{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T10:42:21Z","timestamp":1761561741514,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,4,9]],"date-time":"2013-04-09T00:00:00Z","timestamp":1365465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,4,9]]},"DOI":"10.1145\/2461446.2461451","type":"proceedings-article","created":{"date-parts":[[2013,4,9]],"date-time":"2013-04-09T12:19:32Z","timestamp":1365509972000},"page":"25-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["A framework for privacy and security analysis of probe-based traffic information systems"],"prefix":"10.1145","author":[{"given":"Edward S.","family":"Canepa","sequence":"first","affiliation":[{"name":"King Abdullah University of Science and Technology, Thuwal, Saudi Arabia"}]},{"given":"Christian G.","family":"Claudel","sequence":"additional","affiliation":[{"name":"King Abdullah University of Science and Technology, Thuwal, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2013,4,9]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/1755952.1755976"},{"volume-title":"Birkhauser","year":"1991","author":"Aubin J.-P.","key":"e_1_3_2_1_2_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1137\/060659569"},{"doi-asserted-by":"crossref","unstructured":"M. Bardi and I. Capuzzo-Dolcetta. Optimal Control and Viscosity Solutions of Hamilton-Jacobi-Bellman equations. Birkh\\\"auser Boston MA 1997.  M. Bardi and I. Capuzzo-Dolcetta. Optimal Control and Viscosity Solutions of Hamilton-Jacobi-Bellman equations. Birkh\\\"auser Boston MA 1997.","key":"e_1_3_2_1_4_1","DOI":"10.1007\/978-0-8176-4755-1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1080\/03605309908820745"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1137\/090778754"},{"volume-title":"Proceedings of the 15th International IEEE Conference on Intelligent Transportation Systems","year":"2012","author":"Canepa E. S.","key":"e_1_3_2_1_7_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/ICCNC.2013.6504104"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1137\/090778754"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/TAC.2010.2041976"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/TAC.2010.2045439"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1090\/S0002-9947-1983-0690039-8"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1016\/0191-2615(94)90002-7"},{"doi-asserted-by":"crossref","unstructured":"C. F. Daganzo. On the variational theory of traffic flow: well-posedness duality and applications. Networks and heterogeneous media 1:601--619 2006.  C. F. Daganzo. On the variational theory of traffic flow: well-posedness duality and applications. Networks and heterogeneous media 1:601--619 2006.","key":"e_1_3_2_1_14_1","DOI":"10.3934\/nhm.2006.1.601"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/ICCS.2006.301511"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1137\/0331016"},{"key":"e_1_3_2_1_17_1","first-page":"531","article-title":"A moving bottleneck. Transportation Research part B","volume":"32","author":"N.","year":"1998","journal-title":"Methodological"},{"volume-title":"Transportation Research Part C: Emerging Technologies","year":"2009","author":"Herrera J. C.","key":"e_1_3_2_1_18_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/1378600.1378604"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1007\/978-3-540-72037-9_8"},{"issue":"1178","key":"e_1_3_2_1_21_1","first-page":"317","article-title":"On kinematic waves. II. A theory of traffic flow on long crowded roads","volume":"229","author":"Lighthill M. J.","year":"1956","journal-title":"Proceedings of the Royal Society of London"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1016\/j.trb.2011.07.004"},{"key":"e_1_3_2_1_23_1","first-page":"43","article-title":"level of service as influenced by volume and capacity characteristics' by D.","volume":"99","author":"Moskowitz K.","year":"1965","journal-title":"R. Drew and C. J. Keese. Highway Research Record"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1016\/0191-2615(93)90038-C"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1145\/1410043.1410047"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1287\/opre.4.1.42"},{"unstructured":"R. Rockafellar. Convex Analysis. Princeton University Press Princeton NJ 1970.  R. Rockafellar. Convex Analysis. Princeton University Press Princeton NJ 1970.","key":"e_1_3_2_1_27_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1002\/rnc.1099"},{"unstructured":"D. Work S. Blandin O. Tossavainen B. Piccoli and A. Bayen. A distributed highway velocity model for traffic state reconstruction. Applied Research Mathematics eXpress (ARMX) 1:1--35 April 2010.  D. Work S. Blandin O. Tossavainen B. Piccoli and A. Bayen. A distributed highway velocity model for traffic state reconstruction. Applied Research Mathematics eXpress (ARMX) 1:1--35 April 2010.","key":"e_1_3_2_1_29_1"},{"unstructured":"http:\/\/traffic.berkeley.edu\/.  http:\/\/traffic.berkeley.edu\/.","key":"e_1_3_2_1_30_1"},{"unstructured":"http:\/\/pems.eecs.berkeley.edu.  http:\/\/pems.eecs.berkeley.edu.","key":"e_1_3_2_1_31_1"}],"event":{"sponsor":["SIGBED ACM Special Interest Group on Embedded Systems"],"acronym":"HiCoNS '13","name":"HiCoNS '13: 2nd ACM International Conference on High Confidence Networked Systems","location":"Philadelphia Pennsylvania USA"},"container-title":["Proceedings of the 2nd ACM international conference on High confidence networked systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2461446.2461451","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2461446.2461451","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:19:00Z","timestamp":1750234740000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2461446.2461451"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,9]]},"references-count":31,"alternative-id":["10.1145\/2461446.2461451","10.1145\/2461446"],"URL":"https:\/\/doi.org\/10.1145\/2461446.2461451","relation":{},"subject":[],"published":{"date-parts":[[2013,4,9]]},"assertion":[{"value":"2013-04-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}