|
|
Bimonthly Since 1986 |
ISSN 1004-9037
|
|
|
|
|
Publication Details |
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
|
|
|
|
|
|
|
|
|
|
Abstract
In recent years, cooperative information estimation has witnessed significant development and important advancements. Ensuring the safeguarding of privacy becomes crucial, especially when dealing with unique or sensitive information in dispersed arrangements. Protecting individuals' privacy during data collection can be pursued through various avenues. Time division mining plays a critical role in analyzing sequential combination-based approaches, yet often lacks emphasis on the sequential component's importance for improved analysis and performance. Hence, this paper is to develop strategies that covertly decode universally shared sequential combination-based policies across all sharing instances.
Keyword
Privacy Safeguarding, Dispersed Repositories, Time Division Mining, Sequential Combination-based Policies
PDF Download (click here)
|
|
|
|
|