Controlled tabular adjustment (CTA) can be classi ed within the group of approaches that perturb output data (i.e., tabular data), unlike other methods that focus on the original microdata. Being a post-tabular data perturbation technique it becomes easier to guarantee consistency and quality of the released information (e.g., table additivity, preservation of subtotal or total cells of the original table, etc.). On the other hand, it may be computationally more costly than pre-tabular strategies. The purpose of this work is twofold. First, we will review a recently used heuristic to suboptimally solve CTA (which is a mixed integer linear optimization problem). For some tables this heuristic provided decent solutions much faster than other ...
Cell suppression is a widely used technique for protecting sensitive information in statistical data...
In this thesis we consider a minimum distance Controlled Tabular Adjustment (CTA) model for statisti...
Various methods are used for Statistical Data Protection. The most commonly used method is Cell Supr...
Controlled tabular adjustment (CTA) can be classi ed within the group of approaches that perturb out...
Controlled tabular adjustment (CTA) is an emerging protect ion technique for tabular data pro- tecti...
Controlled tabular adjustment (CIA) is a relatively new protection technique for tabular data protec...
Minimum distance controlled tabular adjustment (CTA) is a recent perturbative methodology for the p...
Abstract. Controlled tabular adjustment (CTA), and its minimum distance variants, is a recent method...
One of the main services of National Statistical Agencies (NSAs) for the current Information Society...
Minimum-distance controlled tabular adjustment methods (CTA) have been formulated as an alternative ...
Tabular data is routinely released by national statistical agencies (NSA) to disseminate aggregated ...
National Statistical Agencies routinely disseminate large amount of data. Prior to dissemination the...
Minimum-distance controlled tabular adjustment methods (CTA), and its restricted variants (RCTA), is...
Any institution that disseminates data in aggregated form h as the duty to ensure that individual co...
CTA is a post-tabular perturbative approach for statistical disclosure control. Its purpose is to co...
Cell suppression is a widely used technique for protecting sensitive information in statistical data...
In this thesis we consider a minimum distance Controlled Tabular Adjustment (CTA) model for statisti...
Various methods are used for Statistical Data Protection. The most commonly used method is Cell Supr...
Controlled tabular adjustment (CTA) can be classi ed within the group of approaches that perturb out...
Controlled tabular adjustment (CTA) is an emerging protect ion technique for tabular data pro- tecti...
Controlled tabular adjustment (CIA) is a relatively new protection technique for tabular data protec...
Minimum distance controlled tabular adjustment (CTA) is a recent perturbative methodology for the p...
Abstract. Controlled tabular adjustment (CTA), and its minimum distance variants, is a recent method...
One of the main services of National Statistical Agencies (NSAs) for the current Information Society...
Minimum-distance controlled tabular adjustment methods (CTA) have been formulated as an alternative ...
Tabular data is routinely released by national statistical agencies (NSA) to disseminate aggregated ...
National Statistical Agencies routinely disseminate large amount of data. Prior to dissemination the...
Minimum-distance controlled tabular adjustment methods (CTA), and its restricted variants (RCTA), is...
Any institution that disseminates data in aggregated form h as the duty to ensure that individual co...
CTA is a post-tabular perturbative approach for statistical disclosure control. Its purpose is to co...
Cell suppression is a widely used technique for protecting sensitive information in statistical data...
In this thesis we consider a minimum distance Controlled Tabular Adjustment (CTA) model for statisti...
Various methods are used for Statistical Data Protection. The most commonly used method is Cell Supr...