{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T12:06:11Z","timestamp":1773921971108,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,11,5]],"date-time":"2008-11-05T00:00:00Z","timestamp":1225843200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,11,5]]},"DOI":"10.1145\/1460412.1460440","type":"proceedings-article","created":{"date-parts":[[2008,11,14]],"date-time":"2008-11-14T13:17:40Z","timestamp":1226668660000},"page":"281-294","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":127,"title":["PoolView"],"prefix":"10.1145","author":[{"given":"Raghu K.","family":"Ganti","sequence":"first","affiliation":[{"name":"University of Illinois, Urbana-Chamapaign, Urbana, IL, USA"}]},{"given":"Nam","family":"Pham","sequence":"additional","affiliation":[{"name":"University of Illinois, Urbana-Chamapaign, Urbana, IL, USA"}]},{"given":"Yu-En","family":"Tsai","sequence":"additional","affiliation":[{"name":"University of Illinois, Urbana-Chamapaign, Urbana, IL, USA"}]},{"given":"Tarek F.","family":"Abdelzaher","sequence":"additional","affiliation":[{"name":"University of Illinois, Urbana-Chamapaign, Urbana, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,11,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2007.38"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/375551.375602"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1093\/ajcn\/32.8.1710"},{"key":"e_1_3_2_1_5_1","volume-title":"Workshop on World-Sensor-Web, co-located with ACM SenSys","author":"Burke J.","year":"2006","unstructured":"J. Burke Participatory sensing . Workshop on World-Sensor-Web, co-located with ACM SenSys , 2006 . J. Burke et al. Participatory sensing. Workshop on World-Sensor-Web, co-located with ACM SenSys, 2006."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pcbi.1000045"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.121"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1056808.1056910"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956810"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1322263.1322273"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772869"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773174"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1093\/ajcn\/23.9.1212"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134680.1134693"},{"key":"e_1_3_2_1_15_1","unstructured":"Garmin eTrex Legend. www8.garmin.com\/products\/etrexlegend.  Garmin eTrex Legend. www8.garmin.com\/products\/etrexlegend."},{"key":"e_1_3_2_1_16_1","volume-title":"Secure multi-party computation (draft). Technical report","author":"Goldreich O.","year":"2002","unstructured":"O. Goldreich . Secure multi-party computation (draft). Technical report , Weizmann Institute of Science , 2002 . O. Goldreich. Secure multi-party computation (draft). Technical report, Weizmann Institute of Science, 2002."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984624"},{"key":"e_1_3_2_1_18_1","volume-title":"Data Mining: Concepts and Techniques. Morgan Kaufmann","author":"Han J.","year":"2006","unstructured":"J. Han and M. Kamber . Data Mining: Concepts and Techniques. Morgan Kaufmann , second edition, 2006 . J. Han and M. Kamber. Data Mining: Concepts and Techniques. Morgan Kaufmann, second edition, 2006."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cam.2006.04.007"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1098918.1098938"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066163"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1182807.1182821"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.382494"},{"key":"e_1_3_2_1_24_1","first-page":"99","volume-title":"Proc. of the IEEE ICDM","author":"Kargutpa H.","year":"2003","unstructured":"H. Kargutpa , S. Datta , Q. Wang , and K. Sivakumar . On the privacy preserving properties of random data perturbation techniques . In Proc. of the IEEE ICDM , pages 99 -- 106 , 2003 . H. Kargutpa, S. Datta, Q. Wang, and K. Sivakumar. On the privacy preserving properties of random data perturbation techniques. In Proc. of the IEEE ICDM, pages 99--106, 2003."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.37"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144596318740"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30073-1_6"},{"key":"e_1_3_2_1_28_1","unstructured":"S.\n      Papadimitriou F.\n      Li G.\n      Kollios and \n      P. S.\n      Yu\n  . \n  Time series compressibility and privacy\n  . In Proc. \n  of VLDB\n   '07 pages \n  459\n  --\n  470 September \n  2007\n  .   S. Papadimitriou F. Li G. Kollios and P. S. Yu. Time series compressibility and privacy. In Proc. of VLDB '07 pages 459--470 September 2007."},{"key":"e_1_3_2_1_29_1","first-page":"37","volume-title":"Proceedings of HotNets-V","author":"Parker A.","year":"2006","unstructured":"A. Parker Network system challenges in selective sharing and verification for personal, social, and urban-scale sensing applications . In Proceedings of HotNets-V , pages 37 -- 42 , 2006 . A. Parker et al. Network system challenges in selective sharing and verification for personal, social, and urban-scale sensing applications. In Proceedings of HotNets-V, pages 37--42, 2006."},{"key":"e_1_3_2_1_30_1","unstructured":"PoolView. http:\/\/smart-attire.cs.uiuc.edu\/poolview\/.  PoolView. http:\/\/smart-attire.cs.uiuc.edu\/poolview\/."},{"key":"e_1_3_2_1_31_1","unstructured":"PoolView Protocol Specifications. http:\/\/smart-attire.cs.uiuc.edu\/poolview\/files\/fdtp.pdf.  PoolView Protocol Specifications. http:\/\/smart-attire.cs.uiuc.edu\/poolview\/files\/fdtp.pdf."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278972.1278975"},{"key":"e_1_3_2_1_33_1","unstructured":"SciLab. www.scilab.org.  SciLab. www.scilab.org."},{"key":"e_1_3_2_1_34_1","volume-title":"Winstons and Sons","author":"Tikhonov A. N.","year":"1977","unstructured":"A. N. Tikhonov and V. Y. Arsenin . Solution of Ill Posed Problems. V. H . Winstons and Sons , 1977 . A. N. Tikhonov and V. Y. Arsenin. Solution of Ill Posed Problems. V. H. Winstons and Sons, 1977."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1965.10480775"}],"event":{"name":"SenSys08: The 6th ACM Conference on Embedded Networked Sensor Systems","location":"Raleigh NC USA","acronym":"SenSys08","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems","ACM Association for Computing Machinery","SIGBED ACM Special Interest Group on Embedded Systems","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 6th ACM conference on Embedded network sensor systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1460412.1460440","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1460412.1460440","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:01Z","timestamp":1750290241000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1460412.1460440"}},"subtitle":["stream privacy for grassroots participatory sensing"],"short-title":[],"issued":{"date-parts":[[2008,11,5]]},"references-count":35,"alternative-id":["10.1145\/1460412.1460440","10.1145\/1460412"],"URL":"https:\/\/doi.org\/10.1145\/1460412.1460440","relation":{},"subject":[],"published":{"date-parts":[[2008,11,5]]},"assertion":[{"value":"2008-11-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}