-
1
-
-
72949107720
-
-
http://www.anonymizer.com/, 2009.
-
(2009)
-
-
-
2
-
-
72949117549
-
-
http://www.mailshell.com, 2009.
-
(2009)
-
-
-
3
-
-
72949086069
-
-
http://www.spamgourmet.com/, 2009.
-
(2009)
-
-
-
4
-
-
85136049562
-
Vision paper: Enabling privacy for the paranoids
-
G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-Molina, K. Kenthapadi, N. Mishra, R. Motwani, U. Srivastava, D. Thomas, J. Widom, and Y. Xu, "Vision Paper: Enabling Privacy for the Paranoids," Proc. Int'l Conf. Very Large Data Bases (VLDB), 2004.
-
(2004)
Proc. Int'l Conf. Very Large Data Bases (VLDB)
-
-
Aggarwal, G.1
Bawa, M.2
Ganesan, P.3
Garcia-Molina, H.4
Kenthapadi, K.5
Mishra, N.6
Motwani, R.7
Srivastava, U.8
Thomas, D.9
Widom, J.10
Xu, Y.11
-
5
-
-
0242674432
-
Hippocratic databases
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "Hippocratic Databases," Proc. Int'l Conf. Very Large Data Bases (VLDB), 2002.
-
(2002)
Proc. Int'l Conf. Very Large Data Bases (VLDB)
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
7
-
-
0036606530
-
A framework for generating network-based moving objects
-
T. Brinkhoff, "A Framework for Generating Network-Based Moving Objects," GeoInformatica, vol.6, no.2, pp. 153-180, 2002.
-
(2002)
GeoInformatica
, vol.6
, Issue.2
, pp. 153-180
-
-
Brinkhoff, T.1
-
8
-
-
0015050308
-
Alternative algorithm for hilbert's space-filling curve
-
Apr.
-
A.R. Butz, "Alternative Algorithm for Hilbert's Space-Filling Curve," IEEE Trans. Computers, vol.20, no.4, pp. 424-426, Apr. 1971.
-
(1971)
IEEE Trans. Computers
, vol.20
, Issue.4
, pp. 424-426
-
-
Butz, A.R.1
-
11
-
-
34147120474
-
A note on two problems in connection with graphs
-
E.W. Dijkstra, "A Note on Two Problems in Connection with Graphs," Numerische Math., vol.1, pp. 269-271, 1959.
-
(1959)
Numerische Math.
, vol.1
, pp. 269-271
-
-
Dijkstra, E.W.1
-
13
-
-
0002293349
-
Matching, euler tours and the Chinese Postman
-
J. Edmonds and E. Johnson, "Matching, Euler Tours and the Chinese Postman," Math. Programming, vol.5, pp. 88-124, 1973.
-
(1973)
Math. Programming
, vol.5
, pp. 88-124
-
-
Edmonds, J.1
Johnson, E.2
-
15
-
-
57149129292
-
Private queries in location based services: Anonymizers are not necessary
-
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan, "Private Queries in Location Based Services: Anonymizers Are Not Necessary," Proc. ACM SIGMOD, 2008.
-
(2008)
Proc. ACM SIGMOD
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.-L.5
-
17
-
-
1642286258
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
M. Gruteser and D. Grunwald, "Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking," Proc. MobiSys, 2003.
-
(2003)
Proc. MobiSys
-
-
Gruteser, M.1
Grunwald, D.2
-
22
-
-
0032071072
-
Hierarchical encoded path views for path query processing: An optimal model and its performance evaluation
-
May/June
-
N. Jing, Y.W. Huang, and E.A. Rundensteiner, "Hierarchical Encoded Path Views for Path Query Processing: An Optimal Model and Its Performance Evaluation," IEEE Trans. Knowledge and Data Eng., vol.10, no.3, pp. 409-432, May/June 1998.
-
(1998)
IEEE Trans. Knowledge and Data Eng.
, vol.10
, Issue.3
, pp. 409-432
-
-
Jing, N.1
Huang, Y.W.2
Rundensteiner, E.A.3
-
23
-
-
35648982949
-
Preserving location-based identity inference in anonymous spatial queries
-
Dec.
-
P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, "Preserving Location-Based Identity Inference in Anonymous Spatial Queries," IEEE Trans. Knowledge and Data Eng., vol.19, no.12, pp. 1719-1733, Dec. 2007.
-
(2007)
IEEE Trans. Knowledge and Data Eng.
, vol.19
, Issue.12
, pp. 1719-1733
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
27
-
-
84976768905
-
Query processing in main memory database management systems
-
T.J. Lehman and M.J. Carey, "Query Processing in Main Memory Database Management Systems," Proc. ACM SIGMOD, 1986.
-
(1986)
Proc. ACM SIGMOD
-
-
Lehman, T.J.1
Carey, M.J.2
-
29
-
-
5444258405
-
Efficient OLAP operations in spatial data warehouses
-
D. Papadias, P. Kalnis, J. Zhang, and Y. Tao, "Efficient OLAP Operations in Spatial Data Warehouses," Proc. Int'l Symp. Spatial and Temporal Databases (SSTD), 2001.
-
(2001)
Proc. Int'l Symp. Spatial and Temporal Databases (SSTD)
-
-
Papadias, D.1
Kalnis, P.2
Zhang, J.3
Tao, Y.4
-
30
-
-
85012217314
-
Query processing in spatial network databases
-
D. Papadias, J. Zhang, N. Mamoulis, and Y. Tao, "Query Processing in Spatial Network Databases," Proc. Int'l Conf. Very Large Data Bases (VLDB), 2003.
-
(2003)
Proc. Int'l Conf. Very Large Data Bases (VLDB)
-
-
Papadias, D.1
Zhang, J.2
Mamoulis, N.3
Tao, Y.4
-
31
-
-
0030734554
-
CCAM: A connectivity-clustered access method for networks and network computations
-
Jan./Feb.
-
S. Shekhar and D. Liu, "CCAM: A Connectivity-Clustered Access Method for Networks and Network Computations," IEEE Trans. Knowledge and Data Eng., vol.9, no.1, pp. 102-119, Jan./Feb. 1997.
-
(1997)
IEEE Trans. Knowledge and Data Eng.
, vol.9
, Issue.1
, pp. 102-119
-
-
Shekhar, S.1
Liu, D.2
-
33
-
-
0036811662
-
K-Anonymity: A model for protecting privacy
-
L. Sweeney, "k-Anonymity: A Model for Protecting Privacy," Int'l J. Uncertainty, Fuzziness, and Knowledge-Based Systems, vol.10, no.5, pp. 557-570, 2002.
-
(2002)
Int'l J. Uncertainty, Fuzziness, and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
34
-
-
84986462345
-
An eulerian trail through konigsberg
-
R.J. Wilson, "An Eulerian Trail through Konigsberg," J. Graph Theory, vol.10, pp. 265-275, 1986.
-
(1986)
J. Graph Theory
, vol.10
, pp. 265-275
-
-
Wilson, R.J.1
-
35
-
-
52649118020
-
Space twist: Managing the trade offs among location privacy, query performance, and query accuracy in mobile services
-
M.L. Yiu, C.S. Jensen, X. Huang, and H. Lu, "Space Twist: Managing the Trade Offs among Location Privacy, Query Performance, and Query Accuracy in Mobile Services," Proc. Int'l Conf. Data Eng. (ICDE), 2008.
-
(2008)
Proc. Int'l Conf. Data Eng. (ICDE)
-
-
Yiu, M.L.1
Jensen, C.S.2
Huang, X.3
Lu, H.4
|