Artículos de revistas sobre el tema "SENSITIVE RULES"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "SENSITIVE RULES".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Wang, Hui. "Hiding Sensitive Association Rules by Sanitizing". Advanced Materials Research 694-697 (mayo de 2013): 2317–21. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2317.
Texto completoBansal, Meenakshi, Dinesh Grover y Dhiraj Sharma. "Sensitivity Association Rule Mining using Weight based Fuzzy Logic". Global Journal of Enterprise Information System 9, n.º 2 (28 de junio de 2017): 1. http://dx.doi.org/10.18311/gjeis/2017/15480.
Texto completoWang, Hui. "Hiding Sensitive Association Rules by Adjusting Support". Advanced Materials Research 756-759 (septiembre de 2013): 1875–78. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1875.
Texto completoRao, K. Srinivasa, CH Suresh Babu, A. Damodaram y Tai-hoon Kim. "Distortion Technique for Hiding Sensitive Association Rules". International Journal of Multimedia and Ubiquitous Engineering 9, n.º 10 (31 de octubre de 2014): 57–66. http://dx.doi.org/10.14257/ijmue.2014.9.10.06.
Texto completoWhittle, P. "Entropy-minimising and risk-sensitive control rules". Systems & Control Letters 13, n.º 1 (julio de 1989): 1–7. http://dx.doi.org/10.1016/0167-6911(89)90014-5.
Texto completoJain, Dhyanendra. "Hiding Sensitive Association Rules Without Altering the Support of Sensitive Item(S)". International Journal of Artificial Intelligence & Applications 3, n.º 2 (31 de marzo de 2012): 75–84. http://dx.doi.org/10.5121/ijaia.2012.3207.
Texto completoWang, Hui. "Strategies for Sensitive Association Rule Hiding". Applied Mechanics and Materials 336-338 (julio de 2013): 2203–6. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2203.
Texto completoGayathiri, P. y B. Poorna. "Effective Gene Patterned Association Rule Hiding Algorithm for Privacy Preserving Data Mining on Transactional Database". Cybernetics and Information Technologies 17, n.º 3 (1 de septiembre de 2017): 92–108. http://dx.doi.org/10.1515/cait-2017-0032.
Texto completoMenon, Syam, Abhijeet Ghoshal y Sumit Sarkar. "Modifying Transactional Databases to Hide Sensitive Association Rules". Information Systems Research 33, n.º 1 (marzo de 2022): 152–78. http://dx.doi.org/10.1287/isre.2021.1033.
Texto completoWu, Yi-hung, Chia-ming Chiang y Arbee Chen. "Hiding Sensitive Association Rules with Limited Side Effects". IEEE Transactions on Knowledge and Data Engineering 19, n.º 1 (enero de 2007): 29–42. http://dx.doi.org/10.1109/tkde.2007.250583.
Texto completoDehkordi, Mohammad Naderi, Kambiz Badie y Ahmad Khadem Zadeh. "A new approach for sensitive association rules hiding". International Journal of Rapid Manufacturing 1, n.º 2 (2009): 128. http://dx.doi.org/10.1504/ijrapidm.2009.029379.
Texto completoSchmid-Hempel, Paul y Regula Schmid-Hempel. "Nectar-collecting bees use Distance-sensitive movement rules". Animal Behaviour 34, n.º 2 (abril de 1986): 605–7. http://dx.doi.org/10.1016/s0003-3472(86)80131-2.
Texto completoBonam, Janakiramaiah y Ramamohan Reddy. "Balanced Approach for Hiding Sensitive Association Rules in Data Sharing Environment". International Journal of Information Security and Privacy 8, n.º 3 (julio de 2014): 39–62. http://dx.doi.org/10.4018/ijisp.2014070103.
Texto completoMohan, S. Vijayarani y Tamilarasi Angamuthu. "Association Rule Hiding in Privacy Preserving Data Mining". International Journal of Information Security and Privacy 12, n.º 3 (julio de 2018): 141–63. http://dx.doi.org/10.4018/ijisp.2018070108.
Texto completoBoddez, Yannick, Marc Patrick Bennett, Silke van Esch y Tom Beckers. "Bending rules: the shape of the perceptual generalisation gradient is sensitive to inference rules". Cognition and Emotion 31, n.º 7 (28 de septiembre de 2016): 1444–52. http://dx.doi.org/10.1080/02699931.2016.1230541.
Texto completoKhuda Bux, Naadiya, Mingming Lu, Jianxin Wang, Saajid Hussain y Yazan Aljeroudi. "Efficient Association Rules Hiding Using Genetic Algorithms". Symmetry 10, n.º 11 (2 de noviembre de 2018): 576. http://dx.doi.org/10.3390/sym10110576.
Texto completoZwicky, Arnold M., Ellen M. Kaisse y Michael Kenstowicz. "The phonology and syntax of wh-expressions in Tangale". Phonology Yearbook 4, n.º 1 (mayo de 1987): 229–41. http://dx.doi.org/10.1017/s0952675700000841.
Texto completoIqbal, Khalid, Dr Sohail Asghar y Dr Abdulrehman Mirza. "Hiding Sensitive XML Association Rules With Supervised Learning Technique". Intelligent Information Management 03, n.º 06 (2011): 219–29. http://dx.doi.org/10.4236/iim.2011.36027.
Texto completoClymer, John R., David J. Cheng y Daniel Hernandez. "Induction of decision making rules for context sensitive systems". SIMULATION 59, n.º 3 (septiembre de 1992): 198–206. http://dx.doi.org/10.1177/003754979205900308.
Texto completoBarca, Laura, Andrew W. Ellis y Cristina Burani. "Context-sensitive rules and word naming in Italian children". Reading and Writing 20, n.º 5 (28 de noviembre de 2006): 495–509. http://dx.doi.org/10.1007/s11145-006-9040-z.
Texto completoTalebi, Behnam y Mohammad Naderi Dehkordi. "Sensitive association rules hiding using electromagnetic field optimization algorithm". Expert Systems with Applications 114 (diciembre de 2018): 155–72. http://dx.doi.org/10.1016/j.eswa.2018.07.031.
Texto completoKrishnamoorthy, Sathiyapriya, G. Sudha Sadasivam, M. Rajalakshmi, K. Kowsalyaa y M. Dhivya. "Privacy Preserving Fuzzy Association Rule Mining in Data Clusters Using Particle Swarm Optimization". International Journal of Intelligent Information Technologies 13, n.º 2 (abril de 2017): 1–20. http://dx.doi.org/10.4018/ijiit.2017040101.
Texto completoB., Suma y Shobha G. "Association rule hiding using integer linear programming". International Journal of Electrical and Computer Engineering (IJECE) 11, n.º 4 (1 de agosto de 2021): 3451. http://dx.doi.org/10.11591/ijece.v11i4.pp3451-3458.
Texto completoZhu, Chenyi. "Realistic Dilemma and Improvement of Sensitive Personal Information Processing Rules". Journal of Education, Humanities and Social Sciences 14 (30 de mayo de 2023): 256–62. http://dx.doi.org/10.54097/ehss.v14i.8847.
Texto completoZhu, Chenyi. "Realistic Dilemma and Improvement of Sensitive Personal Information Processing Rules". Journal of Education, Humanities and Social Sciences 14 (30 de mayo de 2023): 127–33. http://dx.doi.org/10.54097/ehss.v14i.8806.
Texto completoAli, Munawar. "Sustainability Index of Benoa Bay Beach Reclamation Against National Resistance". INFLUENCE: INTERNATIONAL JOURNAL OF SCIENCE REVIEW 5, n.º 2 (5 de abril de 2023): 43–62. http://dx.doi.org/10.54783/influencejournal.v5i2.135.
Texto completoKAPLAN, ABBY. "How much homophony is normal?" Journal of Linguistics 47, n.º 3 (18 de abril de 2011): 631–71. http://dx.doi.org/10.1017/s0022226711000053.
Texto completoLe, Bac, Lien Kieu y Dat Tran. "DISTORTION-BASED HEURISTIC METHOD FOR SENSITIVE ASSOCIATION RULE HIDING". Journal of Computer Science and Cybernetics 35, n.º 4 (31 de octubre de 2019): 337–54. http://dx.doi.org/10.15625/1813-9663/35/4/14131.
Texto completoMary, A. Geetha, D. P. Acharjya y N. Ch S. N. Iyengar. "Privacy preservation in fuzzy association rules using rough computing and DSR". Cybernetics and Information Technologies 14, n.º 1 (1 de marzo de 2014): 52–71. http://dx.doi.org/10.2478/cait-2014-0005.
Texto completoWhittle, Peter. "The risk-sensitive certainty equivalence principle". Journal of Applied Probability 23, A (1986): 383–88. http://dx.doi.org/10.2307/3214366.
Texto completoWhittle, Peter. "The risk-sensitive certainty equivalence principle". Journal of Applied Probability 23, A (1986): 383–88. http://dx.doi.org/10.1017/s0021900200117218.
Texto completoZwicky, Arnold M., Ellen M. Kaisse, Elizabeth A. Cowper y Keren D. Rice. "Are phonosyntactic rules necessary?" Phonology Yearbook 4, n.º 1 (mayo de 1987): 185–94. http://dx.doi.org/10.1017/s0952675700000816.
Texto completoFelando, Cynthia. "Breaking the rules of the game". Short Film Studies 9, n.º 2 (1 de abril de 2019): 157–60. http://dx.doi.org/10.1386/sfs.9.2.157_1.
Texto completoJing Yang, Junwei Zhang, Jianpei Zhang y Lejun Zhang. "Blocking Inference Channels of Sensitive Rules in Data Stream Mining". INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 5, n.º 7 (15 de abril de 2013): 196–203. http://dx.doi.org/10.4156/aiss.vol5.issue7.24.
Texto completoSirole, Tapan y Jaytrilok Choudhary. "A Survey of Various Methodologies for Hiding Sensitive Association Rules". International Journal of Computer Applications 96, n.º 18 (18 de junio de 2014): 12–15. http://dx.doi.org/10.5120/16893-6942.
Texto completoPatel, Deepak y Vineet Richhariya. "C Privacy Prevention of Discriminating Rules by Perturbing Sensitive Items". Communications on Applied Electronics 2, n.º 8 (24 de septiembre de 2015): 12–16. http://dx.doi.org/10.5120/cae2015651825.
Texto completoRajalakshmi, M. y T. Purusothaman. "Concealing party-centric sensitive rules in a centralized data source". International Journal of Machine Learning and Cybernetics 4, n.º 5 (5 de julio de 2012): 515–25. http://dx.doi.org/10.1007/s13042-012-0111-y.
Texto completoZhao, Mingjun. "Optimal simple rules in RE models with risk sensitive preferences". Economics Letters 97, n.º 3 (diciembre de 2007): 260–66. http://dx.doi.org/10.1016/j.econlet.2007.03.004.
Texto completoSharma, Dhiraj, Meenakshi Bansal y Dinesh Grover. "Storage and Query Over Encrypted Sensitive Association Rules in Database". International Journal of Internet Technology and Secured Transactions 1, n.º 1 (2019): 1. http://dx.doi.org/10.1504/ijitst.2019.10012622.
Texto completoBansal, Meenakshi, Dinesh Grover y Dhiraj Sharma. "Storage and query over encrypted sensitive association rules in database". International Journal of Internet Technology and Secured Transactions 9, n.º 3 (2019): 242. http://dx.doi.org/10.1504/ijitst.2019.101818.
Texto completoKhalil Jumaa, Alaa, Sufyan T. F. Al-Janabi y Nazar Abedlqader Ali. "Hiding Sensitive Association Rules over Privacy Preserving Distributed Data Mining". Kirkuk University Journal-Scientific Studies 9, n.º 1 (28 de junio de 2014): 59–72. http://dx.doi.org/10.32894/kujss.2014.89609.
Texto completoFerroni, Marina, Beatriz Diuk y Milagros Mena. "Acquisition of orthographic knowledge: orthographic representations and context sensitive rules". psicología desde el caribe 33, n.º 3 (1 de septiembre de 2016): 237–43. http://dx.doi.org/10.14482/psdc.33.3.6942.
Texto completoFerroni, Marina, Beatriz Diuk y Milagros Mena. "Acquisition of orthographic knowledge: orthographic representations and context sensitive rules". Psicología desde el Caribe 33, n.º 3 (15 de noviembre de 2016): 237–43. http://dx.doi.org/10.14482/psdc.33.3.9487.
Texto completoB., Suma y Shobha G. "Privacy preserving association rule hiding using border based approach". Indonesian Journal of Electrical Engineering and Computer Science 23, n.º 2 (1 de agosto de 2021): 1137. http://dx.doi.org/10.11591/ijeecs.v23.i2.pp1137-1145.
Texto completoQuoc Le, Hai, Somjit Arch-int y Ngamnij Arch-int. "Association Rule Hiding Based on Intersection Lattice". Mathematical Problems in Engineering 2013 (2013): 1–11. http://dx.doi.org/10.1155/2013/210405.
Texto completoJiang, Ying, Ming Jing, Jie Zeng, Feng Qi Shen, Du Lan Qi y Li Hua Wang. "LanguageTool Based Proofreading of Sensitive Chinese Political Information". Applied Mechanics and Materials 687-691 (noviembre de 2014): 2644–47. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2644.
Texto completoYi, Tong y Minyong Shi. "Privacy Protection Method for Multiple Sensitive Attributes Based on Strong Rule". Mathematical Problems in Engineering 2015 (2015): 1–14. http://dx.doi.org/10.1155/2015/464731.
Texto completoNegus, Oliver J., Andrew Dunn y William Ridsdill-Smith. "Lower limb acute joint injuries: when to refer for X-ray?" British Journal of Hospital Medicine 81, n.º 3 (2 de marzo de 2020): 1–5. http://dx.doi.org/10.12968/hmed.2020.0055.
Texto completoDOMINGO-FERRER, JOSEP y VICENÇ TORRA. "A CRITIQUE OF THE SENSITIVITY RULES USUALLY EMPLOYED FOR STATISTICAL TABLE PROTECTION". International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10, n.º 05 (octubre de 2002): 545–56. http://dx.doi.org/10.1142/s0218488502001636.
Texto completoHayes, Daniel, Miguel Moreira, Isabel Boavida, Melanie Haslauer, Günther Unfer, Bernhard Zeiringer, Franz Greimel, Stefan Auer, Teresa Ferreira y Stefan Schmutz. "Life Stage-Specific Hydropeaking Flow Rules". Sustainability 11, n.º 6 (14 de marzo de 2019): 1547. http://dx.doi.org/10.3390/su11061547.
Texto completo