Gotowa bibliografia na temat „SENSITIVE RULES”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „SENSITIVE RULES”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "SENSITIVE RULES"
Wang, Hui. "Hiding Sensitive Association Rules by Sanitizing". Advanced Materials Research 694-697 (maj 2013): 2317–21. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2317.
Pełny tekst źródłaBansal, Meenakshi, Dinesh Grover i Dhiraj Sharma. "Sensitivity Association Rule Mining using Weight based Fuzzy Logic". Global Journal of Enterprise Information System 9, nr 2 (28.06.2017): 1. http://dx.doi.org/10.18311/gjeis/2017/15480.
Pełny tekst źródłaWang, Hui. "Hiding Sensitive Association Rules by Adjusting Support". Advanced Materials Research 756-759 (wrzesień 2013): 1875–78. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1875.
Pełny tekst źródłaRao, K. Srinivasa, CH Suresh Babu, A. Damodaram i Tai-hoon Kim. "Distortion Technique for Hiding Sensitive Association Rules". International Journal of Multimedia and Ubiquitous Engineering 9, nr 10 (31.10.2014): 57–66. http://dx.doi.org/10.14257/ijmue.2014.9.10.06.
Pełny tekst źródłaWhittle, P. "Entropy-minimising and risk-sensitive control rules". Systems & Control Letters 13, nr 1 (lipiec 1989): 1–7. http://dx.doi.org/10.1016/0167-6911(89)90014-5.
Pełny tekst źródłaJain, Dhyanendra. "Hiding Sensitive Association Rules Without Altering the Support of Sensitive Item(S)". International Journal of Artificial Intelligence & Applications 3, nr 2 (31.03.2012): 75–84. http://dx.doi.org/10.5121/ijaia.2012.3207.
Pełny tekst źródłaWang, Hui. "Strategies for Sensitive Association Rule Hiding". Applied Mechanics and Materials 336-338 (lipiec 2013): 2203–6. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2203.
Pełny tekst źródłaGayathiri, P., i B. Poorna. "Effective Gene Patterned Association Rule Hiding Algorithm for Privacy Preserving Data Mining on Transactional Database". Cybernetics and Information Technologies 17, nr 3 (1.09.2017): 92–108. http://dx.doi.org/10.1515/cait-2017-0032.
Pełny tekst źródłaMenon, Syam, Abhijeet Ghoshal i Sumit Sarkar. "Modifying Transactional Databases to Hide Sensitive Association Rules". Information Systems Research 33, nr 1 (marzec 2022): 152–78. http://dx.doi.org/10.1287/isre.2021.1033.
Pełny tekst źródłaWu, Yi-hung, Chia-ming Chiang i Arbee Chen. "Hiding Sensitive Association Rules with Limited Side Effects". IEEE Transactions on Knowledge and Data Engineering 19, nr 1 (styczeń 2007): 29–42. http://dx.doi.org/10.1109/tkde.2007.250583.
Pełny tekst źródłaRozprawy doktorskie na temat "SENSITIVE RULES"
Bakshi, Arjun. "Methodology For Generating High-Confidence Cost-Sensitive Rules For Classification". University of Cincinnati / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1377868085.
Pełny tekst źródłaDimitrova, Katica. "Order-sensitive view maintenance of materialized XQuery views". Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0505103-151827.
Pełny tekst źródłaMurphy, Brian R. "Order-sensitive XML query processing over relational sources". Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0505103-123753.
Pełny tekst źródłaKeywords: computation pushdown; XML; order-based Xquery processing; relational database; ordered SQL queries; data model mapping; XQuery; XML data mapping; SQL; XML algebra rewrite rules; XML document order. Includes bibliographical references (p. 64-67).
Baladová, Šárka. "THE IMPACT ANALYSIS OF THE EU-KOREA FTA ON THE CZECH SENSITIVE SECTORS WITH SPECIAL ATTENTION TO THE AUTOMOTIVE INDUSTRY". Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-74890.
Pełny tekst źródłaAljandal, Waleed A. "Itemset size-sensitive interestingness measures for association rule mining and link prediction". Diss., Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/1119.
Pełny tekst źródłaZhao, Mingjun. "Essays on model uncertainty in macroeconomics". Columbus, Ohio : Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1153244452.
Pełny tekst źródłaOliveira, Paulo Henrique Maestrello Assad. "Detecção de fraudes em cartões: um classificador baseado em regras de associação e regressão logística". Universidade de São Paulo, 2015. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-01022016-204144/.
Pełny tekst źródłaCredit and debit cards are two methods of payments highly utilized. This awakens the interest of fraudsters. Businesses see fraudulent transactions as operating costs, which are passed on to consumers. Thus, the high number of transactions and the necessity to combat fraud stimulate the use of machine learning algorithms; among them, rule-based classifiers. However, a weakness of these classifiers is that, in practice, they are highly dependent on professionals who detect patterns of fraudulent transactions, transform them into rules and implement these rules in the classifier. Knowing this scenario, the aim of this thesis is to propose an architecture based on association rules and logistic regression - techniques studied in Machine Learning - for mining rules on data and produce rule sets to detect fraudulent transactions and make them available to experts. As a result, these professionals will have the aid of computers to discover the rules that support the classifier, decreasing the chance of having non-discovered fraudulent patterns and increasing the efficiency of generate and maintain these rules. In order to test the proposal, the experimental part of the thesis has used almost 7.7 million transactions provided by a real company. Moreover, after a long process of analysis of the database, 141 characteristics were combined using the algorithm FP-Growth, generating 38,003 rules. After a process of filtering and selection, they were grouped into five sets of rules which the biggest one has 1,285 rules. Each of the five sets was subjected to logistic regression, so their rules have been validated and weighted by statistical criteria. At the end of the process, the goodness of fit tests were satisfied and the performance indicators have shown very good classification powers (AUC between 0.788 and 0.820). In conclusion, the combined application of statistical techniques - cost sensitive learning, association rules and logistic regression - proved being conceptually and theoretically cohesive and coherent. Finally, the experiment and its results have demonstrated the technical and practical feasibilities of the proposal.
Pinsolle, Julie. "L'éducation familiale transformée, approche anthropo-didactique de l'autorité à la préadolescence : Appréhension des pratiques dans la région bordelaise". Thesis, Bordeaux, 2015. http://www.theses.fr/2015BORD0388.
Pełny tekst źródłaThis work is about family education, at the time when children’s status has changed. Thisnew status alters educational and authority relationships and questions the link betweenindividual and collectiv aspects of social life such as transmission. How do parents dealwith this sensitiv issue that is authority, torn between the democratic ideal and theconstraint that cannot be avoided in education ? How do they organize everyday life ? Isfamily organisation linked with children’s way to follow school rules ?Studying chilren and childhood representations, the issue of this work is to reveal thedynamics that contributed to family education evolution. Thus, the aim of this study is tounderstand the movement of family education while allowing to question educationnalauthority by combining family and school sociological approaches.The study focuses on parenting practices (parents’ daily organisation with their children)and educational values that parents promot. It reavels that they their organisation haschanged. Henceforth parenting practicises are structured by situational heterogeneity and« social class education » is less relevant to describe parenting practices unlike genderideologies. On the axiological level appears the educational homogenization that Fize(1990) predicted : parents massively join values promoted by privileged backgroundsfamilies (child’s personal development).Finally, with the notion of sensitivy to school form (students’ way to follow school rules),the thesis shows how, in education, dialogue and explication injonctions reinforceeducational difficulties. On the contrary, it reveals that most critical points in education areunspeakable and that the meaning of rules relies in their use
Yang, Jei-Hung, i 楊介宏. "Hiding Sensitive Rules Based on Transaction Grouping". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/58538882177123969090.
Pełny tekst źródła中原大學
資訊工程研究所
98
As the prevalent development of network technology, information sharing and communication is frequent in daily life. Although data mining techniques help people find the important rules among data, people also have to take the risk of sensitive information disclosed. In addition to hiding sensitive rules, recent researches also start discussing the reduction or avoidance of unexpected side effects, including the hiding of non-sensitive rules (lost rules) and the creation of non-existent rules (false rules). This thesis aims at a small amount of transaction modifications and proposes a method of rule hiding. The method can recover lost rules and keep sensitive rules hidden. Besides, we propose an efficient index structure for a quick retrieval of transactions during the hiding process. The experiments verify that our method can hide all sensitive rules and recover at most 40% lost rules. The index structure reduces about 85% retrieval time on average.
Kao, Tai-wei, i 高黛威. "Hiding dynamic sensitive association rules in incremental data". Thesis, 2013. http://ndltd.ncl.edu.tw/handle/29229249691498416855.
Pełny tekst źródła國立臺灣科技大學
資訊工程系
101
As the advancement of technologies as well as the intense competition of business, the issues of privacy have acquiring more attention. Mining association rule is the significant technique in data mining. However, it may cause some privacy problem in mining processes. Many researches, thus, start to hide sensitive association rules due to avoid the sensitive information exposed. However, the development of computers and Internet technologies is so fast that data are increasing successively. In addition, sensitive association rules will change with time and policy. These both are the challenges for protecting sensitive association rules. Most exist technologies of hiding sensitive association rules cannot handle dynamic data and sensitive rules effectively. For solving these problems, this paper proposed a framework to protect dynamic sensitive association rules in incremental environment, HSAi and HDSA. HSAi is the algorithm to protect sensitive association rule in incremental data and we design the strategy to select appropriate victim transactions and items to delete them in order to hide sensitive association rules. HDSA is the algorithm for protecting dynamic sensitive rules, including adding and deleting. The mean of the deleting sensitive rule is the association rule that hidden can show again in the mining result. The goals of HSAi and HDSA are not only protecting sensitive rules but also producing least side effect from released dataset. Experiment results represent that the framework situation of incremental data and dynamic sensitive rules both can cause least side effects and maintain a desirable quality of sanitized database as well.
Książki na temat "SENSITIVE RULES"
Kutz, Gregory D. Sales of sensitive military property to the public. Washington, D.C. (441 G St., NW, Rm. LM, D.C. 20548): United States Government Accountability Office, 2007.
Znajdź pełny tekst źródłaUnited States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, red. Contractor integrity: Stronger safeguards needed for contractor access to sensitive information : report to the Chairman, Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Governmental Affairs, U.S. Senate. Washington, D.C.]: U.S. Govt. Accountability Office, 2010.
Znajdź pełny tekst źródłaOffice, General Accounting. Environmental information: EPA could better address concerns about disseminating sensitive business information : report to the Chairman and Ranking Minority Member, Subcommittee on VA, HUD, and Independent Agencies, Committee on Appropriations, U.S. Senate. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Znajdź pełny tekst źródłaOffice, General Accounting. Defense inventory: Inadequate compliance with controls for excess firearms and other sensitive items : report to the Chairman, Committee on Armed Services, House of Representatives. Washington, D.C: The Office, 1999.
Znajdź pełny tekst źródłaOffice, General Accounting. Defense inventory: Controls over C-4 explosive and other sensitive munitions : briefing report to the Chairman, Legislation and National Security Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1990.
Znajdź pełny tekst źródłaTimofeeva, Liliya, Elena Korneicheva i Natal'ya Gracheva. Organization of educational activities in the OED. Approximate planning. The second youngest group (3-4 years). ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1072118.
Pełny tekst źródłaTimofeeva, Liliya, Elena Korneicheva i Natal'ya Gracheva. Organization of educational activities in the OED. Approximate planning. Preparation for school group (6-7 years). ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1072122.
Pełny tekst źródłaOffice, General Accounting. Defense inventory: Controls over C-4 explosive and other sensitive munitions : briefing report to the Chairman, Legislation and National Security Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1990.
Znajdź pełny tekst źródłaKosiara-Pedersen, Karina, Susan E. Scarrow i Emilie van Haute. Rules of Engagement? Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198758631.003.0010.
Pełny tekst źródłaEisen, Kim, i Cathryn Taylor. Staying in Your Power : 3 Steps to Creating Boundaries and Rules in Your Life: For Intuitive, Sensitive and Empathic Souls. Vibration Publishing, 2022.
Znajdź pełny tekst źródłaCzęści książek na temat "SENSITIVE RULES"
Hezart, Armin, Abhaya Nayak i Mehmet Orgun. "Towards Context Sensitive Defeasible Rules". W Lecture Notes in Computer Science, 193–213. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88833-8_11.
Pełny tekst źródłaJain, Dhyanendra, Pallavi Khatri, Rishi Soni i Brijesh Kumar Chaurasia. "Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s)". W Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 500–509. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27299-8_52.
Pełny tekst źródłaLesaint, David, Deepak Mehta, Barry O’Sullivan, Luis Quesada i Nic Wilson. "Context-Sensitive Call Control Using Constraints and Rules". W Principles and Practice of Constraint Programming – CP 2010, 583–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15396-9_46.
Pełny tekst źródłaDíaz, Irene, Luis J. Rodríguez-Mũniz i Luigi Troiano. "On Mining Sensitive Rules to Identify Privacy Threats". W Lecture Notes in Computer Science, 232–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40846-5_24.
Pełny tekst źródłaPatin, Cédric, i Annie Rialland. "On the Nature of Rules Sensitive to Syntax". W Prosody and Syntax, 285. Amsterdam: John Benjamins Publishing Company, 2006. http://dx.doi.org/10.1075/ubli.3.16pat.
Pełny tekst źródłaModi, Chirag, U. P. Rao i Dhiren R. Patel. "A Survey on Preserving Privacy for Sensitive Association Rules in Databases". W Communications in Computer and Information Science, 538–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12214-9_96.
Pełny tekst źródłaDomadiya, Nikunj H., i Udai Pratap Rao. "A Hybrid Technique for Hiding Sensitive Association Rules and Maintaining Database Quality". W Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 2, 359–67. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30927-9_35.
Pełny tekst źródłade Souza Amorim, Luís Eduardo, i Eelco Visser. "Multi-purpose Syntax Definition with SDF3". W Software Engineering and Formal Methods, 1–23. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58768-0_1.
Pełny tekst źródłaNavet, Nicolas, i Shu-Heng Chen. "On Predictability and Profitability: Would GP Induced Trading Rules be Sensitive to the Observed Entropy of Time Series?" W Natural Computing in Computational Finance, 197–210. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-77477-8_11.
Pełny tekst źródłaNordberg, Ana. "Biobank and Biomedical Research: Responsibilities of Controllers and Processors Under the EU General Data Protection Regulation". W GDPR and Biobanking, 61–89. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-49388-2_5.
Pełny tekst źródłaStreszczenia konferencji na temat "SENSITIVE RULES"
Wang, Shyue-Liang, Tzung-Pei Hong, Yu-Chuan Tsai i Hung-Yu Kao. "Hiding Sensitive Association Rules on Stars". W 2010 IEEE International Conference on Granular Computing (GrC-2010). IEEE, 2010. http://dx.doi.org/10.1109/grc.2010.123.
Pełny tekst źródłaBakshi, Arjun, i Raj Bhatnagar. "Learning Cost-Sensitive Rules for Non-forced Classification". W 2012 IEEE 12th International Conference on Data Mining Workshops. IEEE, 2012. http://dx.doi.org/10.1109/icdmw.2012.62.
Pełny tekst źródłaWang, S. L., i A. Jafari. "Using unknowns for hiding sensitive predictive association rules". W Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration. IEEE, 2005. http://dx.doi.org/10.1109/iri-05.2005.1506477.
Pełny tekst źródłaNavale, Geeta S., i Suresh N. Mali. "A Survey on Sensitive Association Rules Hiding Methods". W 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA). IEEE, 2017. http://dx.doi.org/10.1109/iccubea.2017.8464012.
Pełny tekst źródłaWeng, Chih-Chia, Shan-Tai Chen i Hung-Che Lo. "A Novel Algorithm for Completely Hiding Sensitive Association Rules". W 2008 Eighth International Conference on Intelligent Systems Design and Applications (ISDA). IEEE, 2008. http://dx.doi.org/10.1109/isda.2008.180.
Pełny tekst źródłaChoi, K. S., i J. Pan. "An Anisotropic Hardening Rule With Non-Associated Flow Rule for Pressure-Sensitive Materials". W ASME 2009 Pressure Vessels and Piping Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/pvp2009-77951.
Pełny tekst źródłaLi, Xueming, Zhijun Liu i Chuan Zuo. "Hiding association rules based on relative-non-sensitive frequent itemsets". W 2009 8th IEEE International Conference on Cognitive Informatics (ICCI). IEEE, 2009. http://dx.doi.org/10.1109/coginf.2009.5250708.
Pełny tekst źródłaCheng, Peng, i Jeng-Shyang Pan. "Completely hide sensitive association rules using EMO by deleting transactions". W GECCO '14: Genetic and Evolutionary Computation Conference. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2598394.2598466.
Pełny tekst źródłaZesch, Torsten, i Oren Melamud. "Automatic Generation of Challenging Distractors Using Context-Sensitive Inference Rules". W Proceedings of the Ninth Workshop on Innovative Use of NLP for Building Educational Applications. Stroudsburg, PA, USA: Association for Computational Linguistics, 2014. http://dx.doi.org/10.3115/v1/w14-1817.
Pełny tekst źródłaLei Xu, Lei Shi, Runxin Wang i Brendan Jennings. "A multiple criteria service composition selection algorithm supporting time-sensitive rules". W 2011 IFIP/IEEE International Symposium on Integrated Network Management (IM 2011). IEEE, 2011. http://dx.doi.org/10.1109/inm.2011.5990664.
Pełny tekst źródłaRaporty organizacyjne na temat "SENSITIVE RULES"
Hudson-Vitale, Cynthia, i Katherine Klosek. Issue Brief: New US Federal Compliance Rules for Sensitive Information. Association of Research Libraries, maj 2021. http://dx.doi.org/10.29242/brief.sensitiveinfo2021.
Pełny tekst źródłaDvorianyn, Paraskoviya. Сенситивне інтерв’ю: переживання колективної травми війни. Ivan Franko National University of Lviv, marzec 2023. http://dx.doi.org/10.30970/vjo.2023.52-53.11727.
Pełny tekst źródłaRaju, Nivedita, i Laura Bruun. Integrating Gender Perspectives into International Humanitarian Law. Stockholm International Peace Research Institute, sierpień 2023. http://dx.doi.org/10.55163/qilu7567.
Pełny tekst źródłaKhadan, Jeetendra. An Econometric Analysis of Energy Revenue and Government Expenditure Shocks on Economic Growth in Trinidad and Tobago. Inter-American Development Bank, grudzień 2016. http://dx.doi.org/10.18235/0011776.
Pełny tekst źródłaParkins, R. N. NR198706 Environmental Aspects of the Stress-Corrosion Cracking of Pipeline Steels. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), wrzesień 1987. http://dx.doi.org/10.55274/r0011886.
Pełny tekst źródłaHertel, Thomas, David Hummels, Maros Ivanic i Roman Keeney. How Confident Can We Be in CGE-Based Assessments of Free Trade Agreements? GTAP Working Paper, czerwiec 2003. http://dx.doi.org/10.21642/gtap.wp26.
Pełny tekst źródłaLocy, Robert D., Hillel Fromm, Joe H. Cherry i Narendra K. Singh. Regulation of Arabidopsis Glutamate Decarboxylase in Response to Heat Stress: Modulation of Enzyme Activity and Gene Expression. United States Department of Agriculture, styczeń 2001. http://dx.doi.org/10.32747/2001.7575288.bard.
Pełny tekst źródłaReport on Experiences and Opportunities for Coordinated Operating Rules and Cooperation Arrangements on Dam Operations. Vientiane, Lao PDR: Mekong River Commission Secretariat, luty 2023. http://dx.doi.org/10.52107/mrc.b193up.
Pełny tekst źródła