A K-Main Routes Approach to Spatial Network Activity Summarization

Slides:



Advertisements
Similar presentations
CAPACITY CONSTRAINED NETWORK VORONOI DIAGRAM (CCNVD)
Advertisements

Lindsey Bleimes Charlie Garrod Adam Meyerson
Size-estimation framework with applications to transitive closure and reachability Presented by Maxim Kalaev Edith Cohen AT&T Bell Labs 1996.
Fast Algorithms For Hierarchical Range Histogram Constructions
Approximations of points and polygonal chains
Spatial Dependency Modeling Using Spatial Auto-Regression Mete Celik 1,3, Baris M. Kazar 4, Shashi Shekhar 1,3, Daniel Boley 1, David J. Lilja 1,2 1 CSE.
1 EE5900 Advanced Embedded System For Smart Infrastructure Static Scheduling.
Algorithms + L. Grewe.
Algorithm Strategies Nelson Padua-Perez Chau-Wen Tseng Department of Computer Science University of Maryland, College Park.
Critical Analysis Presentation: T-Drive: Driving Directions based on Taxi Trajectories Authors of Paper: Jing Yuan, Yu Zheng, Chengyang Zhang, Weilei Xie,
SASB: Spatial Activity Summarization using Buffers Atanu Roy & Akash Agrawal.
Using Structure Indices for Efficient Approximation of Network Properties Matthew J. Rattigan, Marc Maier, and David Jensen University of Massachusetts.
Recent Development on Elimination Ordering Group 1.
CSE 421 Algorithms Richard Anderson Dijkstra’s algorithm.
Cascading Spatio-Temporal Pattern Discovery P. Mohan, S.Shekhar, J. Shine, J. Rogers CSci 8715 Presented by: Atanu Roy Akash Agrawal.
The Theory of NP-Completeness
Tracking Moving Objects in Anonymized Trajectories Nikolay Vyahhi 1, Spiridon Bakiras 2, Panos Kalnis 3, and Gabriel Ghinita 3 1 St. Petersburg State University.
Scalable Network Distance Browsing in Spatial Database Samet, H., Sankaranarayanan, J., and Alborzi H. Proceedings of the 2008 ACM SIGMOD international.
Trip Planning Queries F. Li, D. Cheng, M. Hadjieleftheriou, G. Kollios, S.-H. Teng Boston University.
1 Context-Inclusive Approach to Speed-up Function Evaluation for Statistical Queries: An Extended Abstract Vijay Gandhi, James Kang, Shashi Shekhar University.
Network and Dynamic Segmentation Chapter 16. Introduction A network consists of connected linear features. Dynamic segmentation is a data model that is.
Internet Traffic Engineering by Optimizing OSPF Weights Bernard Fortz (Universit é Libre de Bruxelles) Mikkel Thorup (AT&T Labs-Research) Presented by.
The Traveling Salesperson Problem Algorithms and Networks.
Fixed Parameter Complexity Algorithms and Networks.
Scott Perryman Jordan Williams.  NP-completeness is a class of unsolved decision problems in Computer Science.  A decision problem is a YES or NO answer.
Mapping and analysis for public safety: An Overview.
CCAN: Cache-based CAN Using the Small World Model Shanghai Jiaotong University Internet Computing R&D Center.
Bill Payment Optimization Algorithms. Purpose To find and/or construct algorithms that will optimize the decision process of paying bills from an account.
Approximation Algorithms
More Computational Complexity Shirley Moore CS4390/5390 Fall August 29,
On Non-Disjoint Dominating Sets for the Lifetime of Wireless Sensor Networks Akshaye Dhawan.
On Graphs Supporting Greedy Forwarding for Directional Wireless Networks W. Si, B. Scholz, G. Mao, R. Boreli, et al. University of Western Sydney National.
Computer Science and Engineering Parallelizing Defect Detection and Categorization Using FREERIDE Leonid Glimcher P. 1 ipdps’05 Scaling and Parallelizing.
Zhuo Peng, Chaokun Wang, Lu Han, Jingchao Hao and Yiyuan Ba Proceedings of the Third International Conference on Emerging Databases, Incheon, Korea (August.
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
Group 8: Denial Hess, Yun Zhang Project presentation.
Project 2: Classification Using Genetic Programming Kim, MinHyeok Biointelligence laboratory Artificial.
Presentation Template KwangSoo Yang Florida Atlantic University College of Engineering & Computer Science.
Transport in weighted networks: optimal path and superhighways Collaborators: Z. Wu, Y. Chen, E. Lopez, S. Carmi, L.A. Braunstein, S. Buldyrev, H. E. Stanley.
Data Mining By Farzana Forhad CS 157B. Agenda Decision Tree and ID3 Rough Set Theory Clustering.
Young CS 331 D&A of Algo. NP-Completeness1 NP-Completeness Reference: Computers and Intractability: A Guide to the Theory of NP-Completeness by Garey and.
Example Apply hierarchical clustering with d min to below data where c=3. Nearest neighbor clustering d min d max will form elongated clusters!
Using category-Based Adherence to Cluster Market-Basket Data Author : Ching-Huang Yun, Kun-Ta Chuang, Ming-Syan Chen Graduate : Chien-Ming Hsiao.
Zaiben Chen et al. Presented by Lian Liu. You’re traveling from s to t. Which gas station would you choose?
::Network Optimization:: Minimum Spanning Trees and Clustering Taufik Djatna, Dr.Eng. 1.
General Elliptical Hotspot Detection Xun Tang, Yameng Zhang Group
A K-Main Routes Approach to Spatial Network Activity Summarization(SNAS) Group 8.
Cohesive Subgraph Computation over Large Graphs
Presented by: Mi Tian, Deepan Sanghavi, Dhaval Dholakia
University PI: Shashi Shekhar
CACTUS-Clustering Categorical Data Using Summaries
A Study of Group-Tree Matching in Large Scale Group Communications
Graph Theory and Algorithm 02
DS595/CS525 Team#2 - Mi Tian, Deepan Sanghavi, Dhaval Dholakia
Probabilistic Data Management
COSC160: Data Structures Linked Lists
Yi Wu 9/17/2018.
Greedy Algorithms / Interval Scheduling Yin Tat Lee
Spatio-temporal Pattern Queries
Multi-Core Parallel Routing
Unit 3 (Part-I): Greedy Algorithms
Algorithms for Budget-Constrained Survivable Topology Design
NP-Complete Problems.
The Traveling Salesperson Problem
Nearest Neighbors CSC 576: Data Mining.
Chapter 6 Network Flow Models.
NP-Completeness Reference: Computers and Intractability: A Guide to the Theory of NP-Completeness by Garey and Johnson, W.H. Freeman and Company, 1979.
The Theory of NP-Completeness
Winter 2019 Lecture 11 Minimum Spanning Trees (Part II)
Autumn 2019 Lecture 11 Minimum Spanning Trees (Part II)
Presentation transcript:

A K-Main Routes Approach to Spatial Network Activity Summarization Authors: Dev Oliver Shashi Shekhar James M. Kang Renee Bousselaire Abdussalam Bannur

Outline Motivation Problem Statement Contributions Validation Analytical Experimental Case Studies Summary and Future Work

Motivation: Crime Analysis (application domain) Street Place Neighborhood Crime hotspot Area of concentrated crime **J. E. Eck et. al. Mapping Crime: Understanding Hot Spots. US National Inst. of Justice (http://www.ncjrs.gov/pdffiles1/nij/209393.pdf), 2005. “Most clustering algorithms will show areas of concentration even when a line is the most appropriate dimension.” – National Institute of Justice** Star Tribune, January 26, 2011

Examples of Linear Patterns Linear patterns resulting from deforestation in Brazil http://en.wikipedia.org/wiki/Deforestation_in_Brazil Linear patterns of crime in a major US city

Motivation: Environmental Criminology (scientific domain) Spatial theories in Environmental Criminology Routine Activity Theory1 Crime location related to criminal’s frequently visited areas Crime Pattern Theory2 Based on spatial model Nodes (e.g. home, work, entertainment), Paths (e.g. routes between nodes), Edges Crime locations close to edges Near criminal’s activity boundaries where residents may not recognize him/her Source: Rossmo, Kim (2000). Geographic Profiling. Boca Raton, FL: CRC Press. http://www.popcenter.org/learning/60steps/index.cfm?stepNum=16 Network based summarization adds value to Environmental Criminology Assist with large scale verification of real-world data matching theories Opportunities to develop hypotheses for new theory formulation 1L.E. Cohen et al., Social change and crime rate trends: A routine activity approach, American sociological review, 1979. 2P. L. Brantingham et al., Environmental Criminology, Waveland Press, 1990.

Other Domains Disaster Relief Accident Analysis and Prevention

Each edge has a weight of 1 Key Concepts Activity Object of interest located at node or edge Summary path A path chosen by KMR to summarize activities Activity coverage Total number of activities of a path or set of paths Active node A node having n ≥ 1 activities or joined by an edge having n ≥ 1 activities e.g., A, B, C, D, E Inactive node A node having n = 0 activities and joined by edges all having n = 0 activities e.g., F Active node ratio Total # active nodes/Total # nodes e.g., 5/6 Each edge has a weight of 1 7

Given P = the set of Shortest Paths Problem Statement Given P = the set of Shortest Paths Given A spatial network G = (N, E) A set of activities, A and their locations (e.g. a node or edge) A set of Paths, P K (Number of routes) Edge weights Find A cardinality k subset P′ of P, i.e., a subset P′⊆ P with |P′| = k Objective Maximize the activity coverage (AC) by P′ Constraints 1 ≤ k ≤ |P|. k = 2 Edge Weights are 1 8

Challenges Measures of interestingness Computational Complexity Activity coverage, average distance, etc Computational Complexity Choose(N,2) paths, given N nodes Exponential number of k subsets of paths 9

SNAS is NP-Complete (Proof Sketch) Devising an NP-Completeness proof for decision problem Π [1] Show that Π is in NP Select a known NP-Complete Problem Π’ Construct a transformation f from Π’ to Π Prove that f is a polynomial transformation 1M. Garey and D. Johnson, Computers and Intractability: A Guide to the Theory of NP-completeness. WH freeman San Francisco, 1979.

Step 1: SNAS is in NP Verify in polynomial time whether activity coverage of P’ ≥ B SNAS Decision problem Given A spatial network G = (N, E) A set of activities, A and their locations (e.g. a node or edge) A set of Paths, P K (Number of routes) Edge weights B (bound on number of activities) Find A cardinality k subset P′ of P, i.e., a subset P′⊆ P with |P′| = k Objective Activity coverage (AC) by P′ ≥ B Constraints 1 ≤ k ≤ |P|.

Step 2: Select a known NP-Complete Problem Maximum Coverage Input Sets s1, s2, …,sm (the sets may have some elements E = {e1, e2, …, en} in common) A number k < min (m,n) Output k sets such that the maximum number of elements are covered, i.e. the union of the selected sets has maximal size.

Step 3: Construct a transformation f from Π to Π’ (1/3) Known NP Complete Problem Polynomial transformation A new Problem Solution to New Problem Solution to NP-Complete Problem Maximum Coverage Problem SNAS

Step 3: Construct a transformation f from Π to Π’ (2/3) Maximum coverage input to SNAS input Impose a total order, TO, to m elements E = {e1, e2, …, en} Convert each element in E into a node with one activity Convert each set si to a path pi Sort elements in si using TO Add edge (eij, eij+1) ∀ j ∈ 1 …. |si| Example Maximum Coverage: E = {e1, e2, e3, e5, e6} K = 2 S1 = {e1, e2} S2 = {e2, e3} S3 = {e1, e2, e3} S4 = {e5, e6} KMR: P = {(e1→e2), (e2→e3), (e1→e2→e3), (e5→e6)} K = 2 Activity = {a1, a2, a3, a5, a6} Activity node = {a1–e1, a2–e2, a3–e3, a5–e5, a6–e6} Candidate Solutions: (e1→e2→e3), (e5→e6) e1 e2 e3 e5 e6

Step 3: Construct a transformation f from Π to Π’ (3/3) SNAS output to maximum coverage output For each K route, Ri, produced by SNAS, convert the activities on the route into elements and form a set Si Example Given the K Routes: (e1→e2→e3), (e5→e6) S1 = {e1, e2, e3} S2 = {e5, e6}

Network Summarization by Grouping/Clustering Related Work Network Summarization by Grouping/Clustering Zero or One routes Multiple routes Clumping (Okabe), e.g. NT-VCM (Shiode) Max. Subgraph, e.g. path, tree (Buchin) Our Work 16

Contributions K-Main Routes (KMR) algorithm Finds a set of k routes to group activities New design decisions added Network Voronoi Activity assignment Divide and Conquer Summary path recomputation Spatial network activity summarization is shown to be NP-complete. Analytically demonstrate correctness of design decisions and show cost analysis Experimental evaluation of the various algorithms Performance evaluated using synthetic and real world datasets Case study comparing KMR with geometry based summarization 17

K-Main Routes (KMR) Algorithm P = the set of Shortest Paths, K=2 K-Main Routes (KMR) Algorithm K-Main Routes Algorithm Select k paths as initial summary paths Repeat Form k clusters by assigning each activity to its closest summary path Recompute summary path of each cluster Until summary paths do not change Design Decisions Inactive node pruning Network Voronoi Activity assignment Divide and Conquer Summary path recomputation The lower left graph shows 2 active nodes N7 and N8. With inactive node pruning, we would only need to calculate and store shortest paths between these 2 nodes, as opposed to calculating and storing shortest paths between all the nodes in the graph. 18

Design Decision: Inactive Node Pruning Only consider paths between active nodes Optimal solution will still be in this set Given the set of shortest paths 20 shortest paths calculated and stored versus 30

Design Decision: Network Voronoi (NV) Activity Assignment Goals Form k clusters by assigning each activity to its closest summary path Improve execution time of current assignment strategy Example (execution trace) Next K-Main Routes Algorithm Select k shortest paths as initial summary paths Repeat Network Voronoi Activity Assignment Recompute summary path of each cluster Until summary paths do not change K-Main Routes Algorithm Select k shortest paths as initial summary paths Repeat Form k clusters by assigning each activity to its closest summary path Recompute summary path of each cluster Until summary paths do not change

Design Decision: Network Voronoi (NV) Activity Assignment X Open: X A E D H Closed: X ∞ ∞ ∞ A B 3 4 C 7 8 D ∞ ACTIVITIES 1 9 2 10 1 2 3 4 5 6 7 8 9 10 A E D H AE DH ∞ E 5 6 F G H ∞ DISTANCE FROM ∞ ∞ Activity Active Node Inactive Node Virtual Node Summary Path Edge weight = 1 Edge weight = 0 Closed Node

Design Decision: Network Voronoi (NV) Activity Assignment X Open: A E D H B Closed: X A ∞ 1 ∞ A B 3 4 C 7 8 D ACTIVITIES 1 9 2 10 1 2 3 4 5 6 7 8 9 10 A E D H AE DH E 5 6 F G H DISTANCE FROM ∞ ∞ 1 < 0? Activity Active Node Inactive Node Virtual Node Summary Path Edge weight = 1 Edge weight = 0 Closed Node

Design Decision: Network Voronoi (NV) Activity Assignment X Open: E D H B F Closed: X A E 1 ∞ A B 3 4 C 7 8 D ACTIVITIES 1 9 2 10 1 2 3 4 5 6 7 8 9 10 A E D H AE DH E 5 6 F G H DISTANCE FROM ∞ 1 ∞ Activity Active Node Inactive Node Virtual Node Summary Path Edge weight = 1 Edge weight = 0 Closed Node

Design Decision: Network Voronoi (NV) Activity Assignment X Open: D H B F C Closed: X A E D 1 ∞ 1 A B 3 4 C 7 8 D ACTIVITIES 1 9 2 10 1 2 3 4 5 6 7 8 9 10 A E D H AE DH E 5 6 F G H DISTANCE FROM 1 ∞ 1 < 0? Activity Active Node Inactive Node Virtual Node Summary Path Edge weight = 1 Edge weight = 0 Closed Node

Design Decision: Network Voronoi (NV) Activity Assignment X Open: H B F C G Closed: X A E D H 1 1 A B 3 4 C 7 8 D ACTIVITIES 1 9 2 10 1 2 3 4 5 6 7 8 9 10 A E D H AE DH E 5 6 F G H DISTANCE FROM 1 ∞ 1 Activity Active Node Inactive Node Virtual Node Summary Path Edge weight = 1 Edge weight = 0 Closed Node

Design Decision: Network Voronoi (NV) Activity Assignment X Open: B F C G 2 < 1? Closed: X A E D H B 1 1 A B 3 4 C 7 8 D ACTIVITIES 1 9 2 10 1 2 3 4 5 6 7 8 9 10 A E D H AE DH E 5 6 F G H DISTANCE FROM 1 1 1 1 2 < 1? Activity Active Node Inactive Node Virtual Node Summary Path Edge weight = 1 Edge weight = 0 Closed Node 1 1

Design Decision: Network Voronoi (NV) Activity Assignment X Open: F C G Closed: X A E D H B F 1 1 A B 3 4 C 7 8 D ACTIVITIES 1 9 2 10 1 2 3 4 5 6 7 8 9 10 A E D H AE DH E 5 6 F G H DISTANCE FROM 1 1 1 1 2 < 1? Activity Active Node Inactive Node Virtual Node Summary Path Edge weight = 1 Edge weight = 0 Closed Node 1 1

Design Decision: Network Voronoi (NV) Activity Assignment X Open: C G Closed: X A E D H B F C 1 1 A B 3 4 C 7 8 D ACTIVITIES 1 9 2 10 1 2 3 4 5 6 7 8 9 10 A E D H AE DH E 5 6 F G H DISTANCE FROM 1 1 1 1 2 < 1? Activity Active Node Inactive Node Virtual Node Summary Path Edge weight = 1 Edge weight = 0 Closed Node 1 1 1 1 1 1

Design Decision: Network Voronoi (NV) Activity Assignment Network Voronoi Activity Assignment algorithm Input: Graph G = (N, E), a set of Activities A, a set of k Summary Paths, S Output: A set of k clusters formed by assigning all ai ∈A to one si ∈S, where dist(ai, si) ≤ dist(ai, sj) and sj ∈S and sj ≠ si 1. Open ← all nodes ∈ S, Closed ← Ø 2. Tnodes ← all nodes ∈ S, 3. Tactivities ← activities on si ∈S 4. repeat 5. nc ← next node ∈ Open 6. remove nc from Open 7. Closed ← nc 8. X ← neighbors of nc 9. foreach xi ∈ X 10. if xi ∉ Tnodes and xi ∉ Closed 11. Tnodes ← xi xi.prev ← nc, xi.dist ← dist(xi, nc) + nc.dist xi.sp ← nc.sp else if xi ∈Tnodes update xi if new dist < xi.dist if xi ∉ Open Open ← xi Y ← activities on edge {nc, xi} foreach yi ∈ Y if yi ∉ Tactivities Tactivities ← yi yi.prev ← nc yi.dist ← xi.dist yi.sp ← xi.sp else update yi if new dist < yi.dist until all active nodes ∈ Closed return currentClusters

Design Decision: Divide and Conquer Summary PAth REcomputation Goals Recompute the summary path of each cluster Improve execution time of current recomputation strategy Example (execution trace) Next K-Main Routes Algorithm Select k shortest paths as initial summary paths Repeat Network Voronoi Activity Assignment Divide and Conquer Summary path Recomputation Design Decision Until summary paths do not change K-Main Routes Algorithm Select k shortest paths as initial summary paths Repeat Network Voronoi Activity Assignment Recompute summary path of each cluster Until summary paths do not change

Design Decision: Divide and Conquer Summary PAth REcomputation Summary Path Recomputation Algorithm Input: Graph G = (N, E), a set of Clusters, C Output: A set of summary paths, S where si ∈S has max coverage for ci ∈ C and si ∈ ci nextClusters ← Ø foreach ci ∈ C X ← active nodes of ci maxP ← Ø foreach xi ∈ X foreach xj ∈ X if (i ≠ j) cP ← getSP(xi, xj) if (maxP = Ø) maxP ← cP if (maxP.activities < cP.activities) if (maxP ≠ ci.summaryPath nextClusters ← maxP else nextClusters ← ci.summaryPath return nextClusters A B C D E F G H 1 2 3 4 5 6 7 8 9 10 Activity Active Node Inactive Node Summary Path Edge weights are 1 Cluster

Validation Analytical Experimental Case studies Cost analysis explaining computational savings Experimental Comparative analysis of KMR with various design decisions Performed on real and synthetic data Network voronoi activity assignment and divide and conquer summary path recomputation saves computational costs Savings increase with number of nodes, routes, activities and active node ratio Case studies Qualitatively shows the usefulness of network based summarization on Crime data

Analytical Evaluation: Computational Analysis KMR Execution Time = Number of Iterations × (Activity Assignment Cost + Summary Path Recomputation Cost) TKMR = I × ([K × |A| × cost(ai,ci)] + [K × dc × |N|2]) TKMR_I = I × ([K × |A| × cost(ai,ci)] + [K × dc × (|N| × r)2]) TKMR_IAS = I × ([|E| + |N|×log |N|] + [K × dc × (|N|/K × r)2]) I = Number of Iterations K = Number of Clusters A = Set of activities cost(ai, ci) = Cost of calculating the distance between activity ai and cluster ci dc = Cost of looking up a path N = Set of Nodes E = Set of Edges r = active node ratio, 0 ≤ r ≤ 1

Experimental Evaluation Variables Synthetic Dataset Real Dataset #Nodes #Routes Measures Java-based Simulator Analysis #Activities Active Node Ratio Candidates KMR_I KMR_IV KMR_ID KMR_IVD Goal: Comparative analysis Candidates: KMR with various design decisions KMR_I – KMR with inactive node pruning KMR_IV – KMR with inactive node pruning and Network voronoi activity assignment KMR_ID – KMR with Divide and conquer summary path recomputation KMR_IVD – KMR with all three design decisions Measure: CPU time (Unix time command) Platform: Mac Pro, 2 x Xeon Quad Core 2.26 GHz, 16 GB RAM Variables: #Nodes, #Routes, #Activities, Active Node Ratio Fixed Parameters: unit edge length Datasets: Synthetic and Real (Haiti Earthquake) 34

Data Description and Characteristics Synthetic Data 2010 Census TIGER/Line® Shapefiles used for road network Activities randomly assigned to each edge Real-world data: Haiti Data Set Geospatial and Temporal Dataset describing recent events post-disaster Dataset collected from Jan 12, 2010 to March 23, 2010 1,677 records Characteristics Attributes Incident Title (e.g., “Food, Water, Tents needed…”) Incident Date and Time Location (City, port name) Category (numeric category) Latitude/Longitude Sources Crisis Map of Haiti - http://haiti.ushahidi.com/ OpenStreetMap - http://www.openstreetmap.org/ 35

Effect of Number of Nodes Synthetic Data Set Number of Activities = 1200 Active Node Ratio = 0.2 K = 2 Real Data Set Number of Activities = 1206 Active Node Ratio = 0.1998 K = 2 Trends: Voronoi Activity assignment and divide and conquer summary path recomputation saves comp. costs Savings increase with number of nodes

Effect of Number of Routes, K Synthetic Data Set Number of Nodes = 1000 Number of Activities = 1200 Active Node Ratio = 0.2 Real Data Set Number of Nodes = 1000 Number of Activities = 202 Active Node Ratio = 0.219 Trends: Voronoi Activity assignment and divide and conquer summary path recomputation saves comp. costs Savings increase with number of routes

Effect of Number of Activities Synthetic Data Set Number of Nodes = 1000 Active Node Ratio = 0.2 K = 2 Trends: Voronoi Activity assignment and divide and conquer summary path recomputation saves comp. costs Savings increase with number of activities

Effect of Active Node Ratio Synthetic Data Set Number of Nodes = 1000 Number of Activities = 1200 K = 2 Trends: Voronoi Activity assignment and divide and conquer summary path recomputation saves comp. costs Savings increase with active node ratio

Case Study: Crime Analysis Input (a set of crime incidents, k=5) KMR Output Crimestat K-Means (Euclidean distance) Crimestat K-Means (Network distance)

Case Study: Crime Analysis Input (a set of crime incidents, k=5) KMR Output Crimestat K-Means (Euclidean distance) Crimestat K-Means (Network distance)

Case Study: Crime Analysis Input (a set of crime incidents, k=5) KMR Output Crimestat K-Means (Euclidean distance) Crimestat K-Means (Network distance)

Summary Spatial network activity summarization was shown to be NP-complete. K-Main Routes (KMR) algorithm and its design decisions described Inactive node pruning Network Voronoi Activity assignment Divide and Conquer Summary path recomputation Analytically demonstrated correctness of design decisions and cost analysis showed Experimental evaluation Performance evaluated using synthetic and real world datasets Case study comparing KMR with geometry based summarization 43

Future Work Short Term Long Term Usefulness When is it useful to domain professionals (crime analysts, emergency managers)? For which use cases is the proposed solution appropriate? For which geographies is the proposed solution appropriate? Distance based objective function instead of coverage based Overlapping paths Long Term Dynamically changing incidents Edge lengths, e.g. activities on a small section of a long edge 44

Acknowledgements Members of the Spatial Database and Spatial Data Mining Research Group, University of Minnesota, Twin-Cities. This work was supported by grants from USARMY and USDOD. Thank you for your time! Any questions or comments?