-
3
-
-
36549043405
-
Protecting location privacy with personalized k-anonymity: Architecture and algorithms
-
B. Gedik and L. Liu. Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing, 7(1):1-18, 2008.
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.1
, pp. 1-18
-
-
Gedik, B.1
Liu, L.2
-
4
-
-
57149129292
-
Private Queries in Location Based Services: Anonymizers are not Necessary
-
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan. Private Queries in Location Based Services: Anonymizers are not Necessary. In Proc. of ACM SIGMOD, page 121-132, 2008.
-
(2008)
Proc. of ACM SIGMOD
, pp. 121-132
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.-L.5
-
6
-
-
33847315663
-
Protecting Location Privacy Through Path Confusion
-
B. Hoh and M. Gruteser. Protecting Location Privacy Through Path Confusion. In Proc. of SecureComm, pages 194-205, 2005.
-
(2005)
Proc. of SecureComm
, pp. 194-205
-
-
Hoh, B.1
Gruteser, M.2
-
8
-
-
0030385808
-
Effective Graph Clustering for Path Queries in Digital Map Databases
-
Y.-W. Huang, N.Jing, and E.A. Rundensteiner. Effective Graph Clustering for Path Queries in Digital Map Databases. In Proc. of CIKM, pages 215-222, 1996.
-
(1996)
Proc. of CIKM
, pp. 215-222
-
-
Huang, Y.-W.1
Jing, N.2
Rundensteiner, E.A.3
-
9
-
-
33745536305
-
Mining Outliers in Spatial Networks
-
W. Jin, Y. Jiang, W. Qian, and A.K.H. Tung. Mining Outliers in Spatial Networks. In Proc. of International Conference on Database Systems for Advanced Applications, pages 156-170, 2006.
-
(2006)
Proc. of International Conference on Database Systems for Advanced Applications
, pp. 156-170
-
-
Jin, W.1
Jiang, Y.2
Qian, W.3
Tung, A.K.H.4
-
10
-
-
0032071072
-
Hierarchical Encoded Path Views for Path Query Processing: An Optimal Model and Its Performance Evaluation
-
N. Jing, Y.-W. Huang, and E.A. Rundensteiner. Hierarchical Encoded Path Views for Path Query Processing: An Optimal Model and Its Performance Evaluation. IEEE Transactions on Knowledge and Data Engineering, 10(3):409-432, 1998.
-
(1998)
IEEE Transactions on Knowledge and Data Engineering
, vol.10
, Issue.3
, pp. 409-432
-
-
Jing, N.1
Huang, Y.-W.2
Rundensteiner, E.A.3
-
11
-
-
0036709198
-
An Efficient Path Computation Model for Hierarchically Structured Topographical Road Maps
-
S. Jung and S. Pramanik. An Efficient Path Computation Model for Hierarchically Structured Topographical Road Maps. IEEE Transactions on Knowledge and Data Engineering, 14(5):1029-1046, 2002.
-
(2002)
IEEE Transactions on Knowledge and Data Engineering
, vol.14
, Issue.5
, pp. 1029-1046
-
-
Jung, S.1
Pramanik, S.2
-
12
-
-
35648982949
-
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
-
P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. Preventing Location-Based Identity Inference in Anonymous Spatial Queries. IEEE Transactions on Knowledge and Data Engineering, 19(12):1719-1733, 2007.
-
(2007)
IEEE Transactions on Knowledge and Data Engineering
, vol.19
, Issue.12
, pp. 1719-1733
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
13
-
-
84990479742
-
An Efficient Heuristic Procedure for Partitioning Graphs
-
B. Kernighan and S. Lin. An Efficient Heuristic Procedure for Partitioning Graphs. Bell Systems Technical Journal, 49(2):291-308, 1970.
-
(1970)
Bell Systems Technical Journal
, vol.49
, Issue.2
, pp. 291-308
-
-
Kernighan, B.1
Lin, S.2
-
16
-
-
34548805858
-
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity
-
N. Li, T. Li, and S. Venkatasubramanian. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. In Proc. of ICDE, pages 106-115, 2007.
-
(2007)
Proc. of ICDE
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
17
-
-
34248181923
-
l-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data, 1(1), 2007.
-
(2007)
ACM Transactions on Knowledge Discovery from Data
, vol.1
, Issue.1
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
18
-
-
34547720006
-
The new casper: Query processing for location services without compromising privacy
-
M.F. Mokbel, C.-Y. Chow, and W.G. Aref. The new casper: Query processing for location services without compromising privacy. In Proc. of VLDB, pages 763-774, 2006.
-
(2006)
Proc. of VLDB
, pp. 763-774
-
-
Mokbel, M.F.1
Chow, C.-Y.2
Aref, W.G.3
-
19
-
-
0030734554
-
CCAM: A Connectivity-Clustered Access Method for Networks and Network Computations
-
S. Shekhar and D.-R. Liu. CCAM: A Connectivity-Clustered Access Method for Networks and Network Computations. IEEE Transactions on Knowledge and Data Engineering, 9(1):102-119, 1997.
-
(1997)
IEEE Transactions on Knowledge and Data Engineering
, vol.9
, Issue.1
, pp. 102-119
-
-
Shekhar, S.1
Liu, D.-R.2
-
20
-
-
33947617743
-
An Architecture and Key Management Approach for Maintaining Privacy in Location Based Group Services
-
Y. Sun, P. Liu, P. Kermani, and T.F.L. Porta. An Architecture and Key Management Approach for Maintaining Privacy in Location Based Group Services. In Proc. of International Conference on Collaborative Computing: Networking, Applications and Worksharing, 2005.
-
(2005)
Proc. of International Conference on Collaborative Computing: Networking, Applications and Worksharing
-
-
Sun, Y.1
Liu, P.2
Kermani, P.3
Porta, T.F.L.4
-
23
-
-
74549177451
-
-
Thomas Brinkoff. Network-based Generator of Moving Objects
-
Thomas Brinkoff. Network-based Generator of Moving Objects.
-
-
-
-
24
-
-
74549150527
-
-
U.S. Census Bureau. Tiger/Line
-
U.S. Census Bureau. Tiger/Line.
-
-
-
-
25
-
-
52649118020
-
-
M.L. Yiu, C.S. Jensen, X. Huang, and H. Lu. Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In Proc. of ICDE, pages 366-375, 2008.
-
M.L. Yiu, C.S. Jensen, X. Huang, and H. Lu. Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In Proc. of ICDE, pages 366-375, 2008.
-
-
-
|