Author:
Chester Sean,Kapron Bruce M.,Srivastava Gautam,Venkatesh S.
Publisher
Springer Science and Business Media LLC
Subject
Computer Science Applications,Human-Computer Interaction,Media Technology,Communication,Information Systems
Reference26 articles.
1. Abdallah S (2011) Generalizing unweighted network measures to capture the focus in interactions. Soc Netw Anal Min 1(4):255–269
2. Aggarwal G, Feder T, Kenthapadi K, Motwani R, Panigrahy R, Thomas D, Zhu A (2005) Anonymizing tables. In: Proceedings of the international conference on database theory (ICDT), pp 246–258
3. Anshelevich E, Karagiozova A (2007) Terminal backup, 3D matching, and covering cubic graphs. In: Proceedings of the ACM symposium on theory of computing (STOC), pp 391–400
4. Backstrom L, Dwork C, Kleinberg JM (2007) Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In: Proceedings of the conference on World Wide Web (WWW), pp 181–190
5. Blocki J, Williams R (2010) Resolving the complexity of some data privacy problems. In: Proceedings of the international colloquium on automata, languages and programming, pp 393–404
Cited by
41 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献