Research Article

A Novel Method for Location Privacy Protection in LBS Applications

Algorithm 4

Enumeration with the Voronoi diagram.

Input: real ranking ; Maximum tolerance
Output: ranking Set ;
1. init queue , set of Candidate ;
2. ; 3. for each do
4.  Generate Delaunay triangulation of
5. end for
6. function circulate():
7.  for each do
8.   q.add(item);
9.   if then
10.    ;
11.   else if then
12.    candy.remove(x) ;
13.   else
14.    q.add(item);
15.    calculate the candidate of ;
16.    circulate();
17. return ;