发布日期:2014-06-17 访问量:
VLDB Database School (China)
VLDB中国数据库学院
2014年暑期学校招生简章
2014年7月7日~ 7月12日
中国 • 北京
受VLDB(Very Large Databases)基金会资助的VLDB中国数据库学院始办于2002年,隶属于中国计算机学会数据库专业委员会, 创办人陆宏钧教授担任首任院长,自2005年起由王珊教授担任院长。根据2013年6月专委会主任会议意见,自2014年起成立由周傲英、李战怀和王国仁三位教授组成的工作小组负责学院的相关事宜。
学院的宗旨是:充分利用VLDB的资源,通过组织暑期学校等形式,邀请国际知名数据库学者来中国讲学,为我国数据库及相关领域的研究生、青年教师和工程技术人员提供一个集中学习和交流的平台,促进我们对国际数据库学科前沿全面及时的了解,并在此前提下,立足应用研发具有特色的数据管理技术和系统。
2014年暑期学校由中国人民大学信息学院承办,主题为“Mobile Computing and Location-Based Services”。主讲教授是国际上享有很高学术声誉的数据库专家:丹麦奥尔堡大学教授现任TODS的主编 Christian Jensen、美国乔治亚理工学院教授刘伶和微软亚洲研究院研究员谢幸博士。我们热忱欢迎全国各地从事数据库研究的高年级研究生、青年教师和工程技术人员报名参加。
组织机构
VLDB 中国数据库学院
院 长:周傲英 教授(华东师范大学)
副院长:李战怀 教授(西北工业大学)
王国仁 教授(东北大学)
本期组委会
学术委员会主席:杜小勇 教授(中国人民大学)
周傲英 教授(华东师范大学)
组织委员会主席:李翠平 教授(中国人民大学)
课程安排
日 期:2014年7月7日至7月12日
主 题:Mobile Computing and Location-Based Services
授课地点:中国人民大学(北京市海淀区中关村大街59号)
课程简介
1. Course title: Data Management Foundations for Location-Based Services
Course instructor: Christian Jensen, Professor at Aalborg University, Denmark
Course abstract:
An increasingly sophisticated infrastructure that encompasses geo-positioning capabilities and Internet-worked mobile computing devices is becoming available to rapidly growing numbers of users. Concurrently, the research community has invented foundations that enable location-based services that exploit this infrastructure. Such services may concern emergency management, transportation, information and social needs, and games, to name but a few possibilities.
These two half-day lectures aim to present an overview of selected data management foundations for location-based services. In this setting, the location of a mobile object is captured by a trajectory, which is a function from time to points in the Euclidean, spatial-network, or indoor space in which the movement occurs. Tracking denotes the process of using a positioning system for continuously maintaining an up-to-date representation of a (partial) trajectory of an object. Prediction relates to aspects of the future trajectories of objects. Systems underlying location-based services may be subject to workloads that involve frequent updates as well as queries. This calls for efficient update as well as query processing techniques, and this in turn calls for efficient indexing techniques. A number of such techniques have been proposed that are based on the R-tree and the B-tree. These techniques differ in how they contend with skew and other properties of the problem domain.
The following topics are planned: 1. Motivation; 2. Tracking and route prediction; 3. Indexing: bottom-up updates, the TPR-tree family, and the Bx-tree family; 4. Indoor data management techniques: modeling, trajectories, and query processing
2. Course Title: (1) Spatial Alarms: Architectures and Algorithms
(2) Privacy Challenges in Mobile Computing and Location Based Services
(3) Trajectory Mining: From subtrajectories, whole trajectories to Trajectory Pattern
Course Instructor: Ling Liu, Professor at Georgia Institute of Technology, USA
Course abstract:
(1) Spatial alarms are one of the fundamental capabilities for enabling personalization of location-based services (LBSs), especially location-based advertisement, location based entertainment and location based information dissemination. In this lecture, I will describe the alternative architectures and algorithms for scaling spatial alarm processing. We will cover three types of system architectural design: client-centric architecture, client-server architecture, and distributed architecture. The algorithms and optimization techniques for efficient processing of spatial alarms include safe region techniques for optimizing client energy efficiency, server loads, and network bandwidth efficiency. For example, in a distributed architecture, I will describe the fundamentals of safe region-based processing and discuss the suite of techniques for optimal distribution of partial alarm processing tasks from the server to the mobile clients while minimizing unnecessary alarm evaluations at both server and mobile clients. I will also describe different safe region computation algorithms to explore the impact of size and shape of the safe region on network bandwidth, server load and client energy consumption. The development of these alternative safe region computation techniques is critical for supporting client device heterogeneity and scaling spatial alarm processing.
(2) We are entering the mobile Internet era where people, vehicles, and hand-held devices are connected at all times. Location becomes a piece of important information for real-time information access, on-demand service discovery and delivery, as well as continuous and personalized service provision. In location-based services, there are conceivably two types of location privacy - personal subscriber level privacy and corporate enterprise-level privacy. Companies need enterprise-level privacy to preserve corporate secrets and maintain competitive edge. Location privacy has attracted attention in mobile computing, mobile data management, and wireless communication research over the past few years. Most of the location privacy solutions try to prevent disclosure of unauthorized location information by techniques that explicitly or implicitly control what and how location information is given to whom and when. In this lecture, I will give an overview of location privacy research and discuss three categories of location privacy protection techniques: (1) Location protection through user-defined or system-supplied privacy policies; (2) Location protection through location anonymization, a system capability to obfuscate the location information such that a state of a subject is not identifiable within the anonymity set; and (3) Location protection through pseudonymity of user identities, which uses an internal pseudonym rather than the user’s actual identity. I will also describe the intrinsic relationships among location privacy, location utility, and personalization. My lecture will end with a list of open issues and technical challenges in location privacy research.
(3) Mining mobile object trajectory datasets has been gaining significant interest in recent years. We can broadly classify the existing research into three categories: mining subtrajectories of mobile objects, mining whole trajectories of mobile objects, and mining trajectory patterns of mobile objects. Density and Euclidean distance measures are commonly used by most of existing approaches to trajectory mining. In this lecture, we show that when the utility of mining mobile object trajectories is targeted at road network aware location based applications, density and Euclidean distance are no longer the effective measures. This is because traffic flows in a road network and the flow-based density characterization become important factors for finding interesting trajectory clusters of mobile objects travelling on road networks. I will describe one or two technical approaches under each of the three categories mentioned above. For example, by taking into account the physical constraints of the road network, the network proximity and the traffic flows among consecutive road segments, the trajectory mining can produe groups of sub-trajectories that describe both dense and highly continuous traffic flows of mobile objects. I will discuss the technical challenges in mining sparial trajectories.
3. Course Title: User Understanding from Large Scale Human Behavioral Data
Course Instructor: Doctor Xing Xie, MSRA(微软亚洲研究院)研究员
Course abstract:
With the rapid development of positioning, sensor and smart device technologies, large quantities of human behavioral data are now readily available. They reflect various aspects of human mobility and activities in the physical world. The availability of this data presents an unprecedented opportunity to gain a more in depth understanding of users and provide them with personalized online experience while respecting their privacy. In this course, I will present a number of our recent research efforts on this direction, including user mobility understanding and prediction, location and activity recommendation, user linking across multiple networks, psychological trait inference, life pattern analysis, and driving behavior understanding.
报名须知
1. 本年度计划招收学员100名。
联系人
姓名 |
电子邮箱 |
电话 |
李翠平 |
licuiping@ruc.edu.cn |
|
赵素云 |
zhaosuyun@ruc.edu.cn |
13671391782 |
史晓薇 |
vldbss2014@163.com |
18810762516 |
点击下载: