Research Article
A Novel Method for Location Privacy Protection in LBS Applications
Algorithm 3
Enumeration with pruning.
| Input: real ranking , Maximum tolerance | |
| Output: ranking Set | |
| 1. init , , , | |
| 2. for each do | |
| 3. calculate and | |
| 4. if then | |
| 5. | |
| 6. for to do | |
| 7. init | |
| 8. for each in do | |
| 9. for to do | |
| 10. if then | |
| 11. continue | |
| 12. | |
| 13. calculate and | |
| 14. if then | |
| 15. | |
| 16. | |
| 17. return |