Minimum-distance controlled perturbation methods for large-scale tabular data protection
DOI10.1016/j.ejor.2004.08.034zbMath1091.90088OpenAlexW2161248223MaRDI QIDQ2576244
Publication date: 27 December 2005
Published in: European Journal of Operational Research (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ejor.2004.08.034
linear programmingquadratic programminginterior-point methodsstatistical disclosure controlstatistical confidentialitycontrolled tabular adjustment
Applications of mathematical programming (90C90) Quadratic programming (90C20) Special problems of linear programming (transportation, multi-index, data envelopment analysis, etc.) (90C08) Interior-point methods (90C51) Graphical methods in statistics (62A09)
Related Items (13)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Controlled rounding for tables with subtotals
- Models and algorithms for the 2-dimensional cell suppression problem in statistical disclosure control
- Elements of statistical disclosure control
- The controlled rounding problem: Relaxations and complexity issues
- Quadratic interior-point methods in statistical disclosure control
- An approach to nonlinear programming
- Solving the Cell Suppression Problem on Tabular Data with Linear Constraints
- Network Models for Complementary Cell Suppression
- Controlled Rounding of Tabular Data
- Solving Real-World Linear Programs: A Decade and More of Progress
- Controlled Rounding
- Cell suppression: Disclosure protection for sensitive tabular data
- Using Simulated Annealing to Solve Controlled Rounding Problems
- Statistical disclosure in general three‐dimensional tables
- Statistical Disclosure in Two-Dimensional Tables: General Tables
- A Specialized Interior-Point Algorithm for Multicommodity Network Flows
- A CRITIQUE OF THE SENSITIVITY RULES USUALLY EMPLOYED FOR STATISTICAL TABLE PROTECTION
- Matrix Rounding Problems
This page was built for publication: Minimum-distance controlled perturbation methods for large-scale tabular data protection