Change search
Refine search result
1 - 12 of 12
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Griggs, Terry
    et al.
    The Open University, UK.
    Stokes, Klara
    University of Skövde, School of Engineering Science. University of Skövde, The Virtual Systems Research Centre.
    On Pentagonal Geometries with Block Size 3, 4 or 52016In: Symmetries in Graphs, Maps, and Polytopes: 5th SIGMAP Workshop, West Malvern, UK, July 2014 / [ed] Jozef Širáň, Robert Jajcay, Springer, 2016, p. 147-157Chapter in book (Refereed)
  • 2.
    Izquierdo, Milagros
    et al.
    Department of Mathematics, Linköping University, Linköping, Sweden.
    Stokes, Klara
    University of Skövde, School of Engineering Science. University of Skövde, The Virtual Systems Research Centre.
    Isometric point-circle configurations on surfaces from uniform maps2016In: Symmetries in Graphs, Maps, and Polytopes: 5th SIGMAP Workshop, West Malvern, UK, July 2014 / [ed] Jozef Širáň, Robert Jajcay, Springer, 2016, p. 201-212Chapter in book (Refereed)
    Abstract [en]

    We embed neighborhood geometries of graphs on surfaces as point-circle configurations. We give examples coming from regular maps on surfaces with a maximum number of automorphisms for their genus, and survey geometric realization of pentagonal geometries coming from Moore graphs. An infinite family of point-circle v4 configurations on p-gonal surfaces with two p-gonal morphisms is given. The image of these configurations on the sphere under the two p-gonal morphisms is also described.

  • 3.
    Stokes, Klara
    University of Skövde, School of Engineering Science. University of Skövde, The Virtual Systems Research Centre.
    Irreducibility of configurations2016In: Ars Mathematica Contemporanea, ISSN 1855-3966, Vol. 10, no 1, p. 169-181Article in journal (Refereed)
  • 4.
    Stokes, Klara
    University of Skövde, School of Engineering Science. University of Skövde, The Virtual Systems Research Centre.
    Patterns of ideals of numerical semigroups2016In: Semigroup Forum, ISSN 0037-1912, E-ISSN 1432-2137, Vol. 93, no 1, p. 180-200Article in journal (Refereed)
  • 5.
    Stokes, Klara
    et al.
    Universitat Oberta de Catalunya, Barcelona, Spain .
    Bras-Amorós, Maria
    Universitat Rovira i Virgili, Tarragona, Spain .
    A Survey on the Use of Combinatorial Configurations for Anonymous Database Search2015In: Advanced Research in Data Privacy / [ed] Guillermo Navarro-Arribas, Vicenç Torra, Springer, 2015, p. 407-419Chapter in book (Refereed)
    Abstract [en]

    The peer-to-peer user-private information retrieval (P2P UPIR) protocol is an anonymous database search protocol in which the users collaborate in order to protect their privacy. This collaboration can be modelled by a combinatorial configuration. This chapter surveys currently available results on how to choose combinatorial configurations for P2P UPIR.

  • 6.
    Stokes, Klara
    et al.
    University of Skövde, School of Engineering Science. University of Skövde, The Virtual Systems Research Centre.
    Izquierdo, Milagros
    Department of Mathematics, Linköping University, Linköping Sweden.
    Geometric point-circle pentagonal geometries from Moore graphs2016In: Ars Mathematica Contemporanea, ISSN 1855-3966, Vol. 11, no 1, p. 215-229Article in journal (Refereed)
  • 7.
    Stokes, Klara
    et al.
    Universitat Oberta de Catalunya, Barcelona, Spain.
    Torra, Vicenç
    Consejo Superior de Investigaciones Científicas (CSIC), Spain.
    Multiple releases of k-anonymous data sets and k-anonymous relational databases2012In: International Journal of Uncertainty Fuzziness and Knowledge-Based Systems, ISSN 0218-4885, Vol. 20, no 6, p. 839-853Article in journal (Refereed)
    Abstract [en]

    In data privacy, the evaluation of the disclosure risk has to take into account the fact that several releases of the same or similar information about a population are common. In this paper we discuss this issue within the scope of k-anonymity. We also show how this issue is related to the publication of privacy protected databases that consist of linked tables. We present algorithms for the implementation of k-anonymity for this type of data.

  • 8.
    Stokes, Klara
    et al.
    Universitat Rovira i Virgili, Tarragona, Spain.
    Torra, Vicenç
    Universitat Autònoma de Barcelona (UAB), Spain.
    On some clustering approaches for graphs2011In: Fuzzy Systems (FUZZ), 2011, IEEE conference proceedings, 2011, p. 409-415Conference paper (Refereed)
    Abstract [en]

    In this paper we discuss some tools for graph perturbation with applications to data privacy. We present and analyse two different approaches. One is based on matrix decomposition and the other on graph partitioning. We discuss these methods and show that they belong to two traditions in data protection: noise addition/microaggregation and k-anonymity.

  • 9.
    Stokes, Klara
    et al.
    Universitat Rovira i Virgili, Tarragona, Spain.
    Torra, Vicenç
    Universitat Autònoma de Barcelona (UAB), Spain.
    On the Relationship Between Clustering and Coding Theory2012In: 2012 IEEE International Conference on Fuzzy Systems: Brisbane, Australia (June 10-15, 2012) / [ed] Hussein Abbass, Daryl Essam & Ruhul Sarker, IEEE conference proceedings, 2012, p. Article number 6250783-Conference paper (Refereed)
    Abstract [en]

    In this paper we discuss the relations between clustering and error correcting codes. We show that clustering can be used for constructing error correcting codes. We review the previous works found in the literature about this issue, and propose a modification of a previous work that can be used for code construction from a set of proposed codewords.

  • 10.
    Stokes, Klara
    et al.
    Universitat Rovira i Virgili, Tarragona, Catalonia, Spain.
    Torra, Vicenç
    IIIA, Institut d’Investigació en Intel ligència Artificial CSIC, Consejo Superior de Investigaciones Científicas, Bellaterra, Catalonia, Spain.
    Reidentification and k-anonymity: a model for disclosure risk in graphs2012In: Soft Computing - A Fusion of Foundations, Methodologies and Applications, ISSN 1432-7643, E-ISSN 1433-7479, Vol. 16, no 10, p. 1657-1670Article in journal (Refereed)
    Abstract [en]

    In this article we provide a formal framework for reidentification in general. We define n-confusion as a concept for modeling the anonymity of a database table and we prove that n-confusion is a generalization of k-anonymity. After a short survey on the different available definitions of k-anonymity for graphs we provide a new definition for k-anonymous graph, which we consider to be the correct definition. We provide a description of the k-anonymous graphs, both for the regular and the non-regular case. We also introduce the more flexible concept of (k, l)-anonymous graph. Our definition of (k, l)-anonymous graph is meant to replace a previous definition of (k, l)-anonymous graph, which we here prove to have severe weaknesses. Finally, we provide a set of algorithms for k-anonymization of graphs.

  • 11.
    Torra, Vicenç
    et al.
    University of Skövde, School of Informatics. University of Skövde, The Informatics Research Centre.
    Navarro-Arribas, Guillermo
    Universitat Autònoma de Barcelona, Barcelona, Spain.
    Stokes, Klara
    University of Skövde, School of Engineering Science. University of Skövde, The Virtual Systems Research Centre.
    An Overview of the Use of Clustering for Data Privacy2016In: Unsupervised Learning Algorithms / [ed] M. Emre Celebi, Kemal Aydin, Springer, 2016, p. 237-251Chapter in book (Refereed)
    Abstract [en]

    In this chapter we review some of our results related to the use of clustering in the area of data privacy. The paper gives a brief overview of data privacy and, more specifically, on data driven methods for data privacy and discusses where clustering can be applied in this setting. We discuss the role of clustering in the definition of masking methods, and on the calculation of information loss and data utility.

  • 12.
    Torra, Vicenç
    et al.
    Institut d'Investigacío en Intellig̀encia Artificial, Consejo Superior de Investigaciones Cient́ficas, Universitat Aut̀onoma de Barcelona, Bellaterra, Catalonia, Spain.
    Stokes, Klara
    Departments of Computer Science and Mathematics, Universitat Rovira i Virgili, Tarragona, Spain / UNESCO Chair in Data Privacy, Tarragona, Catalonia, Spain.
    Narukawa, Yasuo
    Toho Gakuen, Tokyo, Japan / Department of Computational Intelligence and Systems Science, Tokyo Institute of Technology, Yokohama, Japan.
    An extension of fuzzy measures to multisets and its relation to distorted probabilities2012In: IEEE transactions on fuzzy systems, ISSN 1063-6706, E-ISSN 1941-0034, Vol. 20, no 6, p. 1032-1045Article in journal (Refereed)
    Abstract [en]

    Fuzzy measures are monotonic set functions on a reference set; they generalize probabilities replacing the additivity condition by monotonicity. The typical application of these measures is with fuzzy integrals. Fuzzy integrals integrate a function with respect to a fuzzy measure, and they can be used to aggregate information from a set of sources (opinions from experts or criteria in a multicriteria decision-making problem). In this context, background knowledge on the sources is represented by means of the fuzzy measures. For example, interactions between criteria are represented by means of nonadditive measures. In this paper, we introduce fuzzy measures on multisets. We propose a general definition, and we then introduce a family of fuzzy measures for multisets which we show to be equivalent to distorted probabilities when the multisets are restricted to proper sets

1 - 12 of 12
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf