Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2015, Article ID 958154, 9 pages
http://dx.doi.org/10.1155/2015/958154
Research Article

An Efficient Approximation Method for Calculating Confidence Level of Negative Survey

School of Computer Science, China University of Geosciences, Wuhan, China

Received 27 April 2015; Revised 23 July 2015; Accepted 2 September 2015

Academic Editor: Ofer Hadar

Copyright © 2015 Ran Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. A. Hofmeyr and S. Forrest, “Architecture for an artificial immune system,” Evolutionary Computation, vol. 8, no. 4, pp. 443–473, 2000. View at Publisher · View at Google Scholar · View at Scopus
  2. S. Forrest, A. S. Perelson, L. Allen, and R. Cherukuri, “Self-nonself discrimination in a computer,” in Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 202–212, May 1994. View at Scopus
  3. J. Kim and P. J. Bentley, “Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator,” in Proceedings of the Congress on Evolutionary Computation (CEC '01), vol. 2, pp. 1244–1252, May 2001. View at Scopus
  4. G. Du, T. Huang, B. Zhao, and L. Song, “Dynamic self-defined immunity model base on data mining for network intrusion detection,” in Proceedings of the 4th International Coference on Machine Learning and Cybernetics, vol. 6, pp. 3866–3870, 2005.
  5. Z. Ji and D. Dasgupta, “V-detector: an efficient negative selection algorithm with ‘probably adequate’ detector coverage,” Information Sciences, vol. 179, no. 10, pp. 1390–1406, 2009. View at Publisher · View at Google Scholar · View at Scopus
  6. F. Esponda, “Negative surveys,” http://arxiv.org/abs/math/0608176.
  7. J. Horey, M. M. Groat, S. Forrest, and F. Esponda, “Anonymous data collection in sensor networks,” in Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous '07), pp. 1–8, August 2007. View at Publisher · View at Google Scholar · View at Scopus
  8. F. Esponda and V. M. Guerrero, “Surveys with negative questions for sensitive items,” Statistics and Probability Letters, vol. 79, no. 24, pp. 2456–2461, 2009. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  9. J. L. Horey, S. Forrest, and M. Groat, “Reconstructing spatial distributions from anonymized locations,” in Proceedings of the 28th International Conference on Data Engineering Workshops, pp. 243–250, ACM, 2012. View at Publisher · View at Google Scholar
  10. H. Xie, L. Kulik, and E. Tanin, “Privacy-aware collection of aggregate spatial data,” Data & Knowledge Engineering, vol. 70, no. 6, pp. 575–595, 2011. View at Publisher · View at Google Scholar · View at Scopus
  11. Y. Bao, W. Luo, and X. Zhang, “Estimating positive surveys from negative surveys,” Statistics and Probability Letters, vol. 83, no. 2, pp. 551–558, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  12. Y. Bao, W. Luo, and Y. Lu, “On the dependable level of the negative survey,” Statistics and Probability Letters, vol. 89, pp. 31–40, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus