Research Article
A Novel Method for Location Privacy Protection in LBS Applications
Algorithm 3
Enumeration with pruning.
Input: real ranking , Maximum tolerance | |
Output: ranking Set | |
1. init , , , | |
2. for each do | |
3. calculate and | |
4. if then | |
5. | |
6. for to do | |
7. init | |
8. for each in do | |
9. for to do | |
10. if then | |
11. continue | |
12. | |
13. calculate and | |
14. if then | |
15. | |
16. | |
17. return |