-
1
-
-
84870948261
-
Smart cities of the future
-
Batty M, Axhausen KW, Giannotti F, Pozdnoukhov A, Bazzani A, Wachowicz M, Ouzounis G, Portugali Y (2012) Smart cities of the future. Eur Phys J Spec Top 214(1):481-518
-
(2012)
Eur Phys J Spec Top
, vol.214
, Issue.1
, pp. 481-518
-
-
Batty, M.1
Axhausen, K.W.2
Giannotti, F.3
Pozdnoukhov, A.4
Bazzani, A.5
Wachowicz, M.6
Ouzounis, G.7
Portugali, Y.8
-
2
-
-
31444431866
-
The scaling laws of human travel
-
Brockmann D, Hufnagel L, Geisel T (2006) The scaling laws of human travel. Nature 439(7075):462-465
-
(2006)
Nature
, vol.439
, Issue.7075
, pp. 462-465
-
-
Brockmann, D.1
Hufnagel, L.2
Geisel, T.3
-
3
-
-
80053051430
-
Unveiling the complexity of human mobility by querying and mining massive trajectory data
-
Giannotti F, Nanni M, Pedreschi D, Pinelli F, Renso C, Rinzivillo S, Trasarti R (2011) Unveiling the complexity of human mobility by querying and mining massive trajectory data. VLDB J 20(5):695-719
-
(2011)
VLDB J
, vol.20
, Issue.5
, pp. 695-719
-
-
Giannotti, F.1
Nanni, M.2
Pedreschi, D.3
Pinelli, F.4
Renso, C.5
Rinzivillo, S.6
Trasarti, R.7
-
4
-
-
44849122540
-
Understanding individual human mobility patterns
-
Gonzalez MC, Hidalgo CA, Barabasi A-L (2008) Understanding individual human mobility patterns. Nature 453(7196):779-782
-
(2008)
Nature
, vol.453
, Issue.7196
, pp. 779-782
-
-
Gonzalez, M.C.1
Hidalgo, C.A.2
Barabasi, A.-L.3
-
5
-
-
77957566436
-
Modelling the scaling properties of human mobility
-
Song C, Koren T, Wang P, Barabasi A-L (2010) Modelling the scaling properties of human mobility. Nat Phys 6(10):818-823
-
(2010)
Nat Phys
, vol.6
, Issue.10
, pp. 818-823
-
-
Song, C.1
Koren, T.2
Wang, P.3
Barabasi, A.-L.4
-
6
-
-
77149139158
-
Limits of predictability in human mobility
-
Song C, Qu Z, Blumm N, Barabási A-L (2010) Limits of predictability in human mobility. Science 327(5968):1018-1021
-
(2010)
Science
, vol.327
, Issue.5968
, pp. 1018-1021
-
-
Song, C.1
Qu, Z.2
Blumm, N.3
Barabási, A.-L.4
-
7
-
-
80052648601
-
-
In: KDD
-
Wang D, Pedreschi D, Song C, Giannotti F, Barabási A-L (2011) Human mobility, social ties, and link prediction. In: KDD, pp 1100-1108
-
(2011)
Human Mobility, Social Ties, and Link Prediction
, pp. 1100-1108
-
-
Wang, D.1
Pedreschi, D.2
Song, C.3
Giannotti, F.4
Barabási, A.-L.5
-
8
-
-
77956419343
-
Modeling the spatial spread of infectious diseases: The global epidemic and mobility computational model
-
Balcan D, Gonçalves B, Hu H, Ramasco JJ, Colizza V, Vespignani A (2010) Modeling the spatial spread of infectious diseases: the global epidemic and mobility computational model. J Comput Sci 1(3):132-145
-
(2010)
J Comput Sci
, vol.1
, Issue.3
, pp. 132-145
-
-
Balcan, D.1
Gonçalves, B.2
Hu, H.3
Ramasco, J.J.4
Colizza, V.5
Vespignani, A.6
-
9
-
-
33846670320
-
Modeling the worldwide spread of pandemic influenza: Baseline case and containment interventions
-
Colizza V, Barrat A, Barthelemy M, Valleron AJ, Vespignani A (2007) Modeling the worldwide spread of pandemic influenza: baseline case and containment interventions. PLoS Med 4(1):95-110
-
(2007)
Plos Med
, vol.4
, Issue.1
, pp. 95-110
-
-
Colizza, V.1
Barrat, A.2
Barthelemy, M.3
Valleron, A.J.4
Vespignani, A.5
-
10
-
-
33144474437
-
The role of the airline transportation network in the prediction and predictability of global epidemics
-
Colizza V, Barrat A, Barthélemy M, Vespignani A (2006) The role of the airline transportation network in the prediction and predictability of global epidemics. Proc Natl Acad Sci USA 103(7):2015-2020
-
(2006)
Proc Natl Acad Sci USA
, vol.103
, Issue.7
, pp. 2015-2020
-
-
Colizza, V.1
Barrat, A.2
Barthélemy, M.3
Vespignani, A.4
-
11
-
-
84866939702
-
Inferring the structure of social contacts from demographic data in the analysis of infectious diseases spread
-
Fumanelli L, Ajelli M, Manfredi P, Vespignani A, Merler S (2012) Inferring the structure of social contacts from demographic data in the analysis of infectious diseases spread. PLoS Comput Biol 8(9)
-
(2012)
Plos Comput Biol
, vol.8
, Issue.9
-
-
Fumanelli, L.1
Ajelli, M.2
Manfredi, P.3
Vespignani, A.4
Merler, S.5
-
12
-
-
78149283685
-
Identification of influential spreaders in complex networks
-
Gallos L, Havlin S, Kitsak M, Liljeros F, Makse H, Muchnik L, Stanley H (2010) Identification of influential spreaders in complex networks. Nat Phys 6(11):888-893
-
(2010)
Nat Phys
, vol.6
, Issue.11
, pp. 888-893
-
-
Gallos, L.1
Havlin, S.2
Kitsak, M.3
Liljeros, F.4
Makse, H.5
Muchnik, L.6
Stanley, H.7
-
15
-
-
84861810751
-
Microaggregation- and permutation-based anonymization of movement data
-
Domingo-Ferrer J, Trujillo-Rasua R (2012) Microaggregation- and permutation-based anonymization of movement data. Inf Sci 208:55-80
-
(2012)
Inf Sci
, vol.208
, pp. 55-80
-
-
Domingo-Ferrer, J.1
Trujillo-Rasua, R.2
-
17
-
-
84885396762
-
Pattern-preserving k-anonymization of sequences and its application to mobility data mining
-
Pensa RG, Monreale A, Pinelli F, Pedreschi D (2008) Pattern-preserving k-anonymization of sequences and its application to mobility data mining. In: PiLBA
-
(2008)
Pilba
-
-
Pensa, R.G.1
Monreale, A.2
Pinelli, F.3
Pedreschi, D.4
-
18
-
-
85011072055
-
-
In: VLDB
-
Wong WK, Cheung DW, Hung E, Kao B, Mamoulis N (2007) Security in outsourcing of association rule mining. In: VLDB, pp 111-122
-
(2007)
Security in Outsourcing of Association Rule Mining
, pp. 111-122
-
-
Wong, W.K.1
Cheung, D.W.2
Hung, E.3
Kao, B.4
Mamoulis, N.5
-
20
-
-
78650868674
-
Movement data anonymity through generalization
-
Monreale A, Andrienko GL, Andrienko NV, Giannotti F, Pedreschi D, Rinzivillo S, Wrobel S (2010) Movement data anonymity through generalization. Trans Data Privacy 3(2):91-121
-
(2010)
Trans Data Privacy
, vol.3
, Issue.2
, pp. 91-121
-
-
Monreale, A.1
Rienko, G.L.2
Rienko, N.V.3
Giannotti, F.4
Pedreschi, D.5
Rinzivillo, S.6
Wrobel, S.7
-
21
-
-
84880569901
-
Privacy-preserving mining of association rules from outsourced transaction databases
-
Giannotti F, Lakshmanan LVS, Monreale A, Pedreschi D, Wang WH (2013) Privacy-preserving mining of association rules from outsourced transaction databases. IEEE Syst J 7(3):385-395
-
(2013)
IEEE Syst J
, vol.7
, Issue.3
, pp. 385-395
-
-
Giannotti, F.1
Lakshmanan, L.2
Monreale, A.3
Pedreschi, D.4
Wang, W.H.5
-
22
-
-
84939633427
-
Privacy-preserving distributed movement data aggregation
-
Springer, Berlin
-
Monreale A, Wang WH, Pratesi F, Rinzivillo S, Pedreschi D, Andrienko G, Andrienko N (2013) Privacy-preserving distributed movement data aggregation. In: AGILE. Springer, Berlin. doi:10.1007/978-3-319-00615-4_13
-
(2013)
AGILE
-
-
Monreale, A.1
Wang, W.H.2
Pratesi, F.3
Rinzivillo, S.4
Pedreschi, D.5
Rienko, G.6
Rienko, N.7
-
25
-
-
84933554566
-
-
Article 29 data protection working party and working party on police and justice, the future of privacy: joint contribution to the consultation of the european commission on the legal framework for the fundamental right to protection of personal data. 02356/09/en, wp 168
-
Article 29 data protection working party and working party on police and justice, the future of privacy: joint contribution to the consultation of the european commission on the legal framework for the fundamental right to protection of personal data. 02356/09/en, wp 168 (dec. 1, 2009)
-
(2009)
-
-
-
26
-
-
84933554567
-
-
European Data Protection Supervisor, Opinion of the European data protection supervisor on promoting trust in the information society by fostering data protection and privacy
-
European Data Protection Supervisor (Mar. 18, 2010) Opinion of the European data protection supervisor on promoting trust in the information society by fostering data protection and privacy
-
(2010)
-
-
-
27
-
-
84933554568
-
-
Federal Trade Commission (Bureau of Consumer Protection) (Dec. 2010) Preliminary staff report, protecting consumer privacy in an era of rapid change: a proposed framework for business and policy makers
-
Federal Trade Commission (Bureau of Consumer Protection) (Dec. 2010) Preliminary staff report, protecting consumer privacy in an era of rapid change: a proposed framework for business and policy makers, at v, 41
-
-
-
-
28
-
-
4344559647
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppresion
-
Samarati P, Sweeney L (1998) Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppresion. In: Proc. of the IEEE symp. on research in security and privacy, pp 384-393
-
(1998)
Proc. Of the IEEE Symp. On Research in Security and Privacy
, pp. 384-393
-
-
Samarati, P.1
Sweeney, L.2
-
31
-
-
70349095406
-
Anonymizing moving objects: How to hide a MOB in a crowd?
-
Yarovoy R, Bonchi F, Lakshmanan LVS, Wang WH (2009) Anonymizing moving objects: how to hide a MOB in a crowd? In: EDBT, pp 72-83
-
(2009)
EDBT
, pp. 72-83
-
-
Yarovoy, R.1
Bonchi, F.2
Lakshmanan, L.3
Wang, W.H.4
-
32
-
-
73949100139
-
Towards trajectory anonymization: A generalization-based approach
-
Nergiz ME, Atzori M, Saygin Y, Güç B (2009) Towards trajectory anonymization: a generalization-based approach. Trans Data Privacy 2(1):47-75
-
(2009)
Trans Data Privacy
, vol.2
, Issue.1
, pp. 47-75
-
-
Nergiz, M.E.1
Atzori, M.2
Saygin, Y.3
Güç, B.4
-
33
-
-
54049092431
-
Protecting business intelligence and customer privacy while outsourcing data mining tasks
-
Qiu L, Li Y, Wu X (2008) Protecting business intelligence and customer privacy while outsourcing data mining tasks. Knowl Inf Syst 17(1):99-120
-
(2008)
Knowl Inf Syst
, vol.17
, Issue.1
, pp. 99-120
-
-
Qiu, L.1
Li, Y.2
Wu, X.3
-
36
-
-
33745556605
-
Smith A (2006) Calibrating noise to sensitivity in private data analysis
-
Springer, Berlin
-
Dwork C, Mcsherry F, Nissim K, Smith A (2006) Calibrating noise to sensitivity in private data analysis. In: Proceedings of the 3rd theory of cryptography conference. Springer, Berlin, pp 265-284
-
Proceedings of the 3Rd Theory of Cryptography Conference
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
-
41
-
-
33746335051
-
Differential privacy
-
In: Bugliesi M, Preneel B, Sassone V, Wegener I, Springer, Berlin
-
Dwork C (2006) Differential privacy. In: Bugliesi M, Preneel B, Sassone V, Wegener I (eds) Automata, languages and programming. Lecture notes in computer science, vol 4052. Springer, Berlin, pp 1-12
-
(2006)
Automata, Languages and Programming. Lecture Notes in Computer Science
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
45
-
-
84939435708
-
Sequenced release of privacy accurate call data record information in a GSM forensic investigation
-
Sandton, South Africa
-
Croft NJ, Olivier MS (2006) Sequenced release of privacy accurate call data record information in a GSM forensic investigation. ISSA, Sandton, South Africa
-
(2006)
ISSA
-
-
Croft, N.J.1
Olivier, M.S.2
-
47
-
-
21644439814
-
Cell-ID location technique, limits and benefits: An experimental study
-
IEEE
-
Trevisani E, Vitaletti A (2004) Cell-ID location technique, limits and benefits: an experimental study. In: WMCSA’04, pp 51-60. IEEE
-
(2004)
WMCSA’04
, pp. 51-60
-
-
Trevisani, E.1
Vitaletti, A.2
-
48
-
-
70349337434
-
Identification via location-profiling in GSM networks
-
ACM
-
De Mulder Y, Danezis G, Batina L, Preneel B (2008) Identification via location-profiling in GSM networks. In: WPES’08, pp 23-32. ACM
-
(2008)
WPES’08
, pp. 23-32
-
-
De Mulder, Y.1
Danezis, G.2
Batina, L.3
Preneel, B.4
|