vldb中国数据库学院2014年暑期学校招生简章-z6尊龙旗舰厅

z6尊龙旗舰厅
vldb中国数据库学院2014年暑期学校招生简章
来源: 汤庸/
华南师范大学
4235
0
0
2014-06-21

 信息来源:

vldb中国数据库学院  【vldb database school (china)】   

2014年暑期学校招生简章

2014年7月7日~ 7月12日   中国 • 北京

    受vldb(very large databases)基金会资助的vldb中国数据库学院始办于2002年,隶属于中国计算机学会数据库专业委员会, 创办人陆宏钧教授担任首任院长,自2005年起由王珊教授担任院长。根据2013年6月专委会主任会议意见,自2014年起成立由周傲英、李战怀和王国仁三位教授组成的工作小组负责学院的相关事宜。

    学院的宗旨是:充分利用vldb的资源,通过组织暑期学校等形式,邀请国际知名数据库学者来中国讲学,为我国数据库及相关领域的研究生、青年教师和工程技术人员提供一个集中学习和交流的平台,促进我们对国际数据库学科前沿全面及时的了解,并在此前提下,立足应用研发具有特色的数据管理技术和系统。

    2014年课程由中国人民大学信息学院承办,本期暑期学校的主题为“mobile computing and location-based services”。主讲教授是国际上享有很高学术声誉的数据库专家:丹麦奥尔堡大学教授现任tods的主编 christian jensen、美国乔治亚理工学院教授刘伶和微软亚洲研究院研究员谢幸博士。我们热忱欢迎全国各地从事数据库研究的高年级研究生、青年教师和工程技术人员报名参加。

 

组织机构:

vldb 中国数据库学院

院 长:周傲英 教授(华东师范大学) 

副院长:李战怀 教授(西北工业大学)              王国仁  教授(东北大学)

 

本期组委会:

学术委员会主席:周傲英 教授(华东师范大学)        杜小勇 教授(中国人民大学)  

组织委员会主席:李翠平   教授(中国人民大学)

 

课程安排:

日  期:2014年7月7日至7月12日

主    题:mobile computing and location-based services

授课地点:中国人民大学(北京市海淀区中关村大街59号)

 

课程简介:

1.  course title: data managementfoundations for location-based services

     courseinstructor: christian jensen, professor at aalborg university, denmark

     courseabstract:

an increasingly sophisticated infrastructure that encompasses geo-positioningcapabilities and internet-worked mobile computing devices is becoming availableto rapidly growing numbers of users. concurrently, the research community has inventedfoundations that enable location-based services that exploit thisinfrastructure. such services may concern emergency management, transportation,information and social needs, and games, to name but a few possibilities.

these two half-day lectures aim to present an overview of selected datamanagement foundations for location-based services. in this setting, thelocation of a mobile object is captured by a trajectory, which is a functionfrom time to points in the euclidean, spatial-network, or indoor space in whichthe movement occurs.tracking denotes the process of using a positioning systemfor continuously maintaining an up-to-date representation of a (partial) trajectoryof an object. prediction relates to aspects of the future trajectories ofobjects. systems underlying location-based services may be subject to workloadsthat involve frequent updates as well as queries. this calls for efficientupdate as well as query processing techniques, and this in turn calls forefficient indexing techniques.  a numberof such techniques have been proposed that are based on the r-tree and the b-tree.these techniques differ in how they contend with skew and other properties ofthe problem domain.

the following topics are planned: 1. motivation; 2. tracking androute prediction; 3. indexing: bottom-up updates, the tpr-tree family, and thebx-tree family; 4. indoor data management techniques: modeling, trajectories,and query processing

 2. course title: (1) spatial alarms:architectures and algorithms

            (2) privacy challenges in mobilecomputing and location based services

(3)trajectory mining: from subtrajectories, whole trajectories totrajectory patterns

course instructor: ling liu, professor at georgia institute oftechnology, usa

course abstract:

(1) spatial alarms are one of the fundamental capabilities forenabling personalization of location-based services (lbss), especiallylocation-based advertisement, location based entertainment and location basedinformation dissemination. in this lecture, i will describe the alternativearchitectures and algorithms for scaling spatial alarm processing. we willcover three types of system architectural design: client-centric architecture,client-server architecture, and distributed architecture. the algorithms andoptimization techniques for efficient processing of spatial alarms include saferegion techniques for optimizing client energy efficiency, server loads, andnetwork bandwidth efficiency. for example, in a distributed architecture, iwill describe the fundamentals of safe region-based processing and discuss thesuite of techniques for optimal distribution of partial alarm processing tasksfrom the server to the mobile clients while minimizing unnecessary alarmevaluations at both server and mobile clients. i will also describe differentsafe region computation algorithms to explore the impact of size and shape ofthe safe region on network bandwidth, server load and client energyconsumption. the development of these alternative safe region computationtechniques is critical for supporting client device heterogeneity and scalingspatial alarm processing.

(2)  we are entering the mobile internet era wherepeople, vehicles, and hand-held devices are connected at all times. locationbecomes a piece of important information for real-time information access,on-demand service discovery and delivery, as well as continuous andpersonalized service provision. in location-based services, there areconceivably two types of location privacy - personal subscriber level privacyand corporate enterprise-level privacy. companies need enterprise-level privacyto preserve corporate secrets and maintain competitive edge. location privacyhas attracted attention in mobile computing, mobile data management, and wirelesscommunication research over the past few years. most of the location privacysolutions try to prevent disclosure of unauthorized location information bytechniques that explicitly or implicitly control what and how locationinformation is given to whom and when. in this lecture, i will give an overviewof location privacy research and discuss three categories of location privacyprotection techniques: (1) location protection through user-defined orsystem-supplied privacy policies; (2) location protection through locationanonymization, a system capability to obfuscate the location information suchthat a state of a subject is not identifiable within the anonymity set; and (3)location protection through pseudonymity of user identities, which uses an internalpseudonym rather than the user’s actual identity. i will also describe theintrinsic relationships among location privacy, location utility, andpersonalization. my lecture will end with a list of open issues and technicalchallenges in location privacy research.

(3) mining mobile object trajectory datasets has been gainingsignificant interest in recent years. we can broadly classify the existingresearch into three categories: mining subtrajectories of mobile objects,mining whole trajectories of mobile objects, and mining trajectory patterns ofmobile objects. density and euclidean distance measures are commonly used bymost of existing approaches to trajectory mining. in this lecture, we show thatwhen the utility of  mining mobile objecttrajectories is targeted at road network aware location based applications,density and euclidean distance are no longer the effective measures. this isbecause traffic flows in a road network and the flow-based densitycharacterization become important factors for finding interesting trajectoryclusters of mobile objects travelling on road networks. i will describe one ortwo technical approaches under each of the three categories mentioned above.for example, by taking into account the physical constraints of the roadnetwork, the network proximity and the traffic flows among consecutive roadsegments, the trajectory mining can produe groups of sub-trajectories thatdescribe both dense and highly continuous traffic flows of mobile objects. iwill discuss the technical challenges in mining sparial trajectories. 

 3. course title: understanding from largescale human behavioral data

    course instructor: xing xie博士, msra(微软亚洲研究院)研究员

    courseabstract:

with the rapid development of positioning, sensor and smart devicetechnologies, large quantities of human behavioral data are now readilyavailable. they reflect various aspects of human mobility and activities in thephysical world. the availability of this data presents an unprecedentedopportunity to gain a more in depth understanding of users and provide themwith personalized online experience while respecting their privacy. in thiscourse, i will present a number of our recent research efforts on thisdirection, including user mobility understanding and prediction, location andactivity recommendation, user linking across multiple networks, psychologicaltrait inference, life pattern analysis, and driving behavior understanding.

报名须知

 1.本年度计划招收学员100名。

2.学员录取由vldb 中国数据库学院负责,将根据申请条件以及学校地区平衡的原则进行录取。录取通知将于2014年6月27日发出。

3.申请条件:具有博士学位的青年教师、博士研究生、成果突出的硕士研究生。

4.注册费每人500元,于收到录取通知后缴费。住宿有会议宾馆可优先优惠预订,但费用需自行承担。

5.学院为所有学员提供课程资料和讲义、会议期间的餐饮。不负责订返程票,不接送站(火车、飞机等)。

6.为了资助边远地区学校的师生参会,学院将提供5份奖学金,用于支付注册费和住宿费.由学院在提出申请的符合条件的学员中进行遴选.

7.请报名者填写报名表(报名表格下载)

邮寄:北京市海淀区中国人民大学信息楼429室 史晓薇 ,邮政编码:100872

(邮寄请注明:vldb 2014 summer school)

同时,发送扫描件至 vldbss2014@163.com

8.纸质报名表需由申请者所在单位签署意见并加盖公章。 纸质报名表下载  :  

9.网上报名截止时间:2014年 6月 25日   

联系人

 李翠平 

赵素云 zhaosuyun@ruc.edu.cn

史晓薇

 

讲师介绍

 
christian jensen, aalborg university, denmark


christians. jensenis an obel professor of computer science at aalborg university, denmark. he wasa professor at aarhus university for a 3-year period from 2010 to 2013. priorto that, he was a professor at aalborg university, denmark. during the 1990s,he spent four sabbaticals at university of arizona, and he recently spent aone-year sabbatical at google inc., mountain view. he received the ph.d. degreefrom aalborg university in 1991 after 2 1/2 years of study at university ofmaryland, and he received the dr. techn. degree fromaalborg university in 2000. his research concerns data management anddata-intensive systems, and it concerns primarily temporal and spatio-temporaldata management. he is an acm and an ieee fellow, and he is a member of theacademia europaea, the royal danish academy of sciences and letters, the danishacademy of technical sciences, and the edbt endowment, as well as a trusteeemeritus of the vldb endowment. he received the ib henriksen research award2001 for his research in mainly temporal data management, telenor's nordicresearch award 2002 for his research in mobile services, and the villum kannrasmussen award for technical and scientific research 2011 for his generalresearch contributions. he is editor-in-chief of acm tods and aneditor-in-chief of the vldb journal, and he is an area editor (temporaldatabases) for the encyclopedia of database systems. he has served on theeditorial boards of acm tods, ieee tkde, and the ieee data engineeringbulletin. he was pc chair or co-chair for sstd 2001, edbt 2002, vldb 2005,mobide 2006, mdm 2007, dmsn 2008, time 2008, acm sigspatial gis 2011, ap web2012, ieee icde 2013, and dasfaa 2014.

 
ling liu, georgia institute oftechnology, usa


ling liu

 

 

xing xie博士, msra(微软亚洲研究院)研究员


dr. xing xie iscurrently a senior researcher in microsoft research asia, and a guest ph.d.advisor for the university of science and technology of china. he received hisb.s. and ph.d. degrees in computer science from the university of science andtechnology of china in 1996 and 2001, respectively. he joined microsoftresearch asia in july 2001, working on spatial data mining, location basedservices, social networks and ubiquitous computing. during the past years, hehas published over 140 referred journal and conference papers. he has more than50 patents filed or granted. he currently serves on the editorial boards of acmtransactions on intelligent systems and technology (tist), springergeoinformatica, elsevier pervasive and mobile computing, journal of locationbased services, and communications of the china computer federation (cccf). hehas worked as a guest editor of ieee transactions on multimedia and ieeeintelligent systems. in recent years, he was involved in the program or organizingcommittees of over 70 conferences and workshops. especially, he initiated thelbsn workshop series and served as program co-chair of acm ubicomp 2011 andprogram chair of the 8th chinese pervasive computing conference (pcc 2012). inoct. 2009, he founded the sigspatial china chapter which was the first regionalchapter of acm sigspatial. he is a member of joint steering committee of theubicomp and pervasive conference series. he is a senior member of acm, theieee, and china computer federation (ccf).


登录用户可以查看和发表评论, 请前往  登录 或  注册
scholat.com 学者网
免责声明 | 关于z6尊龙旗舰厅 | 联系z6尊龙旗舰厅
联系z6尊龙旗舰厅:
网站地图