Academic literature on the topic 'SENSITIVE RULES'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SENSITIVE RULES.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "SENSITIVE RULES"
Wang, Hui. "Hiding Sensitive Association Rules by Sanitizing." Advanced Materials Research 694-697 (May 2013): 2317–21. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2317.
Full textBansal, Meenakshi, Dinesh Grover, and Dhiraj Sharma. "Sensitivity Association Rule Mining using Weight based Fuzzy Logic." Global Journal of Enterprise Information System 9, no. 2 (2017): 1. http://dx.doi.org/10.18311/gjeis/2017/15480.
Full textSuma, B., and G. Shobha. "Association rule hiding using integer linear programming." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 4 (2021): 3451–58. https://doi.org/10.11591/ijece.v11i4.pp3451-3458.
Full textNguyen, Khac-Chien. "Mining Association Rules on Time-sensitive Data." ICT Research 2024, no. 2 (2024): 130–40. http://dx.doi.org/10.32913/mic-ict-research.v2024.n2.1256.
Full textWang, Hui. "Hiding Sensitive Association Rules by Adjusting Support." Advanced Materials Research 756-759 (September 2013): 1875–78. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1875.
Full textRao, K. Srinivasa, CH Suresh Babu, A. Damodaram, and Tai-hoon Kim. "Distortion Technique for Hiding Sensitive Association Rules." International Journal of Multimedia and Ubiquitous Engineering 9, no. 10 (2014): 57–66. http://dx.doi.org/10.14257/ijmue.2014.9.10.06.
Full textWhittle, P. "Entropy-minimising and risk-sensitive control rules." Systems & Control Letters 13, no. 1 (1989): 1–7. http://dx.doi.org/10.1016/0167-6911(89)90014-5.
Full textDiwan, Abhishek, and Alpana Singh. "An Efficient Technique for Protecting Sensitive Information." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 03 (2013): 79–82. https://doi.org/10.5281/zenodo.14594519.
Full textAlayiaboozar, Elham. "Studying the possibility of improving the function of a POS tagger system." Comparative Linguistic Research 10, no. 19 (2020): 95–110. https://doi.org/10.22084/RJHLL.2019.16614.1834.
Full textHameed, S., F. Shahzad, and S. Asghar. "SANITIZING SENSITIVE ASSOCIATION RULES USING FUZZY CORRELATION SCHEME." Nucleus 50, no. 4 (2013): 359–67. https://doi.org/10.71330/thenucleus.2013.739.
Full textDissertations / Theses on the topic "SENSITIVE RULES"
Bakshi, Arjun. "Methodology For Generating High-Confidence Cost-Sensitive Rules For Classification." University of Cincinnati / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1377868085.
Full textDimitrova, Katica. "Order-sensitive view maintenance of materialized XQuery views." Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0505103-151827.
Full textMurphy, Brian R. "Order-sensitive XML query processing over relational sources." Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0505103-123753.
Full textBaladová, Šárka. "THE IMPACT ANALYSIS OF THE EU-KOREA FTA ON THE CZECH SENSITIVE SECTORS WITH SPECIAL ATTENTION TO THE AUTOMOTIVE INDUSTRY." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-74890.
Full textAljandal, Waleed A. "Itemset size-sensitive interestingness measures for association rule mining and link prediction." Diss., Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/1119.
Full textZhao, Mingjun. "Essays on model uncertainty in macroeconomics." Columbus, Ohio : Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1153244452.
Full textOliveira, Paulo Henrique Maestrello Assad. "Detecção de fraudes em cartões: um classificador baseado em regras de associação e regressão logística." Universidade de São Paulo, 2015. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-01022016-204144/.
Full textPinsolle, Julie. "L'éducation familiale transformée, approche anthropo-didactique de l'autorité à la préadolescence : Appréhension des pratiques dans la région bordelaise." Thesis, Bordeaux, 2015. http://www.theses.fr/2015BORD0388.
Full textYang, Jei-Hung, and 楊介宏. "Hiding Sensitive Rules Based on Transaction Grouping." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/58538882177123969090.
Full textKao, Tai-wei, and 高黛威. "Hiding dynamic sensitive association rules in incremental data." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/29229249691498416855.
Full textBooks on the topic "SENSITIVE RULES"
Kutz, Gregory D. Sales of sensitive military property to the public. United States Government Accountability Office, 2007.
Find full textUnited States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, ed. Contractor integrity: Stronger safeguards needed for contractor access to sensitive information : report to the Chairman, Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Governmental Affairs, U.S. Senate. U.S. Govt. Accountability Office, 2010.
Find full textOffice, General Accounting. Environmental information: EPA could better address concerns about disseminating sensitive business information : report to the Chairman and Ranking Minority Member, Subcommittee on VA, HUD, and Independent Agencies, Committee on Appropriations, U.S. Senate. The Office, 1999.
Find full textOffice, General Accounting. Defense inventory: Inadequate compliance with controls for excess firearms and other sensitive items : report to the Chairman, Committee on Armed Services, House of Representatives. The Office, 1999.
Find full textOffice, General Accounting. Defense inventory: Controls over C-4 explosive and other sensitive munitions : briefing report to the Chairman, Legislation and National Security Subcommittee, Committee on Government Operations, House of Representatives. The Office, 1990.
Find full textvan der Sloot, Bart, and Sascha van Schendel. The Boundaries of Data. Amsterdam University Press, 2024. http://dx.doi.org/10.5117/9789463729192.
Full textTimofeeva, Liliya, Elena Korneicheva, and Natal'ya Gracheva. Organization of educational activities in the OED. Approximate planning. The second youngest group (3-4 years). INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1072118.
Full textTimofeeva, Liliya, Elena Korneicheva, and Natal'ya Gracheva. Organization of educational activities in the OED. Approximate planning. Preparation for school group (6-7 years). INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1072122.
Full textOffice, General Accounting. Defense inventory: Controls over C-4 explosive and other sensitive munitions : briefing report to the Chairman, Legislation and National Security Subcommittee, Committee on Government Operations, House of Representatives. The Office, 1990.
Find full textKosiara-Pedersen, Karina, Susan E. Scarrow, and Emilie van Haute. Rules of Engagement? Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198758631.003.0010.
Full textBook chapters on the topic "SENSITIVE RULES"
Hezart, Armin, Abhaya Nayak, and Mehmet Orgun. "Towards Context Sensitive Defeasible Rules." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88833-8_11.
Full textJain, Dhyanendra, Pallavi Khatri, Rishi Soni, and Brijesh Kumar Chaurasia. "Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s)." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27299-8_52.
Full textLesaint, David, Deepak Mehta, Barry O’Sullivan, Luis Quesada, and Nic Wilson. "Context-Sensitive Call Control Using Constraints and Rules." In Principles and Practice of Constraint Programming – CP 2010. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15396-9_46.
Full textDíaz, Irene, Luis J. Rodríguez-Mũniz, and Luigi Troiano. "On Mining Sensitive Rules to Identify Privacy Threats." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40846-5_24.
Full textPatin, Cédric, and Annie Rialland. "On the Nature of Rules Sensitive to Syntax." In Prosody and Syntax. John Benjamins Publishing Company, 2006. http://dx.doi.org/10.1075/ubli.3.16pat.
Full textShepherd, Dean A., Holger Patzelt, and Nicola Breugst. "Simples Rules for Developing the Social Aspects of Your Venture." In 66 Simple Rules for Entrepreneurs. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62032-4_11.
Full textModi, Chirag, U. P. Rao, and Dhiren R. Patel. "A Survey on Preserving Privacy for Sensitive Association Rules in Databases." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12214-9_96.
Full textDomadiya, Nikunj H., and Udai Pratap Rao. "A Hybrid Technique for Hiding Sensitive Association Rules and Maintaining Database Quality." In Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 2. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30927-9_35.
Full textde Souza Amorim, Luís Eduardo, and Eelco Visser. "Multi-purpose Syntax Definition with SDF3." In Software Engineering and Formal Methods. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58768-0_1.
Full textFan, Weijie, Hongjin Liang, Xinyu Feng, and Hanru Jiang. "A Program Logic for Concurrent Randomized Programs in the Oblivious Adversary Model." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-91118-7_13.
Full textConference papers on the topic "SENSITIVE RULES"
Wang, Dingmin, Przemysław Andrzej Wałęga, and Bernardo Cuenca Grau. "MTLearn: Extracting Temporal Rules Using Datalog Rule Learners." In 21st International Conference on Principles of Knowledge Representation and Reasoning {KR-2023}. International Joint Conferences on Artificial Intelligence Organization, 2024. http://dx.doi.org/10.24963/kr.2024/90.
Full textTian, Meng, Shihai Wang, Wentao Wu, and Wandong Xie. "A Novel Approach for Software Defect Prediction Through Relational Association Rules Based on Cost-Sensitive Learning." In 2024 IEEE 24th International Conference on Software Quality, Reliability, and Security Companion (QRS-C). IEEE, 2024. http://dx.doi.org/10.1109/qrs-c63300.2024.00117.
Full textLin, Pengfei, Ehsan Javanmardi, Yuze Jiang, and Manabu Tsukada. "A Rule-Compliance Path Planner for Lane-Merge Scenarios Based on Responsibility-Sensitive Safety." In 2024 18th International Conference on Control, Automation, Robotics and Vision (ICARCV). IEEE, 2024. https://doi.org/10.1109/icarcv63323.2024.10821557.
Full textWang, Shyue-Liang, Tzung-Pei Hong, Yu-Chuan Tsai, and Hung-Yu Kao. "Hiding Sensitive Association Rules on Stars." In 2010 IEEE International Conference on Granular Computing (GrC-2010). IEEE, 2010. http://dx.doi.org/10.1109/grc.2010.123.
Full textBakshi, Arjun, and Raj Bhatnagar. "Learning Cost-Sensitive Rules for Non-forced Classification." In 2012 IEEE 12th International Conference on Data Mining Workshops. IEEE, 2012. http://dx.doi.org/10.1109/icdmw.2012.62.
Full textWang, S. L., and A. Jafari. "Using unknowns for hiding sensitive predictive association rules." In Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration. IEEE, 2005. http://dx.doi.org/10.1109/iri-05.2005.1506477.
Full textNavale, Geeta S., and Suresh N. Mali. "A Survey on Sensitive Association Rules Hiding Methods." In 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA). IEEE, 2017. http://dx.doi.org/10.1109/iccubea.2017.8464012.
Full textWeng, Chih-Chia, Shan-Tai Chen, and Hung-Che Lo. "A Novel Algorithm for Completely Hiding Sensitive Association Rules." In 2008 Eighth International Conference on Intelligent Systems Design and Applications (ISDA). IEEE, 2008. http://dx.doi.org/10.1109/isda.2008.180.
Full textChoi, K. S., and J. Pan. "An Anisotropic Hardening Rule With Non-Associated Flow Rule for Pressure-Sensitive Materials." In ASME 2009 Pressure Vessels and Piping Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/pvp2009-77951.
Full textLi, Xueming, Zhijun Liu, and Chuan Zuo. "Hiding association rules based on relative-non-sensitive frequent itemsets." In 2009 8th IEEE International Conference on Cognitive Informatics (ICCI). IEEE, 2009. http://dx.doi.org/10.1109/coginf.2009.5250708.
Full textReports on the topic "SENSITIVE RULES"
Hudson-Vitale, Cynthia, and Katherine Klosek. Issue Brief: New US Federal Compliance Rules for Sensitive Information. Association of Research Libraries, 2021. http://dx.doi.org/10.29242/brief.sensitiveinfo2021.
Full textUlloa-Suarez, Carolina, and Oscar Valencia. Sustaining Compliance with Fiscal Rules: A Future at Risk? Inter-American Development Bank, 2024. https://doi.org/10.18235/0013256.
Full textDvorianyn, Paraskoviya. Сенситивне інтерв’ю: переживання колективної травми війни. Ivan Franko National University of Lviv, 2023. http://dx.doi.org/10.30970/vjo.2023.52-53.11727.
Full textRaju, Nivedita, and Laura Bruun. Integrating Gender Perspectives into International Humanitarian Law. Stockholm International Peace Research Institute, 2023. http://dx.doi.org/10.55163/qilu7567.
Full textNang, Phirun, and Chhuong Ouch. Gender and Water Governance: Women’s Role in Irrigation Management and Development in the Context of Climate Change. Cambodia Development Resource Institute, 2014. https://doi.org/10.64202/wp.89.201401.
Full textKhadan, Jeetendra. An Econometric Analysis of Energy Revenue and Government Expenditure Shocks on Economic Growth in Trinidad and Tobago. Inter-American Development Bank, 2016. http://dx.doi.org/10.18235/0011776.
Full textOwusu, Samuel Ening, and Bahman Peyravi. The Impact of Trade Policies on International Marketing Strategies. Vilnius Business College, 2024. http://dx.doi.org/10.57005/ab.2024.1.3.
Full textParkins, R. N. NR198706 Environmental Aspects of the Stress-Corrosion Cracking of Pipeline Steels. Pipeline Research Council International, Inc. (PRCI), 1987. http://dx.doi.org/10.55274/r0011886.
Full textAppleyard, Bruce, Anurag Pande, Joseph Gibbons, et al. Right Turn on Red: Energy-Saving Measure or Unsafe Maneuver? Mineta Transportation Institute, 2024. https://doi.org/10.31979/mti.2024.2347.
Full textHertel, Thomas, David Hummels, Maros Ivanic, and Roman Keeney. How Confident Can We Be in CGE-Based Assessments of Free Trade Agreements? GTAP Working Paper, 2003. http://dx.doi.org/10.21642/gtap.wp26.
Full text