Some social networking web sites provide mechanisms for users to determine the GPS coor dinates of where their friends are located at any given moment. Describe a generalization scheme that would anonymize this information using disjoint rectangles so that any reported rectangular region as a "location" always has at least k people in it, for some security pa rameter k
What will be an ideal response?
Start with a rectangular region that contains all the users. Divide this region
into two subregions by means of a horizontal line so that each subregion contains half of
the users. Now divide each of the two subregions using a vertical line. Continue the subdi
vision process alternating between horizontal and vertical dividing lines until the resulting
subregions have each between k and 2k - 1 users. For each user, report as its location the
smallest subregion containing the user.
You might also like to view...
The method used when someone helping you is also using Windows 10 is called ________
Fill in the blank(s) with correct word
The Wired Equivalent Privacy standard had what significant disadvantage?
a. It did not allow the use of a password for access to the network. b. It provided no encryption for traffic sent over the air. c. It used a shared encryption key for all clients, and the key might never change. d. It only encrypted the initial connection authentication, but did not encrypt subsequent traffic.
Identify the letter of the choice that best matches the phrase or definition.
A. Displays media controls when you move the pointer over audio and video clips during a slide show B. Allows you to set advanced options for a slide show C. Plays any recorded timings during the slide show D. Allows remote viewers to watch the slide show in a browser E. Plays any recorded narrations during the slide show
Domestic financial institutions are required to provide an annual privacy notice to which of the following?
A. Consumers B. Customers C. Employees D. Contractors