-
1
-
-
33746052559
-
Anonymizing tables
-
January
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. Anonymizing tables. In Proc. of the 10th Int'l Conference on Database Theory, January 2005.
-
(2005)
Proc. of the 10th Int'l Conference on Database Theory
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
4
-
-
0003787146
-
-
Princeton University Press, Princeton, NJ
-
R. Bellman. Dynamic Programming. Princeton University Press, Princeton, NJ, 1957.
-
(1957)
Dynamic Programming
-
-
Bellman, R.1
-
6
-
-
0344811122
-
An overview of data warehousing and OLAP technology
-
S. Chaudhuri and U. Dayal. An overview of data warehousing and OLAP technology. SICMOD Record, 26, 1997.
-
(1997)
SICMOD Record
, vol.26
-
-
Chaudhuri, S.1
Dayal, U.2
-
8
-
-
21744433274
-
Data cube: A relational aggregation operator generalizing group-by, cross-tab, and sub-totals
-
November
-
J. Gray, S.Chaudhuri, A. Bosworth, A. Layman, D. Reichart, M. Venkatrao, F. Pellow, and H. Pirahesh. Data cube: A relational aggregation operator generalizing group-by, cross-tab, and sub-totals. Data Mining and Knowledge Discovery, 1(1), November 1996.
-
(1996)
Data Mining and Knowledge Discovery
, vol.1
, Issue.1
-
-
Gray, J.1
Chaudhuri, S.2
Bosworth, A.3
Layman, A.4
Reichart, D.5
Venkatrao, M.6
Pellow, F.7
Pirahesh, H.8
-
14
-
-
0035517699
-
Protecting respondants' identities in microdata release
-
November/December
-
P. Samarati. Protecting respondants' identities in microdata release. IEEE Transactions on Knowledge and Data Engineering, 13(6), November/December 2001.
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
-
-
Samarati, P.1
-
15
-
-
0003483188
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
SRI Computer Science Laboratory
-
P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report SRI-CSL-98-04, SRI Computer Science Laboratory, 1998.
-
(1998)
Technical Report
, vol.SRI-CSL-98-04
-
-
Samarati, P.1
Sweeney, L.2
-
17
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
L. Sweeney. Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems, 10(5):571-588, 2002.
-
(2002)
International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
18
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney. K-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems, 10(5):557-570, 2002.
-
(2002)
International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
21
-
-
4344650051
-
Using simulated annealing for k-anonymity
-
US Census Bureau Statistical Research Division, November
-
W. Winkler. Using simulated annealing for k-anonymity. Research Report 2002-07, US Census Bureau Statistical Research Division, November 2002.
-
(2002)
Research Report
, vol.2002
, Issue.7
-
-
Winkler, W.1
|