Littérature scientifique sur le sujet « SENSITIVE RULES »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Sommaire
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « SENSITIVE RULES ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "SENSITIVE RULES"
Wang, Hui. « Hiding Sensitive Association Rules by Sanitizing ». Advanced Materials Research 694-697 (mai 2013) : 2317–21. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2317.
Texte intégralBansal, Meenakshi, Dinesh Grover et Dhiraj Sharma. « Sensitivity Association Rule Mining using Weight based Fuzzy Logic ». Global Journal of Enterprise Information System 9, no 2 (28 juin 2017) : 1. http://dx.doi.org/10.18311/gjeis/2017/15480.
Texte intégralWang, Hui. « Hiding Sensitive Association Rules by Adjusting Support ». Advanced Materials Research 756-759 (septembre 2013) : 1875–78. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1875.
Texte intégralRao, K. Srinivasa, CH Suresh Babu, A. Damodaram et Tai-hoon Kim. « Distortion Technique for Hiding Sensitive Association Rules ». International Journal of Multimedia and Ubiquitous Engineering 9, no 10 (31 octobre 2014) : 57–66. http://dx.doi.org/10.14257/ijmue.2014.9.10.06.
Texte intégralWhittle, P. « Entropy-minimising and risk-sensitive control rules ». Systems & ; Control Letters 13, no 1 (juillet 1989) : 1–7. http://dx.doi.org/10.1016/0167-6911(89)90014-5.
Texte intégralJain, Dhyanendra. « Hiding Sensitive Association Rules Without Altering the Support of Sensitive Item(S) ». International Journal of Artificial Intelligence & ; Applications 3, no 2 (31 mars 2012) : 75–84. http://dx.doi.org/10.5121/ijaia.2012.3207.
Texte intégralWang, Hui. « Strategies for Sensitive Association Rule Hiding ». Applied Mechanics and Materials 336-338 (juillet 2013) : 2203–6. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2203.
Texte intégralGayathiri, P., et B. Poorna. « Effective Gene Patterned Association Rule Hiding Algorithm for Privacy Preserving Data Mining on Transactional Database ». Cybernetics and Information Technologies 17, no 3 (1 septembre 2017) : 92–108. http://dx.doi.org/10.1515/cait-2017-0032.
Texte intégralMenon, Syam, Abhijeet Ghoshal et Sumit Sarkar. « Modifying Transactional Databases to Hide Sensitive Association Rules ». Information Systems Research 33, no 1 (mars 2022) : 152–78. http://dx.doi.org/10.1287/isre.2021.1033.
Texte intégralWu, Yi-hung, Chia-ming Chiang et Arbee Chen. « Hiding Sensitive Association Rules with Limited Side Effects ». IEEE Transactions on Knowledge and Data Engineering 19, no 1 (janvier 2007) : 29–42. http://dx.doi.org/10.1109/tkde.2007.250583.
Texte intégralThèses sur le sujet "SENSITIVE RULES"
Bakshi, Arjun. « Methodology For Generating High-Confidence Cost-Sensitive Rules For Classification ». University of Cincinnati / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1377868085.
Texte intégralDimitrova, Katica. « Order-sensitive view maintenance of materialized XQuery views ». Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0505103-151827.
Texte intégralMurphy, Brian R. « Order-sensitive XML query processing over relational sources ». Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0505103-123753.
Texte intégralKeywords: computation pushdown; XML; order-based Xquery processing; relational database; ordered SQL queries; data model mapping; XQuery; XML data mapping; SQL; XML algebra rewrite rules; XML document order. Includes bibliographical references (p. 64-67).
Baladová, Šárka. « THE IMPACT ANALYSIS OF THE EU-KOREA FTA ON THE CZECH SENSITIVE SECTORS WITH SPECIAL ATTENTION TO THE AUTOMOTIVE INDUSTRY ». Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-74890.
Texte intégralAljandal, Waleed A. « Itemset size-sensitive interestingness measures for association rule mining and link prediction ». Diss., Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/1119.
Texte intégralZhao, Mingjun. « Essays on model uncertainty in macroeconomics ». Columbus, Ohio : Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1153244452.
Texte intégralOliveira, Paulo Henrique Maestrello Assad. « Detecção de fraudes em cartões : um classificador baseado em regras de associação e regressão logística ». Universidade de São Paulo, 2015. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-01022016-204144/.
Texte intégralCredit and debit cards are two methods of payments highly utilized. This awakens the interest of fraudsters. Businesses see fraudulent transactions as operating costs, which are passed on to consumers. Thus, the high number of transactions and the necessity to combat fraud stimulate the use of machine learning algorithms; among them, rule-based classifiers. However, a weakness of these classifiers is that, in practice, they are highly dependent on professionals who detect patterns of fraudulent transactions, transform them into rules and implement these rules in the classifier. Knowing this scenario, the aim of this thesis is to propose an architecture based on association rules and logistic regression - techniques studied in Machine Learning - for mining rules on data and produce rule sets to detect fraudulent transactions and make them available to experts. As a result, these professionals will have the aid of computers to discover the rules that support the classifier, decreasing the chance of having non-discovered fraudulent patterns and increasing the efficiency of generate and maintain these rules. In order to test the proposal, the experimental part of the thesis has used almost 7.7 million transactions provided by a real company. Moreover, after a long process of analysis of the database, 141 characteristics were combined using the algorithm FP-Growth, generating 38,003 rules. After a process of filtering and selection, they were grouped into five sets of rules which the biggest one has 1,285 rules. Each of the five sets was subjected to logistic regression, so their rules have been validated and weighted by statistical criteria. At the end of the process, the goodness of fit tests were satisfied and the performance indicators have shown very good classification powers (AUC between 0.788 and 0.820). In conclusion, the combined application of statistical techniques - cost sensitive learning, association rules and logistic regression - proved being conceptually and theoretically cohesive and coherent. Finally, the experiment and its results have demonstrated the technical and practical feasibilities of the proposal.
Pinsolle, Julie. « L'éducation familiale transformée, approche anthropo-didactique de l'autorité à la préadolescence : Appréhension des pratiques dans la région bordelaise ». Thesis, Bordeaux, 2015. http://www.theses.fr/2015BORD0388.
Texte intégralThis work is about family education, at the time when children’s status has changed. Thisnew status alters educational and authority relationships and questions the link betweenindividual and collectiv aspects of social life such as transmission. How do parents dealwith this sensitiv issue that is authority, torn between the democratic ideal and theconstraint that cannot be avoided in education ? How do they organize everyday life ? Isfamily organisation linked with children’s way to follow school rules ?Studying chilren and childhood representations, the issue of this work is to reveal thedynamics that contributed to family education evolution. Thus, the aim of this study is tounderstand the movement of family education while allowing to question educationnalauthority by combining family and school sociological approaches.The study focuses on parenting practices (parents’ daily organisation with their children)and educational values that parents promot. It reavels that they their organisation haschanged. Henceforth parenting practicises are structured by situational heterogeneity and« social class education » is less relevant to describe parenting practices unlike genderideologies. On the axiological level appears the educational homogenization that Fize(1990) predicted : parents massively join values promoted by privileged backgroundsfamilies (child’s personal development).Finally, with the notion of sensitivy to school form (students’ way to follow school rules),the thesis shows how, in education, dialogue and explication injonctions reinforceeducational difficulties. On the contrary, it reveals that most critical points in education areunspeakable and that the meaning of rules relies in their use
Yang, Jei-Hung, et 楊介宏. « Hiding Sensitive Rules Based on Transaction Grouping ». Thesis, 2010. http://ndltd.ncl.edu.tw/handle/58538882177123969090.
Texte intégral中原大學
資訊工程研究所
98
As the prevalent development of network technology, information sharing and communication is frequent in daily life. Although data mining techniques help people find the important rules among data, people also have to take the risk of sensitive information disclosed. In addition to hiding sensitive rules, recent researches also start discussing the reduction or avoidance of unexpected side effects, including the hiding of non-sensitive rules (lost rules) and the creation of non-existent rules (false rules). This thesis aims at a small amount of transaction modifications and proposes a method of rule hiding. The method can recover lost rules and keep sensitive rules hidden. Besides, we propose an efficient index structure for a quick retrieval of transactions during the hiding process. The experiments verify that our method can hide all sensitive rules and recover at most 40% lost rules. The index structure reduces about 85% retrieval time on average.
Kao, Tai-wei, et 高黛威. « Hiding dynamic sensitive association rules in incremental data ». Thesis, 2013. http://ndltd.ncl.edu.tw/handle/29229249691498416855.
Texte intégral國立臺灣科技大學
資訊工程系
101
As the advancement of technologies as well as the intense competition of business, the issues of privacy have acquiring more attention. Mining association rule is the significant technique in data mining. However, it may cause some privacy problem in mining processes. Many researches, thus, start to hide sensitive association rules due to avoid the sensitive information exposed. However, the development of computers and Internet technologies is so fast that data are increasing successively. In addition, sensitive association rules will change with time and policy. These both are the challenges for protecting sensitive association rules. Most exist technologies of hiding sensitive association rules cannot handle dynamic data and sensitive rules effectively. For solving these problems, this paper proposed a framework to protect dynamic sensitive association rules in incremental environment, HSAi and HDSA. HSAi is the algorithm to protect sensitive association rule in incremental data and we design the strategy to select appropriate victim transactions and items to delete them in order to hide sensitive association rules. HDSA is the algorithm for protecting dynamic sensitive rules, including adding and deleting. The mean of the deleting sensitive rule is the association rule that hidden can show again in the mining result. The goals of HSAi and HDSA are not only protecting sensitive rules but also producing least side effect from released dataset. Experiment results represent that the framework situation of incremental data and dynamic sensitive rules both can cause least side effects and maintain a desirable quality of sanitized database as well.
Livres sur le sujet "SENSITIVE RULES"
Kutz, Gregory D. Sales of sensitive military property to the public. Washington, D.C. (441 G St., NW, Rm. LM, D.C. 20548) : United States Government Accountability Office, 2007.
Trouver le texte intégralUnited States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, dir. Contractor integrity : Stronger safeguards needed for contractor access to sensitive information : report to the Chairman, Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Governmental Affairs, U.S. Senate. Washington, D.C.] : U.S. Govt. Accountability Office, 2010.
Trouver le texte intégralOffice, General Accounting. Environmental information : EPA could better address concerns about disseminating sensitive business information : report to the Chairman and Ranking Minority Member, Subcommittee on VA, HUD, and Independent Agencies, Committee on Appropriations, U.S. Senate. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013) : The Office, 1999.
Trouver le texte intégralOffice, General Accounting. Defense inventory : Inadequate compliance with controls for excess firearms and other sensitive items : report to the Chairman, Committee on Armed Services, House of Representatives. Washington, D.C : The Office, 1999.
Trouver le texte intégralOffice, General Accounting. Defense inventory : Controls over C-4 explosive and other sensitive munitions : briefing report to the Chairman, Legislation and National Security Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C : The Office, 1990.
Trouver le texte intégralTimofeeva, Liliya, Elena Korneicheva et Natal'ya Gracheva. Organization of educational activities in the OED. Approximate planning. The second youngest group (3-4 years). ru : INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1072118.
Texte intégralTimofeeva, Liliya, Elena Korneicheva et Natal'ya Gracheva. Organization of educational activities in the OED. Approximate planning. Preparation for school group (6-7 years). ru : INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1072122.
Texte intégralOffice, General Accounting. Defense inventory : Controls over C-4 explosive and other sensitive munitions : briefing report to the Chairman, Legislation and National Security Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C : The Office, 1990.
Trouver le texte intégralKosiara-Pedersen, Karina, Susan E. Scarrow et Emilie van Haute. Rules of Engagement ? Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198758631.003.0010.
Texte intégralEisen, Kim, et Cathryn Taylor. Staying in Your Power : 3 Steps to Creating Boundaries and Rules in Your Life : For Intuitive, Sensitive and Empathic Souls. Vibration Publishing, 2022.
Trouver le texte intégralChapitres de livres sur le sujet "SENSITIVE RULES"
Hezart, Armin, Abhaya Nayak et Mehmet Orgun. « Towards Context Sensitive Defeasible Rules ». Dans Lecture Notes in Computer Science, 193–213. Berlin, Heidelberg : Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88833-8_11.
Texte intégralJain, Dhyanendra, Pallavi Khatri, Rishi Soni et Brijesh Kumar Chaurasia. « Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s) ». Dans Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 500–509. Berlin, Heidelberg : Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27299-8_52.
Texte intégralLesaint, David, Deepak Mehta, Barry O’Sullivan, Luis Quesada et Nic Wilson. « Context-Sensitive Call Control Using Constraints and Rules ». Dans Principles and Practice of Constraint Programming – CP 2010, 583–97. Berlin, Heidelberg : Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15396-9_46.
Texte intégralDíaz, Irene, Luis J. Rodríguez-Mũniz et Luigi Troiano. « On Mining Sensitive Rules to Identify Privacy Threats ». Dans Lecture Notes in Computer Science, 232–41. Berlin, Heidelberg : Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40846-5_24.
Texte intégralPatin, Cédric, et Annie Rialland. « On the Nature of Rules Sensitive to Syntax ». Dans Prosody and Syntax, 285. Amsterdam : John Benjamins Publishing Company, 2006. http://dx.doi.org/10.1075/ubli.3.16pat.
Texte intégralModi, Chirag, U. P. Rao et Dhiren R. Patel. « A Survey on Preserving Privacy for Sensitive Association Rules in Databases ». Dans Communications in Computer and Information Science, 538–44. Berlin, Heidelberg : Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12214-9_96.
Texte intégralDomadiya, Nikunj H., et Udai Pratap Rao. « A Hybrid Technique for Hiding Sensitive Association Rules and Maintaining Database Quality ». Dans Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems : Volume 2, 359–67. Cham : Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30927-9_35.
Texte intégralde Souza Amorim, Luís Eduardo, et Eelco Visser. « Multi-purpose Syntax Definition with SDF3 ». Dans Software Engineering and Formal Methods, 1–23. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58768-0_1.
Texte intégralNavet, Nicolas, et Shu-Heng Chen. « On Predictability and Profitability : Would GP Induced Trading Rules be Sensitive to the Observed Entropy of Time Series ? » Dans Natural Computing in Computational Finance, 197–210. Berlin, Heidelberg : Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-77477-8_11.
Texte intégralNordberg, Ana. « Biobank and Biomedical Research : Responsibilities of Controllers and Processors Under the EU General Data Protection Regulation ». Dans GDPR and Biobanking, 61–89. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-49388-2_5.
Texte intégralActes de conférences sur le sujet "SENSITIVE RULES"
Wang, Shyue-Liang, Tzung-Pei Hong, Yu-Chuan Tsai et Hung-Yu Kao. « Hiding Sensitive Association Rules on Stars ». Dans 2010 IEEE International Conference on Granular Computing (GrC-2010). IEEE, 2010. http://dx.doi.org/10.1109/grc.2010.123.
Texte intégralBakshi, Arjun, et Raj Bhatnagar. « Learning Cost-Sensitive Rules for Non-forced Classification ». Dans 2012 IEEE 12th International Conference on Data Mining Workshops. IEEE, 2012. http://dx.doi.org/10.1109/icdmw.2012.62.
Texte intégralWang, S. L., et A. Jafari. « Using unknowns for hiding sensitive predictive association rules ». Dans Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration. IEEE, 2005. http://dx.doi.org/10.1109/iri-05.2005.1506477.
Texte intégralNavale, Geeta S., et Suresh N. Mali. « A Survey on Sensitive Association Rules Hiding Methods ». Dans 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA). IEEE, 2017. http://dx.doi.org/10.1109/iccubea.2017.8464012.
Texte intégralWeng, Chih-Chia, Shan-Tai Chen et Hung-Che Lo. « A Novel Algorithm for Completely Hiding Sensitive Association Rules ». Dans 2008 Eighth International Conference on Intelligent Systems Design and Applications (ISDA). IEEE, 2008. http://dx.doi.org/10.1109/isda.2008.180.
Texte intégralChoi, K. S., et J. Pan. « An Anisotropic Hardening Rule With Non-Associated Flow Rule for Pressure-Sensitive Materials ». Dans ASME 2009 Pressure Vessels and Piping Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/pvp2009-77951.
Texte intégralLi, Xueming, Zhijun Liu et Chuan Zuo. « Hiding association rules based on relative-non-sensitive frequent itemsets ». Dans 2009 8th IEEE International Conference on Cognitive Informatics (ICCI). IEEE, 2009. http://dx.doi.org/10.1109/coginf.2009.5250708.
Texte intégralCheng, Peng, et Jeng-Shyang Pan. « Completely hide sensitive association rules using EMO by deleting transactions ». Dans GECCO '14 : Genetic and Evolutionary Computation Conference. New York, NY, USA : ACM, 2014. http://dx.doi.org/10.1145/2598394.2598466.
Texte intégralZesch, Torsten, et Oren Melamud. « Automatic Generation of Challenging Distractors Using Context-Sensitive Inference Rules ». Dans Proceedings of the Ninth Workshop on Innovative Use of NLP for Building Educational Applications. Stroudsburg, PA, USA : Association for Computational Linguistics, 2014. http://dx.doi.org/10.3115/v1/w14-1817.
Texte intégralLei Xu, Lei Shi, Runxin Wang et Brendan Jennings. « A multiple criteria service composition selection algorithm supporting time-sensitive rules ». Dans 2011 IFIP/IEEE International Symposium on Integrated Network Management (IM 2011). IEEE, 2011. http://dx.doi.org/10.1109/inm.2011.5990664.
Texte intégralRapports d'organisations sur le sujet "SENSITIVE RULES"
Hudson-Vitale, Cynthia, et Katherine Klosek. Issue Brief : New US Federal Compliance Rules for Sensitive Information. Association of Research Libraries, mai 2021. http://dx.doi.org/10.29242/brief.sensitiveinfo2021.
Texte intégralDvorianyn, Paraskoviya. Сенситивне інтерв’ю : переживання колективної травми війни. Ivan Franko National University of Lviv, mars 2023. http://dx.doi.org/10.30970/vjo.2023.52-53.11727.
Texte intégralRaju, Nivedita, et Laura Bruun. Integrating Gender Perspectives into International Humanitarian Law. Stockholm International Peace Research Institute, août 2023. http://dx.doi.org/10.55163/qilu7567.
Texte intégralKhadan, Jeetendra. An Econometric Analysis of Energy Revenue and Government Expenditure Shocks on Economic Growth in Trinidad and Tobago. Inter-American Development Bank, décembre 2016. http://dx.doi.org/10.18235/0011776.
Texte intégralParkins, R. N. NR198706 Environmental Aspects of the Stress-Corrosion Cracking of Pipeline Steels. Chantilly, Virginia : Pipeline Research Council International, Inc. (PRCI), septembre 1987. http://dx.doi.org/10.55274/r0011886.
Texte intégralHertel, Thomas, David Hummels, Maros Ivanic et Roman Keeney. How Confident Can We Be in CGE-Based Assessments of Free Trade Agreements ? GTAP Working Paper, juin 2003. http://dx.doi.org/10.21642/gtap.wp26.
Texte intégralLocy, Robert D., Hillel Fromm, Joe H. Cherry et Narendra K. Singh. Regulation of Arabidopsis Glutamate Decarboxylase in Response to Heat Stress : Modulation of Enzyme Activity and Gene Expression. United States Department of Agriculture, janvier 2001. http://dx.doi.org/10.32747/2001.7575288.bard.
Texte intégralReport on Experiences and Opportunities for Coordinated Operating Rules and Cooperation Arrangements on Dam Operations. Vientiane, Lao PDR : Mekong River Commission Secretariat, février 2023. http://dx.doi.org/10.52107/mrc.b193up.
Texte intégral