Academic literature on the topic 'SENSITIVE RULES'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SENSITIVE RULES.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "SENSITIVE RULES"
Wang, Hui. "Hiding Sensitive Association Rules by Sanitizing." Advanced Materials Research 694-697 (May 2013): 2317–21. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2317.
Full textBansal, Meenakshi, Dinesh Grover, and Dhiraj Sharma. "Sensitivity Association Rule Mining using Weight based Fuzzy Logic." Global Journal of Enterprise Information System 9, no. 2 (June 28, 2017): 1. http://dx.doi.org/10.18311/gjeis/2017/15480.
Full textWang, Hui. "Hiding Sensitive Association Rules by Adjusting Support." Advanced Materials Research 756-759 (September 2013): 1875–78. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1875.
Full textRao, K. Srinivasa, CH Suresh Babu, A. Damodaram, and Tai-hoon Kim. "Distortion Technique for Hiding Sensitive Association Rules." International Journal of Multimedia and Ubiquitous Engineering 9, no. 10 (October 31, 2014): 57–66. http://dx.doi.org/10.14257/ijmue.2014.9.10.06.
Full textWhittle, P. "Entropy-minimising and risk-sensitive control rules." Systems & Control Letters 13, no. 1 (July 1989): 1–7. http://dx.doi.org/10.1016/0167-6911(89)90014-5.
Full textJain, Dhyanendra. "Hiding Sensitive Association Rules Without Altering the Support of Sensitive Item(S)." International Journal of Artificial Intelligence & Applications 3, no. 2 (March 31, 2012): 75–84. http://dx.doi.org/10.5121/ijaia.2012.3207.
Full textWang, Hui. "Strategies for Sensitive Association Rule Hiding." Applied Mechanics and Materials 336-338 (July 2013): 2203–6. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2203.
Full textGayathiri, P., and B. Poorna. "Effective Gene Patterned Association Rule Hiding Algorithm for Privacy Preserving Data Mining on Transactional Database." Cybernetics and Information Technologies 17, no. 3 (September 1, 2017): 92–108. http://dx.doi.org/10.1515/cait-2017-0032.
Full textMenon, Syam, Abhijeet Ghoshal, and Sumit Sarkar. "Modifying Transactional Databases to Hide Sensitive Association Rules." Information Systems Research 33, no. 1 (March 2022): 152–78. http://dx.doi.org/10.1287/isre.2021.1033.
Full textWu, Yi-hung, Chia-ming Chiang, and Arbee Chen. "Hiding Sensitive Association Rules with Limited Side Effects." IEEE Transactions on Knowledge and Data Engineering 19, no. 1 (January 2007): 29–42. http://dx.doi.org/10.1109/tkde.2007.250583.
Full textDissertations / Theses on the topic "SENSITIVE RULES"
Bakshi, Arjun. "Methodology For Generating High-Confidence Cost-Sensitive Rules For Classification." University of Cincinnati / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1377868085.
Full textDimitrova, Katica. "Order-sensitive view maintenance of materialized XQuery views." Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0505103-151827.
Full textMurphy, Brian R. "Order-sensitive XML query processing over relational sources." Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0505103-123753.
Full textKeywords: computation pushdown; XML; order-based Xquery processing; relational database; ordered SQL queries; data model mapping; XQuery; XML data mapping; SQL; XML algebra rewrite rules; XML document order. Includes bibliographical references (p. 64-67).
Baladová, Šárka. "THE IMPACT ANALYSIS OF THE EU-KOREA FTA ON THE CZECH SENSITIVE SECTORS WITH SPECIAL ATTENTION TO THE AUTOMOTIVE INDUSTRY." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-74890.
Full textAljandal, Waleed A. "Itemset size-sensitive interestingness measures for association rule mining and link prediction." Diss., Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/1119.
Full textZhao, Mingjun. "Essays on model uncertainty in macroeconomics." Columbus, Ohio : Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1153244452.
Full textOliveira, Paulo Henrique Maestrello Assad. "Detecção de fraudes em cartões: um classificador baseado em regras de associação e regressão logística." Universidade de São Paulo, 2015. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-01022016-204144/.
Full textCredit and debit cards are two methods of payments highly utilized. This awakens the interest of fraudsters. Businesses see fraudulent transactions as operating costs, which are passed on to consumers. Thus, the high number of transactions and the necessity to combat fraud stimulate the use of machine learning algorithms; among them, rule-based classifiers. However, a weakness of these classifiers is that, in practice, they are highly dependent on professionals who detect patterns of fraudulent transactions, transform them into rules and implement these rules in the classifier. Knowing this scenario, the aim of this thesis is to propose an architecture based on association rules and logistic regression - techniques studied in Machine Learning - for mining rules on data and produce rule sets to detect fraudulent transactions and make them available to experts. As a result, these professionals will have the aid of computers to discover the rules that support the classifier, decreasing the chance of having non-discovered fraudulent patterns and increasing the efficiency of generate and maintain these rules. In order to test the proposal, the experimental part of the thesis has used almost 7.7 million transactions provided by a real company. Moreover, after a long process of analysis of the database, 141 characteristics were combined using the algorithm FP-Growth, generating 38,003 rules. After a process of filtering and selection, they were grouped into five sets of rules which the biggest one has 1,285 rules. Each of the five sets was subjected to logistic regression, so their rules have been validated and weighted by statistical criteria. At the end of the process, the goodness of fit tests were satisfied and the performance indicators have shown very good classification powers (AUC between 0.788 and 0.820). In conclusion, the combined application of statistical techniques - cost sensitive learning, association rules and logistic regression - proved being conceptually and theoretically cohesive and coherent. Finally, the experiment and its results have demonstrated the technical and practical feasibilities of the proposal.
Pinsolle, Julie. "L'éducation familiale transformée, approche anthropo-didactique de l'autorité à la préadolescence : Appréhension des pratiques dans la région bordelaise." Thesis, Bordeaux, 2015. http://www.theses.fr/2015BORD0388.
Full textThis work is about family education, at the time when children’s status has changed. Thisnew status alters educational and authority relationships and questions the link betweenindividual and collectiv aspects of social life such as transmission. How do parents dealwith this sensitiv issue that is authority, torn between the democratic ideal and theconstraint that cannot be avoided in education ? How do they organize everyday life ? Isfamily organisation linked with children’s way to follow school rules ?Studying chilren and childhood representations, the issue of this work is to reveal thedynamics that contributed to family education evolution. Thus, the aim of this study is tounderstand the movement of family education while allowing to question educationnalauthority by combining family and school sociological approaches.The study focuses on parenting practices (parents’ daily organisation with their children)and educational values that parents promot. It reavels that they their organisation haschanged. Henceforth parenting practicises are structured by situational heterogeneity and« social class education » is less relevant to describe parenting practices unlike genderideologies. On the axiological level appears the educational homogenization that Fize(1990) predicted : parents massively join values promoted by privileged backgroundsfamilies (child’s personal development).Finally, with the notion of sensitivy to school form (students’ way to follow school rules),the thesis shows how, in education, dialogue and explication injonctions reinforceeducational difficulties. On the contrary, it reveals that most critical points in education areunspeakable and that the meaning of rules relies in their use
Yang, Jei-Hung, and 楊介宏. "Hiding Sensitive Rules Based on Transaction Grouping." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/58538882177123969090.
Full text中原大學
資訊工程研究所
98
As the prevalent development of network technology, information sharing and communication is frequent in daily life. Although data mining techniques help people find the important rules among data, people also have to take the risk of sensitive information disclosed. In addition to hiding sensitive rules, recent researches also start discussing the reduction or avoidance of unexpected side effects, including the hiding of non-sensitive rules (lost rules) and the creation of non-existent rules (false rules). This thesis aims at a small amount of transaction modifications and proposes a method of rule hiding. The method can recover lost rules and keep sensitive rules hidden. Besides, we propose an efficient index structure for a quick retrieval of transactions during the hiding process. The experiments verify that our method can hide all sensitive rules and recover at most 40% lost rules. The index structure reduces about 85% retrieval time on average.
Kao, Tai-wei, and 高黛威. "Hiding dynamic sensitive association rules in incremental data." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/29229249691498416855.
Full text國立臺灣科技大學
資訊工程系
101
As the advancement of technologies as well as the intense competition of business, the issues of privacy have acquiring more attention. Mining association rule is the significant technique in data mining. However, it may cause some privacy problem in mining processes. Many researches, thus, start to hide sensitive association rules due to avoid the sensitive information exposed. However, the development of computers and Internet technologies is so fast that data are increasing successively. In addition, sensitive association rules will change with time and policy. These both are the challenges for protecting sensitive association rules. Most exist technologies of hiding sensitive association rules cannot handle dynamic data and sensitive rules effectively. For solving these problems, this paper proposed a framework to protect dynamic sensitive association rules in incremental environment, HSAi and HDSA. HSAi is the algorithm to protect sensitive association rule in incremental data and we design the strategy to select appropriate victim transactions and items to delete them in order to hide sensitive association rules. HDSA is the algorithm for protecting dynamic sensitive rules, including adding and deleting. The mean of the deleting sensitive rule is the association rule that hidden can show again in the mining result. The goals of HSAi and HDSA are not only protecting sensitive rules but also producing least side effect from released dataset. Experiment results represent that the framework situation of incremental data and dynamic sensitive rules both can cause least side effects and maintain a desirable quality of sanitized database as well.
Books on the topic "SENSITIVE RULES"
Kutz, Gregory D. Sales of sensitive military property to the public. Washington, D.C. (441 G St., NW, Rm. LM, D.C. 20548): United States Government Accountability Office, 2007.
Find full textUnited States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, ed. Contractor integrity: Stronger safeguards needed for contractor access to sensitive information : report to the Chairman, Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Governmental Affairs, U.S. Senate. Washington, D.C.]: U.S. Govt. Accountability Office, 2010.
Find full textOffice, General Accounting. Environmental information: EPA could better address concerns about disseminating sensitive business information : report to the Chairman and Ranking Minority Member, Subcommittee on VA, HUD, and Independent Agencies, Committee on Appropriations, U.S. Senate. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Find full textOffice, General Accounting. Defense inventory: Inadequate compliance with controls for excess firearms and other sensitive items : report to the Chairman, Committee on Armed Services, House of Representatives. Washington, D.C: The Office, 1999.
Find full textOffice, General Accounting. Defense inventory: Controls over C-4 explosive and other sensitive munitions : briefing report to the Chairman, Legislation and National Security Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1990.
Find full textTimofeeva, Liliya, Elena Korneicheva, and Natal'ya Gracheva. Organization of educational activities in the OED. Approximate planning. The second youngest group (3-4 years). ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1072118.
Full textTimofeeva, Liliya, Elena Korneicheva, and Natal'ya Gracheva. Organization of educational activities in the OED. Approximate planning. Preparation for school group (6-7 years). ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1072122.
Full textOffice, General Accounting. Defense inventory: Controls over C-4 explosive and other sensitive munitions : briefing report to the Chairman, Legislation and National Security Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1990.
Find full textKosiara-Pedersen, Karina, Susan E. Scarrow, and Emilie van Haute. Rules of Engagement? Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198758631.003.0010.
Full textEisen, Kim, and Cathryn Taylor. Staying in Your Power : 3 Steps to Creating Boundaries and Rules in Your Life: For Intuitive, Sensitive and Empathic Souls. Vibration Publishing, 2022.
Find full textBook chapters on the topic "SENSITIVE RULES"
Hezart, Armin, Abhaya Nayak, and Mehmet Orgun. "Towards Context Sensitive Defeasible Rules." In Lecture Notes in Computer Science, 193–213. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88833-8_11.
Full textJain, Dhyanendra, Pallavi Khatri, Rishi Soni, and Brijesh Kumar Chaurasia. "Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s)." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 500–509. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27299-8_52.
Full textLesaint, David, Deepak Mehta, Barry O’Sullivan, Luis Quesada, and Nic Wilson. "Context-Sensitive Call Control Using Constraints and Rules." In Principles and Practice of Constraint Programming – CP 2010, 583–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15396-9_46.
Full textDíaz, Irene, Luis J. Rodríguez-Mũniz, and Luigi Troiano. "On Mining Sensitive Rules to Identify Privacy Threats." In Lecture Notes in Computer Science, 232–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40846-5_24.
Full textPatin, Cédric, and Annie Rialland. "On the Nature of Rules Sensitive to Syntax." In Prosody and Syntax, 285. Amsterdam: John Benjamins Publishing Company, 2006. http://dx.doi.org/10.1075/ubli.3.16pat.
Full textModi, Chirag, U. P. Rao, and Dhiren R. Patel. "A Survey on Preserving Privacy for Sensitive Association Rules in Databases." In Communications in Computer and Information Science, 538–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12214-9_96.
Full textDomadiya, Nikunj H., and Udai Pratap Rao. "A Hybrid Technique for Hiding Sensitive Association Rules and Maintaining Database Quality." In Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 2, 359–67. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30927-9_35.
Full textde Souza Amorim, Luís Eduardo, and Eelco Visser. "Multi-purpose Syntax Definition with SDF3." In Software Engineering and Formal Methods, 1–23. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58768-0_1.
Full textNavet, Nicolas, and Shu-Heng Chen. "On Predictability and Profitability: Would GP Induced Trading Rules be Sensitive to the Observed Entropy of Time Series?" In Natural Computing in Computational Finance, 197–210. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-77477-8_11.
Full textNordberg, Ana. "Biobank and Biomedical Research: Responsibilities of Controllers and Processors Under the EU General Data Protection Regulation." In GDPR and Biobanking, 61–89. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-49388-2_5.
Full textConference papers on the topic "SENSITIVE RULES"
Wang, Shyue-Liang, Tzung-Pei Hong, Yu-Chuan Tsai, and Hung-Yu Kao. "Hiding Sensitive Association Rules on Stars." In 2010 IEEE International Conference on Granular Computing (GrC-2010). IEEE, 2010. http://dx.doi.org/10.1109/grc.2010.123.
Full textBakshi, Arjun, and Raj Bhatnagar. "Learning Cost-Sensitive Rules for Non-forced Classification." In 2012 IEEE 12th International Conference on Data Mining Workshops. IEEE, 2012. http://dx.doi.org/10.1109/icdmw.2012.62.
Full textWang, S. L., and A. Jafari. "Using unknowns for hiding sensitive predictive association rules." In Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration. IEEE, 2005. http://dx.doi.org/10.1109/iri-05.2005.1506477.
Full textNavale, Geeta S., and Suresh N. Mali. "A Survey on Sensitive Association Rules Hiding Methods." In 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA). IEEE, 2017. http://dx.doi.org/10.1109/iccubea.2017.8464012.
Full textWeng, Chih-Chia, Shan-Tai Chen, and Hung-Che Lo. "A Novel Algorithm for Completely Hiding Sensitive Association Rules." In 2008 Eighth International Conference on Intelligent Systems Design and Applications (ISDA). IEEE, 2008. http://dx.doi.org/10.1109/isda.2008.180.
Full textChoi, K. S., and J. Pan. "An Anisotropic Hardening Rule With Non-Associated Flow Rule for Pressure-Sensitive Materials." In ASME 2009 Pressure Vessels and Piping Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/pvp2009-77951.
Full textLi, Xueming, Zhijun Liu, and Chuan Zuo. "Hiding association rules based on relative-non-sensitive frequent itemsets." In 2009 8th IEEE International Conference on Cognitive Informatics (ICCI). IEEE, 2009. http://dx.doi.org/10.1109/coginf.2009.5250708.
Full textCheng, Peng, and Jeng-Shyang Pan. "Completely hide sensitive association rules using EMO by deleting transactions." In GECCO '14: Genetic and Evolutionary Computation Conference. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2598394.2598466.
Full textZesch, Torsten, and Oren Melamud. "Automatic Generation of Challenging Distractors Using Context-Sensitive Inference Rules." In Proceedings of the Ninth Workshop on Innovative Use of NLP for Building Educational Applications. Stroudsburg, PA, USA: Association for Computational Linguistics, 2014. http://dx.doi.org/10.3115/v1/w14-1817.
Full textLei Xu, Lei Shi, Runxin Wang, and Brendan Jennings. "A multiple criteria service composition selection algorithm supporting time-sensitive rules." In 2011 IFIP/IEEE International Symposium on Integrated Network Management (IM 2011). IEEE, 2011. http://dx.doi.org/10.1109/inm.2011.5990664.
Full textReports on the topic "SENSITIVE RULES"
Hudson-Vitale, Cynthia, and Katherine Klosek. Issue Brief: New US Federal Compliance Rules for Sensitive Information. Association of Research Libraries, May 2021. http://dx.doi.org/10.29242/brief.sensitiveinfo2021.
Full textDvorianyn, Paraskoviya. Сенситивне інтерв’ю: переживання колективної травми війни. Ivan Franko National University of Lviv, March 2023. http://dx.doi.org/10.30970/vjo.2023.52-53.11727.
Full textRaju, Nivedita, and Laura Bruun. Integrating Gender Perspectives into International Humanitarian Law. Stockholm International Peace Research Institute, August 2023. http://dx.doi.org/10.55163/qilu7567.
Full textKhadan, Jeetendra. An Econometric Analysis of Energy Revenue and Government Expenditure Shocks on Economic Growth in Trinidad and Tobago. Inter-American Development Bank, December 2016. http://dx.doi.org/10.18235/0011776.
Full textParkins, R. N. NR198706 Environmental Aspects of the Stress-Corrosion Cracking of Pipeline Steels. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), September 1987. http://dx.doi.org/10.55274/r0011886.
Full textHertel, Thomas, David Hummels, Maros Ivanic, and Roman Keeney. How Confident Can We Be in CGE-Based Assessments of Free Trade Agreements? GTAP Working Paper, June 2003. http://dx.doi.org/10.21642/gtap.wp26.
Full textLocy, Robert D., Hillel Fromm, Joe H. Cherry, and Narendra K. Singh. Regulation of Arabidopsis Glutamate Decarboxylase in Response to Heat Stress: Modulation of Enzyme Activity and Gene Expression. United States Department of Agriculture, January 2001. http://dx.doi.org/10.32747/2001.7575288.bard.
Full textReport on Experiences and Opportunities for Coordinated Operating Rules and Cooperation Arrangements on Dam Operations. Vientiane, Lao PDR: Mekong River Commission Secretariat, February 2023. http://dx.doi.org/10.52107/mrc.b193up.
Full text