-
2
-
-
28444449426
-
Data Privacy through Optimal k-Anonymization
-
R. J. Bayardo and R. Agrawal, "Data Privacy through Optimal k-Anonymization," in Proc. of ICDE. 2005, pp. 217-228.
-
(2005)
Proc. of ICDE
, pp. 217-228
-
-
Bayardo, R.J.1
Agrawal, R.2
-
3
-
-
29844444250
-
Incognito: Efficient Full-domain k-Anorivmity
-
K. LeFevre, D. J. DeWitt, and R. Ramakrishnan, "Incognito: Efficient Full-domain k-Anorivmity," in Proc. of ACM SIGMOD,"2005, pp. 49-60.
-
(2005)
Proc. of ACM SIGMOD
, pp. 49-60
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
5
-
-
33745629638
-
On k-Anonymity and the Curse, of Dimensionality
-
C. C. Aggarwal, "On k-Anonymity and the Curse, of Dimensionality." in Proc. of VLDB, 2005. pp. 901-909.
-
(2005)
Proc. of VLDB
, pp. 901-909
-
-
Aggarwal, C.C.1
-
6
-
-
84893853914
-
Anatomy: Simple and Effective Privacy Preservation
-
X. Xiao and Y. Tao, "Anatomy: Simple and Effective Privacy Preservation," in Proc. of VLDB, 2006.
-
(2006)
Proc. of VLDB
-
-
Xiao, X.1
Tao, Y.2
-
7
-
-
0036811662
-
k-Anonymity: A Model for Protecting Privacy
-
L. Sweeney, "k-Anonymity: A Model for Protecting Privacy," International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10. no. 5. pp. 557-570, 2002.
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
8
-
-
34250673244
-
Injecting Utility into Anonymized Datasets
-
D. Kifer and J. Gehrke. "Injecting Utility into Anonymized Datasets," in Proc. of ACM SIGMOD, 2006, pp. 217-228.
-
(2006)
Proc. of ACM SIGMOD
, pp. 217-228
-
-
Kifer, D.1
Gehrke, J.2
-
9
-
-
0016939622
-
An algorithm for reducing the bandwidth and profile of a sparse matrix
-
N. Gibbs, W. Poole, and P. Stockmeyer, "An algorithm for reducing the bandwidth and profile of a sparse matrix." SIAM J. Numerical Analysis, vol. 13, pp. 236-250. 1976.
-
(1976)
SIAM J. Numerical Analysis
, vol.13
, pp. 236-250
-
-
Gibbs, N.1
Poole, W.2
Stockmeyer, P.3
-
10
-
-
34547191587
-
Reducing the total bandwidth of a sparse unsymmetric matrix
-
J. K. Reid and J. A. Scott, "Reducing the total bandwidth of a sparse unsymmetric matrix," SIAM J. Matrix Anal. Appl. vol. 28, no. 3, pp. 805-821, 2006.
-
(2006)
SIAM J. Matrix Anal. Appl
, vol.28
, Issue.3
, pp. 805-821
-
-
Reid, J.K.1
Scott, J.A.2
-
11
-
-
0016881473
-
The NP-completeness of the bandwidth minimization problem
-
C. Papadimitriou. "The NP-completeness of the bandwidth minimization problem." Computing, vol. 16. pp. 263-270, 1976.
-
(1976)
Computing
, vol.16
, pp. 263-270
-
-
Papadimitriou, C.1
-
12
-
-
0014612601
-
Reducing the bandwidth of sparse symmetric matrices
-
E. Cuthill and J. McKee, "Reducing the bandwidth of sparse symmetric matrices," in 24th National ACM Conference, 1969, pp. 157-172.
-
(1969)
24th National ACM Conference
, pp. 157-172
-
-
Cuthill, E.1
McKee, J.2
-
13
-
-
0018915486
-
A linear time implementation of the Reverse Cuthill-McKee algorithm
-
W. M. Chan and A. George, "A linear time implementation of the Reverse Cuthill-McKee algorithm," BIT Numerical Mathematics, vol, 20, no. 1, pp. 8-14, 1980.
-
(1980)
BIT Numerical Mathematics
, vol.20
, Issue.1
, pp. 8-14
-
-
Chan, W.M.1
George, A.2
-
14
-
-
0035788918
-
Real world performance of association rule algorithms,
-
Z. Zheng, R. Kohavi, and L. Mason, "Real world performance of association rule algorithms,'' in Proc. of KDD, 2001, pp. 401-406.
-
(2001)
Proc. of KDD
, pp. 401-406
-
-
Zheng, Z.1
Kohavi, R.2
Mason, L.3
-
16
-
-
29844458622
-
Deriving private information from randomized data
-
Z. Huang, W. Du. and B. Chen. "Deriving private information from randomized data," in Proc. of ACM SIGMOD, 2005.
-
(2005)
Proc. of ACM SIGMOD
-
-
Huang, Z.1
Du, W.2
Chen, B.3
-
18
-
-
34250661905
-
Achieving Anonymity via Clustering
-
G. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D. Thomas, and A. Zhu, "Achieving Anonymity via Clustering," in Proc. of ACM PODS. 2006, pp. 153-162.
-
(2006)
Proc. of ACM PODS
, pp. 153-162
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Khuller, S.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
19
-
-
52649160569
-
Utility-Based Anonymization Using Local Receding
-
J. Xu, W. Wang, J. Pei, X. Wang. B. Shi, and A. Fu, "Utility-Based Anonymization Using Local Receding," in Proc. of SIGKDD, 2006. pp. 20-23.
-
(2006)
Proc. of SIGKDD
, pp. 20-23
-
-
Xu, J.1
Wang, W.2
Pei, J.3
Wang, X.4
Shi, B.5
Fu, A.6
-
20
-
-
84988315609
-
Fast Data Anoriymization with Low Information Loss
-
O. Ghinita, P. Karras, P. Kalnis, and N. Mamoulis. "Fast Data Anoriymization with Low Information Loss," in Proc. of VLDB, 2007. pp. 758-769.
-
(2007)
Proc. of VLDB
, pp. 758-769
-
-
Ghinita, O.1
Karras, P.2
Kalnis, P.3
Mamoulis, N.4
-
21
-
-
35648982949
-
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
-
P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, "Preventing Location-Based Identity Inference in Anonymous Spatial Queries." IEEE TKDE, vol. 19, no. 12, pp. 1719-1733, 2007.
-
(2007)
IEEE TKDE
, vol.19
, Issue.12
, pp. 1719-1733
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
24
-
-
2142754478
-
Association rule hiding
-
V. Verykios. A. Elmagarmid, E. Bertino, Y. Saygin, and E. Dasseni, "Association rule hiding," IEEE TKDE, vol. 16, no. 4, pp. 434-447, 2004.
-
(2004)
IEEE TKDE
, vol.16
, Issue.4
, pp. 434-447
-
-
Verykios, V.1
Elmagarmid, A.2
Bertino, E.3
Saygin, Y.4
Dasseni, E.5
|