-
1
-
-
33745629638
-
On k-Anonymity and the Curse of Dimensionality
-
C. C. Aggarwal. On k-Anonymity and the Curse of Dimensionality. In Proc. of VLDB, pages 901-909, 2005.
-
(2005)
Proc. of VLDB
, pp. 901-909
-
-
Aggarwal, C.C.1
-
3
-
-
0035009259
-
A Clustering Scheme for Hierarchical Control in Wireless Networks
-
S. Banerjee and S. Khuller. A Clustering Scheme for Hierarchical Control in Wireless Networks. In Proc. of IEEE INFOCOM, pages 1028-1037, 2001.
-
(2001)
Proc. of IEEE INFOCOM
, pp. 1028-1037
-
-
Banerjee, S.1
Khuller, S.2
-
4
-
-
28444449426
-
Data Privacy through Optimal k-Anonymization
-
R. Bayardo and R. Agrawal. Data Privacy through Optimal k-Anonymization. In Proc. of ICDE, pages 217-228, 2005.
-
(2005)
Proc. of ICDE
, pp. 217-228
-
-
Bayardo, R.1
Agrawal, R.2
-
5
-
-
0036606530
-
A Framework for Generating Network-Based Moving Objects
-
T. Brinkhoff. A Framework for Generating Network-Based Moving Objects. Geoinformatica, 6(2):153-180, 2002.
-
(2002)
Geoinformatica
, vol.6
, Issue.2
, pp. 153-180
-
-
Brinkhoff, T.1
-
6
-
-
0015050308
-
Alternative Algorithm for Hubert's Space-Filling Curve
-
A. R. Butz. Alternative Algorithm for Hubert's Space-Filling Curve. IEEE Trans. on Computers, 20(4):424-426, 1971.
-
(1971)
IEEE Trans. on Computers
, vol.20
, Issue.4
, pp. 424-426
-
-
Butz, A.R.1
-
7
-
-
34547474184
-
A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services
-
C.-Y. Chow, M. F. Mokbel, and X. Liu. A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services. In In Proc. of ACM GIS, pages 171-178, 2006.
-
(2006)
In Proc. of ACM GIS
, pp. 171-178
-
-
Chow, C.-Y.1
Mokbel, M.F.2
Liu, X.3
-
8
-
-
77954433598
-
Querying P2P Networks using P-trees
-
A. Crainiceanu, P. Linga, J. Gehrke, and J. Shanmugasundaram. Querying P2P Networks using P-trees. In Proc. of WebDB, pages 25-30, 2004.
-
(2004)
Proc. of WebDB
, pp. 25-30
-
-
Crainiceanu, A.1
Linga, P.2
Gehrke, J.3
Shanmugasundaram, J.4
-
9
-
-
27944454864
-
Location Privacy in Mobile Systems: A Personalized Anonymization Model
-
B. Gedik and L. Liu. Location Privacy in Mobile Systems: A Personalized Anonymization Model. In Proc. of ICDCS, pages 620-629, 2005.
-
(2005)
Proc. of ICDCS
, pp. 620-629
-
-
Gedik, B.1
Liu, L.2
-
10
-
-
85018204196
-
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
-
M. Gruteser and D. Grunwald. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In Proc. of USENIX MobiSys, pages 31-42, 2003.
-
(2003)
Proc. of USENIX MobiSys
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
11
-
-
31344477599
-
Range Nearest-Neighbor Query
-
H. Hu and D. L. Lee. Range Nearest-Neighbor Query. IEEE TKDE, 18(1):78-91, 2006.
-
(2006)
IEEE TKDE
, vol.18
, Issue.1
, pp. 78-91
-
-
Hu, H.1
Lee, D.L.2
-
12
-
-
33745630382
-
BATON: A Balanced Tree Structure for P2P networks
-
H. V. Jagadish, B. C. Ooi, and Q. H. Vu. BATON: a Balanced Tree Structure for P2P networks. In Proc. of VLDB, pages 661-672, 2005.
-
(2005)
Proc. of VLDB
, pp. 661-672
-
-
Jagadish, H.V.1
Ooi, B.C.2
Vu, Q.H.3
-
13
-
-
35348818457
-
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
-
Technical Report TRB36/06, National Univ. of Singapore
-
P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. Preventing Location-Based Identity Inference in Anonymous Spatial Queries. Technical Report TRB36/06, National Univ. of Singapore, 2006.
-
(2006)
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
15
-
-
33749607006
-
1-Diversity: Privacy Beyond k-Anonymity
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. 1-Diversity: Privacy Beyond k-Anonymity. In Proc. of ICDE, pages 24-35, 2006.
-
(2006)
Proc. of ICDE
, pp. 24-35
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
16
-
-
3142691086
-
On the Complexity of Optimal K-anonymity
-
A. Meyerson and R. Williams. On the Complexity of Optimal K-anonymity. In Proc. of A CM PODS, pages 223-228, 2004.
-
(2004)
Proc. of A CM PODS
, pp. 223-228
-
-
Meyerson, A.1
Williams, R.2
-
17
-
-
34547720006
-
The New Casper: Query Processing for Location Services without Compromising Privacy
-
M. F. Mokbel, C. Y. Chow, and W. G. Aref. The New Casper: Query Processing for Location Services without Compromising Privacy. In Proc. of VLDB, pages 763-774, 2006.
-
(2006)
Proc. of VLDB
, pp. 763-774
-
-
Mokbel, M.F.1
Chow, C.Y.2
Aref, W.G.3
-
18
-
-
84944047281
-
Efficient OLAP Operations in Spatial Data Warehouses
-
D. Papadias, P. Kalnis, J. Zhang, and Y. Tao. Efficient OLAP Operations in Spatial Data Warehouses. In Proc. of SSTD, pages 443-459, 2001.
-
(2001)
Proc. of SSTD
, pp. 443-459
-
-
Papadias, D.1
Kalnis, P.2
Zhang, J.3
Tao, Y.4
-
19
-
-
0035517699
-
Protecting Respondents' Identities in Microdata Release
-
P. Samarati. Protecting Respondents' Identities in Microdata Release. IEEE TKDE, 13(6): 1010-1027, 2001.
-
(2001)
IEEE TKDE
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
20
-
-
0037298256
-
Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications
-
I. Stoica, R. Morris, D. Liben-Nowell, D. R. Karger, M. F. Kaashoek, F. Dabek, and H. Balakrishnan. Chord: a Scalable Peer-to-Peer Lookup Protocol for Internet Applications. IEEE/ACM Transactions on Networking, 11(1):17-32, 2003.
-
(2003)
IEEE/ACM Transactions on Networking
, vol.11
, Issue.1
, pp. 17-32
-
-
Stoica, I.1
Morris, R.2
Liben-Nowell, D.3
Karger, D.R.4
Kaashoek, M.F.5
Dabek, F.6
Balakrishnan, H.7
-
22
-
-
34250680246
-
Personalized Privacy Preservation
-
Y. Tao and X. Xiao. Personalized Privacy Preservation. In Proc. of ACM SIGMOD, pages 229-240, 2006.
-
(2006)
Proc. of ACM SIGMOD
, pp. 229-240
-
-
Tao, Y.1
Xiao, X.2
-
23
-
-
0036373331
-
Improving Search in Peer-to-Peer Networks
-
B. Yang and H. Garcia-Molina. Improving Search in Peer-to-Peer Networks. In Proc. of ICDCS, pages 5-14, 2002.
-
(2002)
Proc. of ICDCS
, pp. 5-14
-
-
Yang, B.1
Garcia-Molina, H.2
|