A mobile trusted path system based on social network data

Felix Mata, Christophe Claramunt

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Social networks provide rich data sources for analyzing people journeys in urban environments. This paper introduces a trusted path system that helps users to find their routes based in two criteria: low crime rate and no theft report. These data are obtained from two complementary sources: geo-tagged tweets from the social network Twitter, and an official database given by the Police of Mexico City. Recommended paths are computed automatically from these data sources by a complementary application of social mining techniques, Bayes algorithm and an adaptation of the Dijkstra algorithm. This system can be also used to identify the probability that an event occurs in specific locations and times. A proof of concept of the system is illustrated through two example scenarios.

Original languageEnglish
Title of host publication23rd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2015
EditorsYan Huang, Mohamed Ali, Jagan Sankaranarayanan, Matthias Renz, Michael Gertz
PublisherAssociation for Computing Machinery
ISBN (Electronic)9781450339674
DOIs
StatePublished - 3 Nov 2015
Event23rd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2015 - Seattle, United States
Duration: 3 Nov 20156 Nov 2015

Publication series

NameGIS: Proceedings of the ACM International Symposium on Advances in Geographic Information Systems
Volume03-06-November-2015

Conference

Conference23rd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2015
Country/TerritoryUnited States
CitySeattle
Period3/11/156/11/15

Keywords

  • Outdoor navigation
  • Recommender systems
  • Trusted paths

Fingerprint

Dive into the research topics of 'A mobile trusted path system based on social network data'. Together they form a unique fingerprint.

Cite this