Добірка наукової літератури з теми "SENSITIVE RULES"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "SENSITIVE RULES".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "SENSITIVE RULES"
Wang, Hui. "Hiding Sensitive Association Rules by Sanitizing." Advanced Materials Research 694-697 (May 2013): 2317–21. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2317.
Повний текст джерелаBansal, Meenakshi, Dinesh Grover, and Dhiraj Sharma. "Sensitivity Association Rule Mining using Weight based Fuzzy Logic." Global Journal of Enterprise Information System 9, no. 2 (June 28, 2017): 1. http://dx.doi.org/10.18311/gjeis/2017/15480.
Повний текст джерелаWang, Hui. "Hiding Sensitive Association Rules by Adjusting Support." Advanced Materials Research 756-759 (September 2013): 1875–78. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1875.
Повний текст джерелаRao, K. Srinivasa, CH Suresh Babu, A. Damodaram, and Tai-hoon Kim. "Distortion Technique for Hiding Sensitive Association Rules." International Journal of Multimedia and Ubiquitous Engineering 9, no. 10 (October 31, 2014): 57–66. http://dx.doi.org/10.14257/ijmue.2014.9.10.06.
Повний текст джерелаWhittle, P. "Entropy-minimising and risk-sensitive control rules." Systems & Control Letters 13, no. 1 (July 1989): 1–7. http://dx.doi.org/10.1016/0167-6911(89)90014-5.
Повний текст джерелаJain, Dhyanendra. "Hiding Sensitive Association Rules Without Altering the Support of Sensitive Item(S)." International Journal of Artificial Intelligence & Applications 3, no. 2 (March 31, 2012): 75–84. http://dx.doi.org/10.5121/ijaia.2012.3207.
Повний текст джерелаWang, Hui. "Strategies for Sensitive Association Rule Hiding." Applied Mechanics and Materials 336-338 (July 2013): 2203–6. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2203.
Повний текст джерелаGayathiri, P., and B. Poorna. "Effective Gene Patterned Association Rule Hiding Algorithm for Privacy Preserving Data Mining on Transactional Database." Cybernetics and Information Technologies 17, no. 3 (September 1, 2017): 92–108. http://dx.doi.org/10.1515/cait-2017-0032.
Повний текст джерелаMenon, Syam, Abhijeet Ghoshal, and Sumit Sarkar. "Modifying Transactional Databases to Hide Sensitive Association Rules." Information Systems Research 33, no. 1 (March 2022): 152–78. http://dx.doi.org/10.1287/isre.2021.1033.
Повний текст джерелаWu, Yi-hung, Chia-ming Chiang, and Arbee Chen. "Hiding Sensitive Association Rules with Limited Side Effects." IEEE Transactions on Knowledge and Data Engineering 19, no. 1 (January 2007): 29–42. http://dx.doi.org/10.1109/tkde.2007.250583.
Повний текст джерелаДисертації з теми "SENSITIVE RULES"
Bakshi, Arjun. "Methodology For Generating High-Confidence Cost-Sensitive Rules For Classification." University of Cincinnati / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1377868085.
Повний текст джерелаDimitrova, Katica. "Order-sensitive view maintenance of materialized XQuery views." Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0505103-151827.
Повний текст джерелаMurphy, Brian R. "Order-sensitive XML query processing over relational sources." Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0505103-123753.
Повний текст джерелаKeywords: computation pushdown; XML; order-based Xquery processing; relational database; ordered SQL queries; data model mapping; XQuery; XML data mapping; SQL; XML algebra rewrite rules; XML document order. Includes bibliographical references (p. 64-67).
Baladová, Šárka. "THE IMPACT ANALYSIS OF THE EU-KOREA FTA ON THE CZECH SENSITIVE SECTORS WITH SPECIAL ATTENTION TO THE AUTOMOTIVE INDUSTRY." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-74890.
Повний текст джерелаAljandal, Waleed A. "Itemset size-sensitive interestingness measures for association rule mining and link prediction." Diss., Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/1119.
Повний текст джерелаZhao, Mingjun. "Essays on model uncertainty in macroeconomics." Columbus, Ohio : Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1153244452.
Повний текст джерелаOliveira, Paulo Henrique Maestrello Assad. "Detecção de fraudes em cartões: um classificador baseado em regras de associação e regressão logística." Universidade de São Paulo, 2015. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-01022016-204144/.
Повний текст джерелаCredit and debit cards are two methods of payments highly utilized. This awakens the interest of fraudsters. Businesses see fraudulent transactions as operating costs, which are passed on to consumers. Thus, the high number of transactions and the necessity to combat fraud stimulate the use of machine learning algorithms; among them, rule-based classifiers. However, a weakness of these classifiers is that, in practice, they are highly dependent on professionals who detect patterns of fraudulent transactions, transform them into rules and implement these rules in the classifier. Knowing this scenario, the aim of this thesis is to propose an architecture based on association rules and logistic regression - techniques studied in Machine Learning - for mining rules on data and produce rule sets to detect fraudulent transactions and make them available to experts. As a result, these professionals will have the aid of computers to discover the rules that support the classifier, decreasing the chance of having non-discovered fraudulent patterns and increasing the efficiency of generate and maintain these rules. In order to test the proposal, the experimental part of the thesis has used almost 7.7 million transactions provided by a real company. Moreover, after a long process of analysis of the database, 141 characteristics were combined using the algorithm FP-Growth, generating 38,003 rules. After a process of filtering and selection, they were grouped into five sets of rules which the biggest one has 1,285 rules. Each of the five sets was subjected to logistic regression, so their rules have been validated and weighted by statistical criteria. At the end of the process, the goodness of fit tests were satisfied and the performance indicators have shown very good classification powers (AUC between 0.788 and 0.820). In conclusion, the combined application of statistical techniques - cost sensitive learning, association rules and logistic regression - proved being conceptually and theoretically cohesive and coherent. Finally, the experiment and its results have demonstrated the technical and practical feasibilities of the proposal.
Pinsolle, Julie. "L'éducation familiale transformée, approche anthropo-didactique de l'autorité à la préadolescence : Appréhension des pratiques dans la région bordelaise." Thesis, Bordeaux, 2015. http://www.theses.fr/2015BORD0388.
Повний текст джерелаThis work is about family education, at the time when children’s status has changed. Thisnew status alters educational and authority relationships and questions the link betweenindividual and collectiv aspects of social life such as transmission. How do parents dealwith this sensitiv issue that is authority, torn between the democratic ideal and theconstraint that cannot be avoided in education ? How do they organize everyday life ? Isfamily organisation linked with children’s way to follow school rules ?Studying chilren and childhood representations, the issue of this work is to reveal thedynamics that contributed to family education evolution. Thus, the aim of this study is tounderstand the movement of family education while allowing to question educationnalauthority by combining family and school sociological approaches.The study focuses on parenting practices (parents’ daily organisation with their children)and educational values that parents promot. It reavels that they their organisation haschanged. Henceforth parenting practicises are structured by situational heterogeneity and« social class education » is less relevant to describe parenting practices unlike genderideologies. On the axiological level appears the educational homogenization that Fize(1990) predicted : parents massively join values promoted by privileged backgroundsfamilies (child’s personal development).Finally, with the notion of sensitivy to school form (students’ way to follow school rules),the thesis shows how, in education, dialogue and explication injonctions reinforceeducational difficulties. On the contrary, it reveals that most critical points in education areunspeakable and that the meaning of rules relies in their use
Yang, Jei-Hung, and 楊介宏. "Hiding Sensitive Rules Based on Transaction Grouping." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/58538882177123969090.
Повний текст джерела中原大學
資訊工程研究所
98
As the prevalent development of network technology, information sharing and communication is frequent in daily life. Although data mining techniques help people find the important rules among data, people also have to take the risk of sensitive information disclosed. In addition to hiding sensitive rules, recent researches also start discussing the reduction or avoidance of unexpected side effects, including the hiding of non-sensitive rules (lost rules) and the creation of non-existent rules (false rules). This thesis aims at a small amount of transaction modifications and proposes a method of rule hiding. The method can recover lost rules and keep sensitive rules hidden. Besides, we propose an efficient index structure for a quick retrieval of transactions during the hiding process. The experiments verify that our method can hide all sensitive rules and recover at most 40% lost rules. The index structure reduces about 85% retrieval time on average.
Kao, Tai-wei, and 高黛威. "Hiding dynamic sensitive association rules in incremental data." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/29229249691498416855.
Повний текст джерела國立臺灣科技大學
資訊工程系
101
As the advancement of technologies as well as the intense competition of business, the issues of privacy have acquiring more attention. Mining association rule is the significant technique in data mining. However, it may cause some privacy problem in mining processes. Many researches, thus, start to hide sensitive association rules due to avoid the sensitive information exposed. However, the development of computers and Internet technologies is so fast that data are increasing successively. In addition, sensitive association rules will change with time and policy. These both are the challenges for protecting sensitive association rules. Most exist technologies of hiding sensitive association rules cannot handle dynamic data and sensitive rules effectively. For solving these problems, this paper proposed a framework to protect dynamic sensitive association rules in incremental environment, HSAi and HDSA. HSAi is the algorithm to protect sensitive association rule in incremental data and we design the strategy to select appropriate victim transactions and items to delete them in order to hide sensitive association rules. HDSA is the algorithm for protecting dynamic sensitive rules, including adding and deleting. The mean of the deleting sensitive rule is the association rule that hidden can show again in the mining result. The goals of HSAi and HDSA are not only protecting sensitive rules but also producing least side effect from released dataset. Experiment results represent that the framework situation of incremental data and dynamic sensitive rules both can cause least side effects and maintain a desirable quality of sanitized database as well.
Книги з теми "SENSITIVE RULES"
Kutz, Gregory D. Sales of sensitive military property to the public. Washington, D.C. (441 G St., NW, Rm. LM, D.C. 20548): United States Government Accountability Office, 2007.
Знайти повний текст джерелаUnited States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, ed. Contractor integrity: Stronger safeguards needed for contractor access to sensitive information : report to the Chairman, Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Governmental Affairs, U.S. Senate. Washington, D.C.]: U.S. Govt. Accountability Office, 2010.
Знайти повний текст джерелаOffice, General Accounting. Environmental information: EPA could better address concerns about disseminating sensitive business information : report to the Chairman and Ranking Minority Member, Subcommittee on VA, HUD, and Independent Agencies, Committee on Appropriations, U.S. Senate. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Знайти повний текст джерелаOffice, General Accounting. Defense inventory: Inadequate compliance with controls for excess firearms and other sensitive items : report to the Chairman, Committee on Armed Services, House of Representatives. Washington, D.C: The Office, 1999.
Знайти повний текст джерелаOffice, General Accounting. Defense inventory: Controls over C-4 explosive and other sensitive munitions : briefing report to the Chairman, Legislation and National Security Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1990.
Знайти повний текст джерелаTimofeeva, Liliya, Elena Korneicheva, and Natal'ya Gracheva. Organization of educational activities in the OED. Approximate planning. The second youngest group (3-4 years). ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1072118.
Повний текст джерелаTimofeeva, Liliya, Elena Korneicheva, and Natal'ya Gracheva. Organization of educational activities in the OED. Approximate planning. Preparation for school group (6-7 years). ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1072122.
Повний текст джерелаOffice, General Accounting. Defense inventory: Controls over C-4 explosive and other sensitive munitions : briefing report to the Chairman, Legislation and National Security Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1990.
Знайти повний текст джерелаKosiara-Pedersen, Karina, Susan E. Scarrow, and Emilie van Haute. Rules of Engagement? Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198758631.003.0010.
Повний текст джерелаEisen, Kim, and Cathryn Taylor. Staying in Your Power : 3 Steps to Creating Boundaries and Rules in Your Life: For Intuitive, Sensitive and Empathic Souls. Vibration Publishing, 2022.
Знайти повний текст джерелаЧастини книг з теми "SENSITIVE RULES"
Hezart, Armin, Abhaya Nayak, and Mehmet Orgun. "Towards Context Sensitive Defeasible Rules." In Lecture Notes in Computer Science, 193–213. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88833-8_11.
Повний текст джерелаJain, Dhyanendra, Pallavi Khatri, Rishi Soni, and Brijesh Kumar Chaurasia. "Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s)." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 500–509. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27299-8_52.
Повний текст джерелаLesaint, David, Deepak Mehta, Barry O’Sullivan, Luis Quesada, and Nic Wilson. "Context-Sensitive Call Control Using Constraints and Rules." In Principles and Practice of Constraint Programming – CP 2010, 583–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15396-9_46.
Повний текст джерелаDíaz, Irene, Luis J. Rodríguez-Mũniz, and Luigi Troiano. "On Mining Sensitive Rules to Identify Privacy Threats." In Lecture Notes in Computer Science, 232–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40846-5_24.
Повний текст джерелаPatin, Cédric, and Annie Rialland. "On the Nature of Rules Sensitive to Syntax." In Prosody and Syntax, 285. Amsterdam: John Benjamins Publishing Company, 2006. http://dx.doi.org/10.1075/ubli.3.16pat.
Повний текст джерелаModi, Chirag, U. P. Rao, and Dhiren R. Patel. "A Survey on Preserving Privacy for Sensitive Association Rules in Databases." In Communications in Computer and Information Science, 538–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12214-9_96.
Повний текст джерелаDomadiya, Nikunj H., and Udai Pratap Rao. "A Hybrid Technique for Hiding Sensitive Association Rules and Maintaining Database Quality." In Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 2, 359–67. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30927-9_35.
Повний текст джерелаde Souza Amorim, Luís Eduardo, and Eelco Visser. "Multi-purpose Syntax Definition with SDF3." In Software Engineering and Formal Methods, 1–23. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58768-0_1.
Повний текст джерелаNavet, Nicolas, and Shu-Heng Chen. "On Predictability and Profitability: Would GP Induced Trading Rules be Sensitive to the Observed Entropy of Time Series?" In Natural Computing in Computational Finance, 197–210. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-77477-8_11.
Повний текст джерелаNordberg, Ana. "Biobank and Biomedical Research: Responsibilities of Controllers and Processors Under the EU General Data Protection Regulation." In GDPR and Biobanking, 61–89. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-49388-2_5.
Повний текст джерелаТези доповідей конференцій з теми "SENSITIVE RULES"
Wang, Shyue-Liang, Tzung-Pei Hong, Yu-Chuan Tsai, and Hung-Yu Kao. "Hiding Sensitive Association Rules on Stars." In 2010 IEEE International Conference on Granular Computing (GrC-2010). IEEE, 2010. http://dx.doi.org/10.1109/grc.2010.123.
Повний текст джерелаBakshi, Arjun, and Raj Bhatnagar. "Learning Cost-Sensitive Rules for Non-forced Classification." In 2012 IEEE 12th International Conference on Data Mining Workshops. IEEE, 2012. http://dx.doi.org/10.1109/icdmw.2012.62.
Повний текст джерелаWang, S. L., and A. Jafari. "Using unknowns for hiding sensitive predictive association rules." In Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration. IEEE, 2005. http://dx.doi.org/10.1109/iri-05.2005.1506477.
Повний текст джерелаNavale, Geeta S., and Suresh N. Mali. "A Survey on Sensitive Association Rules Hiding Methods." In 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA). IEEE, 2017. http://dx.doi.org/10.1109/iccubea.2017.8464012.
Повний текст джерелаWeng, Chih-Chia, Shan-Tai Chen, and Hung-Che Lo. "A Novel Algorithm for Completely Hiding Sensitive Association Rules." In 2008 Eighth International Conference on Intelligent Systems Design and Applications (ISDA). IEEE, 2008. http://dx.doi.org/10.1109/isda.2008.180.
Повний текст джерелаChoi, K. S., and J. Pan. "An Anisotropic Hardening Rule With Non-Associated Flow Rule for Pressure-Sensitive Materials." In ASME 2009 Pressure Vessels and Piping Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/pvp2009-77951.
Повний текст джерелаLi, Xueming, Zhijun Liu, and Chuan Zuo. "Hiding association rules based on relative-non-sensitive frequent itemsets." In 2009 8th IEEE International Conference on Cognitive Informatics (ICCI). IEEE, 2009. http://dx.doi.org/10.1109/coginf.2009.5250708.
Повний текст джерелаCheng, Peng, and Jeng-Shyang Pan. "Completely hide sensitive association rules using EMO by deleting transactions." In GECCO '14: Genetic and Evolutionary Computation Conference. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2598394.2598466.
Повний текст джерелаZesch, Torsten, and Oren Melamud. "Automatic Generation of Challenging Distractors Using Context-Sensitive Inference Rules." In Proceedings of the Ninth Workshop on Innovative Use of NLP for Building Educational Applications. Stroudsburg, PA, USA: Association for Computational Linguistics, 2014. http://dx.doi.org/10.3115/v1/w14-1817.
Повний текст джерелаLei Xu, Lei Shi, Runxin Wang, and Brendan Jennings. "A multiple criteria service composition selection algorithm supporting time-sensitive rules." In 2011 IFIP/IEEE International Symposium on Integrated Network Management (IM 2011). IEEE, 2011. http://dx.doi.org/10.1109/inm.2011.5990664.
Повний текст джерелаЗвіти організацій з теми "SENSITIVE RULES"
Hudson-Vitale, Cynthia, and Katherine Klosek. Issue Brief: New US Federal Compliance Rules for Sensitive Information. Association of Research Libraries, May 2021. http://dx.doi.org/10.29242/brief.sensitiveinfo2021.
Повний текст джерелаDvorianyn, Paraskoviya. Сенситивне інтерв’ю: переживання колективної травми війни. Ivan Franko National University of Lviv, березень 2023. http://dx.doi.org/10.30970/vjo.2023.52-53.11727.
Повний текст джерелаRaju, Nivedita, and Laura Bruun. Integrating Gender Perspectives into International Humanitarian Law. Stockholm International Peace Research Institute, August 2023. http://dx.doi.org/10.55163/qilu7567.
Повний текст джерелаKhadan, Jeetendra. An Econometric Analysis of Energy Revenue and Government Expenditure Shocks on Economic Growth in Trinidad and Tobago. Inter-American Development Bank, December 2016. http://dx.doi.org/10.18235/0011776.
Повний текст джерелаParkins, R. N. NR198706 Environmental Aspects of the Stress-Corrosion Cracking of Pipeline Steels. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), September 1987. http://dx.doi.org/10.55274/r0011886.
Повний текст джерелаHertel, Thomas, David Hummels, Maros Ivanic, and Roman Keeney. How Confident Can We Be in CGE-Based Assessments of Free Trade Agreements? GTAP Working Paper, June 2003. http://dx.doi.org/10.21642/gtap.wp26.
Повний текст джерелаLocy, Robert D., Hillel Fromm, Joe H. Cherry, and Narendra K. Singh. Regulation of Arabidopsis Glutamate Decarboxylase in Response to Heat Stress: Modulation of Enzyme Activity and Gene Expression. United States Department of Agriculture, January 2001. http://dx.doi.org/10.32747/2001.7575288.bard.
Повний текст джерелаReport on Experiences and Opportunities for Coordinated Operating Rules and Cooperation Arrangements on Dam Operations. Vientiane, Lao PDR: Mekong River Commission Secretariat, February 2023. http://dx.doi.org/10.52107/mrc.b193up.
Повний текст джерела