{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T02:54:01Z","timestamp":1776394441439,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,27]],"date-time":"2017-06-27T00:00:00Z","timestamp":1498521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF-DGE-1433659, NSF-IIP-1332002"],"award-info":[{"award-number":["NSF-DGE-1433659, NSF-IIP-1332002"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000138","name":"U.S. Department of Education","doi-asserted-by":"publisher","award":["P200A120110"],"award-info":[{"award-number":["P200A120110"]}],"id":[{"id":"10.13039\/100000138","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,27]]},"DOI":"10.1145\/3085504.3085581","type":"proceedings-article","created":{"date-parts":[[2017,6,5]],"date-time":"2017-06-05T12:50:05Z","timestamp":1496667005000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["MELT"],"prefix":"10.1145","author":[{"given":"Katrina","family":"Ward","sequence":"first","affiliation":[{"name":"Missouri S&amp;T, Computer Science, Rolla, Missouri"}]},{"given":"Dan","family":"Lin","sequence":"additional","affiliation":[{"name":"Missouri S&amp;T, Computer Science, Rolla, Missouri"}]},{"given":"Sanjay","family":"Madria","sequence":"additional","affiliation":[{"name":"Missouri S&amp;T, Computer Science, Rolla, Missouri"}]}],"member":"320","published-online":{"date-parts":[[2017,6,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497446"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2031331.2031336"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.07.035"},{"key":"e_1_3_2_1_4_1","volume-title":"Calif., Each Day.","author":"Deal Melanie","year":"2016","unstructured":"Melanie Deal . 2016. Census Bureau Reports 471,000 Workers Commute into Los Angeles County , Calif., Each Day. ( 2016 ). http:\/\/www.census.gov\/newsroom\/press-releases\/2013\/cb13-r13.html Melanie Deal. 2016. Census Bureau Reports 471,000 Workers Commute into Los Angeles County, Calif., Each Day. (2016). http:\/\/www.census.gov\/newsroom\/press-releases\/2013\/cb13-r13.html"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536274.2536283"},{"key":"e_1_3_2_1_6_1","volume-title":"Dynamic Path Planning and Traffic Light Coordination for Emergency Vehicle Routing","author":"Gedawy Hend Kamal","year":"2009","unstructured":"Hend Kamal Gedawy . 2009. Dynamic Path Planning and Traffic Light Coordination for Emergency Vehicle Routing . Carnegie Mellon University Thesis ( 2009 ), 1--9. Hend Kamal Gedawy. 2009. Dynamic Path Planning and Traffic Light Coordination for Emergency Vehicle Routing. Carnegie Mellon University Thesis (2009), 1--9."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2013.12.003"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2542666"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00887-0_69"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2015.18"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14778\/2809974.2809978"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676536.2676543"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10506-014-9154-6"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1556406.1556410"},{"key":"e_1_3_2_1_16_1","volume-title":"CEUR Workshop Proceedings 397","author":"Pensa Ruggero G.","year":"2008","unstructured":"Ruggero G. Pensa , Anna Monreale , Fabio Pinelli , and Dino Pedreschi . 2008 . Pattern-preserving k-anonymization of sequences and its application to mobility data mining . CEUR Workshop Proceedings 397 (2008), 44--60. Ruggero G. Pensa, Anna Monreale, Fabio Pinelli, and Dino Pedreschi. 2008. Pattern-preserving k-anonymization of sequences and its application to mobility data mining. CEUR Workshop Proceedings 397 (2008), 44--60."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2013.136"},{"key":"e_1_3_2_1_18_1","first-page":"165","article-title":"Apriori-based algorithms for k m -anonymizing trajectory data","volume":"7","author":"Poulis Giorgos","year":"2014","unstructured":"Giorgos Poulis , Spiros Skiadopoulos , Grigorios Loukides , and Aris Gkoulalas . 2014 . Apriori-based algorithms for k m -anonymizing trajectory data . Transactions on Data Privacy 7 , 2 (2014), 165 -- 194 . Giorgos Poulis, Spiros Skiadopoulos, Grigorios Loukides, and Aris Gkoulalas. 2014. Apriori-based algorithms for k m -anonymizing trajectory data. Transactions on Data Privacy 7, 2 (2014), 165--194.","journal-title":"Transactions on Data Privacy"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2013.66"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2525314.2525360"},{"key":"e_1_3_2_1_21_1","volume-title":"Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update","author":"Summary Executive","year":"2013","unstructured":"Executive Summary . 2014. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update , 2013 --2018. (2014). http:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/white_paper_c11-520862.html Executive Summary. 2014. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2013--2018. (2014). http:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/white_paper_c11-520862.html"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10665-1_71"}],"event":{"name":"SSDBM '17: 29th International Conference on Scientific and Statistical Database Management","location":"Chicago IL USA","acronym":"SSDBM '17","sponsor":["Northwestern University Northwestern University"]},"container-title":["Proceedings of the 29th International Conference on Scientific and Statistical Database Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3085504.3085581","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3085504.3085581","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3085504.3085581","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:36:57Z","timestamp":1750282617000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3085504.3085581"}},"subtitle":["Mapreduce-based Efficient Large-scale Trajectory Anonymization"],"short-title":[],"issued":{"date-parts":[[2017,6,27]]},"references-count":22,"alternative-id":["10.1145\/3085504.3085581","10.1145\/3085504"],"URL":"https:\/\/doi.org\/10.1145\/3085504.3085581","relation":{},"subject":[],"published":{"date-parts":[[2017,6,27]]},"assertion":[{"value":"2017-06-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}