Academic literature on the topic 'Exploitation of public data'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Exploitation of public data.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Exploitation of public data"
Pollak, Shaul, Matti Gralka, Yuya Sato, Julia Schwartzman, Lu Lu, and Otto X. Cordero. "Public good exploitation in natural bacterioplankton communities." Science Advances 7, no. 31 (July 2021): eabi4717. http://dx.doi.org/10.1126/sciadv.abi4717.
Full textPilo, Paola. "Improving Exploitation of Whole Genome Sequencing Data for Public Health, Forensic Microbiology and Biosafety." EBioMedicine 2, no. 11 (November 2015): 1566–67. http://dx.doi.org/10.1016/j.ebiom.2015.11.011.
Full textPavlova, Kristina, Todor Stoilov, and Krasimira Stoilova. "Bi-Level Model for Public Rail Transportation under Incomplete Data." Cybernetics and Information Technologies 17, no. 3 (September 1, 2017): 75–91. http://dx.doi.org/10.1515/cait-2017-0031.
Full textPoveda, Sammia, Melinda Gill, Don Rodney Junio, Hannah Thinyane, and Vanessa Catan. "Should social enterprises complement or supplement public health provision?" Social Enterprise Journal 15, no. 4 (November 28, 2019): 495–518. http://dx.doi.org/10.1108/sej-12-2018-0083.
Full textGoens, Delphine. "The exploitation of Business Register data from a public sector information and data protection perspective: A case study." Computer Law & Security Review 26, no. 4 (July 2010): 398–405. http://dx.doi.org/10.1016/j.clsr.2010.05.001.
Full textLoukis, Euripidis N., Manolis Maragoudakis, and Niki Kyriakou. "Artificial intelligence-based public sector data analytics for economic crisis policymaking." Transforming Government: People, Process and Policy 14, no. 4 (May 29, 2020): 639–62. http://dx.doi.org/10.1108/tg-11-2019-0113.
Full textArenou, F., X. Luri, C. Babusiaux, C. Fabricius, A. Helmi, A. C. Robin, A. Vallenari, et al. "Gaia Data Release 1." Astronomy & Astrophysics 599 (February 27, 2017): A50. http://dx.doi.org/10.1051/0004-6361/201629895.
Full textCharalabidis, Yannis, and Euripidis Loukis. "Participative Public Policy Making Through Multiple Social Media Platforms Utilization." International Journal of Electronic Government Research 8, no. 3 (July 2012): 78–97. http://dx.doi.org/10.4018/jegr.2012070105.
Full textBedini, Ivan, Feroz Farazi, David Leoni, Juan Pane, Ivan Tankoyeu, and Stefano Leucci. "Open Government Data: Fostering Innovation." JeDEM - eJournal of eDemocracy and Open Government 6, no. 1 (November 14, 2014): 69–79. http://dx.doi.org/10.29379/jedem.v6i1.329.
Full textCheung, Sarah. "Disambiguating the benefits and risks from public health data in the digital economy." Big Data & Society 7, no. 1 (January 2020): 205395172093392. http://dx.doi.org/10.1177/2053951720933924.
Full textDissertations / Theses on the topic "Exploitation of public data"
Thompson, Julie. "Evolution of multiple alignments : Towards efficient data exploitation and knowledge extraction in the post-genomique era." Université Louis Pasteur (Strasbourg) (1971-2008), 2006. https://publication-theses.unistra.fr/public/theses_doctorat/2006/MAALOUM_Julie_2006.pdf.
Full textGenomics and proteomics technologies, together with the new systems biology strategies have led to a paradigm shift in bioinformatics. The traditional reductionist approach has been replaced by a more global, integrated view. In this context, new information management systems are now being introduced to collect, store and curate heterogeneous information in ways that will allow its efficient retrieval and exploitation. Multiple sequence alignments provide an ideal environment for the reliable integration of information from a complete genome to a gene and its related products. In the multiple alignment, patterns of conservation and divergence can be used to identify evolutionarily conserved features and important genetic events. In this thesis, three developments are described: (i) a new benchmark for the objective evaluation of multiple alignment algorithms, (ii) a multiple alignment ontology (MAO) for nucleic acid or protein sequences and structures, (iii) an information management system (MACSIMS) that exploits the multiple alignment and the organisation provided by the ontology. MACSIMS has been used in a variety of projects, including complete genome annotation, target characterisation for structural proteomics and the prediction of structural and functional effects of mutations involved in human pathologies. MACSIMS can also be used for the systematic testing of research hypotheses and the rationale is demonstrated by a study of the effectiveness of various sequence/structure characteristics for the prediction of functional sites in proteins. Other potential applications include such fields as the annotation of the numerous hypothetical proteins produced by the genome sequencing projects or the definition of characteristic motifs for specific protein folds. Hopefully, this will also have more wide-reaching consequences in areas such as protein engineering, metabolic modelling, or the development of new drug development strategies
Kaplangil, Diren. "Les enjeux juridiques de l'Open Data : Les données publiques entre la patrimonialisation et dé-patrimonialisation." Thesis, Université Grenoble Alpes, 2022. http://www.theses.fr/2022GRALD001.
Full textThe Legal Issues of Open Data: Public data between patrimonialisation and de-patrimonialisationSince the first commitment of the French Government in its open data policy, for a decade now, the issue of free circulation of public sector information takes a new dimension. Considered as « open » in the sense of « free of any restrictive rights », public data do not serve only the democratic goal of consolidating the rights of citizens in their relations with the public authorities, but rather provide an essential « information infrastructure » which constitutes the basis of today's emerging "digital" economy. However, this transformation in apprehension of public data inevitably raises the question of their legal status, which is still far from being clarified. Whereas some adjustments brought under the regime of open data make them legally closer to the legal status of « commons », some other monopolistic practices coming from the public institutions (in particular cultural establishments or their concessionaires) in exploiting the content of their information reveal another approach which is quite close to the form of exclusive property rights.Moreover, opening public data does not only raise the question of the legal nature of these information. Indeed, these information are at the heart of the French State's public policy relating to its intangible assets seeking to protect and exploit them in a way which sometimes may enter into conflict with the principles of open data. At the crossroads of public and private law, more specifically intellectual property law, our thesis is therefore focused on the analysis of this conflictual relationship emerged around the process of proactive release of public sector data online
Rychlá, Jana. "Marketing bankovních služeb v České spořitelně, a.s." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2008. http://www.nusl.cz/ntk/nusl-221806.
Full textArvizo, Adrian E. Janowiak Vincent J. "Field level computer exploitation package." Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion.exe/07Mar%5FArvizo.pdf.
Full textGéraud, Rémi. "Advances in public-key cryptology and computer exploitation." Thesis, Paris Sciences et Lettres (ComUE), 2017. http://www.theses.fr/2017PSLEE057/document.
Full textInformation security relies on the correct interaction of several abstraction layers: hardware, operating systems, algorithms, and networks. However, protecting each component of the technological stack has a cost; for this reason, many devices are left unprotected or under-protected. This thesis addresses several of these aspects, from a security and cryptography viewpoint. To that effect we introduce new cryptographic algorithms (such as extensions of the Naccache–Stern encryption scheme), new protocols (including a distributed zero-knowledge identification protocol), improved algorithms (including a new error-correcting code, and an efficient integer multiplication algorithm), as well as several contributions relevant to information security and network intrusion. Furthermore, several of these contributions address the performance of existing and newly-introduced constructions
Procopio, Pietro. "Foreground implications in the scientific exploitation of CMB data." Paris 7, 2009. http://www.theses.fr/2009PA077252.
Full textThe first part of my thesis work focus on the CMB photon distribution function. I show the implementations and the updating phases characterizing a numerical integration code (KYPRIX) for the solution of the Kompaneets equation in cosmological context. Physical implementations were also performed: the introduction of the cosmological constant; the choice of the primordial chemical abundances of H and He is now possible; the ionization fractions for the species involved have been introduced; it was created an optional interface that links KYPRIX with codes, like RECFAST, in order to calculate a recombination history of the ionization fraction of H and He. Ail of the physical implementations contributed to perform more realistic simulation of the spectral distortion of the CMB. During my second stage at APC I performed several tests on the Planck Sky Model. The tests involved the latest two release of Galactic emission model, the Galactic foreground template derived by WMAP data and a clean CMB anisotropy map. The last release of the PSM total intensity prediction of the Galactic processes showed results consistent with the previous ones for almost ail the frequencies tested, while it still needs some tuning at 23 GHz, where synchrotron emission and free-free emission are more prominent. I started using SMICA (component separation techniques) during my first stage at APC, in 2007. 1 used SMICA, and another filter (FFT filter) I developed, for a reprocessing of the IRIS mapset. A FFT filter was developed for this purpose and I used the filter only on localized regions, not on the full-sky maps. The dramatic improvements obtained on the IRIS maps are clearly visible just by eye
Elmi, Saïda. "An Advanced Skyline Approach for Imperfect Data Exploitation and Analysis." Thesis, Chasseneuil-du-Poitou, Ecole nationale supérieure de mécanique et d'aérotechnique, 2017. http://www.theses.fr/2017ESMA0011/document.
Full textThe main purpose of this thesis is to study an advanced database tool named the skyline operator in the context of imperfect data modeled by the evidence theory. In this thesis, we first address, on the one hand, the fundamental question of how to extend the dominance relationship to evidential data, and on the other hand, it provides some optimization techniques for improving the efficiency of the evidential skyline. We then introduce efficient approach for querying and processing the evidential skyline over multiple and distributed servers. ln addition, we propose efficient methods to maintain the skyline results in the evidential database context wben a set of objects is inserted or deleted. The idea is to incrementally compute the new skyline, without reconducting an initial operation from the scratch. In the second step, we introduce the top-k skyline query over imperfect data and we develop efficient algorithms its computation. Further more, since the evidential skyline size is often too large to be analyzed, we define the set SKY² to refine the evidential skyline and retrieve the best evidential skyline objects (or the stars). In addition, we develop suitable algorithms based on scalable techniques to efficiently compute the evidential SKY². Extensive experiments were conducted to show the efficiency and the effectiveness of our approaches
Hayashi, Shogo. "Information Exploration and Exploitation for Machine Learning with Small Data." Doctoral thesis, Kyoto University, 2021. http://hdl.handle.net/2433/263774.
Full textKurdej, Marek. "Exploitation of map data for the perception of intelligent vehicles." Thesis, Compiègne, 2015. http://www.theses.fr/2015COMP2174/document.
Full textThis thesis is situated in the domains of robotics and data fusion, and concerns geographic information systems. We study the utility of adding digital maps, which model the urban environment in which the vehicle evolves, as a virtual sensor improving the perception results. Indeed, the maps contain a phenomenal quantity of information about the environment : its geometry, topology and additional contextual information. In this work, we extract road surface geometry and building models in order to deduce the context and the characteristics of each detected object. Our method is based on an extension of occupancy grids : the evidential perception grids. It permits to model explicitly the uncertainty related to the map and sensor data. By this means, the approach presents also the advantage of representing homogeneously the data originating from various sources : lidar, camera or maps. The maps are handled on equal terms with the physical sensors. This approach allows us to add geographic information without imputing unduly importance to it, which is essential in presence of errors. In our approach, the information fusion result, stored in a perception grid, is used to predict the stateof environment on the next instant. The fact of estimating the characteristics of dynamic elements does not satisfy the hypothesis of static world. Therefore, it is necessary to adjust the level of certainty attributed to these pieces of information. We do so by applying the temporal discounting. Due to the fact that existing methods are not well suited for this application, we propose a family of discoun toperators that take into account the type of handled information. The studied algorithms have been validated through tests on real data. We have thus developed the prototypes in Matlab and the C++ software based on Pacpus framework. Thanks to them, we present the results of experiments performed in real conditions
Jacobs, Thomas Richard. "Exploitation of thread- and data-parallelism in video coding algorithms." Thesis, Loughborough University, 2007. https://dspace.lboro.ac.uk/2134/34963.
Full textBooks on the topic "Exploitation of public data"
Chang, Chein-I., ed. Hyperspectral Data Exploitation. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2007. http://dx.doi.org/10.1002/0470124628.
Full textAkerkar, Rajendra, ed. Big Data in Emergency Management: Exploitation Techniques for Social and Mobile Data. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-48099-8.
Full textPužman, Josef, and Boris Kubín. Public Data Networks. London: Springer London, 1992. http://dx.doi.org/10.1007/978-1-4471-1737-7.
Full textGIS and public data. Clifton Park, N.Y: Thomson/Delmar Learning, 2004.
Find full textRabin, Jack. Public budgeting laboratory: Data sourcebook. 2nd ed. Athens, Ga: Carl Vinson Institute of Government, University of Georgia, 1987.
Find full text1949-, Hildreth W. Bartley, and Miller Gerald, eds. Public budgeting laboratory: Data sourcebook. 2nd ed. Athens, Ga: Carl Vinson Institute of Government, University of Georgia, 1996.
Find full textChen, Jeffrey C., Edward A. Rubin, and Gary J. Cornwall. Data Science for Public Policy. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71352-2.
Full textJarman, Holly, and Luis F. Luna-Reyes, eds. Private Data and Public Value. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-27823-0.
Full textEggensperger, Jim, and Natalie Redcross. Data-Driven Public Relations Research. 1 Edition. | New York : Routledge, 2019.: Routledge, 2018. http://dx.doi.org/10.4324/9781315196688.
Full textSchreuder, Hans T. Data estimation and prediction for natural resources public data. [Fort Collins, Colo.?]: U.S. Dept. of Agriculture, Forest Service, Rocky Mountain Research Station, 1998.
Find full textBook chapters on the topic "Exploitation of public data"
Walravens, Nils, Pieter Ballon, Mathias Van Compernolle, and Koen Borghys. "Data Ownership and Open Data: The Potential for Data-Driven Policy Making." In The Data Shake, 19–34. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-63693-7_2.
Full textPretzsch, Sebastian, Holger Drees, and Lutz Rittershaus. "Mobility Data Space." In Designing Data Spaces, 343–61. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93975-5_21.
Full textRodrigo Duro, Francisco, Javier Garcia Blas, and Jesus Carretero. "I/O-Focused Cost Model for the Exploitation of Public Cloud Resources in Data-Intensive Workflows." In Algorithms and Architectures for Parallel Processing, 244–57. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49956-7_20.
Full textSchulze, Patrick. "Data Collection and Data Sample." In Balancing Exploitation and Exploration, 142–53. Wiesbaden: Gabler, 2009. http://dx.doi.org/10.1007/978-3-8349-8397-8_7.
Full textAbramowicz, Witold, Paweł Kalczyński, and Krzysztof Węcel. "Source Exploitation." In Filtering the Web to Feed Data Warehouses, 179–202. London: Springer London, 2002. http://dx.doi.org/10.1007/978-1-4471-0137-6_7.
Full textBeavis, William D. "Architectures for Integration of Data and Applications." In Genome Exploitation, 31–47. Boston, MA: Springer US, 2005. http://dx.doi.org/10.1007/0-387-24187-6_3.
Full textSaikia, Anup. "Data and Methods." In Over-Exploitation of Forests, 25–28. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-01408-1_4.
Full textSchulze, Patrick. "Methodology of Data Analysis." In Balancing Exploitation and Exploration, 78–115. Wiesbaden: Gabler, 2009. http://dx.doi.org/10.1007/978-3-8349-8397-8_5.
Full textHolzer, Marc, and Richard W. Schwester. "Existing Data, Big Data, and Analyzing Data." In Public Administration, 332–56. Third edition. | Abingdon, Oxon; New York, NY: Routledge, 2019. |: Routledge, 2019. http://dx.doi.org/10.4324/9780429507878-15.
Full textMARSH, TERRY, ROGER MOORE, HARRY DIXON, JAMIE HANNAFORD, ALAN GUSTARD, ANDY YOUNG, MELINDA LEWIS, COLIN NEAL, and GWYN REES. "Hydrological Data Acquisition and Exploitation." In Progress in Modern Hydrology: Past, Present and Future, 324–65. Chichester, UK: John Wiley & Sons, Ltd, 2015. http://dx.doi.org/10.1002/9781119074304.ch11.
Full textConference papers on the topic "Exploitation of public data"
Ioannidis, Charalabos, Sofia Soile, Athanassios Stamos, Dimitra Vassilaki, Evangelos Maltezos, and Styliani Verykokou. "Exploitation of satellite optical and SAR data for public work studies." In Third International Conference on Remote Sensing and Geoinformation of the Environment, edited by Diofantos G. Hadjimitsis, Kyriacos Themistocleous, Silas Michaelides, and Giorgos Papadavid. SPIE, 2015. http://dx.doi.org/10.1117/12.2193483.
Full textMatheus, Ricardo, and Marijn Janssen. "Exploitation and Exploration Strategies to Create Data Transparency in the Public Sector." In ICEGOV '15-16: 9th International Conference on Theory and Practice of Electronic Governance. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2910019.2910091.
Full textPaide, Karoline, Ingrid Pappel, Heiko Vainsalu, and Dirk Draheim. "On the Systematic Exploitation of the Estonian Data Exchange Layer X-Road for Strengthening Public-Private Partnerships." In ICEGOV '18: 11th International Conference on Theory and Practice of Electronic Governance. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3209415.3209441.
Full textKhan, Muhammad Hanif, Warda Yousaf, Bilal Sadaqat, Naila Javed, and Abdulrahman Olukade. "A Workflow for Shale Play Exploration and Exploitation." In Offshore Technology Conference Asia. OTC, 2022. http://dx.doi.org/10.4043/31504-ms.
Full textGerni, Mine, Ömer Selçuk Emsen, Dilek Özdemir, and Özge Buzdağlı. "Determinants of Corruption and their Relationship to Growth." In International Conference on Eurasian Economies. Eurasian Economists Association, 2012. http://dx.doi.org/10.36880/c03.00406.
Full textPerko, Jurica, Danijel Topic, and Damir Sljivac. "Exploitation of public lighting infrastructural possibilities." In 2016 International Conference on Smart Systems and Technologies (SST). IEEE, 2016. http://dx.doi.org/10.1109/sst.2016.7765632.
Full textXiaohan, Zeng, and Tu Yongqian. "The Game of Capital: Prosperity or Exploitation?" In 2021 International Conference on Public Relations and Social Sciences (ICPRSS 2021). Paris, France: Atlantis Press, 2021. http://dx.doi.org/10.2991/assehr.k.211020.334.
Full textHabibi, Mohammad S. "Data exploitation using visual analytics." In 2012 IEEE International Conference on Intelligence and Security Informatics (ISI 2012). IEEE, 2012. http://dx.doi.org/10.1109/isi.2012.6284299.
Full textZeng, Qi, Rakesh Jha, Shigang Chen, and Jih-Kwon Peir. "Data Locality Exploitation in Cache Compression." In 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS). IEEE, 2018. http://dx.doi.org/10.1109/padsw.2018.8644558.
Full textNatali, S., A. Beccati, S. D'Elia, M. G. Veratelli, P. Campalani, M. Folegani, and S. Mantovani. "Multitemporal data management and exploitation infrastructure." In 2011 6th International Workshop on the Analysis of Multi-temporal Remote Sensing Images (Multi-Temp). IEEE, 2011. http://dx.doi.org/10.1109/multi-temp.2011.6005087.
Full textReports on the topic "Exploitation of public data"
Kamath, C., D. Poland, S. Sengupta, and J. Futterman. Automated Image Data Exploitation Final Report. Office of Scientific and Technical Information (OSTI), January 2004. http://dx.doi.org/10.2172/15013923.
Full textPorter, Reid B., James P. Theiler, and Donald R. Hush. Interactive Machine Learning in Data Exploitation. Office of Scientific and Technical Information (OSTI), January 2013. http://dx.doi.org/10.2172/1060903.
Full textMoreland, Ken, Dave Pugmire, and Jieyang Chen. The Exploitation of Data Reduction for Visualization. Office of Scientific and Technical Information (OSTI), August 2022. http://dx.doi.org/10.2172/1881112.
Full textMacDonald, Stuart, Connor Rees, and Joost S. Remove, Impede, Disrupt, Redirect: Understanding & Combating Pro-Islamic State Use of File-Sharing Platforms. RESOLVE Network, April 2022. http://dx.doi.org/10.37805/ogrr2022.1.
Full textHodgkiss, W. S. Exploitation of Environmental Complexity in Shallow Water Acoustic Data Communications. Fort Belvoir, VA: Defense Technical Information Center, September 2006. http://dx.doi.org/10.21236/ada612631.
Full textHodgkiss, W. S. Exploitation of Environmental Complexity in Shallow Water Acoustic Data Communications. Fort Belvoir, VA: Defense Technical Information Center, September 2007. http://dx.doi.org/10.21236/ada541268.
Full textAlföldi, T. Exploitation of Network Technologies for GeoSpatial Data Research and Commerce. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1999. http://dx.doi.org/10.4095/219366.
Full textCook, K., S. Nikolaev, and M. Huber. The Large Synoptic Survey Telescope and Foundations for Data Exploitation of Petabyte Data Sets. Office of Scientific and Technical Information (OSTI), February 2007. http://dx.doi.org/10.2172/902312.
Full textHanratty, Timothy, and John Richardson. A Visual Analytic for High-Dimensional Data Exploitation: The Heterogeneous Data-Reduction Proximity Tool. Fort Belvoir, VA: Defense Technical Information Center, July 2013. http://dx.doi.org/10.21236/ada591619.
Full textBalza, Lenin, Camilo De Los Rios, and Nathaly M. Rivera. Digging Deep: Resource Exploitation and Higher Education. Inter-American Development Bank, October 2022. http://dx.doi.org/10.18235/0004495.
Full text