Advertisement

Measuring User Similarity with Trajectory Patterns: Principles and New Metrics

  • Xihui Chen
  • Ruipeng Lu
  • Xiaoxing Ma
  • Jun Pang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8709)

Abstract

The accumulation of users’ whereabouts in location-based applications has made it possible to construct user mobility profiles. Trajectory patterns, i.e., traces of places of interest that a user frequently visits, are among the most popular models of mobility profiles. In this paper, we revisit measuring user similarity using trajectory patterns, which is an important supplement for friend recommendation in on-line social networks. Specifically, we identify and formalise a number of basic principles that should hold when quantifying user similarity with trajectory patterns. These principles allow us to evaluate existing metrics in the literature and demonstrate their insufficiencies. Then we propose for the first time a new metric that respects all the identified principles. The metric is extended to deal with location semantics. Through experiments on a real-life trajectory dataset, we show the effectiveness of our new metrics.

Keywords

User Mobility User Similarity Trajectory Pattern Maximal Pattern Semantic Pattern 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Crandall, D.J., Backstrom, L., Cosley, D., Suri, S., Huttenlocher, D., Kleinberg, J.: Inferring social ties from geographic coincidences. PNAS 107(52), 22436–22441 (2010)CrossRefGoogle Scholar
  2. 2.
    Zheng, Y., Zhang, L., Ma, Z., Xie, X., Ma, W.Y.: Recommending friends and locations based on individual location history. ACM Transactions on the Web 5(1), 1–44 (2011)CrossRefzbMATHGoogle Scholar
  3. 3.
    Giannotti, F., Nanni, M., Pedreschi, D., Pinelli, F., Axiak, M.: Trajectory pattern mining. In: Proc. KDD, pp. 330–339. ACM Press (2007)Google Scholar
  4. 4.
    Rhee, I., Shin, M., Hong, S., Lee, K., Kim, S.J., Chong, S.: On the levy-walk nature of human mobility. IEEE/ACM Transaction on Networking 19(3), 630–643 (2011)CrossRefGoogle Scholar
  5. 5.
    Song, C., Koren, T., Wang, P., Barabási, A.-L.: Modelling the scaling properties of human mobility. Nature Physics 6, 818–823 (2010)CrossRefGoogle Scholar
  6. 6.
    Brockman, D., Hufnagel, L., Geisel, T.: The scaling laws of human travel. Nature 439(26), 462–465 (2006)CrossRefGoogle Scholar
  7. 7.
    Shokri, R., Theodorakopoulos, G., Troncoso, C., Hubaux, J.P., Boudec, J.Y.L.: Protecting location privacy: optimal strategy against localization attacks. In: Proc. CCS, pp. 617–627. ACM Press (2012)Google Scholar
  8. 8.
    Xiao, X., Zheng, Y., Luo, Q., Xie, X.: Finding similar users using category-based location history. In: Proc. GIS, pp. 442–445. ACM Press (2010)Google Scholar
  9. 9.
    Ying, J.C., Lu, H.C., Lee, W.C., Weng, T.C., Tseng, S.: Mining user similarity from semantic trajectories. In: Proc. SIGSPATIAL, pp. 19–26. ACM Press (2010)Google Scholar
  10. 10.
    Chen, X., Pang, J., Xue, R.: Constructing and comparing user mobility profiles for location-based services. In: Proc. SAC, pp. 261–266. ACM Press (2013)Google Scholar
  11. 11.
    Chen, X., Pang, J., Xue, R.: Constructing and comparing user mobility profiles. TWEB (accepted, 2014)Google Scholar
  12. 12.
    Bray, J.R., Curtis, J.T.: An ordination of upland forest communities of southern Wisconsin. Ecological Monographs 27, 325–349 (1957)CrossRefGoogle Scholar
  13. 13.
    Zhao, Z., Yan, D., Ng, W.: Mining probabilistically frequent sequential patterns in large uncertain databases. IEEE Transaction on Knowledge and Data Engineering (2013) (preprint)Google Scholar
  14. 14.
    Ye, M., Shou, D., Lee, W.C., Yin, P., Janowicz, K.: On the semantic annotation of places in location-based social networks. In: Proc. KDD, pp. 520–528. ACM Press (2011)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Xihui Chen
    • 1
  • Ruipeng Lu
    • 2
  • Xiaoxing Ma
    • 3
  • Jun Pang
    • 1
    • 2
  1. 1.Interdisciplinary Centre for Security, Reliability and TrustUniversity of LuxembourgLuxembourg
  2. 2.Faculty of Science, Technology and CommunicationUniversity of LuxembourgLuxembourg
  3. 3.State Key Laboratory for Novel Software Technology, Department of Computer Science and TechnologyNanjing UniversityChina

Personalised recommendations