{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T07:06:39Z","timestamp":1725692799069},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/camad.2011.5941096","type":"proceedings-article","created":{"date-parts":[[2011,7,8]],"date-time":"2011-07-08T17:49:21Z","timestamp":1310147361000},"page":"107-111","source":"Crossref","is-referenced-by-count":8,"title":["Agent based middleware for private data mashup in IPTV recommender services"],"prefix":"10.1109","author":[{"given":"Ahmed M.","family":"Elmisery","sequence":"first","affiliation":[]},{"given":"Dmitri","family":"Botvich","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250908"},{"key":"ref11","article-title":"Robust De-anonymization of Large Sparse Datasets","author":"narayanan","year":"0","journal-title":"presented at the Proceedings of the 2008 IEEE Symposium on Security and Privacy"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1244002.1244092"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.06.052"},{"key":"ref14","article-title":"Naive (Bayes) at Forty: The Independence Assumption in Information Retrieval","author":"lewis","year":"0","journal-title":"presented at the Proceedings of the 10th European Conference on Machine Learning"},{"article-title":"Use of knn for the netflix prize","year":"2006","author":"hong","key":"ref15"},{"journal-title":"MovieLens Data Sets","year":"0","author":"lam","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/963770.963772"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180416"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1005140.1005158"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14125-6_18"},{"key":"ref6","first-page":"161","article-title":"Experimental Demonstration of a Hybrid Privacy-Preserving Recommender System","author":"esma","year":"2008"},{"key":"ref5","article-title":"Cyber Dialogue Survey Data Reveals Lost Revenue for Retailers Due to Widespread Consumer Privacy Concerns","author":"dialogue","year":"2001","journal-title":"Cyber Dialogue"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1066860"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250993"},{"key":"ref2","article-title":"Mix, Match, And Mutate","author":"hof","year":"2005","journal-title":"BusinessWeek"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066163"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2009.123"}],"event":{"name":"2011 IEEE 16th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","start":{"date-parts":[[2011,6,10]]},"location":"Kyoto, Japan","end":{"date-parts":[[2011,6,11]]}},"container-title":["2011 IEEE 16th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5934664\/5941092\/05941096.pdf?arnumber=5941096","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T01:47:27Z","timestamp":1490060847000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5941096\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/camad.2011.5941096","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}