callback( { "result":{ "query":":facetid:toc:\"db/journals/tdp/tdp10.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"66.80" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"8", "@dc":"8", "@oc":"8", "@id":"43473944", "text":":facetid:toc:db/journals/tdp/tdp10.bht" } }, "hits":{ "@total":"8", "@computed":"8", "@sent":"8", "@first":"0", "hit":[{ "@score":"1", "@id":"2849023", "info":{"authors":{"author":[{"@pid":"137/8002","text":"Vanessa Ayala-Rivera"},{"@pid":"96/10518","text":"Patrick McDonagh"},{"@pid":"11/7834","text":"Thomas Cerqueus"},{"@pid":"56/753-1","text":"Liam Murphy 0001"},{"@pid":"37/9979","text":"Christina Thorpe"}]},"title":"Enhancing the Utility of Anonymized Data by Improving the Quality of Generalization Hierarchies.","venue":"Trans. Data Priv.","volume":"10","number":"1","pages":"27-59","year":"2017","type":"Journal Articles","access":"open","key":"journals/tdp/Ayala-RiveraMCM17","ee":"http://www.tdp.cat/issues16/tdp.a261a16.pdf","url":"https://dblp.org/rec/journals/tdp/Ayala-RiveraMCM17"}, "url":"URL#2849023" }, { "@score":"1", "@id":"2849024", "info":{"authors":{"author":[{"@pid":"97/9862","text":"Amine Belabed"},{"@pid":"91/2661","text":"Esma Aïmeur"},{"@pid":"99/9862","text":"Mohammed Amine Chikh"},{"@pid":"80/9862","text":"Hadjila Fethallah"}]},"title":"A Privacy-Preserving Approach for Composite Web Service Selection.","venue":"Trans. Data Priv.","volume":"10","number":"2","pages":"83-115","year":"2017","type":"Journal Articles","access":"open","key":"journals/tdp/BelabedACF17","ee":"http://www.tdp.cat/issues16/abs.a253a16.php","url":"https://dblp.org/rec/journals/tdp/BelabedACF17"}, "url":"URL#2849024" }, { "@score":"1", "@id":"2849025", "info":{"authors":{"author":[{"@pid":"155/3220","text":"Sam Fletcher"},{"@pid":"153/5559","text":"Md Zahidul Islam 0001"}]},"title":"Measuring Rule Retention in Anonymized Data - When One Measure Is Not Enough.","venue":"Trans. Data Priv.","volume":"10","number":"3","pages":"175-201","year":"2017","type":"Journal Articles","access":"open","key":"journals/tdp/FletcherI17","ee":"http://www.tdp.cat/issues16/abs.a259a16.php","url":"https://dblp.org/rec/journals/tdp/FletcherI17"}, "url":"URL#2849025" }, { "@score":"1", "@id":"2849026", "info":{"authors":{"author":[{"@pid":"16/11442","text":"Yasser Jafer"},{"@pid":"m/StanMatwin","text":"Stan Matwin"},{"@pid":"52/3016","text":"Marina Sokolova"}]},"title":"A Multi-dimensional Privacy-aware Evaluation Function in Automatic Feature Selection.","venue":"Trans. Data Priv.","volume":"10","number":"3","pages":"145-174","year":"2017","type":"Journal Articles","access":"open","key":"journals/tdp/JaferMS17","ee":"http://www.tdp.cat/issues16/abs.a230a15.php","url":"https://dblp.org/rec/journals/tdp/JaferMS17"}, "url":"URL#2849026" }, { "@score":"1", "@id":"2849027", "info":{"authors":{"author":[{"@pid":"124/3060","text":"Koray Mancuhan"},{"@pid":"c/CClifton","text":"Chris Clifton"}]},"title":"Instance-Based Learning with l-diversity.","venue":"Trans. Data Priv.","volume":"10","number":"3","pages":"203-235","year":"2017","type":"Journal Articles","access":"open","key":"journals/tdp/MancuhanC17","ee":"http://www.tdp.cat/issues16/abs.a273a17.php","url":"https://dblp.org/rec/journals/tdp/MancuhanC17"}, "url":"URL#2849027" }, { "@score":"1", "@id":"2849028", "info":{"authors":{"author":[{"@pid":"134/4205","text":"Reza Mortazavi"},{"@pid":"59/6375","text":"Saeed Jalili"}]},"title":"Fine granular proximity breach prevention during numerical data anonymization.","venue":"Trans. Data Priv.","volume":"10","number":"2","pages":"117-144","year":"2017","type":"Journal Articles","access":"open","key":"journals/tdp/MortazaviJ17","ee":"http://www.tdp.cat/issues16/abs.a268a16.php","url":"https://dblp.org/rec/journals/tdp/MortazaviJ17"}, "url":"URL#2849028" }, { "@score":"1", "@id":"2849029", "info":{"authors":{"author":[{"@pid":"75/6958","text":"Anna Oganian"},{"@pid":"d/JDomingoFerrer","text":"Josep Domingo-Ferrer"}]},"title":"Local synthesis for disclosure limitation that satisfies probabilistic k-anonymity criterion.","venue":"Trans. Data Priv.","volume":"10","number":"1","pages":"61-81","year":"2017","type":"Journal Articles","access":"open","key":"journals/tdp/OganianD17","ee":"http://www.tdp.cat/issues16/tdp.a244a16.pdf","url":"https://dblp.org/rec/journals/tdp/OganianD17"}, "url":"URL#2849029" }, { "@score":"1", "@id":"2849030", "info":{"authors":{"author":[{"@pid":"147/5138","text":"Baichuan Zhang"},{"@pid":"94/1458","text":"Noman Mohammed"},{"@pid":"67/10405","text":"Vachik S. Dave"},{"@pid":"87/5931","text":"Mohammad Al Hasan"}]},"title":"Feature Selection for Classification under Anonymity Constraint.","venue":"Trans. Data Priv.","volume":"10","number":"1","pages":"1-25","year":"2017","type":"Journal Articles","access":"open","key":"journals/tdp/ZhangMDH17","ee":"http://www.tdp.cat/issues16/tdp.a262a16.pdf","url":"https://dblp.org/rec/journals/tdp/ZhangMDH17"}, "url":"URL#2849030" } ] } } } )