Academic literature on the topic 'Private framework'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Private framework.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Private framework"

1

Yani, Risma, Mansur Mansur, and Kasmawi Kasmawi. "Sistem Informasi Penjadwalan Les Privat Menggunakan Framework Codeigniter." INFORMATION SYSTEM FOR EDUCATORS AND PROFESSIONALS : Journal of Information System 5, no. 1 (2020): 11. http://dx.doi.org/10.51211/isbi.v5i1.1396.

Full text
Abstract:
Abstrak : Jadwal pertemuan yang tersusun serta terencana dengan baik pada les privat merupakan suatu langkah untuk meningkatkan produktivitas belajar. Les privat merupakan aktivitas belajar-mengajar yang dilakukan diluar jam sekolah, oleh karena itu penting untuk melakukan memanagement waktu dalam penyusunan jadwal les. Namun terdapat beberapa permasalahan yang sering dihadapi antara calon guru les dengan siswa terkait sistem penjadwalan. Penjadwalan yang masih dilakukan secara konvensional seperti mencatat pada media tulis yang digunakan sebagai pengingat jadwal pertemuan les antara guru dan siswa. Hal ini dapat mengakibatkan produktivitas belajar les privat menjadi tidak terpenuhi dan mengakibatkan orang tua murid melakukan pembatalan pemesanan akibat jadwal belajar yang tidak sesuai. Tujuan dari penelitian ini yaitu membangun Sistem informasi penjadwalan les privat menggunakan framework codeigniter sebagai pendukung kesuksesan calon guru privat dalam mengoptimalkan penjadwalan les yang akan mereka terbitkan. Aplikasi yang dibuat menggunakan framework codeigniter tersebut membuat sistem coding lebih tersusun dalam bentuk MVC (Model, View, Controller). Hasil dari penelitian ini yaitu dengan adanya Sistem informasi penjadwalan les privat dapat membantu pengguna jasa terkait dengan jadwal yang sudah ditentukan oleh guru privat selain itu juga memberikan kemudahan kepada guru privat dalam mengelola jadwal terkait jam dan hari pelaksanaan pada kelas paket dan les guru kelas tanpa harus melakukan pencatatan manual.
 
 Kata Kunci : framework codeigniter, les privat, penjadwalan, sistem informasi.
 
 Abstract:A well-structured and well-planned meeting schedule in private lessons is a step to increase learning productivity. Private tutoring is a teaching-learning activity that is carried out outside school hours, therefore it is important to manage time in the preparation of a lesson schedule. However, there are several problems that are often faced by prospective tutors and students related to the scheduling system. Scheduling is still done conventionally, such as taking notes on written media which is used as a reminder of tutoring meeting schedules between teachers and students. This can result in the productivity of learning private lessons not being fulfilled and resulting in parents canceling orders due to inappropriate study schedules. The purpose of this study is to build a private tutoring scheduling information system using a codeigniter framework to support the success of private tutor candidates in optimizing the scheduling of lessons they will publish. Applications created using the codeigniter framework make the coding system more structured in the form of an MVC (Model, View, Controller). The results of this study are that the private tutoring scheduling information system can help service users related to schedules that have been determined by private teachers besides that it also makes it easy for private teachers to manage schedules related to hours and days of implementation in package classes and classroom tutoring without having to do manual note-taking.
 
 Keywords: codeigniter framework, information systems, private lessons, scheduling.
APA, Harvard, Vancouver, ISO, and other styles
2

Yang, Jing, Xiaoye Li, Zhenlong Sun, and Jianpei Zhang. "A Differential Privacy Framework for Collaborative Filtering." Mathematical Problems in Engineering 2019 (January 9, 2019): 1–11. http://dx.doi.org/10.1155/2019/1460234.

Full text
Abstract:
Focusing on the privacy issues in recommender systems, we propose a framework containing two perturbation methods for differentially private collaborative filtering to prevent the threat of inference attacks against users. To conceal individual ratings and provide valuable predictions, we consider some representative algorithms to calculate the predicted scores and provide specific solutions for adding Laplace noise. The DPI (Differentially Private Input) method perturbs the original ratings, which can be followed by any recommendation algorithms. By contrast, the DPM (Differentially Private Manner) method is based on the original ratings, which perturbs the measurements during implementation of the algorithms and releases the predicted scores. The experimental results showed that both methods can provide valuable prediction results while guaranteeing DP, which suggests it is a feasible solution and can be competent to make private recommendations.
APA, Harvard, Vancouver, ISO, and other styles
3

Prakash, Kritika, Fiza Husain, Praveen Paruchuri, and Sujit Gujar. "How Private Is Your RL Policy? An Inverse RL Based Analysis Framework." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 7 (2022): 8009–16. http://dx.doi.org/10.1609/aaai.v36i7.20772.

Full text
Abstract:
Reinforcement Learning (RL) enables agents to learn how to perform various tasks from scratch. In domains like autonomous driving, recommendation systems, and more, optimal RL policies learned could cause a privacy breach if the policies memorize any part of the private reward. We study the set of existing differentially-private RL policies derived from various RL algorithms such as Value Iteration, Deep-Q Networks, and Vanilla Proximal Policy Optimization. We propose a new Privacy-Aware Inverse RL analysis framework (PRIL) that involves performing reward reconstruction as an adversarial attack on private policies that the agents may deploy. For this, we introduce the reward reconstruction attack, wherein we seek to reconstruct the original reward from a privacy-preserving policy using the Inverse RL algorithm. An adversary must do poorly at reconstructing the original reward function if the agent uses a tightly private policy. Using this framework, we empirically test the effectiveness of the privacy guarantee offered by the private algorithms on instances of the FrozenLake domain of varying complexities. Based on the analysis performed, we infer a gap between the current standard of privacy offered and the standard of privacy needed to protect reward functions in RL. We do so by quantifying the extent to which each private policy protects the reward function by measuring distances between the original and reconstructed rewards.
APA, Harvard, Vancouver, ISO, and other styles
4

Benladgham, Rafika, Fethallah Hadjila, and Adam Belloum. "Efficient Privacy-Utility Optimization for Differentially Private Deep Learning." International journal of electrical and computer engineering systems 16, no. 5 (2025): 377–95. https://doi.org/10.32985/ijeces.16.5.3.

Full text
Abstract:
The optimization of differentially private deep learning models in medical data analysis using efficient hyper-parameter tuning is still a challenging task. In this context, we address the fundamental issue of balancing privacy guarantees with model utility by simultaneously optimizing model parameters and privacy parameters across two primary medical datasets, with additional validation on PathMNIST. Our framework encompasses both tabular data (Wisconsin Breast Cancer dataset) and medical imaging (BreastMNIST and PathMNIST), implementing four distinct optimization approaches: Grid Search, Random Search, Bayesian Optimization, and Bat Algorithm. Through extensive experimentation, we demonstrate a promising performance: achieving 93.62% accuracy with strong privacy guarantees (ε = 0.5) for tabular data, and 74.91% accuracy for medical imaging, with the Bat Algorithm discovering an unprecedented privacy level (ε = 0.293). Further validation on PathMNIST histopathology images demonstrated the framework's scalability, achieving 44.71% accuracy with privacy guarantees (ε = 2.603). Our comparative analysis reveals that different medical data types require distinct optimization strategies, with Bayesian Optimization excelling in tabular data applications and Random Search providing efficient solutions for image processing. The experiments with PathMNIST histopathology images provided valuable insights into the framework's behavior with complex medical data, revealing configuration-dependent performance variations and computational trade-offs. Our framework incorporates Pareto analysis and visualization techniques to enable systematic exploration of privacy-utility trade-offs, while early stopping mechanisms optimize privacy budget utilization. This comprehensive approach, validated across diverse medical imaging complexities and data modalities, establishes practical guidelines for implementing privacy-preserving machine learning in healthcare settings while highlighting the importance of balanced optimization strategies and computational efficiency in secure and efficient medical data analysis.
APA, Harvard, Vancouver, ISO, and other styles
5

R. Dhaya, R. Dhaya, R. Kanthavel R. Dhaya, and Kanagaraj Venusamy R. Kanthavel. "AI Based Learning Model Management Framework for Private Cloud Computing." 網際網路技術學刊 23, no. 7 (2022): 1633–42. http://dx.doi.org/10.53106/160792642022122307017.

Full text
Abstract:
<p>Artificial Intelligence (AI) systems are computational simulations that are “educated” using knowledge and individual expert participation to replicate a decision that a professional would make provided the same data. A model tries to simulate a specific decision loop that several scientists would take if they had access to all kinds of knowledge. To convey a model, you make a model asset in AI Platform Prediction, make a variant of that model and, at that point, interface the model form to the model record put away in Cloud Storage. AI and DB information sharing are essential for cutting-edge processing for DBMS innovation. The inspirations promoting their incorporation advances incorporate the requirement for admittance to a lot of data that is shared information handling, effective administration of data as information, and astute preparation of information. Notwithstanding these inspirations, the plan for a smart information base interface (IDI) was likewise spurred by the craving to save the considerable speculation spoke to by most existing data sets. A few general ways to deal with the connectivity of AI and databases and different improvements in the area of clever information bases were already examined and announced in this paper.</p> <p> </p>
APA, Harvard, Vancouver, ISO, and other styles
6

Anson, Mark J. P. "Private Equity Within a Utility Framework." Journal of Investing 11, no. 1 (2002): 17–25. http://dx.doi.org/10.3905/joi.2002.319491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Thandavan, R., and Kalaichelvi Sivaraman. "Public Private Partnership Within Policy Framework." Indian Journal of Public Administration 54, no. 3 (2008): 436–54. http://dx.doi.org/10.1177/0019556120080304.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Engel, Christoph. "A Constitutional Framework for Private Governance." German Law Journal 5, no. 3 (2004): 197–236. http://dx.doi.org/10.1017/s2071832200012402.

Full text
Abstract:
Lawyers are the engineers of the social sciences, and their doctors. Neither is good for reputation in interdisciplinary exchange. Social scientists often show contempt for a discipline that seems too close to reality to meet hard methodological standards, and too much concerned by pathologies that are beyond the reach of their methodological tools. As with many prejudices, there is a grain of truth in this one. But not all law is about making decisions and judgements in the face of a reality that is at best partly understood. The legal discipline has its own methodological standards. For the sake of internal clarity, it aims at parsimony. But modelling is not the legal path to methodological rigor. The legal equivalent boils down to one simple question: who asks whom for what? The law splits abstract problems into a series of cases. It reaches parsimony via the selection and sequence of cases. These hypothetical cases are like histological cuts through the social tissue. The legal discipline starts cutting at cases for which existing legal tools seem particularly wellsuited. If these cases are understood, the legal discipline then starts again with the more demanding ones. It is hoped that the sequence of cases leads to an understanding of situations that seemed inaccessible at the outset.
APA, Harvard, Vancouver, ISO, and other styles
9

Thakkar, Vidhi, and Vrushank Shah. "A Privacy-Preserving Framework Using Hyperledger Fabric for EHR Sharing Applications." International journal of electrical and computer engineering systems 14, no. 6 (2023): 667–76. http://dx.doi.org/10.32985/ijeces.14.6.6.

Full text
Abstract:
Electronic Health Records, or EHRs, include private and sensitive information of a patient. The privacy of personal healthcare data can be protected through Hyperledger Fabric, a permissioned blockchain framework. A few Hyperledger Fabric- integrated EHR solutions have emerged in recent years. However, none of them implements the privacy-preserving techniques of Hyperledger Fabric to make transactions anonymous or preserve the transaction data privacy during the consensus. Our proposed architecture is built on Hyperledger Fabric and its privacy-preserving mechanisms, such as Identity Mixer, Private Data Collections, Channels and Transient Fields to securely store and transfer patient-sensitive data while providing anonymity and unlinkability of transactions.
APA, Harvard, Vancouver, ISO, and other styles
10

C P, SHANTALA, and K. V. Viswanatha. "Secure SDN Framework for Data Exfiltration via Video Steganography." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 9 (2015): 6067–73. http://dx.doi.org/10.24297/ijct.v14i9.1847.

Full text
Abstract:
The popularity of steganography in the data exfiltration of private corporate sensitive data is increased. So it is important to detect such malicious activity. Becausethe data being transferred can hide the large amount of data in video becoming increasingly attractive. To ensure privacy and security we proposed an effective steganalysis method to detect hidden data in video by using the SDN framework policy. The main objective of this paper is to prevent the illegal data transmission from the compromised private network by the malicious users.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Private framework"

1

Tzanos, Ioannis. "A conceptual framework for tactical private satellite networks." Thesis, Monterey, California. Naval Postgraduate School, 2008. http://hdl.handle.net/10945/3932.

Full text
Abstract:
The purpose of this research is three-fold. First is to examine the current state of military satellite communications and to analyze current trends in the commercial satellite communications market that support military Command and Control, as well as facilitate network operations. Second is the operational implementation of such private satellite networks within the context of Net Centric Operations, as well as within the context of a coalition environment. Third, this work will illustrate how the private satellite network could be managed, as well as understanding how the network could be used in the context of a network management control channel to exercise management of numerous dispersed network devices and nodes. The focus will be to define, examine, and research the conceptual framework for a tactical private satellite network that facilitates Command and Control of geographically dispersed tactical units, as well as provides a mechanism for the management of tactical networks. After having acquired a clear picture of today's state and future's capabilities of SATCOM, research will be directed to how a tactical private satellite network would be implemented to support Network Centric Operations and how this tactical private satellite network could be utilized as a tool for the management of tactical networks. During the research, a number of secondary, yet supportive topics, need to be examined, such as, how that tactical private satellite network can be implemented to facilitate collaboration between Other Government Agencies, Non-Governmental Organizations, and Coalition partners from other countries or how it would be managed to offer to its subscribers the desired service in terms of quantity (throughput) and overall quality. To materialize the above, this thesis considers it essential to thoroughly examine a commercial base station which is fully capable of managing this satellite network under any conditions. The whole concept of this Tactical Private Satellite Network is examined based on two innovative approaches. First, the establishment of two different logical channels inside the physical one and second, the concept of a private satellite network and its implementation is examined as a method for direct delivery of data.
APA, Harvard, Vancouver, ISO, and other styles
2

Conrad, Brian Tzanos Ioannis. "A conceptual framework for tactical private satellite networks." Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Sept/08Sep%5FConrad.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2008.<br>Thesis Advisor(s): Bordetsky, Alex. "September 2008." Description based on title screen as viewed on November 5, 2008. Includes bibliographical references (p. 177-181). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
3

Sakamoto, Saeko. "Legal framework for Japan to facilitate private space activities." Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=101827.

Full text
Abstract:
This thesis explores a viable domestic legal framework for Japanese private space activities. Ideally, Japanese space legislation would govern private entities in a way that promotes commercialization while also fulfilling international obligations, doing both with an especial focus on commercial launch activities. First, I analyze current Japanese space law and space policies and continue by identifying Japan's problems in this arena. Next, I present research regarding other countries' space legislation solutions and examine how other nations' regulations do or do not solve problems similar to Japan's. Then, I assess the applicability of the foreign countries' approaches to Japan's situation. Finally, I propose ideas for a new legal structure for space activities in Japan and discuss possible implementation. I do so within the context of existing space policy problems that Japan must first tackle in order to successfully develop and enforce such new laws in the future.
APA, Harvard, Vancouver, ISO, and other styles
4

Sherry, Zaida. "Governance of virtual private networks using COBIT as framework." Thesis, Stellenbosch : University of Stellenbosch, 2007. http://hdl.handle.net/10019.1/3389.

Full text
Abstract:
Thesis (MAcc (Accountancy))--University of Stellenbosch, 2007.<br>The purpose of this assignment is to ascertain whether the COBIT framework is an adequate framework to assist in the governance of virtual private networks. The assignment focuses on whether the framework can ensure the identification of virtual private network-related risks and address IT compliance with policies and statutory regulations. A brief summary of the risks and issues pertaining to the pre-implementation, implementation and post-implementation phases of virtual private networks is included in the assignment. These risks and issues are then individually mapped onto a relevant COBIT control objective. The scope of the assignment does not include the intricacies of how these networks operate, the different types of network topologies or the different technologies used in virtual private networks. It was found that the COBIT framework can be implemented to manage and/or mitigate virtual private network risks.
APA, Harvard, Vancouver, ISO, and other styles
5

Ludden, Mary Ellen. "The Conceptual Framework of Leadership in a Public Private Partnership." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2191.

Full text
Abstract:
Partnerships between public and for profit organizations are increasing in frequency and scope due to scarce economic resources to support and deliver social programs. However, little is known about the characteristics of a successful partnership versus the characteristics of a failed partnership. The purpose of the study was to explore the leadership characteristics that were exhibited by the management team of a public-private partnership (PPP) that suffered a significant failure at the onset of the partnership, but recovered successfully over a period of time. The research question explored which leadership characteristics existed within the public and for-profit leadership teams that impacted the project team's ability to deliver the program requirements. A qualitative case study approach was utilized with the theoretical framework leveraging both Greenleaf's servant leadership philosophy and Burn's transformational and transactional leadership styles. A purposive sampling strategy identified 9 people who played a key role in the PPP, experienced the repercussions of the failure, and participated in the remediation efforts. All data were inductively coded and then subjected to a constant comparative method of analysis. The analysis revealed a strong relationship between servant leadership attributes exhibited by the leadership team and the project team's ability to traverse the partnership challenges. Data analysis indicates the necessity of effective servant leadership, specifically the attributes of understanding and empathy. Implications for positive social change from this study may lead to improved partnership delivery outcomes and better utilization of taxpayer funds to administer social programs.
APA, Harvard, Vancouver, ISO, and other styles
6

Maskara, Arvind. "A Process Framework for Managing Quality of Service in Private Cloud." ScholarWorks, 2014. https://scholarworks.waldenu.edu/dissertations/3220.

Full text
Abstract:
As information systems leaders tap into the global market of cloud computing-based services, they struggle to maintain consistent application performance due to lack of a process framework for managing quality of service (QoS) in the cloud. Guided by the disruptive innovation theory, the purpose of this case study was to identify a process framework for meeting the QoS requirements of private cloud service users. Private cloud implementation was explored by selecting an organization in California through purposeful sampling. Information was gathered by interviewing 23 information technology (IT) professionals, a mix of frontline engineers, managers, and leaders involved in the implementation of private cloud. Another source of data was documents such as standard operating procedures, policies, and guidelines related to private cloud implementation. Interview transcripts and documents were coded and sequentially analyzed. Three prominent themes emerged from the analysis of data: (a) end user expectations, (b) application architecture, and (c) trending analysis. The findings of this study may help IT leaders in effectively managing QoS in cloud infrastructure and deliver reliable application performance that may help in increasing customer population and profitability of organizations. This study may contribute to positive social change as information systems managers and workers can learn and apply the process framework for delivering stable and reliable cloud-hosted computer applications.
APA, Harvard, Vancouver, ISO, and other styles
7

McKim, Erica Patricia. "The evolution of private policing in Canada, towards an effective regulatory framework." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ48428.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Surineni, Shravan Kumar. "Venture Capital and private equity in India : systems analysis and development framework." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/83801.

Full text
Abstract:
Thesis (S.M. in Engineering and Management)--Massachusetts Institute of Technology, Engineering Systems Division, 2012.<br>Cataloged from PDF version of thesis. "June 2012."<br>Includes bibliographical references.<br>Venture Capital (VC) has been an important driver of innovation, entrepreneurship and economic growth in the U.S. and around the world for the past few decades. The astounding success of Venture Capital prompted various countries' attempts to emulate the U.S. model and create an indigenous venture capital industry. Several attempts are being pursued to emulate this success and create an indigenous Venture Capital industry in India. This thesis examines efforts to create a Venture Capital and Private Equity industry in India and the various factors that influence this process.<br>by Shravan K. Surineni.<br>S.M.in Engineering and Management
APA, Harvard, Vancouver, ISO, and other styles
9

Kongsakun, Kanokwan. "An intelligent recommendation framework for student counselling management in Thai private universities." Thesis, Kongsakun, Kanokwan (2013) An intelligent recommendation framework for student counselling management in Thai private universities. Professional Doctorate thesis, Murdoch University, 2013. https://researchrepository.murdoch.edu.au/id/eprint/25781/.

Full text
Abstract:
This study proposed a framework for an Intelligent Recommendation System for private universities in Thailand. Choosing a program of study for students is significant due to the commitment involved and the potential career opportunities. However, many students have enrolled in course majors without receiving any advice from appropriate authorities or university services. This could have potential mismatch between a student’s background, personal interests and capability, with the particular course being taken up. This may lead to low retention and dropouts. In order to improve the academic management processes, many universities are developing innovative information systems and services with an aim to enhance efficiency and student relationship. One of the key initiatives is the development of Student Relationship Management Systems (SRM) and among their functions, is the provision of recommendation and advice for students. The proposed system in this study examined the correlation between up to 11,000 student records and their academic performance. The system focuses on the following outcomes: programme and activity recommendation, likely overall GPA and results in each year, Identification of postgraduate students and potential dropouts. Association Rules and K-Means Clustering have been used together with three classification techniques: Artificial Neural Networks (ANN), Decision Tree (DT) and Support Vector Machines (SVM). Ensemble and the Modular Artificial Neural Networks based on Optimised Weight of Subspace Reconstruction (MANN-OWSR) have also been used to combine the learning models for improved performance. Results from the experiments will be useful for counsellors and academic staff in suggesting appropriate recommendations for the students.
APA, Harvard, Vancouver, ISO, and other styles
10

Perez, Fridrich Shane. "A Framework for the Performance Analysis and Tuning of Virtual Private Networks." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/6867.

Full text
Abstract:
With the rising trend of personal devices like laptops and smartphones being used in businesses and significant enterprises, the concern for preserving security arises. In addition to preserving security measures in outside devices, the network speed and performance capable by these devices need to be balanced with the security aspect to avoid slowing down virtual private network (VPN) activity. Performance tests have been done in the past to evaluate available software, hardware, and network security protocol options that will best benefit an entity according to its specific needs. With a variety of comparable frameworks available currently, it is a matter of pick and choose. This study is dedicated to developing a unique process-testing framework for personal devices by comparing the default security encryptions of different VPN architectures to the Federal Information Processing Standards (FIPS) set of complying encryptions. VPN architectures include a vendor-supplied VPN, Palo Alto Networks, open-sourced OpenVPN application, and a Windows PPTP server to test security protocols and measure network speed through different operating platforms. The results achieved in this research reveal the differences between the default security configurations and the encryption settings enforced by FIPS, shown through the collected averaged bandwidth between multiple network tests under those settings. The results have been given additional analysis and confidence through t-tests and standard deviation. The configurations, including difficulty in establishing, between different VPNs also contribute to discovering OpenVPN under FIPS settings to be favorable over a Palo Alto firewall using FIPS-CC mode due to higher bandwidth rate despite following the same encryption standards.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Private framework"

1

Association, European Computer Manufacturers, ed. An Architectural framework for private networks. 2nd ed. ECMA, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fabrizio, Cafaggi, ed. The institutional framework of European private law. Oxford University Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gray, Cheryl W. Romania's evolving legal framework for private sector development. Socialist Economies Reform Unit, Country Economics Dept. and Europe and Central Asia Division, Legal Dept., World Bank, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kleinman, Mark. Private finance for rented housing: An analytic framework. Department of Land Economy, University of Cambridge, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Makinwa, A. Private remedies for corruption: Towards an international framework. Eleven International Publishing, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gray, Cheryl W. Bulgaria's evolving legal framework for private sector development. Country Economics Dept. and Legal Dept., World Bank, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tan, Liong Tong. Malaysian private entities reporting standard: The MPERS framework. Commerce Clearing House (Malaysia) Sdn. Bhd., 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gangwar, Rachna. Framework for structuring public private partnerships in railways. Indian Institute of Management, Ahmedabad, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Indonesia. Komite Kebijakan Percepatan Penyediaan Infrastruktur., ed. Recent development in Indonesia PSP framework. National Committee for Acceleration of Infrastructure Provision, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chang, Yun-chien. Private property and takings compensation: Theoretical framework and empirical analysis. Edward Elgar Publishing Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Private framework"

1

Sommer, Claudia. "Theoretical Framework." In Private Equity Investments. Springer Fachmedien Wiesbaden, 2013. http://dx.doi.org/10.1007/978-3-658-00234-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vecchi, Veronica, Francesca Casalini, Niccolò Cusumano, and Velia M. Leone. "PPP Legal Framework." In Public Private Partnerships. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-65435-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vecchi, Veronica, Stefano Caselli, and Guido Corbetta. "The Public-Private Partnerships’ Framework." In Public Private Partnerships for Infrastructure and Business Development. Palgrave Macmillan US, 2015. http://dx.doi.org/10.1057/9781137541482_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Westermeyer, Gloria. "Research Framework." In The Impact of Private Actors on Security Governance. Springer Fachmedien Wiesbaden, 2013. http://dx.doi.org/10.1007/978-3-658-02230-3_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nokkala, Terhi, Barbara Heller-Schuh, and Manfred Paier. "Ranking Lists and European Framework Programmes." In Public Vices, Private Virtues? SensePublishers, 2011. http://dx.doi.org/10.1007/978-94-6091-466-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Arimoro, Augustine Edobor. "The framework for public-private partnerships." In Public-Private Partnerships in Emerging Economies. Routledge, 2020. http://dx.doi.org/10.4324/9781003105701-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ismail, Mohamed A. M. "The constitutional framework of state contracts in the MENA countries." In Public Private Partnership Contracts. Routledge, 2020. http://dx.doi.org/10.4324/9780429439148-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dasari, Yakobu, Venkatesulu Dondeti, and Hemantha Kumar Kalluri. "An Effective Framework for Ensuring Data Privacy in Private Cloud." In Algorithms for Intelligent Systems. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-3311-0_45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wu, Xiao Yong, Yu Hua Ni, Ying Kai Sun, and Hui He. "Framework of Virtual Private Supply Chain Management." In Materials Science Forum. Trans Tech Publications Ltd., 2006. http://dx.doi.org/10.4028/0-87849-421-9.1064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nwangwu, George. "The Legal and Institutional Framework for PPPs in Nigeria." In Public Private Partnerships in Nigeria. Palgrave Macmillan UK, 2016. http://dx.doi.org/10.1057/978-1-137-54242-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Private framework"

1

Kazemi, Fatemeh, Ningze Wang, Alex Sprintson, and Rafael G. L. D'Oliveira. "A New Framework for Designing Polynomial Codes for Private Information Retrieval." In 2024 60th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE, 2024. http://dx.doi.org/10.1109/allerton63246.2024.10735266.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zheng, Jia-Ying, Hainan Zhang, Lingxiang Wang, Wangjie Qiu, Hong-Wei Zheng, and Zhi-Ming Zheng. "Safely Learning with Private Data: A Federated Learning Framework for Large Language Model." In Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics, 2024. http://dx.doi.org/10.18653/v1/2024.emnlp-main.303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Wei-Cheng, and Ching-Chieh Huang. "Journey to Zero-X: Enabling Autonomous Self-Management Framework in Private 5G Networks." In 2024 International Computer Symposium (ICS). IEEE, 2024. https://doi.org/10.1109/ics64339.2024.00031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bhowmick, S. S., L. Gruenwald, M. Iwaihara, and S. Chatvichienchai. "PRIVATE-IYE: A Framework for Privacy Preserving Data Integration." In 22nd International Conference on Data Engineering Workshops (ICDEW'06). IEEE, 2006. http://dx.doi.org/10.1109/icdew.2006.117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Islam, Tanzir Ul, Noman Mohammed, and Dima Alhadidi. "Private Federated Framework for Health Data." In 2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM). IEEE, 2022. http://dx.doi.org/10.1109/bibm55620.2022.9995700.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Zhijian, and Yanqin Zhu. "A centralized HIDS framework for private cloud." In 2017 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD). IEEE, 2017. http://dx.doi.org/10.1109/snpd.2017.8022709.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gordin, Ionel, Adrian Graur, and Alin Potorac. "Two-factor authentication framework for private cloud." In 2019 23rd International Conference on System Theory, Control and Computing (ICSTCC). IEEE, 2019. http://dx.doi.org/10.1109/icstcc.2019.8885460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

DaeYoub Kim and MiSuk Huh. "Improved AACS framework for private digital contents." In 2009 Digest of Technical Papers International Conference on Consumer Electronics (ICCE). IEEE, 2009. http://dx.doi.org/10.1109/icce.2009.5012280.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Feng, Tingting, Yuchun Guo, and Yishuai Chen. "A differential private collaborative filtering framework based on privacy-relevance of topics." In 2016 IEEE Symposium on Computers and Communication (ISCC). IEEE, 2016. http://dx.doi.org/10.1109/iscc.2016.7543858.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kumar, Sumit, and Ravi Shanker. "Your Privacy is not so Private: Unveiling Android Apps Privacy Framework from the Dark." In 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS). IEEE, 2017. http://dx.doi.org/10.1109/icngcis.2017.25.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Private framework"

1

Jones, P., D. Benham, and C. Groves. A Solution Framework for Private Media in Privacy-Enhanced RTP Conferencing (PERC). RFC Editor, 2021. http://dx.doi.org/10.17487/rfc8871.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gleeson, B., A. Lin, J. Heinanen, G. Armitage, and A. Malis. A Framework for IP Based Virtual Private Networks. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2764.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Andersson, L., and E. Rosen, eds. Framework for Layer 2 Virtual Private Networks (L2VPNs). RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4664.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fang, L., ed. Security Framework for Provider-Provisioned Virtual Private Networks (PPVPNs). RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Takeda, T., ed. Framework and Requirements for Layer 1 Virtual Private Networks. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4847.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dong, J., S. Bryant, Z. Li, T. Miyasaka, and Y. Lee. A Framework for NRP-Based Enhanced Virtual Private Networks. RFC Editor, 2025. https://doi.org/10.17487/rfc9732.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Callon, R., and M. Suzuki. A Framework for Layer 3 Provider-Provisioned Virtual Private Networks (PPVPNs). RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nadeau, T., M. Boucadair, K. Chan, and A. Gonguet. Framework for Layer 3 Virtual Private Networks (L3VPN) Operations and Management. Edited by Y. El. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4176.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pires, Jose Claudio Linhares, Claudio Frischtak, Simon Lodato, Tulio Cravo, Caio Piza, and José Luis Guasch. IDB-9: Assessment of IDB-9's Private Sector Development Framework. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0010532.

Full text
Abstract:
This background paper assesses the actions of the Inter-American Development Bank (IDB, or Bank) related to private sector development (PSD) that were mandated under the Ninth General Capital Increase in Resources (IDB-9). It finds that Management has taken the necessary formal steps to address most of the requirements: preparing a new PSD Strategy; drafting a Non-Sovereign Guarantee (NSG) Business Plan; creating guidelines for specific sectors, beginning with small and medium-sized enterprises; reviewing the NSG guidelines for entities with public participation; gradually expanding NSG prudential limits; supporting the Inter-American Investment Corporation with subordinated lending; adapting the public-private mix to country requirements; adopting measures to improve coordination among PSD and private sector operations windows; and taking steps to enhance NSG development effectiveness. The major area not yet addressed is the integration of NSG operations in Country Strategies and programs. The paper also finds, however, that these steps do not yet provide an appropriate and effective way to achieve the underlying objectives of IDB-9 with regard to the IDB Group's support for development through the private sector. The strategic documents do not lay out an effective and operationally relevant strategy to ensure substantial value added in IDB's support for the private sector. Such a strategy would need to recognize and build on the drivers of productivity gain and economic growth: fostering entry, creating new markets, and supporting competition and innovation. These drivers depend both on public sector initiatives to improve the business environment and on private sector response, and thus an effective strategy has important implications for the sovereign guarantee (SG) and NSG sides of the Bank and for the IDB Group as a whole. One significant challenge relates to coordination between the two sides of the Bank and among the private sector windows of the Bank Group. Despite repeated attempts by Bank Management to strengthen this coordination, it remains a major challenge. Indeed, the analysis finds that operations with coordinated SG and NSG actions and integrated objectives are rare. Limited coordination has resulted in significant lost opportunities¿ and not only in infrastructure, where improved collaboration would bring clear gains (as in operations involving public-private partnerships and concessions). Coordination could enhance the Bank's additionality in financial sector operations as well, with improvements of financial markets regulation concomitant with second-tier support or the set-up of facilities with client financial institutions. OVE also finds that, despite some progress, the accomplishment of the IDB-9 requirements pertaining to development effectiveness is still a work in progress. Going forward, it is critical for the Bank to forge an institution-wide shared vision for the private sector, while leveraging the potential for collaboration of the public and private sides of the Bank. The paper suggests some structural options and incentive-related steps in that direction.
APA, Harvard, Vancouver, ISO, and other styles
10

Dew, Nicholas, and Ira Lewis. The Evolving Private Military Sector: Toward a Framework for Effective DoD Contracting. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada512256.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!