Skip to Main Content
Skip Nav Destination
ASME Press Select Proceedings

International Conference on Instrumentation, Measurement, Circuits and Systems (ICIMCS 2011)

By
Chen Ming
Chen Ming
Search for other works by this author on:
ISBN:
9780791859902
No. of Pages:
1400
Publisher:
ASME Press
Publication date:
2011

During the same time as data mining, it may lead to leakage of personal privacy issues; k-anonymization algorithm is usually used to protect personal privacy, but they are very complicated algorithms, when k-anonymity is a NP-hard problem, k is equal or greater than 3. Traditional clustering algorithm is used to improve the computational efficiency of k-anonymization, but it takes a higher time cost. In order to improve the abovementioned problems, we introduce a fast and stable clustering algorithm, to improve the k-anonymous operation and receive better results. The method of time complexity is only O(n*q)...

Abstract
Keywords:
Introduction
Literature Review
Research Method
Experiment Results
Conclusion
Acknowledgments
References
This content is only available via PDF.
You do not currently have access to this chapter.
Close Modal

or Create an Account

Close Modal
Close Modal