A bound on correlation immunity.
Page 1 Next
Fon-Der-Flaass, D.G. (2007)
Sibirskie Ehlektronnye Matematicheskie Izvestiya [electronic only]
Josep Maria Mateo Sanz, Josep Domingo Ferrer (1998)
Qüestiió
Microaggregation is a statistical disclosure control technique for microdata. Raw microdata (i.e. individual records) are grouped into small aggregates prior to publication. Each aggregate should contain at least k records to prevent disclosure of individual information. Fixed-size microaggregation consists of taking fixed-size microaggregates (size k). Data-oriented microaggregation (with variable group size) was introduced recently. Regardless of the group size, microaggregations on a multidimensional...
Guo, Qin, Luo, Mingxing, Li, Lixiang, Yang, Yixian (2010)
Mathematical Problems in Engineering
Piotr Szwed, Paweł Skrzyński (2014)
International Journal of Applied Mathematics and Computer Science
Petković, Ivan (2002)
Novi Sad Journal of Mathematics
Marcel Zanechal (2001)
Mathematica Slovaca
Kleftouris, D.N., Maragos, N., Ziogou, C., Mouchos, Ch. (2003)
Acta Universitatis Apulensis. Mathematics - Informatics
T. Moh (2003)
Revista Matemática Iberoamericana
Borujeni, Shahram Etemadi, Eshghi, Mohammad (2009)
Mathematical Problems in Engineering
Pieprzyk, Josef, Zhang, Xian-Mo (2004)
Discrete Mathematics and Theoretical Computer Science. DMTCS [electronic only]
Mohammed Khabzaoui, Clarisse Dhaenens, El-Ghazali Talbi (2008)
RAIRO - Operations Research
An important task of knowledge discovery deals with discovering association rules. This very general model has been widely studied and efficient algorithms have been proposed. But most of the time, only frequent rules are seeked. Here we propose to consider this problem as a multi-objective combinatorial optimization problem in order to be able to also find non frequent but interesting rules. As the search space may be very large, a discussion about different approaches is proposed and a hybrid...
D. K. Tasoulis, G. C. Meletiou, M. N. Vrahatis (2003)
Δελτίο της Ελληνικής Μαθηματικής Εταιρίας
Liptai, Kálmán, Kusper, Gábor, Radványi, Tibor (2007)
Annales Mathematicae et Informaticae
Harkins, Ryan, Weber, Eric, Westmeyer, Andrew (2005)
Experimental Mathematics
Kenichi Arai, Hiroyuki Okazaki (2013)
Formalized Mathematics
In this article, we formalize the Advanced Encryption Standard (AES). AES, which is the most widely used symmetric cryptosystem in the world, is a block cipher that was selected by the National Institute of Standards and Technology (NIST) as an official Federal Information Processing Standard for the United States in 2001 [12]. AES is the successor to DES [13], which was formerly the most widely used symmetric cryptosystem in the world. We formalize the AES algorithm according to [12]. We then verify...
Bojan, Daniela, Vultur, Sidonia (2007)
Acta Universitatis Apulensis. Mathematics - Informatics
Josep Domingo i Ferrer (1996)
Qüestiió
When publishing contingency tables which contain official statistics, a need to preserve statistical confidentiality arises. Statistical disclosure of individual units must be prevented. There is a wide choice of techniques to achieve this anonymization: cell supression, cell perturbation, etc. In this paper, we tackle the problem of using anonymized data to compute exact statistics; our approach is based on privacy homomorphisms, which are encryption transformations such that the decryption of...
Jovan Đ. Golić (1998)
Publications de l'Institut Mathématique
Otokar Grošek (1994)
Mathematica Slovaca
Markovski, S., Gligoroski, D., Stojčevska, B. (2000)
Novi Sad Journal of Mathematics
Page 1 Next