Research Article

A Novel Method for Location Privacy Protection in LBS Applications

Algorithm 3

Enumeration with pruning.

Input: real ranking , Maximum tolerance
Output: ranking Set
1. init , , ,
2. for each do
3.  calculate and
4.  if then
5.    
6. for to do
7. init
8.  for each in do
9.    for to do
10.     if then
11.      continue
12.     
13.     calculate and
14.     if then
15.      
16.  
17. return