{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T21:15:05Z","timestamp":1773436505944,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,6,17]],"date-time":"2008-06-17T00:00:00Z","timestamp":1213660800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,6,17]]},"DOI":"10.1145\/1378600.1378604","type":"proceedings-article","created":{"date-parts":[[2008,6,17]],"date-time":"2008-06-17T13:49:02Z","timestamp":1213710542000},"page":"15-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":237,"title":["Virtual trip lines for distributed privacy-preserving traffic monitoring"],"prefix":"10.1145","author":[{"given":"Baik","family":"Hoh","sequence":"first","affiliation":[{"name":"Rutgers University, Piscataway, NJ, USA"}]},{"given":"Marco","family":"Gruteser","sequence":"additional","affiliation":[{"name":"Rutgers University, Piscataway, NJ, USA"}]},{"given":"Ryan","family":"Herring","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, CA, USA"}]},{"given":"Jeff","family":"Ban","sequence":"additional","affiliation":[{"name":"California Center for Innovative Transportation, Berkeley, CA, USA"}]},{"given":"Daniel","family":"Work","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, CA, USA"}]},{"given":"Juan-Carlos","family":"Herrera","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, CA, USA"}]},{"given":"Alexandre M.","family":"Bayen","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, CA, USA"}]},{"given":"Murali","family":"Annavaram","sequence":"additional","affiliation":[{"name":"USC, Los Angeles, CA, USA"}]},{"given":"Quinn","family":"Jacobson","sequence":"additional","affiliation":[{"name":"Nokia Research Center, Palo Alto, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,6,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"http:\/\/bard.wr.usgs.gov\/.  http:\/\/bard.wr.usgs.gov\/."},{"key":"e_1_3_2_1_2_1","unstructured":"http:\/\/jcp.org\/en\/jsr\/detail?id=179\/.  http:\/\/jcp.org\/en\/jsr\/detail?id=179\/."},{"key":"e_1_3_2_1_3_1","unstructured":"http:\/\/pems.eecs.berkeley.edu\/public\/.  http:\/\/pems.eecs.berkeley.edu\/public\/."},{"key":"e_1_3_2_1_4_1","unstructured":"http:\/\/www.fcc.gov\/bureaus\/wireless\/.  http:\/\/www.fcc.gov\/bureaus\/wireless\/."},{"key":"e_1_3_2_1_5_1","unstructured":"http:\/\/www.paramics-online.com.  http:\/\/www.paramics-online.com."},{"key":"e_1_3_2_1_6_1","unstructured":"http:\/\/www.privacyrights.org\/ar\/chrondatabreaches.htm.  http:\/\/www.privacyrights.org\/ar\/chrondatabreaches.htm."},{"key":"e_1_3_2_1_7_1","volume-title":"http:\/\/www.telenav.net\/","year":"2004","unstructured":"TeleNav. http:\/\/www.telenav.net\/ , 2004 . TeleNav. http:\/\/www.telenav.net\/, 2004."},{"key":"e_1_3_2_1_8_1","volume-title":"http:\/\/www.inrix.com\/","year":"2006","unstructured":"Inrix. http:\/\/www.inrix.com\/ , 2006 . Inrix. http:\/\/www.inrix.com\/, 2006."},{"key":"e_1_3_2_1_9_1","volume-title":"http:\/\/www.intellione.com\/","year":"2006","unstructured":"Intellione. http:\/\/www.intellione.com\/ , 2006 . Intellione. http:\/\/www.intellione.com\/, 2006."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/375551.375602"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. of International Workshop on Mobile Devices and Urban Sensing (to appear), St","author":"Annavaram M.","year":"2008","unstructured":"M. Annavaram , Q. Jacobson , and J. P. Shen . Hangout: A privacy preserving social networking application . In Proc. of International Workshop on Mobile Devices and Urban Sensing (to appear), St . Louis, USA , 2008 . M. Annavaram, Q. Jacobson, and J. P. Shen. Hangout: A privacy preserving social networking application. In Proc. of International Workshop on Mobile Devices and Urban Sensing (to appear), St. Louis, USA, 2008."},{"key":"e_1_3_2_1_13_1","volume-title":"California Center for Innovative Transportation, 2008. Revised version to be submitted to the 18th International Symposium on Traffic and Transportation Theory (ISTTT).","author":"Ban X.","unstructured":"X. Ban , R. Herring , J. Margulici , and A. Bayen . Optimal sensor placement for freeway travel time estimation. Interim technical report ( available at http:\/\/www.calccit.org\/resources\/2008-pdf\/OptSenDP_InterimReport_2008.pdf, California Center for Innovative Transportation, 2008. Revised version to be submitted to the 18th International Symposium on Traffic and Transportation Theory (ISTTT). X. Ban, R. Herring, J. Margulici, and A. Bayen. Optimal sensor placement for freeway travel time estimation. Interim technical report (available at http:\/\/www.calccit.org\/resources\/2008-pdf\/OptSenDP_InterimReport_2008.pdf, California Center for Innovative Transportation, 2008. Revised version to be submitted to the 18th International Symposium on Traffic and Transportation Theory (ISTTT)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/977405.978634"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11552338_13"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"e_1_3_2_1_17_1","volume-title":"Transportation Research Board 82nd Annual Meeting, 1(3):03--3865","author":"Cayford R.","year":"2003","unstructured":"R. Cayford and T. Johnson . Operational parameters affecting the use of anonymous cell phone tracking for generating traffic information . Transportation Research Board 82nd Annual Meeting, 1(3):03--3865 , 2003 . R. Cayford and T. Johnson. Operational parameters affecting the use of anonymous cell phone tracking for generating traffic information. Transportation Research Board 82nd Annual Meeting, 1(3):03--3865, 2003."},{"key":"e_1_3_2_1_18_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology-EUROCRYPT '91","author":"Chaum D.","year":"1991","unstructured":"D. Chaum and E. V. Heyst . Group signatures . In Advances in Cryptology-EUROCRYPT '91 , volume 547 of Lecture Notes in Computer Science , pages 257 -- 265 . Springer , 1991 . D. Chaum and E. V. Heyst. Group signatures. In Advances in Cryptology-EUROCRYPT '91, volume 547 of Lecture Notes in Computer Science, pages 257--265. Springer, 1991."},{"key":"e_1_3_2_1_19_1","volume-title":"84th TRB Annual Meeting, Washington D.C.","author":"Chu L.","year":"2005","unstructured":"L. Chu , S. Oh , and W. Recker . Adaptive Kalman filter based freeway travel time estimation . In 84th TRB Annual Meeting, Washington D.C. , January 9-13 2005 . Transportation Research Board. L. Chu, S. Oh, and W. Recker. Adaptive Kalman filter based freeway travel time estimation. In 84th TRB Annual Meeting, Washington D.C., January 9-13 2005. Transportation Research Board."},{"key":"e_1_3_2_1_20_1","volume-title":"Transportation Research Record 1683(-1):47--58","author":"Coifman B.","year":"1999","unstructured":"B. Coifman . Using dual loop speed traps to identify detector errors. Transportation Research Board , Transportation Research Record 1683(-1):47--58 , 1999 . B. Coifman. Using dual loop speed traps to identify detector errors. Transportation Research Board, Transportation Research Record 1683(-1):47--58, 1999."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0965-8564(00)00028-8"},{"key":"e_1_3_2_1_22_1","first-page":"475","volume-title":"Proceedings of the IEEE Intelligent Transportation Systems","author":"Dai X.","year":"2003","unstructured":"X. Dai , M. Ferman , and R. Roesser . A simulation evaluation of a real-time traffic information system using probe vehicles . In Proceedings of the IEEE Intelligent Transportation Systems , pages 475 -- 480 , 2003 . X. Dai, M. Ferman, and R. Roesser. A simulation evaluation of a real-time traffic information system using probe vehicles. In Proceedings of the IEEE Intelligent Transportation Systems, pages 475--480, 2003."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_24_1","unstructured":"A.-M. Elliott. Tomtom announces tomtom high definition traffic. http:\/\/www.pocket-lint.co.uk\/news\/news.phtml\/11248\/12272\/TomTom-High-Definition-Traffic-announced.phtml Nov 2007.  A.-M. Elliott. Tomtom announces tomtom high definition traffic. http:\/\/www.pocket-lint.co.uk\/news\/news.phtml\/11248\/12272\/TomTom-High-Definition-Traffic-announced.phtml Nov 2007."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2003.1251960"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352621"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.48"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293443"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293443"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-32004-3_19"},{"key":"e_1_3_2_1_32_1","first-page":"9","article-title":"Evaluation of speed estimates made with single-detector data from freeway traffic management systems. Transportation Research Board","volume":"1232","author":"Hall F.","year":"1989","unstructured":"F. Hall and B. Persaud . Evaluation of speed estimates made with single-detector data from freeway traffic management systems. Transportation Research Board , Transportation Research Record 1232 : 9 -- 16 , 1989 . F. Hall and B. Persaud. Evaluation of speed estimates made with single-detector data from freeway traffic management systems. Transportation Research Board, Transportation Research Record 1232:9--16, 1989.","journal-title":"Transportation Research Record"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2007.56"},{"key":"e_1_3_2_1_34_1","volume-title":"87th TRB Annual Meeting, Washington D.C.","author":"Herrera J.","year":"2008","unstructured":"J. Herrera and A. M. Bayen . Traffic flow reconstruction using mobile sensors and loop detector data . In 87th TRB Annual Meeting, Washington D.C. , January 12-16 2008 . Transportation Research Board. J. Herrera and A. M. Bayen. Traffic flow reconstruction using mobile sensors and loop detector data. In 87th TRB Annual Meeting, Washington D.C., January 12-16 2008. Transportation Research Board."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.33"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2006.69"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315266"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1182807.1182821"},{"issue":"4","key":"e_1_3_2_1_39_1","first-page":"26","article-title":"The PeMS algorithms for accurate, real-time estimates of g-factors and speeds from single-loop detectors","volume":"21","author":"Jia Z.","year":"2001","unstructured":"Z. Jia , C. Chen , B. Coifman , and P. Varaiya . The PeMS algorithms for accurate, real-time estimates of g-factors and speeds from single-loop detectors . IEEE Control Systems Magazine , 21 ( 4 ): 26 -- 33 , 2001 . Z. Jia, C. Chen, B. Coifman, and P. Varaiya. The PeMS algorithms for accurate, real-time estimates of g-factors and speeds from single-loop detectors. IEEE Control Systems Magazine, 21(4):26--33, 2001.","journal-title":"IEEE Control Systems Magazine"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190662"},{"key":"e_1_3_2_1_41_1","volume-title":"Random data perturbation techniques and privacy preserving data mining","author":"Kargupta H.","year":"2003","unstructured":"H. Kargupta , S. Datta , Q. Wang , and K. Sivakumar . Random data perturbation techniques and privacy preserving data mining . In IEEE ICDM. IEEE Press , 2003 . H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar. Random data perturbation techniques and privacy preserving data mining. In IEEE ICDM. IEEE Press, 2003."},{"key":"e_1_3_2_1_42_1","volume-title":"Traffic Detector Handbook","author":"Klein L.","year":"2006","unstructured":"L. Klein , M. Mills , and D. Gibson . Traffic Detector Handbook , volume 1 and 2. Third edition, October 2006 . L. Klein, M. Mills, and D. Gibson. Traffic Detector Handbook, volume 1 and 2. Third edition, October 2006."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.18"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/1758156.1758167"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179601.1179605"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"e_1_3_2_1_47_1","first-page":"73","article-title":"Estimation of speed from presence detectors","volume":"388","author":"Mikhalkin B.","year":"1972","unstructured":"B. Mikhalkin , H. Payne , and L. Isaksen . Estimation of speed from presence detectors . Highway Research Record , 388 : 73 -- 83 , 1972 . B. Mikhalkin, H. Payne, and L. Isaksen. Estimation of speed from presence detectors. Highway Research Record, 388:73--83, 1972.","journal-title":"Highway Research Record"},{"key":"e_1_3_2_1_48_1","first-page":"763","volume-title":"Proceedings of the 32nd VLDB'2006","author":"Mokbel M. F.","year":"2006","unstructured":"M. F. Mokbel , C.-Y. Chow , and W. G. Aref . The new casper: query processing for location services without compromising privacy . In Proceedings of the 32nd VLDB'2006 , pages 763 -- 774 . VLDB Endowment , 2006 . M. F. Mokbel, C.-Y. Chow, and W. G. Aref. The new casper: query processing for location services without compromising privacy. In Proceedings of the 32nd VLDB'2006, pages 763--774. VLDB Endowment, 2006."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.3141\/1855-06"},{"key":"e_1_3_2_1_50_1","volume-title":"Transportation Research Record 1570(-1):191--201","author":"Payne H.","year":"1997","unstructured":"H. Payne and S. Thompson . Malfunction detection and data repair for induction-loop sensors using i-880 data base. Transportation Research Board , Transportation Research Record 1570(-1):191--201 , 1997 . H. Payne and S. Thompson. Malfunction detection and data repair for induction-loop sensors using i-880 data base. Transportation Research Board, Transportation Research Record 1570(-1):191--201, 1997."},{"key":"e_1_3_2_1_51_1","first-page":"149","article-title":"Estimation of speeds from single-loop freeway flow and occupancy detectors using cusp catastrophy theory model. Transportation Research Board","volume":"1457","author":"Pushkar A.","year":"1994","unstructured":"A. Pushkar , F. Hall , and J. Acha-Daza . Estimation of speeds from single-loop freeway flow and occupancy detectors using cusp catastrophy theory model. Transportation Research Board , Transportation Research Record 1457 : 149 -- 157 , 1994 . A. Pushkar, F. Hall, and J. Acha-Daza. Estimation of speeds from single-loop freeway flow and occupancy detectors using cusp catastrophy theory model. Transportation Research Board, Transportation Research Record 1457:149--157, 1994.","journal-title":"Transportation Research Record"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1979.1102177"},{"key":"e_1_3_2_1_53_1","volume-title":"Proceedings of IEEE Symposium on Research in Security and Privacy","author":"Samarati P.","year":"1998","unstructured":"P. Samarati and L. Sweeney . Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression . In Proceedings of IEEE Symposium on Research in Security and Privacy , 1998 . P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In Proceedings of IEEE Symposium on Research in Security and Privacy, 1998."},{"key":"e_1_3_2_1_54_1","volume-title":"3rd workshop on Embedded Security in Cars (ESCAR2005)","author":"Sampigethaya K.","year":"2005","unstructured":"K. Sampigethaya , L. Huang , M. Li , R. Poovendran , K. Matsuura , and K. Sezaki . Caravan: Providing location privacy for vanet . In 3rd workshop on Embedded Security in Cars (ESCAR2005) , 2005 . K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki. Caravan: Providing location privacy for vanet. In 3rd workshop on Embedded Security in Cars (ESCAR2005), 2005."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"e_1_3_2_1_57_1","volume-title":"o. M","author":"U.","unstructured":"U. o. M . Transportation Studies Center . Final Evaluation Report for the CAPITAL-ITS Operational Test and Demonstration Program. Transportation Studies Center, University of Maryland, 1997. U. o. M. Transportation Studies Center. Final Evaluation Report for the CAPITAL-ITS Operational Test and Demonstration Program. Transportation Studies Center, University of Maryland, 1997."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247660.1247686"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1071246.1071257"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.5555\/1779330.1779335"}],"event":{"name":"Mobisys08: The 6th International Conference on Mobile Systems, Applications, and Services","location":"Breckenridge CO USA","acronym":"Mobisys08","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 6th international conference on Mobile systems, applications, and services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1378600.1378604","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1378600.1378604","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:57:54Z","timestamp":1750258674000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1378600.1378604"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6,17]]},"references-count":59,"alternative-id":["10.1145\/1378600.1378604","10.1145\/1378600"],"URL":"https:\/\/doi.org\/10.1145\/1378600.1378604","relation":{},"subject":[],"published":{"date-parts":[[2008,6,17]]},"assertion":[{"value":"2008-06-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}