-
2
-
-
84890245567
-
-
2nd ed. John Wiley & Sons, Inc, New York
-
Bazaraa, M. S., H. D. Sherali, C. M. Shetty. 1993. Nonlinear Programming, Theory and Algorithms, 2nd ed. John Wiley & Sons, Inc., New York.
-
(1993)
Nonlinear Programming, Theory and Algorithms
-
-
Bazaraa, M.S.1
Sherali, H.D.2
Shetty, C.M.3
-
3
-
-
0004190705
-
-
Addison-Wesley Publishing Company, Reading, MA
-
Castano, S., M. Fugini, G. Martella, P. Samarati. 1996. Database Security. Addison-Wesley Publishing Company, Reading, MA.
-
(1996)
Database Security
-
-
Castano, S.1
Fugini, M.2
Martella, G.3
Samarati, P.4
-
4
-
-
0020205885
-
Auditing and inference control in statistical databases
-
Chin, F., G. Ozsoyoglu. 1982. Auditing and inference control in statistical databases. IEEE Trans. Software Engrg. SE-8(6) 574-582.
-
(1982)
IEEE Trans. Software Engrg
, vol.SE-8
, Issue.6
, pp. 574-582
-
-
Chin, F.1
Ozsoyoglu, G.2
-
5
-
-
0004116989
-
-
MIT Press, Cambridge, MA
-
Cormen, T., C. Leiserson, R. Rivest. 2000. Introduction to Algorithms. MIT Press, Cambridge, MA.
-
(2000)
Introduction to Algorithms
-
-
Cormen, T.1
Leiserson, C.2
Rivest, R.3
-
6
-
-
0000082189
-
Supression methodology and statistical disclosure control
-
Cox, L. H. 1980. Supression methodology and statistical disclosure control. J. Amer. Statist. Assoc. 75(370) 377-385.
-
(1980)
J. Amer. Statist. Assoc
, vol.75
, Issue.370
, pp. 377-385
-
-
Cox, L.H.1
-
8
-
-
2242464139
-
Optimal disclosure limitation strategy in statistical databases: Deterring tracker attacks through additive noise
-
Duncan, G. T., S. Mukherjee. 2000. Optimal disclosure limitation strategy in statistical databases: Deterring tracker attacks through additive noise. J. Amer. Statist. Assoc. 95(451) 720-729.
-
(2000)
J. Amer. Statist. Assoc
, vol.95
, Issue.451
, pp. 720-729
-
-
Duncan, G.T.1
Mukherjee, S.2
-
9
-
-
0002861216
-
A Bayesian approach to data disclosure: Optimal intruder behavior for continuous data
-
Fienberg, S. E., U. E. Makov, A. P. Sanil. 1997. A Bayesian approach to data disclosure: Optimal intruder behavior for continuous data. J. Official Statist. 3(1) 75-89.
-
(1997)
J. Official Statist
, vol.3
, Issue.1
, pp. 75-89
-
-
Fienberg, S.E.1
Makov, U.E.2
Sanil, A.P.3
-
10
-
-
0008551538
-
Models and algorithms for the 2-dimensional cell supression problem in statistical disclosure control
-
Fischetti, M., J. J. Salazar. 1999. Models and algorithms for the 2-dimensional cell supression problem in statistical disclosure control. Math. Programming 84(2) 283-312.
-
(1999)
Math. Programming
, vol.84
, Issue.2
, pp. 283-312
-
-
Fischetti, M.1
Salazar, J.J.2
-
11
-
-
0004236492
-
-
3rd ed. The Johns Hopkins University Press, New York
-
Golub, G. H., C. F. Van Loan. 1997. Matrix Computations, 3rd ed. The Johns Hopkins University Press, New York.
-
(1997)
Matrix Computations
-
-
Golub, G.H.1
Van Loan, C.F.2
-
12
-
-
0000328477
-
Interval protection of confidential information in a database
-
Gopal, R., P. Goes, R. Garfinkel. 1998. Interval protection of confidential information in a database. J. Comput. 10(3) 309-322.
-
(1998)
J. Comput
, vol.10
, Issue.3
, pp. 309-322
-
-
Gopal, R.1
Goes, P.2
Garfinkel, R.3
-
16
-
-
0000610330
-
Accessibility, security, and accuracy in statistical databases: The case for the multiplicative fixed data perturbation approach
-
Muralidhar, K., D. Batra, P. J. Kirs. 1995. Accessibility, security, and accuracy in statistical databases: The case for the multiplicative fixed data perturbation approach. Management Sci. 41(9) 1549-1564.
-
(1995)
Management Sci
, vol.41
, Issue.9
, pp. 1549-1564
-
-
Muralidhar, K.1
Batra, D.2
Kirs, P.J.3
-
17
-
-
0033207750
-
A general additive data perturbation method for database security
-
Muralidhar, K., R. Parsa, R. Sarathy. 1999. A general additive data perturbation method for database security. Management Sci. 45(10) 1399-1415.
-
(1999)
Management Sci
, vol.45
, Issue.10
, pp. 1399-1415
-
-
Muralidhar, K.1
Parsa, R.2
Sarathy, R.3
-
18
-
-
0035565671
-
An improved security requirement for data perturbation with implications for e-commerce
-
Muralidhar, K., R. Sarathy, R. Parsa. 2001. An improved security requirement for data perturbation with implications for e-commerce. Decision Sci. 32(4) 683-698.
-
(2001)
Decision Sci
, vol.32
, Issue.4
, pp. 683-698
-
-
Muralidhar, K.1
Sarathy, R.2
Parsa, R.3
-
19
-
-
0010814278
-
Best algorithms for approximating the maximum of a submodular set function
-
177-188
-
Nemhauser, G. L., L. A. Wolsey. 1978. Best algorithms for approximating the maximum of a submodular set function. Math. Oper. Res. 3(3) 177-188.
-
(1978)
Math. Oper. Res
, vol.3
, Issue.3
-
-
Nemhauser, G.L.1
Wolsey, L.A.2
-
21
-
-
0000095809
-
An analysis of approximations for maximizing submodular set functions - I
-
Nemhauser, G. L., L. A. Wolsey, M. L. Fisher. 1978. An analysis of approximations for maximizing submodular set functions - I. Math. Programming 14 265-294.
-
(1978)
Math. Programming
, vol.14
, pp. 265-294
-
-
Nemhauser, G.L.1
Wolsey, L.A.2
Fisher, M.L.3
-
22
-
-
38549084973
-
-
Statistics New Zealand, Government of New Zealand
-
Statistics New Zealand. 2003. 2007 Census of Population and Dwellings - Meshblock Database Content. Government of New Zealand. http://www.stats.govt.nz/NR/rdonlyres/3C972F72-2CF2-4CAA-A7A0-015D76A72CD6/0/ mbdbcontent.xls.
-
(2003)
2007 Census of Population and Dwellings - Meshblock Database Content
-
-
-
24
-
-
0013776710
-
Randomized response: A survey technique for eliminating evasive answer bias
-
Warner, S. L. 1965. Randomized response: A survey technique for eliminating evasive answer bias. J. Amer. Statist. Assoc. 60(309) 63-69.
-
(1965)
J. Amer. Statist. Assoc
, vol.60
, Issue.309
, pp. 63-69
-
-
Warner, S.L.1
|