Literatura académica sobre el tema "SENSITIVE RULES"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "SENSITIVE RULES".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "SENSITIVE RULES"
Wang, Hui. "Hiding Sensitive Association Rules by Sanitizing". Advanced Materials Research 694-697 (mayo de 2013): 2317–21. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2317.
Texto completoBansal, Meenakshi, Dinesh Grover y Dhiraj Sharma. "Sensitivity Association Rule Mining using Weight based Fuzzy Logic". Global Journal of Enterprise Information System 9, n.º 2 (28 de junio de 2017): 1. http://dx.doi.org/10.18311/gjeis/2017/15480.
Texto completoWang, Hui. "Hiding Sensitive Association Rules by Adjusting Support". Advanced Materials Research 756-759 (septiembre de 2013): 1875–78. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1875.
Texto completoRao, K. Srinivasa, CH Suresh Babu, A. Damodaram y Tai-hoon Kim. "Distortion Technique for Hiding Sensitive Association Rules". International Journal of Multimedia and Ubiquitous Engineering 9, n.º 10 (31 de octubre de 2014): 57–66. http://dx.doi.org/10.14257/ijmue.2014.9.10.06.
Texto completoWhittle, P. "Entropy-minimising and risk-sensitive control rules". Systems & Control Letters 13, n.º 1 (julio de 1989): 1–7. http://dx.doi.org/10.1016/0167-6911(89)90014-5.
Texto completoJain, Dhyanendra. "Hiding Sensitive Association Rules Without Altering the Support of Sensitive Item(S)". International Journal of Artificial Intelligence & Applications 3, n.º 2 (31 de marzo de 2012): 75–84. http://dx.doi.org/10.5121/ijaia.2012.3207.
Texto completoWang, Hui. "Strategies for Sensitive Association Rule Hiding". Applied Mechanics and Materials 336-338 (julio de 2013): 2203–6. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2203.
Texto completoGayathiri, P. y B. Poorna. "Effective Gene Patterned Association Rule Hiding Algorithm for Privacy Preserving Data Mining on Transactional Database". Cybernetics and Information Technologies 17, n.º 3 (1 de septiembre de 2017): 92–108. http://dx.doi.org/10.1515/cait-2017-0032.
Texto completoMenon, Syam, Abhijeet Ghoshal y Sumit Sarkar. "Modifying Transactional Databases to Hide Sensitive Association Rules". Information Systems Research 33, n.º 1 (marzo de 2022): 152–78. http://dx.doi.org/10.1287/isre.2021.1033.
Texto completoWu, Yi-hung, Chia-ming Chiang y Arbee Chen. "Hiding Sensitive Association Rules with Limited Side Effects". IEEE Transactions on Knowledge and Data Engineering 19, n.º 1 (enero de 2007): 29–42. http://dx.doi.org/10.1109/tkde.2007.250583.
Texto completoTesis sobre el tema "SENSITIVE RULES"
Bakshi, Arjun. "Methodology For Generating High-Confidence Cost-Sensitive Rules For Classification". University of Cincinnati / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1377868085.
Texto completoDimitrova, Katica. "Order-sensitive view maintenance of materialized XQuery views". Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0505103-151827.
Texto completoMurphy, Brian R. "Order-sensitive XML query processing over relational sources". Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0505103-123753.
Texto completoKeywords: computation pushdown; XML; order-based Xquery processing; relational database; ordered SQL queries; data model mapping; XQuery; XML data mapping; SQL; XML algebra rewrite rules; XML document order. Includes bibliographical references (p. 64-67).
Baladová, Šárka. "THE IMPACT ANALYSIS OF THE EU-KOREA FTA ON THE CZECH SENSITIVE SECTORS WITH SPECIAL ATTENTION TO THE AUTOMOTIVE INDUSTRY". Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-74890.
Texto completoAljandal, Waleed A. "Itemset size-sensitive interestingness measures for association rule mining and link prediction". Diss., Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/1119.
Texto completoZhao, Mingjun. "Essays on model uncertainty in macroeconomics". Columbus, Ohio : Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1153244452.
Texto completoOliveira, Paulo Henrique Maestrello Assad. "Detecção de fraudes em cartões: um classificador baseado em regras de associação e regressão logística". Universidade de São Paulo, 2015. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-01022016-204144/.
Texto completoCredit and debit cards are two methods of payments highly utilized. This awakens the interest of fraudsters. Businesses see fraudulent transactions as operating costs, which are passed on to consumers. Thus, the high number of transactions and the necessity to combat fraud stimulate the use of machine learning algorithms; among them, rule-based classifiers. However, a weakness of these classifiers is that, in practice, they are highly dependent on professionals who detect patterns of fraudulent transactions, transform them into rules and implement these rules in the classifier. Knowing this scenario, the aim of this thesis is to propose an architecture based on association rules and logistic regression - techniques studied in Machine Learning - for mining rules on data and produce rule sets to detect fraudulent transactions and make them available to experts. As a result, these professionals will have the aid of computers to discover the rules that support the classifier, decreasing the chance of having non-discovered fraudulent patterns and increasing the efficiency of generate and maintain these rules. In order to test the proposal, the experimental part of the thesis has used almost 7.7 million transactions provided by a real company. Moreover, after a long process of analysis of the database, 141 characteristics were combined using the algorithm FP-Growth, generating 38,003 rules. After a process of filtering and selection, they were grouped into five sets of rules which the biggest one has 1,285 rules. Each of the five sets was subjected to logistic regression, so their rules have been validated and weighted by statistical criteria. At the end of the process, the goodness of fit tests were satisfied and the performance indicators have shown very good classification powers (AUC between 0.788 and 0.820). In conclusion, the combined application of statistical techniques - cost sensitive learning, association rules and logistic regression - proved being conceptually and theoretically cohesive and coherent. Finally, the experiment and its results have demonstrated the technical and practical feasibilities of the proposal.
Pinsolle, Julie. "L'éducation familiale transformée, approche anthropo-didactique de l'autorité à la préadolescence : Appréhension des pratiques dans la région bordelaise". Thesis, Bordeaux, 2015. http://www.theses.fr/2015BORD0388.
Texto completoThis work is about family education, at the time when children’s status has changed. Thisnew status alters educational and authority relationships and questions the link betweenindividual and collectiv aspects of social life such as transmission. How do parents dealwith this sensitiv issue that is authority, torn between the democratic ideal and theconstraint that cannot be avoided in education ? How do they organize everyday life ? Isfamily organisation linked with children’s way to follow school rules ?Studying chilren and childhood representations, the issue of this work is to reveal thedynamics that contributed to family education evolution. Thus, the aim of this study is tounderstand the movement of family education while allowing to question educationnalauthority by combining family and school sociological approaches.The study focuses on parenting practices (parents’ daily organisation with their children)and educational values that parents promot. It reavels that they their organisation haschanged. Henceforth parenting practicises are structured by situational heterogeneity and« social class education » is less relevant to describe parenting practices unlike genderideologies. On the axiological level appears the educational homogenization that Fize(1990) predicted : parents massively join values promoted by privileged backgroundsfamilies (child’s personal development).Finally, with the notion of sensitivy to school form (students’ way to follow school rules),the thesis shows how, in education, dialogue and explication injonctions reinforceeducational difficulties. On the contrary, it reveals that most critical points in education areunspeakable and that the meaning of rules relies in their use
Yang, Jei-Hung y 楊介宏. "Hiding Sensitive Rules Based on Transaction Grouping". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/58538882177123969090.
Texto completo中原大學
資訊工程研究所
98
As the prevalent development of network technology, information sharing and communication is frequent in daily life. Although data mining techniques help people find the important rules among data, people also have to take the risk of sensitive information disclosed. In addition to hiding sensitive rules, recent researches also start discussing the reduction or avoidance of unexpected side effects, including the hiding of non-sensitive rules (lost rules) and the creation of non-existent rules (false rules). This thesis aims at a small amount of transaction modifications and proposes a method of rule hiding. The method can recover lost rules and keep sensitive rules hidden. Besides, we propose an efficient index structure for a quick retrieval of transactions during the hiding process. The experiments verify that our method can hide all sensitive rules and recover at most 40% lost rules. The index structure reduces about 85% retrieval time on average.
Kao, Tai-wei y 高黛威. "Hiding dynamic sensitive association rules in incremental data". Thesis, 2013. http://ndltd.ncl.edu.tw/handle/29229249691498416855.
Texto completo國立臺灣科技大學
資訊工程系
101
As the advancement of technologies as well as the intense competition of business, the issues of privacy have acquiring more attention. Mining association rule is the significant technique in data mining. However, it may cause some privacy problem in mining processes. Many researches, thus, start to hide sensitive association rules due to avoid the sensitive information exposed. However, the development of computers and Internet technologies is so fast that data are increasing successively. In addition, sensitive association rules will change with time and policy. These both are the challenges for protecting sensitive association rules. Most exist technologies of hiding sensitive association rules cannot handle dynamic data and sensitive rules effectively. For solving these problems, this paper proposed a framework to protect dynamic sensitive association rules in incremental environment, HSAi and HDSA. HSAi is the algorithm to protect sensitive association rule in incremental data and we design the strategy to select appropriate victim transactions and items to delete them in order to hide sensitive association rules. HDSA is the algorithm for protecting dynamic sensitive rules, including adding and deleting. The mean of the deleting sensitive rule is the association rule that hidden can show again in the mining result. The goals of HSAi and HDSA are not only protecting sensitive rules but also producing least side effect from released dataset. Experiment results represent that the framework situation of incremental data and dynamic sensitive rules both can cause least side effects and maintain a desirable quality of sanitized database as well.
Libros sobre el tema "SENSITIVE RULES"
Kutz, Gregory D. Sales of sensitive military property to the public. Washington, D.C. (441 G St., NW, Rm. LM, D.C. 20548): United States Government Accountability Office, 2007.
Buscar texto completoUnited States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, ed. Contractor integrity: Stronger safeguards needed for contractor access to sensitive information : report to the Chairman, Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Governmental Affairs, U.S. Senate. Washington, D.C.]: U.S. Govt. Accountability Office, 2010.
Buscar texto completoOffice, General Accounting. Environmental information: EPA could better address concerns about disseminating sensitive business information : report to the Chairman and Ranking Minority Member, Subcommittee on VA, HUD, and Independent Agencies, Committee on Appropriations, U.S. Senate. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Buscar texto completoOffice, General Accounting. Defense inventory: Inadequate compliance with controls for excess firearms and other sensitive items : report to the Chairman, Committee on Armed Services, House of Representatives. Washington, D.C: The Office, 1999.
Buscar texto completoOffice, General Accounting. Defense inventory: Controls over C-4 explosive and other sensitive munitions : briefing report to the Chairman, Legislation and National Security Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1990.
Buscar texto completoTimofeeva, Liliya, Elena Korneicheva y Natal'ya Gracheva. Organization of educational activities in the OED. Approximate planning. The second youngest group (3-4 years). ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1072118.
Texto completoTimofeeva, Liliya, Elena Korneicheva y Natal'ya Gracheva. Organization of educational activities in the OED. Approximate planning. Preparation for school group (6-7 years). ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1072122.
Texto completoOffice, General Accounting. Defense inventory: Controls over C-4 explosive and other sensitive munitions : briefing report to the Chairman, Legislation and National Security Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1990.
Buscar texto completoKosiara-Pedersen, Karina, Susan E. Scarrow y Emilie van Haute. Rules of Engagement? Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198758631.003.0010.
Texto completoEisen, Kim y Cathryn Taylor. Staying in Your Power : 3 Steps to Creating Boundaries and Rules in Your Life: For Intuitive, Sensitive and Empathic Souls. Vibration Publishing, 2022.
Buscar texto completoCapítulos de libros sobre el tema "SENSITIVE RULES"
Hezart, Armin, Abhaya Nayak y Mehmet Orgun. "Towards Context Sensitive Defeasible Rules". En Lecture Notes in Computer Science, 193–213. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88833-8_11.
Texto completoJain, Dhyanendra, Pallavi Khatri, Rishi Soni y Brijesh Kumar Chaurasia. "Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s)". En Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 500–509. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27299-8_52.
Texto completoLesaint, David, Deepak Mehta, Barry O’Sullivan, Luis Quesada y Nic Wilson. "Context-Sensitive Call Control Using Constraints and Rules". En Principles and Practice of Constraint Programming – CP 2010, 583–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15396-9_46.
Texto completoDíaz, Irene, Luis J. Rodríguez-Mũniz y Luigi Troiano. "On Mining Sensitive Rules to Identify Privacy Threats". En Lecture Notes in Computer Science, 232–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40846-5_24.
Texto completoPatin, Cédric y Annie Rialland. "On the Nature of Rules Sensitive to Syntax". En Prosody and Syntax, 285. Amsterdam: John Benjamins Publishing Company, 2006. http://dx.doi.org/10.1075/ubli.3.16pat.
Texto completoModi, Chirag, U. P. Rao y Dhiren R. Patel. "A Survey on Preserving Privacy for Sensitive Association Rules in Databases". En Communications in Computer and Information Science, 538–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12214-9_96.
Texto completoDomadiya, Nikunj H. y Udai Pratap Rao. "A Hybrid Technique for Hiding Sensitive Association Rules and Maintaining Database Quality". En Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 2, 359–67. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30927-9_35.
Texto completode Souza Amorim, Luís Eduardo y Eelco Visser. "Multi-purpose Syntax Definition with SDF3". En Software Engineering and Formal Methods, 1–23. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58768-0_1.
Texto completoNavet, Nicolas y Shu-Heng Chen. "On Predictability and Profitability: Would GP Induced Trading Rules be Sensitive to the Observed Entropy of Time Series?" En Natural Computing in Computational Finance, 197–210. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-77477-8_11.
Texto completoNordberg, Ana. "Biobank and Biomedical Research: Responsibilities of Controllers and Processors Under the EU General Data Protection Regulation". En GDPR and Biobanking, 61–89. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-49388-2_5.
Texto completoActas de conferencias sobre el tema "SENSITIVE RULES"
Wang, Shyue-Liang, Tzung-Pei Hong, Yu-Chuan Tsai y Hung-Yu Kao. "Hiding Sensitive Association Rules on Stars". En 2010 IEEE International Conference on Granular Computing (GrC-2010). IEEE, 2010. http://dx.doi.org/10.1109/grc.2010.123.
Texto completoBakshi, Arjun y Raj Bhatnagar. "Learning Cost-Sensitive Rules for Non-forced Classification". En 2012 IEEE 12th International Conference on Data Mining Workshops. IEEE, 2012. http://dx.doi.org/10.1109/icdmw.2012.62.
Texto completoWang, S. L. y A. Jafari. "Using unknowns for hiding sensitive predictive association rules". En Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration. IEEE, 2005. http://dx.doi.org/10.1109/iri-05.2005.1506477.
Texto completoNavale, Geeta S. y Suresh N. Mali. "A Survey on Sensitive Association Rules Hiding Methods". En 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA). IEEE, 2017. http://dx.doi.org/10.1109/iccubea.2017.8464012.
Texto completoWeng, Chih-Chia, Shan-Tai Chen y Hung-Che Lo. "A Novel Algorithm for Completely Hiding Sensitive Association Rules". En 2008 Eighth International Conference on Intelligent Systems Design and Applications (ISDA). IEEE, 2008. http://dx.doi.org/10.1109/isda.2008.180.
Texto completoChoi, K. S. y J. Pan. "An Anisotropic Hardening Rule With Non-Associated Flow Rule for Pressure-Sensitive Materials". En ASME 2009 Pressure Vessels and Piping Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/pvp2009-77951.
Texto completoLi, Xueming, Zhijun Liu y Chuan Zuo. "Hiding association rules based on relative-non-sensitive frequent itemsets". En 2009 8th IEEE International Conference on Cognitive Informatics (ICCI). IEEE, 2009. http://dx.doi.org/10.1109/coginf.2009.5250708.
Texto completoCheng, Peng y Jeng-Shyang Pan. "Completely hide sensitive association rules using EMO by deleting transactions". En GECCO '14: Genetic and Evolutionary Computation Conference. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2598394.2598466.
Texto completoZesch, Torsten y Oren Melamud. "Automatic Generation of Challenging Distractors Using Context-Sensitive Inference Rules". En Proceedings of the Ninth Workshop on Innovative Use of NLP for Building Educational Applications. Stroudsburg, PA, USA: Association for Computational Linguistics, 2014. http://dx.doi.org/10.3115/v1/w14-1817.
Texto completoLei Xu, Lei Shi, Runxin Wang y Brendan Jennings. "A multiple criteria service composition selection algorithm supporting time-sensitive rules". En 2011 IFIP/IEEE International Symposium on Integrated Network Management (IM 2011). IEEE, 2011. http://dx.doi.org/10.1109/inm.2011.5990664.
Texto completoInformes sobre el tema "SENSITIVE RULES"
Hudson-Vitale, Cynthia y Katherine Klosek. Issue Brief: New US Federal Compliance Rules for Sensitive Information. Association of Research Libraries, mayo de 2021. http://dx.doi.org/10.29242/brief.sensitiveinfo2021.
Texto completoDvorianyn, Paraskoviya. Сенситивне інтерв’ю: переживання колективної травми війни. Ivan Franko National University of Lviv, marzo de 2023. http://dx.doi.org/10.30970/vjo.2023.52-53.11727.
Texto completoRaju, Nivedita y Laura Bruun. Integrating Gender Perspectives into International Humanitarian Law. Stockholm International Peace Research Institute, agosto de 2023. http://dx.doi.org/10.55163/qilu7567.
Texto completoKhadan, Jeetendra. An Econometric Analysis of Energy Revenue and Government Expenditure Shocks on Economic Growth in Trinidad and Tobago. Inter-American Development Bank, diciembre de 2016. http://dx.doi.org/10.18235/0011776.
Texto completoParkins, R. N. NR198706 Environmental Aspects of the Stress-Corrosion Cracking of Pipeline Steels. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), septiembre de 1987. http://dx.doi.org/10.55274/r0011886.
Texto completoHertel, Thomas, David Hummels, Maros Ivanic y Roman Keeney. How Confident Can We Be in CGE-Based Assessments of Free Trade Agreements? GTAP Working Paper, junio de 2003. http://dx.doi.org/10.21642/gtap.wp26.
Texto completoLocy, Robert D., Hillel Fromm, Joe H. Cherry y Narendra K. Singh. Regulation of Arabidopsis Glutamate Decarboxylase in Response to Heat Stress: Modulation of Enzyme Activity and Gene Expression. United States Department of Agriculture, enero de 2001. http://dx.doi.org/10.32747/2001.7575288.bard.
Texto completoReport on Experiences and Opportunities for Coordinated Operating Rules and Cooperation Arrangements on Dam Operations. Vientiane, Lao PDR: Mekong River Commission Secretariat, febrero de 2023. http://dx.doi.org/10.52107/mrc.b193up.
Texto completo