-
2
-
-
0020102027
-
Least squares quantization in PCM
-
S.P. Lloyd Least squares quantization in PCM IEEE Trans. Inform. Theory IT-28 Mar. 1982 129 137
-
(1982)
IEEE Trans. Inform. Theory
, vol.IT-28
, pp. 129-137
-
-
Lloyd, S.P.1
-
3
-
-
84937350296
-
Quantizing for minimum distortion
-
J. Max Quantizing for minimum distortion IEEE Trans. Inform. Theory 6 1 Mar. 1960 7 12
-
(1960)
IEEE Trans. Inform. Theory
, vol.6
, Issue.1
, pp. 7-12
-
-
Max, J.1
-
4
-
-
0000169232
-
An algorithm for least-squares estimation of nonlinear parameters
-
D. Marquardt An algorithm for least-squares estimation of nonlinear parameters SIAM J. Appl. Math. (SIAP) 11 1963 431 441
-
(1963)
SIAM J. Appl. Math. (SIAP)
, vol.11
, pp. 431-441
-
-
Marquardt, D.1
-
5
-
-
0003483188
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
P. Samarati, and L. Sweeney Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression SRI Int., Tech. Rep. 1998
-
(1998)
SRI Int., Tech. Rep.
-
-
Samarati, P.1
Sweeney, L.2
-
6
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
DOI 10.1109/69.971193
-
P. Samarati Protecting respondents' identities in microdata release IEEE Trans. Knowl. Data Eng. 13 6 2001 1010 1027 (Pubitemid 34035590)
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
8
-
-
0002889412
-
Panels of enterprises and confidentiality: The small aggregates method
-
D. Defays, and P. Nanopoulos Panels of enterprises and confidentiality: the small aggregates method Proc. Symp. Design, Anal. Longitudinal Surveys, Stat. Canada, Ottawa, Canada 1993 195 204
-
(1993)
Proc. Symp. Design, Anal. Longitudinal Surveys, Stat. Canada, Ottawa, Canada
, pp. 195-204
-
-
Defays, D.1
Nanopoulos, P.2
-
10
-
-
26944448516
-
Ordinal, continuous and heterogeneous k-anonymity through microaggregation
-
DOI 10.1007/s10618-005-0007-5
-
J. Domingo-Ferrer, and V. Torra Ordinal, continuous and heterogenerous k-anonymity through microaggregation Data Min., Knowl. Disc. 11 2 2005 195 212 (Pubitemid 41476765)
-
(2005)
Data Mining and Knowledge Discovery
, vol.11
, Issue.2
, pp. 195-212
-
-
Domingo-Ferrer, J.1
Torra, V.2
-
11
-
-
37649020602
-
A polynomial-time approximation to optimal multivariate microaggregation
-
J. Domingo-Ferrer, F. Sebé, and A. Solanas A polynomial-time approximation to optimal multivariate microaggregation Elsevier Comput., Math. with Appl. 55 4 Feb. 2008 714 732
-
(2008)
Elsevier Comput., Math. with Appl.
, vol.55
, Issue.4
, pp. 714-732
-
-
Domingo-Ferrer, J.1
Sebé, F.2
Solanas, A.3
-
12
-
-
0035693941
-
On the complexity of optimal microaggregation for statistical disclosure control
-
A. Oganian, and J. Domingo-Ferrer On the complexity of optimal microaggregation for statistical disclosure control UNECE Stat. J. 18 4 Apr. 2001 345 354
-
(2001)
UNECE Stat. J.
, vol.18
, Issue.4
, pp. 345-354
-
-
Oganian, A.1
Domingo-Ferrer, J.2
-
13
-
-
36048972384
-
Efficient multivariate data-oriented microaggregation
-
J. Domingo-Ferrer, A. Martínez-Ballesté, J.M. Mateo-Sanz, and F. Sebé Efficient multivariate data-oriented microaggregation VLDB J. 15 4 2006 355 369
-
(2006)
VLDB J.
, vol.15
, Issue.4
, pp. 355-369
-
-
Domingo-Ferrer, J.1
Martínez-Ballesté, A.2
Mateo-Sanz, J.M.3
Sebé, F.4
-
14
-
-
33746995374
-
-
Voorburg Netherlands [Online]. Available
-
A. Hundepool, R. Ramaswamy, P.-P. DeWolf, L. Franconi, R. Brand, and J. Domingo-Ferrer μ-ARGUS version 4.1 software and user's manual 2007 Voorburg Netherlands http://neon.vb.cbs.nl/casc [Online]. Available
-
(2007)
μ-ARGUS Version 4.1 Software and User's Manual
-
-
Hundepool, A.1
Ramaswamy, R.2
Dewolf, P.-P.3
Franconi, L.4
Brand, R.5
Domingo-Ferrer, J.6
-
15
-
-
68949164027
-
Statistical disclosure control for microdata using the R-package sdcMicro
-
[Online]. Available
-
M. Templ Statistical disclosure control for microdata using the R-package sdcMicro Trans. Data Privacy 1 2 2008 67 85 http://cran.r-project.org/web/ packages/sdcMicro [Online]. Available
-
(2008)
Trans. Data Privacy
, vol.1
, Issue.2
, pp. 67-85
-
-
Templ, M.1
-
16
-
-
22944452807
-
Minimum spanning tree partitioning algorithm for microaggregation
-
DOI 10.1109/TKDE.2005.112
-
M. Laszlo, and S. Mukherjee Minimum spanning tree partitioning algorithm for microaggregation IEEE Trans. Knowl. Data Eng. 17 7 Jul. 2005 902 911 (Pubitemid 41049864)
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.7
, pp. 902-911
-
-
Laszlo, M.1
Mukherjee, S.2
-
18
-
-
34548668710
-
TFRP: An efficient microaggregation algorithm for statistical disclosure control
-
C. Chin-chen, L. Yu-chiang, and H. Wen-huang TFRP: an efficient microaggregation algorithm for statistical disclosure control Elsevier J. Syst., Softw. 80 11 Nov. 2007 1866 1878
-
(2007)
Elsevier J. Syst., Softw.
, vol.80
, Issue.11
, pp. 1866-1878
-
-
Chin-Chen, C.1
Yu-Chiang, L.2
Wen-Huang, H.3
-
19
-
-
54349128838
-
On the disclosure risk of multivariate microaggregation
-
J. Nin, J. Herranz, and V. Torra On the disclosure risk of multivariate microaggregation Elsevier Data, Knowl. Eng. 67 3 2008 399 412
-
(2008)
Elsevier Data, Knowl. Eng.
, vol.67
, Issue.3
, pp. 399-412
-
-
Nin, J.1
Herranz, J.2
Torra, V.3
-
21
-
-
72849133477
-
Enhanced p-sensitive k-anonymity models for privacy preserving data publishing
-
X. Sun, H. Wang, J. Li, and T.M. Truta Enhanced p-sensitive k-anonymity models for privacy preserving data publishing Trans. Data Privacy 1 2 2008 53 66
-
(2008)
Trans. Data Privacy
, vol.1
, Issue.2
, pp. 53-66
-
-
Sun, X.1
Wang, H.2
Li, J.3
Truta, T.M.4
-
22
-
-
33749607006
-
L-Diversity: Privacy beyond k-anonymity
-
Atlanta, GA, Apr
-
A. Machanavajjhala, J. Gehrke, D. Kiefer, and M. Venkitasubramanian l-Diversity: privacy beyond k-anonymity Proc. IEEE Int. Conf. Data Eng. (ICDE) 2006 Atlanta, GA, Apr 24
-
(2006)
Proc. IEEE Int. Conf. Data Eng. (ICDE)
, pp. 24
-
-
MacHanavajjhala, A.1
Gehrke, J.2
Kiefer, D.3
Venkitasubramanian, M.4
-
23
-
-
51749087499
-
An improved V-MDAV algorithm for l-diversity
-
H. Jian-min, C. Ting-ting, and Y. Hui-qun An improved V-MDAV algorithm for l-diversity Proc. IEEE Int. Symp. Inform. Processing (ISIP), Moscow, Russia May 2008 733 739
-
(2008)
Proc. IEEE Int. Symp. Inform. Processing (ISIP), Moscow, Russia
, pp. 733-739
-
-
Jian-Min, H.1
Ting-Ting, C.2
Hui-Qun, Y.3
-
24
-
-
34548805858
-
t-Closeness: Privacy beyond k-anonymity and ℓ-diversity
-
DOI 10.1109/ICDE.2007.367856, 4221659, 23rd International Conference on Data Engineering, ICDE 2007
-
N. Li, T. Li, and S. Venkatasubramanian t-Closeness: privacy beyond k-anonymity and l-diversity Proc. IEEE Int. Conf. Data Eng. (ICDE), Istanbul, Turkey Apr. 2007 106 115 (Pubitemid 47422014)
-
(2007)
Proceedings - International Conference on Data Engineering
, pp. 106-115
-
-
Ninghui, L.1
Tiancheng, L.2
Venkatasubramanian, S.3
-
25
-
-
49049098124
-
A critique of k-anonymity and some of its enhancements
-
J. Domingo-Ferrer, and V. Torra A critique of k-anonymity and some of its enhancements Proc. Workshop Privacy, Security, Artif. Intell. (PSAI), Barcelona, Spain 2008 990 993
-
(2008)
Proc. Workshop Privacy, Security, Artif. Intell. (PSAI), Barcelona, Spain
, pp. 990-993
-
-
Domingo-Ferrer, J.1
Torra, V.2
-
26
-
-
77956995886
-
From t-closeness-like privacy to postrandomization via information theory
-
[Online]. Available
-
D. Rebollo-Monedero, J. Forné, and J. Domingo-Ferrer From t-closeness-like privacy to postrandomization via information theory IEEE Trans. Knowl. Data Eng. 22 11 Nov. 2010 1623 1636 http://doi.ieeecomputersociety.org/ 10.1109/TKDE.2009.190 [Online]. Available
-
(2010)
IEEE Trans. Knowl. Data Eng.
, vol.22
, Issue.11
, pp. 1623-1636
-
-
Rebollo-Monedero, D.1
Forné, J.2
Domingo-Ferrer, J.3
-
27
-
-
56749173427
-
From t-closeness to PRAM and noise addition via information theory
-
Springer-Verlag Istambul, Turkey
-
D. Rebollo-Monedero, J. Forné, and J. Domingo-Ferrer From t-closeness to PRAM and noise addition via information theory Privacy Stat. Databases (PSD), ser. Lecture Notes Comput. Sci. (LNCS) Sep. 2008 Springer-Verlag Istambul, Turkey 100 112
-
(2008)
Privacy Stat. Databases (PSD), Ser. Lecture Notes Comput. Sci. (LNCS)
, pp. 100-112
-
-
Rebollo-Monedero, D.1
Forné, J.2
Domingo-Ferrer, J.3
-
28
-
-
84890522850
-
Communication theory of secrecy systems
-
C.E. Shannon Communication theory of secrecy systems Bell Syst., Tech. J. 1949
-
(1949)
Bell Syst., Tech. J.
-
-
Shannon, C.E.1
-
29
-
-
0003214704
-
Coding theorems for a discrete source with a fidelity criterion
-
Part 4
-
C.E. Shannon Coding theorems for a discrete source with a fidelity criterion IRE Nat. Conv. Rec 7 1959 142 163 Part 4
-
(1959)
IRE Nat. Conv. Rec
, vol.7
, pp. 142-163
-
-
Shannon, C.E.1
-
30
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
A. Evfimievski, J. Gehrke, and R. Srikant Limiting privacy breaches in privacy preserving data mining Proc. ACM Symp. Prin. Database Syst. (PODS), San Diego, CA 2003 211 222
-
(2003)
Proc. ACM Symp. Prin. Database Syst. (PODS), San Diego, CA
, pp. 211-222
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
31
-
-
84894177799
-
How do we measure privacy?
-
D. Rebollo-Monedero, and J. Forné How do we measure privacy? Upgrade J. XI 1 Feb. 2010 53 58
-
(2010)
Upgrade J.
, vol.XI
, Issue.1
, pp. 53-58
-
-
Rebollo-Monedero, D.1
Forné, J.2
-
32
-
-
77955802941
-
Optimal query forgery for private information retrieval
-
D. Rebollo-Monedero, and J. Forné Optimal query forgery for private information retrieval IEEE Trans. Inform. Theory 56 9 2010 4631 4642
-
(2010)
IEEE Trans. Inform. Theory
, vol.56
, Issue.9
, pp. 4631-4642
-
-
Rebollo-Monedero, D.1
Forné, J.2
-
34
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
DOI 10.1145/4372.4373
-
D. Chaum Security without identification: transaction systems to make big brother obsolete Commun. ACM 28 10 Oct. 1985 1030 1044 (Pubitemid 15587967)
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum David1
-
35
-
-
33644989680
-
Specification of a framework for the anonymous use of privileges
-
V. Benjumea, J. López, and J.M.T. Linero Specification of a framework for the anonymous use of privileges Elsevier Telemat., Informat. 23 3 Aug. 2006 179 195
-
(2006)
Elsevier Telemat., Informat.
, vol.23
, Issue.3
, pp. 179-195
-
-
Benjumea, V.1
López, J.2
Linero, J.M.T.3
-
36
-
-
56349111434
-
The SPARTA pseudonym and authorization system
-
G. Bianchi, M. Bonola, V. Falletta, F.S. Proto, and S. Teofili The SPARTA pseudonym and authorization system Elsevier Sci. Comput. Program. 74 1-2 2008 23 33
-
(2008)
Elsevier Sci. Comput. Program.
, vol.74
, Issue.12
, pp. 23-33
-
-
Bianchi, G.1
Bonola, M.2
Falletta, V.3
Proto, F.S.4
Teofili, S.5
-
37
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
ACM San Francisco, CA
-
M. Gruteser, and D. Grunwald Anonymous usage of location-based services through spatial and temporal cloaking Proc. ACM Int. Conf. Mob. Syst., Appl., Serv. (MobiSys) May 2003 ACM San Francisco, CA 31 42
-
(2003)
Proc. ACM Int. Conf. Mob. Syst., Appl., Serv. (MobiSys)
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
38
-
-
0035060531
-
A formal approach to imperfection in geographic information
-
DOI 10.1016/S0198-9715(00)00040-5, PII S0198971500000405, GISRUK 2000
-
M. Duckham, K. Mason, J. Stell, and M. Worboys A formal approach to imperfection in geographic information Elsevier Comput., Environ., Urban Syst. 25 1 2001 89 103 (Pubitemid 32337731)
-
(2001)
Computers, Environment and Urban Systems
, vol.25
, Issue.1
, pp. 89-103
-
-
Duckham, M.1
Mason, K.2
Stell, J.3
Worboys, M.4
-
39
-
-
24944432404
-
A formal model of obfuscation and negotiation for location privacy
-
Pervasive Computing: Third International Conference, PERVASIVE 2005, Proceedings
-
M. Duckham, and L. Kulit A formal model of obfuscation and negotiation for location privacy Proc. Int. Conf. Pervas. Comput., ser. Lecture Notes Comput. Sci. (LNCS) vol. 3468 May 2005 Springer-Verlag Munich, Germany 152 170 (Pubitemid 41313330)
-
(2005)
Lecture Notes in Computer Science
, vol.3468
, pp. 152-170
-
-
Duckham, M.1
Kulik, L.2
-
40
-
-
37849032496
-
Location privacy protection through obfuscation-based techniques
-
Springer-Verlag Redondo Beach, CA
-
C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, and P. Samarati Location privacy protection through obfuscation-based techniques Proc. Annual IFIP Working Conf. Data Appl. Security, ser. Lecture Notes Comput. Sci. (LNCS) vol. 4602 Jul. 2007 Springer-Verlag Redondo Beach, CA 47 60
-
(2007)
Proc. Annual IFIP Working Conf. Data Appl. Security, Ser. Lecture Notes Comput. Sci. (LNCS)
, vol.4602
, pp. 47-60
-
-
Ardagna, C.A.1
Cremonini, M.2
Damiani, E.3
De Capitani Di Vimercati, S.4
Samarati, P.5
-
41
-
-
52649118020
-
SpaceTwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services
-
M.L. Yiu, C.S. Jensen, X. Huang, and H. Lu SpaceTwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services Proc. IEEE Int. Conf. Data Eng. (ICDE), Cancun, Mexico Apr. 2008 366 375
-
(2008)
Proc. IEEE Int. Conf. Data Eng. (ICDE), Cancun, Mexico
, pp. 366-375
-
-
Yiu, M.L.1
Jensen, C.S.2
Huang, X.3
Lu, H.4
-
42
-
-
84885395162
-
On the impact of user movement simulations in the evaluation of LBS privacy-preserving techniques
-
S. Mascetti, D. Freni, C. Bettini, X.S. Wang, and S. Jajodia On the impact of user movement simulations in the evaluation of LBS privacy-preserving techniques Proc. Int. Workshop Privacy Locat.-Based Appl. (PiLBA), Málaga, Spain Oct. 2008 61 81
-
(2008)
Proc. Int. Workshop Privacy Locat.-Based Appl. (PiLBA), Málaga, Spain
, pp. 61-81
-
-
Mascetti, S.1
Freni, D.2
Bettini, C.3
Wang, X.S.4
Jajodia, S.5
-
43
-
-
34547474184
-
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
-
DOI 10.1145/1183471.1183500, Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems, ACM-GIS'06
-
C. Chow, M.F. Mokbel, and X. Liu A peer-to-peer spatial cloaking algorithm for anonymous location-based services Proc. ACM Int. Symp. Adv. Geogr. Inform. Syst. (GIS), Arlington, VA Nov. 2006 171 178 (Pubitemid 47168545)
-
(2006)
GIS: Proceedings of the ACM International Symposium on Advances in Geographic Information Systems
, pp. 171-178
-
-
Chow, C.-Y.1
Mokbel, M.F.2
Liu, X.3
-
45
-
-
40949126919
-
A TTP-free protocol for location privacy in location-based services
-
A. Solanas, and A. Martínez-Ballesté A TTP-free protocol for location privacy in location-based services Elsevier Comput. Commun. 31 6 Apr. 2008 1181 1191
-
(2008)
Elsevier Comput. Commun.
, vol.31
, Issue.6
, pp. 1181-1191
-
-
Solanas, A.1
Martínez-Ballesté, A.2
-
46
-
-
57149129292
-
Private queries in location based services: Anonymizers are not necessary
-
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan Private queries in location based services: anonymizers are not necessary Proc. ACM SIGMOD Int. Conf. Manage. Data, Vancouver, Canada Jun. 2008 121 132
-
(2008)
Proc. ACM SIGMOD Int. Conf. Manage. Data, Vancouver, Canada
, pp. 121-132
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.-L.5
-
47
-
-
38049002436
-
A survey of single-database PIR: Techniques and applications
-
Springer-Verlag Beijing, China
-
R. Ostrovsky, and W.E. Skeith III A survey of single-database PIR: techniques and applications Proc. Int. Conf. Practice, Theory Public-Key Cryptogr. (PKC), ser. Lecture Notes Comput. Sci. (LNCS) vol. 4450 Sep. 2007 Springer-Verlag Beijing, China 393 411
-
(2007)
Proc. Int. Conf. Practice, Theory Public-Key Cryptogr. (PKC), Ser. Lecture Notes Comput. Sci. (LNCS)
, vol.4450
, pp. 393-411
-
-
Ostrovsky, R.1
Skeith Iii, W.E.2
-
48
-
-
8344276595
-
Privacy Preservation Improvement by Learning Optimal Profile Generation Rate
-
T. Kuflik, B. Shapira, Y. Elovici, and A. Maschiach Privacy preservation improvement by learning optimal profile generation rate User Modeling, ser. Lecture Notes Comput. Sci. (LNCS) vol. 2702 2003 Springer-Verlag 168 177 (Pubitemid 36768562)
-
(2003)
Lecture Notes Comput. Sci. (LNCS)
, Issue.2702
, pp. 168-177
-
-
Kuflik, T.1
Shapira, B.2
Elovici, Y.3
Maschiach, A.4
-
49
-
-
24944589228
-
Enhancing customer privacy while searching for products and services on the world wide web
-
DOI 10.1108/10662240510615164
-
Y. Elovici, C. Glezer, and B. Shapira Enhancing customer privacy while searching for products and services on the World Wide Web Internet Res. 15 4 2005 378 399 (Pubitemid 41314574)
-
(2005)
Internet Research
, vol.15
, Issue.4
, pp. 378-399
-
-
Elovici, Y.1
Glezer, C.2
Shapira, B.3
-
50
-
-
12344288684
-
PRAW - The model for PRivAte Web
-
B. Shapira, Y. Elovici, A. Meshiach, and T. Kuflik PRAW - the model for PRivAte Web J. Amer. Soc. Inform. Sci., Technol. 56 2 2005 159 172
-
(2005)
J. Amer. Soc. Inform. Sci., Technol.
, vol.56
, Issue.2
, pp. 159-172
-
-
Shapira, B.1
Elovici, Y.2
Meshiach, A.3
Kuflik, T.4
-
51
-
-
33745725717
-
Protection of location privacy using dummies for location-based services
-
H. Kido, Y. Yanagisawa, and T. Satoh Protection of location privacy using dummies for location-based services Proc. IEEE Int. Conf. Data Eng. (ICDE), Washington, DC Oct. 2005 1248
-
(2005)
Proc. IEEE Int. Conf. Data Eng. (ICDE), Washington, DC
, pp. 1248
-
-
Kido, H.1
Yanagisawa, Y.2
Satoh, T.3
-
52
-
-
79958707212
-
Lessons from the identity trail: Privacy, anonymity and identity in a networked society
-
Oxford Univ. Press NY [Online]. Available
-
D.C. Howe, and H. Nissenbaum Lessons from the identity trail: privacy, anonymity and identity in a networked society ch. TrackMeNot: Resisting surveillance in web search 2006 Oxford Univ. Press NY http://mrl.nyu.edu/dhowe/ trackmenot [Online]. Available
-
(2006)
Ch. TrackMeNot: Resisting Surveillance in Web Search
-
-
Howe, D.C.1
Nissenbaum, H.2
-
53
-
-
78049383252
-
-
[Online]. Available
-
V. Toubiana SquiggleSR http://www.squigglesr.com 2007 [Online]. Available
-
(2007)
SquiggleSR
-
-
Toubiana, V.1
-
56
-
-
52649110568
-
Never walk alone: Uncertainty for anonymity in moving objects databases
-
O. Abul, F. Bonchi, and M. Nanni Never walk alone: uncertainty for anonymity in moving objects databases Proc. IEEE Int. Conf. Data Eng. (ICDE), Cancun, Mexico Apr. 2008 366 375
-
(2008)
Proc. IEEE Int. Conf. Data Eng. (ICDE), Cancun, Mexico
, pp. 366-375
-
-
Abul, O.1
Bonchi, F.2
Nanni, M.3
-
58
-
-
66549090154
-
Preserving user location privacy in mobile data management infrastructures
-
ser. Lecture Notes Comput. Sci. (LNCS) Springer-Verlag Cambridge, United Kingdom
-
R. Cheng, Y. Zhang, E. Bertino, and S. Prabhakar Preserving user location privacy in mobile data management infrastructures Proc. Workshop Privacy Enhanc. Technol. (PET) ser. Lecture Notes Comput. Sci. (LNCS) vol. 4258 2006 Springer-Verlag Cambridge, United Kingdom 393 412
-
(2006)
Proc. Workshop Privacy Enhanc. Technol. (PET)
, vol.4258
, pp. 393-412
-
-
Cheng, R.1
Zhang, Y.2
Bertino, E.3
Prabhakar, S.4
-
59
-
-
36549043405
-
Protecting location privacy with personalized k-anonymity: Architecture and algorithms
-
DOI 10.1109/TMC.2007.1062
-
B. Gedik, and L. Liu Protecting location privacy with personalized k-anonymity: architecture and algorithms IEEE Trans. Mob. Comput. 7 1 Jan. 2008 1 18 (Pubitemid 350183929)
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.1
, pp. 1-18
-
-
Gedik, B.1
Liu, L.2
-
60
-
-
57349191501
-
Supporting anonymous location queries in mobile environments with PrivacyGrid
-
B. Bamba, L. Liu, P. Pesti, and T. Wang Supporting anonymous location queries in mobile environments with PrivacyGrid Proc. Int. WWW Conf., Beijing, China Apr. 2008 237 246
-
(2008)
Proc. Int. WWW Conf., Beijing, China
, pp. 237-246
-
-
Bamba, B.1
Liu, L.2
Pesti, P.3
Wang, T.4
-
61
-
-
33750879264
-
Enhancing security and privacy in traffc-monitoring systems
-
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady Enhancing security and privacy in traffc-monitoring systems IEEE Pervas. Comput. Mag., Special Issue Intell. Transport. Syst. 5 4 2006
-
(2006)
IEEE Pervas. Comput. Mag., Special Issue Intell. Transport. Syst.
, vol.5
, Issue.4
-
-
Hoh, B.1
Gruteser, M.2
Xiong, H.3
Alrabady, A.4
-
62
-
-
70349306591
-
A distributed k-anonymity protocol for location privacy
-
G. Zhong, and U. Hengartner A distributed k-anonymity protocol for location privacy Proc. IEEE Int. Conf. Pervas. Comput., Commun. (PerCom), Galveston, TX Mar. 2009 253 262
-
(2009)
Proc. IEEE Int. Conf. Pervas. Comput., Commun. (PerCom), Galveston, TX
, pp. 253-262
-
-
Zhong, G.1
Hengartner, U.2
-
63
-
-
76049114679
-
Private location-based information retrieval through user collaboration
-
[Online]. Available
-
D. Rebollo-Monedero, J. Forné, A. Solanas, and T. Martínez-Ballesté Private location-based information retrieval through user collaboration Elsevier Comput. Commun. 33 6 2010 762 774 http://dx.doi.org/10.1016/j.comcom.2009.11.024 [Online]. Available
-
(2010)
Elsevier Comput. Commun.
, vol.33
, Issue.6
, pp. 762-774
-
-
Rebollo-Monedero, D.1
Forné, J.2
Solanas, A.3
Martínez- Ballesté, T.4
-
64
-
-
77955826302
-
A collaborative protocol for private retrieval of location-based information
-
D. Rebollo-Monedero, J. Forné, L. Subirats, A. Solanas, and A. Martínez-Ballesté A collaborative protocol for private retrieval of location-based information Proc. IADIS Int. Conf. e-Society, Barcelona, Spain Feb. 2009
-
(2009)
Proc. IADIS Int. Conf. E-Society, Barcelona, Spain
-
-
Rebollo-Monedero, D.1
Forné, J.2
Subirats, L.3
Solanas, A.4
Martínez-Ballesté, A.5
-
67
-
-
0001457509
-
Some methods for classification and analysis of multivariate observations
-
(Statistics), Berkeley, CA, 1965-1966 (symposium) (proceedings)
-
J. B. MacQueen, "Some methods for classification and analysis of multivariate observations," in Proc. Berkeley Symp. Math. Stat., Prob., vol. I (Statistics), Berkeley, CA, 1965-1966 (symposium), 1967 (proceedings), pp. 281-297.
-
(1967)
Proc. Berkeley Symp. Math. Stat., Prob
, vol.1
, pp. 281-297
-
-
MacQueen, J.B.1
-
68
-
-
33747479974
-
Sur la division des corps matériels en parties
-
H. Steinhaus Sur la division des corps matériels en parties Bull. Pol. Acad. Sci. IV 12 Mar. 1956 801 804
-
(1956)
Bull. Pol. Acad. Sci.
, vol.IV
, Issue.12
, pp. 801-804
-
-
Steinhaus, H.1
-
69
-
-
85032752137
-
Theoretical foundations of transform coding
-
DOI 10.1109/79.952802
-
V.K. Goyal Theoretical foundations of transform coding IEEE Signal Processing Mag. 18 5 Sep. 2001 9 21 (Pubitemid 32932331)
-
(2001)
IEEE Signal Processing Magazine
, vol.18
, Issue.5
, pp. 9-21
-
-
Goyal, V.K.1
-
70
-
-
0028499659
-
Three-dimensional subband coding with motion compensation
-
J.-R. Ohm Three-dimensional subband coding with motion compensation IEEE Trans. Image Processing 3 5 Sep. 1994 559 571
-
(1994)
IEEE Trans. Image Processing
, vol.3
, Issue.5
, pp. 559-571
-
-
Ohm, J.-R.1
-
71
-
-
79952917254
-
Minimum distortion clustering technique for orthogonal polynomials transform vector quantizer
-
R. Krishnamoorthy, and J. Kalpana Minimum distortion clustering technique for orthogonal polynomials transform vector quantizer Proc. ACM Int. Conf. Commun., Comput., Security (ICCCS), Rourkela, India Feb. 2011 443 448
-
(2011)
Proc. ACM Int. Conf. Commun., Comput., Security (ICCCS), Rourkela, India
, pp. 443-448
-
-
Krishnamoorthy, R.1
Kalpana, J.2
-
73
-
-
77955678056
-
Planar Voronoi diagrams for sums of convex functions, smoothed distance and dilation
-
M. Dickerson, D. Eppstein, and K.A. Wortman Planar Voronoi diagrams for sums of convex functions, smoothed distance and dilation Proc. Int. Symp. Voronoi Diag. Sci., Eng. (ISVD), Quebec, Canada Jun. 2010 13 22
-
(2010)
Proc. Int. Symp. Voronoi Diag. Sci., Eng. (ISVD), Quebec, Canada
, pp. 13-22
-
-
Dickerson, M.1
Eppstein, D.2
Wortman, K.A.3
-
74
-
-
71749120353
-
Text document clustering based on neighbors
-
C. Luo, Y. Li, and S.M. Chung Text document clustering based on neighbors Elsevier Data, Knowl. Eng. 68 11 Nov. 2009 1271 1288
-
(2009)
Elsevier Data, Knowl. Eng.
, vol.68
, Issue.11
, pp. 1271-1288
-
-
Luo, C.1
Li, Y.2
Chung, S.M.3
-
75
-
-
79951676428
-
Document clustering using synthetic cluster prototypes
-
A. Kalogeratos, and A. Likas Document clustering using synthetic cluster prototypes Elsevier Data, Knowl. Eng. 70 3 Mar. 2011 284 306
-
(2011)
Elsevier Data, Knowl. Eng.
, vol.70
, Issue.3
, pp. 284-306
-
-
Kalogeratos, A.1
Likas, A.2
-
78
-
-
0022683355
-
Global convergence and empirical consistency of the generalized Lloyd algorithm
-
M. Sabin, and R.M. Gray Global convergence and empirical consistency of the generalized Lloyd algorithm IEEE Trans. Inform. Theory IT-32, no. 2 Mar. 1986 148 155 (Pubitemid 16613622)
-
(1986)
IEEE Transactions on Information Theory
, vol.IT-32
, Issue.2
, pp. 148-155
-
-
Sabin Michael, J.1
Gray Robert, M.2
-
79
-
-
0039073042
-
Consistency of data-driven histogram methods for density estimation and classification
-
uIUC-BI-93-01.
-
G. Lugosi, and A.B. Nobel Consistency of data-driven histogram methods for density estimation and classification Beckman Inst., Univ. of Illinoi, Tech. Rep. 1993 uIUC-BI-93-01.
-
(1993)
Beckman Inst., Univ. of Illinoi, Tech. Rep.
-
-
Lugosi, G.1
Nobel, A.B.2
-
80
-
-
0030085873
-
Convergence properties of a class of learning vector quantization algorithms
-
PII S1057714996014078
-
E.B. Kosmatopoulos, and M.A. Christodoulou Convergence properties of a class of learning vector quantization algorithms IEEE Trans. Image Processing 5 2 Feb. 1996 361 368 (Pubitemid 126777648)
-
(1996)
IEEE Transactions on Image Processing
, vol.5
, Issue.2
, pp. 361-368
-
-
Kosmatopoulos, E.B.1
Christodoulou, M.A.2
-
81
-
-
0001362410
-
The Levenberg-Marquardt algorithm: Implementation and theory
-
G.A. Watson, Springer-Verlag
-
J.J. Moré The Levenberg-Marquardt algorithm: Implementation and theory G.A. Watson, Numerical Analysis, ser. Lecture Notes Math vol. 630 1977 Springer-Verlag 105 116
-
(1977)
Numerical Analysis, Ser. Lecture Notes Math
, vol.630
, pp. 105-116
-
-
Moré, J.J.1
-
82
-
-
78049387733
-
On a global complexity bound of the Levenberg-Marquardt method
-
K. Ueda, and N. Yamashita On a global complexity bound of the Levenberg-Marquardt method J. Optim. Theory, Appl. 147 2010 443 453
-
(2010)
J. Optim. Theory, Appl.
, Issue.147
, pp. 443-453
-
-
Ueda, K.1
Yamashita, N.2
-
83
-
-
80051801014
-
CASTLE: Continuously anonymizing data streams
-
J. Cao, B. Carminati, E. Ferrari, and K. Tan CASTLE: continuously anonymizing data streams IEEE Trans. Depend., Secure Comput. 99 2009
-
(2009)
IEEE Trans. Depend., Secure Comput.
, vol.99
-
-
Cao, J.1
Carminati, B.2
Ferrari, E.3
Tan, K.4
-
84
-
-
0032143765
-
A trivariate distribution for the height, weight, and fat of adult men
-
D.E. Burmaster, and D.M. Murray A trivariate distribution for the height, weight, and fat of adult men Risk Anal. 18 4 1998 385 389
-
(1998)
Risk Anal.
, vol.18
, Issue.4
, pp. 385-389
-
-
Burmaster, D.E.1
Murray, D.M.2
-
86
-
-
80051790393
-
Computational Aspects of Statistical Confidentiality project
-
CASC European project IST-2000-25069 CASC [Online]
-
CASC, "Computational Aspects of Statistical Confidentiality project," European project IST-2000-25069 CASC, Tech. Rep., 2001-2004. [Online]. Available: http://neon.vb.cbs.nl/casc
-
Tech. Rep., 2001-2004
-
-
|