Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases, 2008 IEEE 24th International Conference on Data Engineering, pp.376-385, 2008. ,
DOI : 10.1109/ICDE.2008.4497446
Got an iphone or 3g ipad ? apple is recording your moves, 2011. ,
A model for enriching trajectories with semantic geographical information, Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems , GIS '07, pp.1-22, 2007. ,
DOI : 10.1145/1341012.1341041
Self-Aware Software?Will It Become a Reality ? Self-star Properties in Complex Information Systems, pp.229-259, 2005. ,
Geographically masking health data to preserve confidentiality, Statistics in Medicine, vol.37, issue.5, pp.497-525, 1999. ,
DOI : 10.1002/(SICI)1097-0258(19990315)18:5<497::AID-SIM45>3.0.CO;2-#
AMORES, Proceedings of the 1st European Workshop on AppRoaches to MObiquiTous Resilience, ARMOR '12, 2012. ,
DOI : 10.1145/2222436.2222443
URL : https://hal.archives-ouvertes.fr/hal-00736020
A preemptive deterministic scheduling algorithm for multithreaded replicas, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings., p.149, 2003. ,
DOI : 10.1109/DSN.2003.1209926
Tolérance aux fautes dans les systèmes répartis à base d'intergiciels réflexifs standards, Thèse de doctorat, Institut National des Sciences Appliquées, p.146, 2005. ,
Implementing simple replication protocols using CORBA portable interceptors and Java serialization, International Conference on Dependable Systems and Networks, 2004, pp.549-554, 2004. ,
DOI : 10.1109/DSN.2004.1311924
Location privacy in pervasive computing. Pervasive Computing, IEEE, vol.2, issue.1, pp.46-55, 2003. ,
Anonymity and historical-anonymity in location-based services. Privacy in Location-Based Applications, pp.1-30, 2009. ,
Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs, ACM SIGMETRICS Performance Evaluation Review, vol.28, issue.1, pp.34-43, 2000. ,
DOI : 10.1145/345063.339345
Can aspects be injected ? experience with replication and protection. On The Move to Meaningful Internet Systems, pp.1402-1420, 2003. ,
On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs, Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks, pp.129-141, 2007. ,
DOI : 10.1007/978-3-540-73275-4_10
Computationally Private Information Retrieval with Polylogarithmic Communication, Advances in Cryptology -EURO- CRYPT'99, pp.402-414, 1999. ,
DOI : 10.1007/3-540-48910-X_28
Migration in CORBA Component Model. Dans Distributed applications and interoperable systems : 7th IFIP WG 6.1 international conference, DAIS, p.139, 2007. ,
How UGVs physically fail in the field, IEEE Transactions on Robotics, vol.21, issue.3, pp.423-437, 2005. ,
DOI : 10.1109/TRO.2004.838027
Re-identification of home addresses from spatial locations anonymized by Gaussian skew, International Journal of Health Geographics, vol.7, issue.1, p.45, 2008. ,
DOI : 10.1186/1476-072X-7-45
Securing Very Dynamic Groups and Data Aggregation in Wireless Sensor Networks, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, pp.1-9, 2007. ,
DOI : 10.1109/MOBHOC.2007.4428625
On the accuracy of MANET simulators, Proceedings of the second ACM international workshop on Principles of mobile computing , POMC '02, pp.38-43, 2002. ,
DOI : 10.1145/584490.584499
Unreliable failure detectors for reliable distributed systems, Journal of the ACM, vol.43, issue.2, pp.225-267, 1996. ,
DOI : 10.1145/226643.226647
Position based cryptography Advances in Cryptology-CRYPTO, pp.391-407, 2009. ,
Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-90, 1981. ,
DOI : 10.1145/358549.358563
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.8210
Preserving User Location Privacy in Mobile Data Management Infrastructures, Privacy Enhancing Technologies, pp.393-412, 2006. ,
DOI : 10.1007/11957454_23
A metaobject protocol for c++, pp.285-299, 1995. ,
Private information retrieval, Proceedings., 36th Annual Symposium on, pp.41-50, 1995. ,
Mapreduce for machine learning on multicore Advances in neural information processing systems, p.281, 2007. ,
Test and Evaluation of the Robustness of the Functional Layer of an Autonomous Robot, Thèse de doctorat, Institut National Polytechnique, p.119, 2011. ,
URL : https://hal.archives-ouvertes.fr/tel-00627225
Robustness Testing of Robot Controller Software, Proceedings of the 12th European Workshop on Dependable Computing, EWDC 2009, edité par H. WAESE- LYNCK, p. 2 pages, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-00381686
Challenges in flexible aggregation of pervasive data, IBM Research Report RC, pp.21942-98646, 2001. ,
Location privacy : Who protects ? URISA Journal-Urban and Regional InformationSystems Association, p.49, 2011. ,
Sauvegarde coopérative de données pour dispositifs mobiles, Thèse de doctorat, Institut National Polytechnique, p.149, 2007. ,
Dependability Evaluation of Cooperative Backup Strategies for Mobile Devices, 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007), pp.139-146, 2007. ,
DOI : 10.1109/PRDC.2007.21
Storage Tradeoffs in a Collaborative Backup Service for Mobile Devices, 2006 Sixth European Dependable Computing Conference, pp.129-138, 2006. ,
DOI : 10.1109/EDCC.2006.26
Security Rationale for a Cooperative Backup Service for Mobile Devices, Proceedings of the Latin-American Symposium on Dependable Computing (LADC), pp.212-230, 2007. ,
DOI : 10.1007/978-3-540-75294-3_16
Pastiche, ACM SIGOPS Operating Systems Review, vol.36, issue.SI, pp.285-298, 2002. ,
DOI : 10.1145/844128.844155
Simulation-based performance evaluation of routing protocols for mobile ad hoc networks, Mobile Networks and Applications, vol.5, issue.3, pp.179-189, 2000. ,
DOI : 10.1023/A:1019108612308
Identification via locationprofiling in gsm networks, Proceedings of the 7th ACM workshop on Privacy in the electronic society, WPES '08, pp.23-32, 2008. ,
A Spatiotemporal Model of Strategies and Counter Strategies for Location Privacy Protection, Geographic Information Science, pp.47-64, 2006. ,
DOI : 10.1007/11863939_4
Reality mining: sensing complex social systems, Personal and Ubiquitous Computing, vol.10, issue.2, pp.255-268, 2006. ,
DOI : 10.1007/s00779-005-0046-3
Been There, Done That : What Your Mobility Traces Reveal about Your Behavior, Mobile Data Challenge by Nokia Workshop, in conjunction with Int. Conf. on Pervasive Computing, 2012. ,
Towards On-line Adaptation of Fault Tolerance Mechanisms, 2010 European Dependable Computing Conference, pp.45-54, 2010. ,
DOI : 10.1109/EDCC.2010.15
Robustness of automotive applications using reflective computing, Proceedings of the 2011 ACM Symposium on Applied Computing, SAC '11, pp.230-235, 2011. ,
DOI : 10.1145/1982185.1982237
Delay-and disruption-tolerant networking. Artech House telecommunications library, 2006. ,
Preserving location and absence privacy in geo-social networks, Proceedings of the 19th ACM international conference on Information and knowledge management, CIKM '10, pp.309-318, 2010. ,
DOI : 10.1145/1871437.1871480
Mixzones for location privacy in vehicular networks, Proceedings of the 1st International Workshop on Wireless Networking for Intelligent Transportation Systems, 2007. ,
Locanyms, Proceedings of the 1st European Workshop on AppRoaches to MObiquiTous Resilience, ARMOR '12, 2012. ,
DOI : 10.1145/2222436.2222437
URL : https://hal.archives-ouvertes.fr/hal-00765530
GEPETO: A GEoPrivacy-Enhancing TOolkit, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, pp.1071-1076, 2010. ,
DOI : 10.1109/WAINA.2010.170
URL : https://hal.archives-ouvertes.fr/inria-00556835
Show me how you move and I will tell you who you are, Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL '10, pp.34-41, 2010. ,
DOI : 10.1145/1868470.1868479
URL : https://hal.archives-ouvertes.fr/inria-00556833
Show me how you move and I will tell you who you are, Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL '10, pp.103-126, 2011. ,
DOI : 10.1145/1868470.1868479
URL : https://hal.archives-ouvertes.fr/inria-00556833
Towards temporal mobility markov chains, Proceedings of the 1st International Workshop on Dynamicity collocated with OPODIS, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00675544
Next place prediction using mobility Markov chains, Proceedings of the First Workshop on Measurement, Privacy, and Mobility, MPM '12, 2012. ,
DOI : 10.1145/2181196.2181199
URL : https://hal.archives-ouvertes.fr/hal-00736947
Deanonymization attack on geolocated datasets. Rapport technique, LAAS-CNRS, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00765525
Mobieyes : Distributed processing of continuously moving queries on moving objects in a mobile system Advances in Database Technology- EDBT, pp.523-524, 2004. ,
Mobility, data mining, and privacy : geographic knowledge discovery, 2008. ,
DOI : 10.1007/978-3-540-75177-9
On the Anonymity of Home/Work Location Pairs, Proceedings of the 7th International Conference on Pervasive Computing, Pervasive '09, pp.390-397978, 2009. ,
DOI : 10.1007/978-3-642-01516-8_26
Understanding individual human mobility patterns, Nature, issue.7196, pp.453-779, 2008. ,
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking, Proceedings of the 1st international conference on Mobile systems, applications and services, MobiSys '03, pp.31-42, 2003. ,
DOI : 10.1145/1066116.1189037
On the complexity of an accurate and precise performance evaluation of wireless networks using simulations, Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems, MSWiM '08, 2008. ,
DOI : 10.1145/1454503.1454570
URL : https://hal.archives-ouvertes.fr/inria-00384082
Project Lachesis: Parsing and Modeling Location Histories, Geographic Information Science, pp.106-124, 2004. ,
DOI : 10.1007/978-3-540-30231-5_8
Object serialization analysis and comparison in Java and .NET, ACM SIGPLAN Notices, vol.38, issue.8, pp.44-54, 2003. ,
DOI : 10.1145/944579.944589
A survey and taxonomy of location systems for ubiquitous computing, 2001. ,
I know what you did last summer : risks of location data leakage in mobile and social computing, 2009. ,
Deterministic scheduling for transactional multithreaded replicas. Reliable Distributed Systems, IEEE Symposium, p.164, 2000. ,
Extracting places from traces of locations, Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots, pp.110-118, 2004. ,
Tolérance aux fautes sur Corba par protocole à métaobjets et langages réflexifs, Thèse de doctorat, 2000. ,
Towards group communication for mobile participants, Proceedings of Principles of Mobile Computing (POMC), pp.75-82, 2001. ,
Implementing a reflective fault-tolerant CORBA system, Proceedings 19th IEEE Symposium on Reliable Distributed Systems SRDS-2000, pp.154-163, 2000. ,
DOI : 10.1109/RELDI.2000.885403
Adaptive fault tolerant systems: reflective design and validation, Proceedings International Parallel and Distributed Processing Symposium, p.212, 2003. ,
DOI : 10.1109/IPDPS.2003.1213387
A metaobject protocol for fault-tolerant CORBA applications, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281), pp.127-134, 1998. ,
DOI : 10.1109/RELDIS.1998.740483
Collaborative backup for dependable mobile applications, Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc computing -, pp.146-149, 2004. ,
DOI : 10.1145/1028509.1028517
Experimental evaluation of ubiquitous systems. Dans Fast abstract at DEBS'08, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-00140129
Experimental evaluation of resilience for ubiquitous mobile systems, Proc. of UbiComp, Workshop on Ubiquitous Systems Evaluation (USE), pp.283-287, 2007. ,
Brief announcement : a platform for experimenting with mobile algorithms in a laboratory, PODC, edité par S. Tirthapura et L. Alvisi, pp.316-317, 2009. ,
Data Backup for Mobile Nodes: A Cooperative Middleware and an Experimentation Platform, Architecting Dependable Systems VII, edité par A. Casimiro, R. de Lemos, et C. Gacek, tome 6420 de Lecture Notes in Computer Science, pp.53-73, 2010. ,
DOI : 10.1007/978-3-642-17245-8_3
ARUM: A cooperative middleware and an experimentation platform for mobile systems, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications, p.8, 2010. ,
DOI : 10.1109/WIMOB.2010.5645030
The ARUM Experimentation Platform: An Open Tool to Evaluate Mobile Systems Applications, Proc. of Amire'11, 2011. ,
DOI : 10.1007/978-3-642-27482-4_22
URL : https://hal.archives-ouvertes.fr/hal-00667832
Data Backup for Mobile Nodes: A Cooperative Middleware and an Experimentation Platform, Proc. of the Workshop on Architecting Dependable Systems of the IEEE International Conference on Dependable Systems and Networks (DSN-2009), 2009. ,
DOI : 10.1007/978-3-642-17245-8_3
Beyond san francisco cabs : building a *-lity mining dataset, Proceedings of Workshop on the Analysis of Mobile Phone Networks (NetMob). Sattelite of NetSci 2010, 2010. ,
Using Compile-Time Reflection for Objects???State Capture, edité par P. Cointe, tome 1616 de Lecture Notes in Computer Science, pp.150-152, 1999. ,
DOI : 10.1007/3-540-48443-4_15
Portable serialization of corba objects : a reflective approach, pp.68-82, 2002. ,
Inference Attacks on Location Tracks, Proceedings of the 5th international conference on Pervasive computing, PERVASIVE'07, pp.127-143, 2007. ,
DOI : 10.1007/978-3-540-72037-9_8
A survey of computational location privacy, Personal and Ubiquitous Computing, vol.10, issue.5, pp.391-399, 2009. ,
DOI : 10.1007/s00779-008-0212-5
Replication is not needed: single database, computationally-private information retrieval, Proceedings 38th Annual Symposium on Foundations of Computer Science, pp.364-373, 1997. ,
DOI : 10.1109/SFCS.1997.646125
Tracking movements with mobile phone billing data : A case study with publicly-available data. Dans Advances in Location-Based Services, Lecture Notes in Geoinformation and Cartography, pp.109-117, 2012. ,
Protection of geoprivacy and accuracy of spatial information : How effective are geographical masks ? Cartographica : The International Journal for Geographic Information and Geovisualization, pp.15-28, 2004. ,
On interprocess communication, Distributed Computing, vol.21, issue.2, pp.77-101, 1986. ,
DOI : 10.1007/BF01786227
The mobile data challenge : Big data for mobile computing research, Mobile Data Challenge by Nokia Workshop, in conjunction with Int. Conf. on Pervasive Computing, 2012. ,
A first step towards a framework for presenting the location of confidential point data on maps???results of an empirical perceptual study, International Journal of Geographical Information Science, vol.49, issue.7, pp.813-822, 2006. ,
DOI : 10.1080/136588198241680
Location-based activity recognition using relational markov networks, Proceedings of the Nineteenth International Conference on Artificial Intelligence, IJCAI'05, 2005. ,
An oblivious transfer protocol with log-squared communication. Information Security, pp.314-328, 2005. ,
Robustesse du logiciel embarqué multicouche par une approche réflexive : application à l'automobile, Thèse de doctorat, Institut National des Sciences Appliquées, p.142, 2009. ,
An approach for improving faulttolerance in automotive modular embedded software, 17th International Conference on Real-Time Systems (RTNS 2009), pp.26-27, 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00442000
Robustness of modular multi-layered software in the automotive domain: a wrapping-based approach, 2009 IEEE Conference on Emerging Technologies & Factory Automation, 2009. ,
DOI : 10.1109/ETFA.2009.5347121
Tolérance aux fautes dans les systèmes autonomes, Thèse de doctorat , Institut National Polytechnique, p.131, 2007. ,
On fault tolerance and robustness in autonomous systems, Proc. of 3rd IARP/IEEE-RAS Joint Workshop on Technical Challenge for Dependable Robots in Human Environments, 2004. ,
Fault Tolerant Planning for Critical Robots, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07), pp.144-153, 2007. ,
DOI : 10.1109/DSN.2007.50
URL : https://hal.archives-ouvertes.fr/hal-01292653
Planning with diversified models for fault-tolerant robots, ICAPS, edité par M. S. Boddy, M. Fox, et S. Thiébaux, pp.216-223, 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-01292650
Fault tolerance in autonomous systems : How and how much, Proc. of 4th IARP/IEEE-RAS Joint Workshop on Technical Challenge for Dependable Robots in Human Environments, 2005. ,
URL : https://hal.archives-ouvertes.fr/hal-01292930
Privacy vulnerability of published anonymous mobility traces, Proceedings of the sixteenth annual international conference on Mobile computing and networking, pp.185-196, 2010. ,
A fault-tolerant java virtual machine, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings., p.425, 2003. ,
DOI : 10.1109/DSN.2003.1209953
Enforcing determinism for the consistent replication of multithreaded corba applications. Reliable Distributed Systems, IEEE Symposium, p.263, 1999. ,
Towards trajectory anonymization, Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, SPRINGL '08, pp.52-61, 2006. ,
DOI : 10.1145/1503402.1503413
Broken promises of privacy : Responding to the surprising failure of anonymization, UCLA Law Review, 2009. ,
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Advances in Cryptology -EUROCRYPT'99, pp.223-238, 1999. ,
DOI : 10.1007/3-540-48910-X_16
Adaptation en ligne de mécanismes de tolérance aux fautes par une approche à composants ouverts, Thèse de doctorat, Institut National Polytechnique, p.166, 2009. ,
Componentization of Fault Tolerance Software for Fine-Grain Adaptation, 2008 14th IEEE Pacific Rim International Symposium on Dependable Computing, pp.248-255, 2008. ,
DOI : 10.1109/PRDC.2008.48
Une architecture à métaobjets pour systèmes répartis tolérant les fautes, Thèse de doctorat, Institut National Polytechnique, p.168, 1997. ,
GeoPrivacy Risk Assessment -Application to a Carpooling System, 2011. ,
A terminology for talking about privacy by data minimization : Anonymity, unlinkability, undetectability, unobservability , pseudonymity, and identity management, 2010. ,
CRAW- DAD data set epfl/mobility (v. 2009-02-24) Downloaded from http, 2009. ,
Testing the Input Timing Robustness of Real-Time Control Software for Autonomous Systems, 2012 Ninth European Dependable Computing Conference, pp.73-83, 2012. ,
DOI : 10.1109/EDCC.2012.16
Multimodal Meeting Analysis by Segmentation and Classification of Meeting Events based on a Higher Level Semantic Approach, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005., pp.161-164, 2005. ,
DOI : 10.1109/ICASSP.2005.1415366
An abstraction for spatial-based distributed computing, Conf. On Principles Of DIStributed computing (OPODIS), pp.534-537 ,
An Abstraction for Spatial-Based Distributed Computing. Rapport technique 09190 ,
Fada : Formalisms and algorithms for resilient services design in ambient systems. Dans Fast abstract at DEBS'08, 2008. ,
FADA : Formalisms and Algorithms for Resilient Services Design in Ambient Systems, Proceedings of the 7th European Dependable Computing Conference (EDCC) -Fast Abstracts, 2008. ,
Reflective fault-tolerant systems: from experience to challenges, IEEE Transactions on Computers, vol.52, issue.2, pp.237-254, 2003. ,
DOI : 10.1109/TC.2003.1176989
Component-Based Construction of Real-Time Systems in BIP, pp.33-34, 2009. ,
DOI : 10.1007/978-3-642-02658-4_4
Limits of Predictability in Human Mobility, Science, vol.327, issue.5968, pp.327-1018, 2010. ,
DOI : 10.1126/science.1177170
A conceptual view on trajectories, Data & Knowledge Engineering, vol.65, issue.1, pp.126-146, 2008. ,
DOI : 10.1016/j.datak.2007.10.008
Risk management guide for information technology systems, Nist special publication, vol.800, issue.30, pp.800-830, 2002. ,
DOI : 10.6028/NIST.SP.800-30
Uniqueness of simple demographics in the us population. LIDAP- WP4, 2000. ,
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002. ,
DOI : 10.1142/S0218488502001648
La réflexivité dans les architectures multi-niveaux : application aux systèmes tolérant les fautes, Thèse de doctorat, p.155, 2004. ,
Principles of multi-level reflection for fault tolerant architectures, 2002 Pacific Rim International Symposium on Dependable Computing, 2002. Proceedings., pp.59-66, 2002. ,
DOI : 10.1109/PRDC.2002.1185619
Towards implementing multi-layer reflection for fault-tolerance, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings., pp.435-444, 2003. ,
DOI : 10.1109/DSN.2003.1209954
A Multi-Level Meta-Object Protocol for Fault-Tolerance in Complex Architectures, 2005 International Conference on Dependable Systems and Networks (DSN'05), pp.270-279, 2005. ,
DOI : 10.1109/DSN.2005.10
Intergiciels pour la tol??rance aux fautes, Techniques et sciences informatiques, vol.25, issue.5, pp.599-630, 2006. ,
DOI : 10.3166/tsi.25.599-630
Cosmopen : dynamic reverse engineering on a budget. how cheap observation techniques can be used to reconstruct complex multi-level behaviour, Softw., Pract. Exper, issue.18, pp.39-1467, 2009. ,
Openjava : A classbased macro system for java. Dans Reflection and Software Engineering, pp.117-133, 1999. ,
Privacy preservation in the publication of trajectories . Dans Mobile Data Management, MDM'08. 9th International Conference on, pp.65-72, 2008. ,
Designing a secure and robust mobile interacting robot for the long term, 2003 IEEE International Conference on Robotics and Automation (Cat. No.03CH37422), pp.4246-4251, 2003. ,
DOI : 10.1109/ROBOT.2003.1242256
Loosely-coupled, mobile replication of objects with transactions, Proceedings. Tenth International Conference on Parallel and Distributed Systems, 2004. ICPADS 2004., pp.675-682, 2004. ,
DOI : 10.1109/ICPADS.2004.1316154
Protecting moving trajectories with dummies. Dans Mobile Data Management, International Conference on, pp.278-282, 2007. ,
Understanding mobility based on GPS data, Proceedings of the 10th international conference on Ubiquitous computing, UbiComp '08, pp.312-321, 2008. ,
DOI : 10.1145/1409635.1409677
Discovering personal gazetteers, Proceedings of the 12th annual ACM international workshop on Geographic information systems , GIS '04, pp.266-273, 2004. ,
DOI : 10.1145/1032222.1032261