{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T21:10:19Z","timestamp":1650489019573},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2014,10,30]],"date-time":"2014-10-30T00:00:00Z","timestamp":1414627200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2015,2]]},"DOI":"10.1007\/s11227-014-1309-4","type":"journal-article","created":{"date-parts":[[2014,10,29]],"date-time":"2014-10-29T05:02:41Z","timestamp":1414558961000},"page":"537-573","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Direct private query in location-based services with GPU run time analysis"],"prefix":"10.1007","volume":"71","author":[{"given":"Charles","family":"Asanya","sequence":"first","affiliation":[]},{"given":"Ratan","family":"Guha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,30]]},"reference":[{"key":"1309_CR1","unstructured":"Martin T (2002) An evaluation of 911 as an effective community alerting system to augment the role of emergency system. In: National Fire Academy Executive Fire officer Program, Branson, MO"},{"key":"1309_CR2","doi-asserted-by":"crossref","unstructured":"Xu J, Tang X, Hu H, DU J (2010) Privacy-conscious location-based queries in mobile environments. Proc. In: Proceedings of the IEEE Transactions On Parallel and Distributed Systems \u201910, vol 21, pp 313\u2013326, March 2010","DOI":"10.1109\/TPDS.2009.65"},{"key":"1309_CR3","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L (2002) K-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl Based Syst 10:557\u2013570","journal-title":"Int J Uncertain Fuzziness Knowl Based Syst"},{"key":"1309_CR4","unstructured":"Samarati P (2002) Protecting respondents identities in microdata release. In: IEEE Transaction on Knowledge and Data Engineering, vol i3, pp 1010\u20131027, August 2002"},{"key":"1309_CR5","doi-asserted-by":"crossref","first-page":"1719","DOI":"10.1109\/TKDE.2007.190662","volume":"19","author":"P Kalnis","year":"2007","unstructured":"Kalnis P, Ghinita G, Mouratidis K, Papadias D (2007) Preventing location-based identity inference in anonymous spatial queries. IEEE Trans Knowl Data Eng 19:1719\u20131733","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1309_CR6","doi-asserted-by":"crossref","unstructured":"Ghinita G, Kalnis P, Khoshgozaran A, Khoshgozaran C, Tan K (2008) Privacy queries in location based services: Anonymizers are not necessary, pp 121\u2013132, June 9\u201312","DOI":"10.1145\/1376616.1376631"},{"key":"1309_CR7","unstructured":"R. Vishwanathan. EXPLORING PRIVACY IN LOCATION-BASED SERVICES USING CRYPTOGRAPHIC PROTOCOLS. PhD thesis, Univ. of North Texas, May 2011"},{"key":"1309_CR8","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/s11227-013-0910-2","volume":"66","author":"B Mahafzah","year":"2013","unstructured":"Mahafzah B (2013) Performance assessment of multithreaded quicksort algorithm on simultaneous multithreaded architecture. J Supercomput 66:339\u2013363","journal-title":"J Supercomput"},{"key":"1309_CR9","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1177\/0165551513519212","volume":"40","author":"B Mahafzah","year":"2014","unstructured":"Mahafzah B (2014) Performance evaluation of parallel multithreaded a* heuristic search algorithm. J Inf Sci 40:363\u2013375","journal-title":"J Inf Sci"},{"key":"1309_CR10","doi-asserted-by":"crossref","unstructured":"Silvestri C, Lettich F, Orlando S, Jensen CS (2014) Gpu-based computing of repeated range queries over moving objects. In: Parallel, Distributed and Network-Based Processing (PDP), 2014 22nd Euromicro International Conference on IEEE, Torino, Italy, pp 640\u2013647 February 12\u201314, 2014","DOI":"10.1109\/PDP.2014.27"},{"key":"1309_CR11","doi-asserted-by":"crossref","unstructured":"Liang S, Liu Y, Wang C, Jian L (2010) Design and evaluation of a parallel k-nearest neighbor algorithm on cuda-enabled gpu. In: Web Society (SWS), 2010 IEEE 2nd Symposium on IEEE, pp 53\u201360, Beijing, China, August 16\u201317, 2010","DOI":"10.1109\/SWS.2010.5607480"},{"key":"1309_CR12","unstructured":"Gieseke F, Heinermann J, Oancea C, Igel C (2014) Buffer k-d trees: Processing massive nearest neighbor queries on gpus. In: Proceedings of the 31st International Conference on Machine Learning, Beijing, China, 2014Beijing, China, pp 172\u2013180"},{"key":"1309_CR13","first-page":"1","volume":"2008","author":"G Ghinita","year":"2008","unstructured":"Ghinita G (2008) Understanding the privacy-efficiency trade-off in location based queries. ACM Springl Irvine 2008:1\u20135","journal-title":"ACM Springl Irvine"},{"key":"1309_CR14","doi-asserted-by":"crossref","unstructured":"Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of ICMSAS 1st International Conference on Mobile Systems, Applications and Services Mobisys\u201903, pp 31\u201342","DOI":"10.1145\/1066116.1189037"},{"key":"1309_CR15","doi-asserted-by":"crossref","unstructured":"Shin H, Atluri V, Vaidya J (2008) A profile anonymization model for privacy in a personalized location based service environment. In: Proceedings of IEEE ICMDM\u201908, pp 73\u201380, Newark, NJ, April 27\u201330","DOI":"10.1109\/MDM.2008.33"},{"key":"1309_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TMC.2007.1062","volume":"7","author":"B Gedik","year":"2008","unstructured":"Gedik B, Liu L (2008) Protecting location privacy with personalized k-anonymity: architecture and algorithms. J IEEE Trans Mob Comput 7:1\u201318","journal-title":"J IEEE Trans Mob Comput"},{"key":"1309_CR17","doi-asserted-by":"crossref","unstructured":"Gedik B, Liu L (2005) Location privacy in mobile systems: A personalized anonymization model. In: Proceedings of ICDCS International Conference on Distributed Computing Systems, Columbus, OH, pp 620\u2013629","DOI":"10.1109\/ICDCS.2005.48"},{"key":"1309_CR18","unstructured":"Gedik B, Liu L (2004) A customizable k-anonymity model for protecting location privacy. In: Proceedings of ICDCS International Conference on Distributed Computing Systems, pp 620\u2013629"},{"key":"1309_CR19","doi-asserted-by":"crossref","unstructured":"Kohlweiss M, Faust S, Fritsch L, Gedrojc B, Preneel B (2007) Efficient oblivious augmented maps: Location-based services with a payment broker. In: Proceedings of ACM 7th international conference on Privacy enhancing technologies PET\u201907, pp 77\u201394, Springer-Verlag, Berlin, Heidelberg","DOI":"10.1007\/978-3-540-75551-7_6"},{"key":"1309_CR20","doi-asserted-by":"crossref","unstructured":"Cheng R, Zhang F (2009) An improved privacy protocol in location based service, pp 1\u20134, December 19\u201320","DOI":"10.1109\/ICIECS.2009.5364986"},{"key":"1309_CR21","unstructured":"Kelley JL (2008) General topology. Ishi Press, Sep 2008"},{"key":"1309_CR22","doi-asserted-by":"crossref","unstructured":"Kushilevitzr K, Ostrovsky R (1997) Replication Is Not Needed: Single Database, Computationally-Private Information Retrieval. In: Proceedings of IEEE 38th Annual Symposium on Foundations of Computer Science, pp 364\u2013373, October 20\u201322","DOI":"10.1109\/SFCS.1997.646125"},{"key":"1309_CR23","unstructured":"Asanya C, Guha R (2013) Anonymous retrieval of k-nn poi in location based srvices (lbs). In: Proceedings of WORLDCOMP International Conference on Security and Management, SAM \u201913, Las Vegas, NV, USA, pp 51\u201356, July 22\u201325"},{"key":"1309_CR24","unstructured":"NVIDIA. Nvidia\u2019s next generation cuda compute architecture:kepler tm gk110. 1.0. http:\/\/www.nvidia.com\/content\/PDF\/kepler\/NVIDIA-Kepler-GK110-Architecture-Whitepaper.pdf"},{"key":"1309_CR25","unstructured":"Rodengen JL (2000) The Legend of Amdahl. Write Stuff Syndicate, 1st edn, Aug 2000"},{"key":"1309_CR26","unstructured":"Cook S (2013) A Developer\u2019s Guide To Parallel computing with GPUs. Morgan Kaufman, 225 Wyman street, Waltham, MA 02451, USA"},{"key":"1309_CR27","unstructured":"Cazalas\u2019 J (2012) EFFICIENT AND SCALABLE EVALUATION OF CONTINUOUS, SPATIO-TEMPORAL QUERIES IN MOBILE COMPUTING ENVIRONMENTS. PhD thesis, Univ. of Central Florida, May 2012"},{"key":"1309_CR28","unstructured":"USBGN. Geographic names information system domestic and antarctic names state and topical gazetteer. Electronic, October 2013. http:\/\/geonames.usgs.gov\/domestic\/download_data.htm"},{"key":"1309_CR29","unstructured":"City of Boston (2013) Boston: a city of neighborhoods. Exploring boston\u2019s neighborhoods Sep 2013. http:\/\/www.cityofboston.gov\/neighborhoods\/"},{"key":"1309_CR30","unstructured":"City of Boston (2013) Data boston: Active food establishment. Electronic Publication, 2013. https:\/\/data.cityofboston.gov\/Permitting\/Active-Food-Establishment-Licenses\/gb6y-34cq"},{"key":"1309_CR31","unstructured":"Sinnot RW (1984) Virtues of the Haversine. Sky and Telescope, vol 68, issue 2, p. 158. http:\/\/daimi.au.dk\/~dam\/thesis\/Sky_and_Telescope_1984.pdf"},{"key":"1309_CR32","doi-asserted-by":"crossref","unstructured":"Zhang Y, Owens JD (2011) A quantitative performance analysis model for gpu architectures. In: IEEE High Performance Computer Architecture (HPCA), 2011 IEEE 17th International Symposium on, San Antonio, TX, pp 382\u2013393, February 12\u201316","DOI":"10.1109\/HPCA.2011.5749745"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-014-1309-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-014-1309-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-014-1309-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T20:45:58Z","timestamp":1650487558000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-014-1309-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,30]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,2]]}},"alternative-id":["1309"],"URL":"https:\/\/doi.org\/10.1007\/s11227-014-1309-4","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10,30]]}}}