Journal of Guangdong University of Technology ›› 2012, Vol. 29 ›› Issue (3): 35-38.doi: 10.3969/j.issn.1007-7162.2012.03.006
• Comprehensive Studies • Previous Articles Next Articles
Zhu Huainian1, Zhang Chengke2, Li Yunlong1, Yang Chaojin1
[1] Rufus Isaacs. Differential Games [M]. New York:John Wiley and Sons, 1965.[2] Friedman, A. Differential Games [M]. New York:WileyInterscience, 1971.[3] Tamer Basar, Geert Jan Olsder. Dynamic Noncooperative Game Theory [M]. New York:Academic Press, 1991.[4] Engelbert J Dockner, Steffen Jorgensen, Ngo Van Long, et al. Differential Games in Economics and Management Science [M]. Cambridge, UK: Cambridge University Press, 2000.[5] David W K Yeung, Leon A Petrosjan. Cooperative Stochastic Differential Games [M].USA:Springer, 2005.[6] Kandethody M, Ramachandran, Chris P Tsokos. Stochastic Differential Games. Theory and Applications [M]. USA: Springer, 2012.[7] Zhou, X Y, Li D. Continuoustime meanvariance portfolio selection: a stochastic LQ framework [J]. Appl Math Optim, 2000, 42(1):1933.[8] Chen S, Li X, Zhou X Y. Stochastic linear quadratic regulators with indefinite control weight costs [J]. SIAM J Control Optim,1998,36(5):16851702.[9] Chen S, Zhou X Y. Stochastic linear quadratic regulators with indefinite control weight costs. II [J]. SIAM J Control Optim,2000,39(4):10651081.[10] Mustapha Ait Rami, Zhou Xunyu. Linear matrix inequalities, Riccati equations, and indefinite stochastic linear quadratic controls [J]. IEEE Transactions on Automatic Control, 2000,45(6):11311143.[9] Guo S,Wu X. Deriving private information from arbitrarily projected data[J]. Advances in Knowledge Discovery and Data Mining, 2007: 8495.[10] Kargupta H, Datta S, Wang Q, et al. On the privacy preserving properties of random data perturbation techniques[C]. Proceedings of the 3rd IEEE International Conference on Data Mining, Melbourne, FL, USA, November 2003.[11] Guo S. Analysis of and techniques for privacy preserving data mining[M]. Ann Arbor: ProQuest Information and Learning Company, 2007.[12] Liu Kun. Multiplicative data perturbation for privacy preserving data mining[D]. Baltimore, MD, USA: University of Maryland Baltimore County, 2007.[13]Huang Z, Du W,Chen B. Deriving private information from randomized data[C]. Proceedings of the 2005 ACM 〖JP2〗SIGMOD Conference, Baltimroe, MD, June 2005: 3748.[14] Aggarwal C C, Yu P S. A condensation based approach to privacy preserving data mining[C]. Proceedings of the 9th International Conference on Extending Database Technology (EDBT’04), Heraklion, Crete, Greece, March 2004: 183-199.[15] 肖岳.移动数据的智能分析与隐私保护[D].广州:广东工业大学,2011.Xiao Yue. Intelligent analysis and privacyprotection of mobile data[D]. Guangzhou: Guangdong University of Technology, 2011.[16] 聂跃光.基于密度聚类的空间数据挖掘算法研究[D].太原:太原科技大学,2008.Nie Yueguang. Study of spatial data mining algorithm based on density clustering[D]. Taiyuan: Taiyuan University of Science and Technology, 2008. |
No related articles found! |
|