Confidentiality control of tabulated data: Some practical network models
From MaRDI portal
Publication:1127145
DOI10.1016/0377-2217(94)00024-7zbMATH Open0912.90207OpenAlexW1976625357MaRDI QIDQ1127145FDOQ1127145
Authors: John A. George, Chong Juin Kuan, Brendan J. Ring
Publication date: 13 August 1998
Published in: European Journal of Operational Research (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/0377-2217(94)00024-7
Recommendations
- Controlled rounding and cell perturbation: statistical disclosure limitation methods for tabular data
- Minimum-distance controlled perturbation methods for large-scale tabular data protection
- Controlled rounding for tables with subtotals
- The controlled rounding problem: Complexity and computational experience
Cites Work
- Controlled Rounding
- Controlled Rounding of Tabular Data
- Using Simulated Annealing to Solve Controlled Rounding Problems
- Controlled rounding for tables with subtotals
- A Constructive Procedure for Unbiased Controlled Rounding
- Title not available (Why is that?)
- Exceptional Paper—Design and Implementation of Large Scale Primal Transshipment Algorithms
This page was built for publication: Confidentiality control of tabulated data: Some practical network models
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1127145)