objects databases is to find similar trajectories of moving objects. Previous work on this topic focuses on movement patterns (trajectories with tim...
A pressing task during the unification process is to identify a user's vertical search intention based on the user's query. In this paper, we propose a novel method to p...
Ning Liu, Jun Yan, Weiguo Fan, Qiang Yang, Zheng C...
Web graphs are approximate snapshots of the web, created by search engines. Their creation is an error-prone procedure that relies on the availability of Internet nodes and the fa...
Panagiotis Papadimitriou 0002, Ali Dasdan, Hector ...