Nearest surrounder searching in mobile computing environments

被引:3
|
作者
Chung, Jaehwa [1 ]
Jang, Hong Jun [2 ]
Jung, Kyoung-Ho [2 ]
Jung, Soon-Young [2 ]
机构
[1] Korea Natl Open Univ, Dept Comp Sci, Seoul, South Korea
[2] Korea Univ, Dept Comp Sci Educ, Seoul, South Korea
关键词
nearest surrounder; spatial query; location-based services; mobile computing environment; GENERATION; QUERIES;
D O I
10.1002/dac.2409
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The key issue in mobile computing environments (MCEs) is how to relieve communication congestion and provide accurate information through location-based services (LBSs). The nearest surrounder (NS) query, used to find all visible objects around a given location, is a type of spatial query that suggests broad application base in LBS domain. However, because existing works for NS query only take into account static query points, the application of the NS query is limited to various LBSs in MCEs requiring frequent location updates. Motivated by this limitation, this paper introduces the continuous nearest surrounder (CNS) query, which uses a decentralized system framework to continuously maintain updated query results in MCEs. In this framework, the LBS server executes an initial NS query to prepare a region, termed non-provoked polygon (NPP), defines a set of visible objects that cannot be changed. Conversely, a client caches the NPP and does not update request unless it leaves its NPP. We performed extensive experiments using synthetic and real datasets with various data cardinality, and query mobility to validate the accurate performance of the proposed strategy. The results show that the CNS algorithm outperforms NS, in terms of computation and communication costs as well as scalability.Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:770 / 791
页数:22
相关论文
共 50 条
  • [1] Nearest Surrounder Queries
    Lee, Ken C. K.
    Lee, Wang-Chien
    Leong, Hong Va
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2010, 22 (10) : 1444 - 1458
  • [2] Transitive nearest neighbor search in mobile environments
    Zheng, Baihua
    Lee, Ken C. K.
    Lee, Wang-Chien
    IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 1, PROCEEDINGS, 2006, : 14 - +
  • [3] Security in mobile computing environments
    Veijalainen, J
    Visa, A
    MOBILE NETWORKS & APPLICATIONS, 2003, 8 (02): : 111 - 112
  • [4] Distributed computing in mobile environments
    Badrinath, B.R.
    Computers and Graphics (Pergamon), 1996, 20 (05): : 615 - 617
  • [5] Distributed computing in mobile environments
    Badrinath, BR
    COMPUTERS & GRAPHICS, 1996, 20 (05) : 615 - 617
  • [6] Cloud computing for mobile environments
    Jeong, Hwa-Young
    Rana, Omer F.
    Hsu, Ching-Hsien
    Jeong, Young-Sik
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (10): : 2753 - 2755
  • [7] Active mobile database systems for mobile computing environments
    Murase, T
    Tsukamoto, M
    Nishio, S
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 1998, E81D (05) : 427 - 433
  • [8] Context awareness in mobile computing environments
    Anagnostopoulos, Christos B.
    Tsounis, Athanasios
    Hadjiefthymiades, Stathes
    WIRELESS PERSONAL COMMUNICATIONS, 2007, 42 (03) : 445 - 464
  • [9] Reducing the rollback on mobile computing environments
    Chung, KS
    Hwang, CS
    Yu, HC
    INTERNATIONAL SOCIETY FOR COMPUTERS AND THEIR APPLICATIONS 13TH INTERNATIONAL CONFERENCE ON COMPUTERS AND THEIR APPLICATIONS, 1998, : 106 - 110
  • [10] Location service in mobile computing environments
    Imperial Coll, London, United Kingdom
    Comput Graphics (Pergamon), 5 (627-632):