Search Results

There are 18036 results for: content related to: A Multi-Layer Dynamic Model for Customer Experience Analytics

  1. Hilbert-order based spatial cloaking algorithm in road network

    Concurrency and Computation: Practice and Experience

    Volume 25, Issue 1, January 2013, Pages: 143–158, Yong-Ki Kim, Amina Hossain, Al-Amin Hossain and Jae-Woo Chang

    Version of Record online : 7 MAY 2012, DOI: 10.1002/cpe.2844

  2. SaC-FRAPP: a scalable and cost-effective framework for privacy preservation over big data on cloud

    Concurrency and Computation: Practice and Experience

    Volume 25, Issue 18, 25 December 2013, Pages: 2561–2576, Xuyun Zhang, Chang Liu, Surya Nepal, Chi Yang, Wanchun Dou and Jinjun Chen

    Version of Record online : 4 JUL 2013, DOI: 10.1002/cpe.3083

  3. (t,k)-Hypergraph anonymization: an approach for secure data publishing

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1306–1317, Atefeh Asayesh, Mohammad Ali Hadavi and Rasool Jalili

    Version of Record online : 25 SEP 2014, DOI: 10.1002/sec.1084

  4. On the identity anonymization of high-dimensional rating data

    Concurrency and Computation: Practice and Experience

    Volume 24, Issue 10, July 2012, Pages: 1108–1122, Xiaoxun Sun, Hua Wang and Yanchun Zhang

    Version of Record online : 24 MAR 2011, DOI: 10.1002/cpe.1724

  5. K-anonymity against neighborhood attacks in weighted social networks

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3864–3882, Chuan-Gang Liu, I-Hsien Liu, Wun-Sheng Yao and Jung-Shian Li

    Version of Record online : 22 JUL 2015, DOI: 10.1002/sec.1306

  6. You have free access to this content
    Using Big Data to Improve Customer Experience and Business Performance

    Bell Labs Technical Journal

    Volume 18, Issue 4, March 2014, Pages: 3–17, Jeffrey Spiess, Yves T'Joens, Raluca Dragnea, Peter Spencer and Laurent Philippart

    Version of Record online : 26 FEB 2014, DOI: 10.1002/bltj.21642

  7. Protecting location privacy and query privacy: a combined clustering approach

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 12, 25 August 2015, Pages: 3021–3043, Chi Lin, Guowei Wu and Chang Wu Yu

    Version of Record online : 10 MAR 2014, DOI: 10.1002/cpe.3244

  8. User identification and anonymization in 802.11 wireless LANs

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 15–27, Dingbang Xu, Yu Wang, Xinghua Shi and Xiaohang Yin

    Version of Record online : 15 FEB 2011, DOI: 10.1002/sec.296

  9. ‘Nothing is really safe’: a focus group study on the processes of anonymizing and sharing of health data for research purposes

    Journal of Evaluation in Clinical Practice

    Volume 17, Issue 6, December 2011, Pages: 1140–1146, Gill Haddow, Ann Bruce, Shiva Sathanandam and Jeremy C. Wyatt

    Version of Record online : 13 JUL 2010, DOI: 10.1111/j.1365-2753.2010.01488.x

  10. Manipulating Wi-Fi packet traces with WiPal: design and experience

    Software: Practice and Experience

    Volume 42, Issue 5, May 2012, Pages: 585–599, Thomas Claveirole and Marcelo Dias de Amorim

    Version of Record online : 13 APR 2011, DOI: 10.1002/spe.1080

  11. Improving Product Quality and Reliability with Customer Experience Data

    Quality and Reliability Engineering International

    Volume 28, Issue 8, December 2012, Pages: 873–886, Aarnout Brombacher, Eva Hopma, Ashwin Ittoo, Yuan Lu, Ilse Luyk, Laura Maruster, Joël Ribeiro, Ton Weijters and Hans Wortmann

    Version of Record online : 9 DEC 2011, DOI: 10.1002/qre.1277

  12. Evaluating Presence for Customer Experience in a Virtual Environment: Using a Nuclear Power Plant as an Example

    Human Factors and Ergonomics in Manufacturing & Service Industries

    Volume 25, Issue 4, July/August 2015, Pages: 484–499, Chia-Hsuan Lee, Chinmei Chou and Tien-Lung Sun

    Version of Record online : 13 OCT 2014, DOI: 10.1002/hfm.20563

  13. Coding of DNA Samples and Data in the Pharmaceutical Industry: Current Practices and Future Directions—Perspective of the I-PWG

    Clinical Pharmacology & Therapeutics

    Volume 89, Issue 4, April 2011, Pages: 537–545, MA Franc, N Cohen, AW Warner, PM Shaw, P Groenen, A Snapir and On behalf of the Industry Pharmacogenomics Working Group

    Version of Record online : 23 FEB 2011, DOI: 10.1038/clpt.2010.306

  14. An improved anonymity model for big data security based on clustering algorithm

    Concurrency and Computation: Practice and Experience

    Chunyong Yin, Sun Zhang, Jinwen Xi and Jin Wang

    Version of Record online : 23 JUN 2016, DOI: 10.1002/cpe.3902

  15. You have free access to this content
    Volume 18 Author/Subject Index

    Bell Labs Technical Journal

    Volume 18, Issue 4, March 2014, Pages: 231–243,

    Version of Record online : 26 FEB 2014, DOI: 10.1002/bltj.21654

  16. Smartphone-based public health information systems: Anonymity, privacy and intervention

    Journal of the Association for Information Science and Technology

    Volume 66, Issue 12, December 2015, Pages: 2596–2608, Andrew Clarke and Robert Steele

    Version of Record online : 2 APR 2015, DOI: 10.1002/asi.23356

  17. Biometric Security and Privacy Using Smart Identity Management and Interoperability: Validation and Vulnerabilities of Various Techniques

    Review of Policy Research

    Volume 29, Issue 1, January 2012, Pages: 63–89, Harry Wechsler

    Version of Record online : 19 JAN 2012, DOI: 10.1111/j.1541-1338.2011.00538.x

  18. The economy of social data: exploring research ethics as device

    The Sociological Review

    Volume 59, Issue s2, December 2011, Pages: 113–129, Ana Gross

    Version of Record online : 1 JUN 2012, DOI: 10.1111/j.1467-954X.2012.02055.x

  19. Take-up of Free School Meals: Price Effects and Peer Effects

    Economica

    Volume 82, Issue 328, October 2015, Pages: 976–993, Angus Holford

    Version of Record online : 25 MAY 2015, DOI: 10.1111/ecca.12147

  20. Obtaining K-obfuscation for profile privacy in social networks

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1384–1398, Xiangyu Liu, Bin Wang, Xiaochun Yang, Meng Yu and Wanyu Zang

    Version of Record online : 17 JAN 2014, DOI: 10.1002/sec.871