-
1
-
-
0024914229
-
Security control methods for statistical databases: A comparative study
-
Adam, N.R. & Wortmann, J.C. (1989). Security control methods for statistical databases: a comparative study. ACM Computing Surveys 21, 515-556.
-
(1989)
ACM Computing Surveys
, vol.21
, pp. 515-556
-
-
Adam, N.R.1
Wortmann, J.C.2
-
2
-
-
85034804999
-
A model of summary data and its applications to statistical databases
-
Proc. IV Int. Working Conf. on "Statistical & Scientific Database Management" (M. Rafanelli et alii, eds.)
-
Chang Chen, M., & McNamee, L., & Melkanoff, M. (1988). A model of summary data and its applications to statistical databases, Proc. IV Int. Working Conf. on "Statistical & Scientific Database Management" (M. Rafanelli et alii, eds.), Lecture Notes in Computer Sciences 339,354-372.
-
(1988)
Lecture Notes in Computer Sciences
, vol.339
, pp. 354-372
-
-
Chang Chen, M.1
McNamee, L.2
Melkanoff, M.3
-
3
-
-
0024914679
-
On the data model and access method of summary data management
-
Chang Chen, M., & McNamee, L. (1989). On the data model and access method of summary data management. IEEE Trans, on Knowledge and Data Engineering 1, 519-529.
-
(1989)
IEEE Trans, on Knowledge and Data Engineering
, vol.1
, pp. 519-529
-
-
Chang Chen, M.1
McNamee, L.2
-
4
-
-
0023348871
-
Cut set and the max cut problem
-
Conforti, M. & Rao, M.R (1987). Cut set and the max cut problem. Math. Oper. Res. 12, 193-204.
-
(1987)
Math. Oper. Res.
, vol.12
, pp. 193-204
-
-
Conforti, M.1
Rao, M.R.2
-
5
-
-
0000082189
-
Suppression methodology and statistical disclosure control
-
Cox, L.H. (1980). Suppression methodology and statistical disclosure control. J. American Statistical Association 75,377-385.
-
(1980)
J. American Statistical Association
, vol.75
, pp. 377-385
-
-
Cox, L.H.1
-
6
-
-
0039081399
-
Generalization of magic graphs
-
Doob, M. (1974). Generalization of magic graphs. J. Combinatorial Theory B 17,205-217.
-
(1974)
J. Combinatorial Theory B
, vol.17
, pp. 205-217
-
-
Doob, M.1
-
7
-
-
0024019017
-
A graph-theoretic approach to statistical data security
-
Gusfield, D. (1988). A graph-theoretic approach to statistical data security. SIAM J. Computing 17, 552-571.
-
(1988)
SIAM J. Computing
, vol.17
, pp. 552-571
-
-
Gusfield, D.1
-
9
-
-
0036588871
-
A linear algorithm for finding the invariant edges of an edge-weighted graph
-
Malvestuto, P.M. & Mezzini, M. (2002). A linear algorithm for finding the invariant edges of an edge-weighted graph. SIAMJ. on Computing 31,1438-1455.
-
(2002)
SIAMJ. on Computing
, vol.31
, pp. 1438-1455
-
-
Malvestuto, P.M.1
Mezzini, M.2
-
11
-
-
0004025372
-
Statistical Disclosure Control in Practice
-
Springer-Verlag, New York
-
Willenborg, L. & de Waal, T. (1996). Statistical Disclosure Control in Practice. Lecture Notes in Statistics, Vol. Ill, Springer-Verlag, New York.
-
(1996)
Lecture Notes in Statistics
-
-
Willenborg, L.1
De Waal, T.2
-
12
-
-
0004025374
-
Elements of Statistical Disclosure
-
Springer-Verlag, New York
-
Willenborg, L. & de Waal, T. (2000). Elements of Statistical Disclosure. Lecture Notes in Statistics, Vol. 155, Springer-Verlag, New York.
-
(2000)
Lecture Notes in Statistics
, vol.155
-
-
Willenborg, L.1
De Waal, T.2
|