参考文献
|
-
J. Doerr,“Top Mobile Internet Trends,”2011, http://www.slideshare.net/kleinerperkins/kpcb-top-10-mobile-trends-feb-2011(2012/12/6).
-
楊惠芬,“3 種Big Data 部署方式”,http://www.ithome.com.tw/itadm/article.php?c=76527 (2012/10/12)。
-
Komodo Media, Rogie King,“Please rob me,” http://pleaserobme.com/( 2012/12/26).
-
Foursquare, https://foursquare.com/ ( 2012/12/26).
-
周秉誼,“雲端運算平台—Hadoop”,國立台灣大學計算機及資訊網路中心,2009,
http://www.cc.ntu.edu.tw/chinese/epaper/0011/20091220_1106.htm (2012/10/12)。
-
法務部全國法規資料庫工作小組,“個人資料保護法”,2010,http://law.moj.gov.tw/LawClass/LawContent.aspx?PCODE=I0050021 (2012/11/10)
-
Dan Farber,“TechNet Summit: The new era of innovation,”2006,http://www.zdnet.com/blog/btl/technet-summit-the-new-era-of-innovation/3959 (2012/12/6).
-
Byun, J.-W.,Kamra, A.,Bertion, E.,Li,N.(2007).Efficient k-anonymization Using Clustering Techniques.12th International Conference on Database System for Advanced Applications(DASFAA'07)
-
Emam, L. E.,Fineberg, A.(2009).,Access to Information and Privacy Division of Health Canada.
-
Fung, C. M. Benjamin,Wang, Ke,Fu, Ada Wai-Chee(2010).Privacy-Preserving Data Publishing : Concepts and Techniques.CRC Press.
-
Gidofalvi, G.,Huang, X.,Pedersen, T. B..Privacy-preserving data mining on moving object trajectories.Proc. International Conference on Mobile Data Management 2007 (MDM '07)
-
Huo, Zheng,Meng, Xiao-Feng(2011).A Survey of Trajectory Privacy-Preserving Techniques.Chinese Journal of Computers,10,1820-1830.
-
Li, X.-B.,Sarkar, S.(2006).A Tree-Based Data perturbation Approach for Privacy-Preserving Data Mining.IEEE Transactions on Knowledge and DATA Engineering,18(9),1278-1283.
-
Luper, D.,Cameron, D.,Miller, J A.,Arabnia, H. R..Spatial and temporal target association through semantic analysis and GPS data mining.Proc. International Conference on Information & Knowledge Engineering 2007(IKE '07)
-
Mohammed , N.,Fung, B M.,Debbabi, M..Walking in the crowd: Anonymizing trajectory data for pattern analysis.Proc. The 18th ACM Conference on Information and Knowledge 2009 (CIKM '09)
-
Pingley, A.(2011).Protection of query privacy for continuous location based services.IEEE INFOCOM 2011
-
Rizvi, S. J.,Haritsa, J. R.(2002).Maintaining data privacy in association rule mining.The 28th International Conference on Very Large Data Base 2002 (VLDB'02)
-
Rokach, L.,Elovici, Y.,Shapira, B.(2010).Efficient Multidimensional Suppression for K-anonymity.IEEE Transaction On Knowledge And Data Engineering,22(3),334-347.
-
Samarati,P.,Sweeney, L.(1998).Protecting Privacy when Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression.IEEE Symposium on Research in Security and Privacy
-
Sweeney, L.(2002).K-anonymity: A model for protecting privacy.International Journal of Uncertainty,10(5),557-570.
-
Terrovitis, M.,Mamoulis, N..Privacy preserving in the publication of trajectories.Proc. The 9th International Conference on Mobile Data Management 2008 (MDM'08)
-
Vicente, C. Ruiz(2011).Location-Related Privacy in Geo-Social Networks.IEEE Internet Computing,15(3),20-27.
-
Xu, T,Cai, Y(2008).Exploring historical location data for anonymity preservation in location-based services.Proceedings of the 27th Conference on Computer Communications (INFOCOM 2008),Phoenix:
-
Yarovoy, R.,Bonchi, F.,Lakshmanan, L.,Wang, H W..Anonymizing moving objects: How to hide a MOB in a crowd?.Proc. The 12th International Conference on Extending Database Technology: Advances in Database Technology 2009 (edbt'09)
-
沈炳宏(2009)。初探Hadoop開放原始碼平台環境。RUNPC,190
-
周泓霈(2005)。碩士論文(碩士論文)。國立成功大學。
-
洪國揚(2011)。碩士論文(碩士論文)。國立中正大學。
-
殷鼎鈞(2011)。碩士論文(碩士論文)。國立中正大學。
-
陳釧瑤(2012)。行動寬頻下之適地性(LBS)服務發展趨勢。經濟部技術處。
-
黃崇明(2011)。適地性行動應用網路與數位內容製作技術。易習圖書。
|