Gotowa bibliografia na temat „SENSITIVE RULES”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „SENSITIVE RULES”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "SENSITIVE RULES"

1

Wang, Hui. "Hiding Sensitive Association Rules by Sanitizing." Advanced Materials Research 694-697 (May 2013): 2317–21. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2317.

Pełny tekst źródła
Streszczenie:
The goal of knowledge discovery is to extract hidden or useful unknown knowledge from databases, while the objective of knowledge hiding is to prevent certain confidential data or knowledge from being extracted through data mining techniques. Hiding sensitive association rules is focused. The side-effects of the existing data mining technology are investigated. The problem of sensitive association rule hiding is described formally. The representative sanitizing strategies for sensitive association rule hiding are discussed.
Style APA, Harvard, Vancouver, ISO itp.
2

Bansal, Meenakshi, Dinesh Grover, and Dhiraj Sharma. "Sensitivity Association Rule Mining using Weight based Fuzzy Logic." Global Journal of Enterprise Information System 9, no. 2 (2017): 1. http://dx.doi.org/10.18311/gjeis/2017/15480.

Pełny tekst źródła
Streszczenie:
Mining of sensitive rules is the most important task in data mining. Most of the existing techniques worked on finding sensitive rules based upon the crisp thresh hold value of support and confidence which cause serious side effects to the original database. To avoid these crisp boundaries this paper aims to use WFPPM (Weighted Fuzzy Privacy Preserving Mining) to extract sensitive association rules. WFPPM completely find the sensitive rules by calculating the weights of the rules. At first, we apply FP-Growth to mine association rules from the database. Next, we implement fuzzy to find the sen
Style APA, Harvard, Vancouver, ISO itp.
3

Suma, B., and G. Shobha. "Association rule hiding using integer linear programming." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 4 (2021): 3451–58. https://doi.org/10.11591/ijece.v11i4.pp3451-3458.

Pełny tekst źródła
Streszczenie:
Privacy preserving data mining has become the focus of attention of government statistical agencies and database security research community who are concerned with preventing privacy disclosure during data mining. Repositories of large datasets include sensitive rules that need to be concealed from unauthorized access. Hence, association rule hiding emerged as one of the powerful techniques for hiding sensitive knowledge that exists in data before it is published. In this paper, we present a constraint-based optimization approach for hiding a set of sensitive association rules, using a well-st
Style APA, Harvard, Vancouver, ISO itp.
4

Nguyen, Khac-Chien. "Mining Association Rules on Time-sensitive Data." ICT Research 2024, no. 2 (2024): 130–40. http://dx.doi.org/10.32913/mic-ict-research.v2024.n2.1256.

Pełny tekst źródła
Streszczenie:
Real-world data is continuously produced andcollected quickly; hence, mining association rules are used tofind relationships between item sets. One of these combinedrule mining techniques is Rare Association Rule Mining(RARM), a method that extracts rare, combined rules with lowsupport but high confidence from the database. Additionally,a large amount of time-sensitive data is created in many fields,and combining valid and outdated data leads to low efficiencyin extracting combined rules. This paper explores a miningmethod that increases rare, combined rules on time-sensitivedata to extract co
Style APA, Harvard, Vancouver, ISO itp.
5

Wang, Hui. "Hiding Sensitive Association Rules by Adjusting Support." Advanced Materials Research 756-759 (September 2013): 1875–78. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1875.

Pełny tekst źródła
Streszczenie:
Data mining technologies are successfully applied in lots of domains such as business, science research, health care, bioinformatics, financial forecasting and so on and so forth. Knowledge can be discovered by data mining and can help people to make better decisions and benefits. Association rule is one kind of the most popular knowledge discovered by data mining. While at the same time, some association rules extracted from data mining can be considered so sensitive for data holders that they will not like to share and really want to hide. Such kind of side effects of data mining is analyzed
Style APA, Harvard, Vancouver, ISO itp.
6

Rao, K. Srinivasa, CH Suresh Babu, A. Damodaram, and Tai-hoon Kim. "Distortion Technique for Hiding Sensitive Association Rules." International Journal of Multimedia and Ubiquitous Engineering 9, no. 10 (2014): 57–66. http://dx.doi.org/10.14257/ijmue.2014.9.10.06.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Whittle, P. "Entropy-minimising and risk-sensitive control rules." Systems & Control Letters 13, no. 1 (1989): 1–7. http://dx.doi.org/10.1016/0167-6911(89)90014-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Diwan, Abhishek, and Alpana Singh. "An Efficient Technique for Protecting Sensitive Information." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 03 (2013): 79–82. https://doi.org/10.5281/zenodo.14594519.

Pełny tekst źródła
Streszczenie:
Data mining services require accurate input data for their results to be meaningful, but privacy concerns may influence users to provide spurious information. To preserve client privacy in the data mining process, a variety of techniques based on random perturbation of data records have been proposed recently. One known fact which is very important in data mining is discovering the association rules from database of transactions where each transaction consists of set of items. Two important terms support and confidence are associated with each of the association rule. Actually any rule is call
Style APA, Harvard, Vancouver, ISO itp.
9

Alayiaboozar, Elham. "Studying the possibility of improving the function of a POS tagger system." Comparative Linguistic Research 10, no. 19 (2020): 95–110. https://doi.org/10.22084/RJHLL.2019.16614.1834.

Pełny tekst źródła
Streszczenie:
The aim of the present study is to check the possibility of improving the function of a POS tagger system via POS tag disambiguation of some of Persian noun and adjective homographs ending in <-ی>. The case study in present research is HAZM.The POS tag disambiguation program is based on some context-sensitive rules. the mentioned rules were extracted from Bijan Khan corpus, Hazm was trained by Bijan Khan corpus. General evaluation of the mentioned POS disambiguation program indicates that if some of the context-sensitive rules which play a role in better POS tagging are added to HAZM, th
Style APA, Harvard, Vancouver, ISO itp.
10

Hameed, S., F. Shahzad, and S. Asghar. "SANITIZING SENSITIVE ASSOCIATION RULES USING FUZZY CORRELATION SCHEME." Nucleus 50, no. 4 (2013): 359–67. https://doi.org/10.71330/thenucleus.2013.739.

Pełny tekst źródła
Streszczenie:
Data mining is used to extract useful information hidden in the data. Sometimes this extraction of information leads to revealing sensitive information. Privacy preservation in Data Mining is a process of sanitizing sensitive information. This research focuses on sanitizing sensitive rules discovered in quantitative data. The proposed scheme, Privacy Preserving in Fuzzy Association Rules (PPFAR) is based on fuzzy correlation analysis. In this work, fuzzy set concept is integrated with fuzzy correlation analysis and Apriori algorithm to mark interesting fuzzy association rules. The identified r
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "SENSITIVE RULES"

1

Bakshi, Arjun. "Methodology For Generating High-Confidence Cost-Sensitive Rules For Classification." University of Cincinnati / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1377868085.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Dimitrova, Katica. "Order-sensitive view maintenance of materialized XQuery views." Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0505103-151827.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Murphy, Brian R. "Order-sensitive XML query processing over relational sources." Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0505103-123753.

Pełny tekst źródła
Streszczenie:
Thesis (M.S.)--Worcester Polytechnic Institute.<br>Keywords: computation pushdown; XML; order-based Xquery processing; relational database; ordered SQL queries; data model mapping; XQuery; XML data mapping; SQL; XML algebra rewrite rules; XML document order. Includes bibliographical references (p. 64-67).
Style APA, Harvard, Vancouver, ISO itp.
4

Baladová, Šárka. "THE IMPACT ANALYSIS OF THE EU-KOREA FTA ON THE CZECH SENSITIVE SECTORS WITH SPECIAL ATTENTION TO THE AUTOMOTIVE INDUSTRY." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-74890.

Pełny tekst źródła
Streszczenie:
Strong objections appeared in the Czech Republic, especially in the automotive industry, against the EU-Korea Free Tra de Agreement right after its adoption in October 2009. There were fears that the Agreement would endanger Czech competitiveness in the European market while new opportunity for Czech exporters in the Korean market would be limited. The thesis aims to analyze the impacts of the Agreement on the Czech sensitive sectors as the author does not agree with the results of the very first Czech country specific analysis made by the Association for International Affairs (AMO) that negle
Style APA, Harvard, Vancouver, ISO itp.
5

Aljandal, Waleed A. "Itemset size-sensitive interestingness measures for association rule mining and link prediction." Diss., Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/1119.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Zhao, Mingjun. "Essays on model uncertainty in macroeconomics." Columbus, Ohio : Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1153244452.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Oliveira, Paulo Henrique Maestrello Assad. "Detecção de fraudes em cartões: um classificador baseado em regras de associação e regressão logística." Universidade de São Paulo, 2015. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-01022016-204144/.

Pełny tekst źródła
Streszczenie:
Os cartões, sejam de crédito ou débito, são meios de pagamento altamente utilizados. Esse fato desperta o interesse de fraudadores. O mercado de cartões enxerga as fraudes como custos operacionais, que são repassados para os consumidores e para a sociedade em geral. Ainda, o alto volume de transações e a necessidade de combater as fraudes abrem espaço para a aplicação de técnicas de Aprendizagem de Máquina; entre elas, os classificadores. Um tipo de classificador largamente utilizado nesse domínio é o classificador baseado em regras. Entretanto, um ponto de atenção dessa categoria de classific
Style APA, Harvard, Vancouver, ISO itp.
8

Pinsolle, Julie. "L'éducation familiale transformée, approche anthropo-didactique de l'autorité à la préadolescence : Appréhension des pratiques dans la région bordelaise." Thesis, Bordeaux, 2015. http://www.theses.fr/2015BORD0388.

Pełny tekst źródła
Streszczenie:
Ce travail se propose d’aborder la question de l’éducation familiale, à l’heure où laconstitution d’un statut d’exception de l’enfant modifie les relations éducative et d’autoritéet rend plus incertains le jeu complexe entre individuel et collectif ainsi que la transmissiondes savoirs. Comment s'organisent les parents face cette question délicate de l'autorité,tiraillés entre les idéaux démocratiques et la composante contraignante irréductible de l'acteéducatif ? Quelle forme prend l’organisation familiale ? Vécu familial et façon de se mettreen règle à l'école sont-ils liés ?L’enjeu de ce tra
Style APA, Harvard, Vancouver, ISO itp.
9

Yang, Jei-Hung, and 楊介宏. "Hiding Sensitive Rules Based on Transaction Grouping." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/58538882177123969090.

Pełny tekst źródła
Streszczenie:
碩士<br>中原大學<br>資訊工程研究所<br>98<br>As the prevalent development of network technology, information sharing and communication is frequent in daily life. Although data mining techniques help people find the important rules among data, people also have to take the risk of sensitive information disclosed. In addition to hiding sensitive rules, recent researches also start discussing the reduction or avoidance of unexpected side effects, including the hiding of non-sensitive rules (lost rules) and the creation of non-existent rules (false rules). This thesis aims at a small amount of transaction modifi
Style APA, Harvard, Vancouver, ISO itp.
10

Kao, Tai-wei, and 高黛威. "Hiding dynamic sensitive association rules in incremental data." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/29229249691498416855.

Pełny tekst źródła
Streszczenie:
碩士<br>國立臺灣科技大學<br>資訊工程系<br>101<br>As the advancement of technologies as well as the intense competition of business, the issues of privacy have acquiring more attention. Mining association rule is the significant technique in data mining. However, it may cause some privacy problem in mining processes. Many researches, thus, start to hide sensitive association rules due to avoid the sensitive information exposed. However, the development of computers and Internet technologies is so fast that data are increasing successively. In addition, sensitive association rules will change with time and pol
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Książki na temat "SENSITIVE RULES"

1

Kutz, Gregory D. Sales of sensitive military property to the public. United States Government Accountability Office, 2007.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, ed. Contractor integrity: Stronger safeguards needed for contractor access to sensitive information : report to the Chairman, Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Governmental Affairs, U.S. Senate. U.S. Govt. Accountability Office, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Office, General Accounting. Environmental information: EPA could better address concerns about disseminating sensitive business information : report to the Chairman and Ranking Minority Member, Subcommittee on VA, HUD, and Independent Agencies, Committee on Appropriations, U.S. Senate. The Office, 1999.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Office, General Accounting. Defense inventory: Inadequate compliance with controls for excess firearms and other sensitive items : report to the Chairman, Committee on Armed Services, House of Representatives. The Office, 1999.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Office, General Accounting. Defense inventory: Controls over C-4 explosive and other sensitive munitions : briefing report to the Chairman, Legislation and National Security Subcommittee, Committee on Government Operations, House of Representatives. The Office, 1990.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

van der Sloot, Bart, and Sascha van Schendel. The Boundaries of Data. Amsterdam University Press, 2024. http://dx.doi.org/10.5117/9789463729192.

Pełny tekst źródła
Streszczenie:
The legal domain distinguishes between different types of data and attaches a different level of protection to each of them. Thus, non-personal data are left largely unregulated, while privacy and data protection rules apply to personal data or personal information. There are stricter rules for processing sensitive personal data than for ‘ordinary’ personal data, and metadata or communications data are regulated differently than content communications data. Technological developments challenge these legal categorisations on at least three fronts: First, the lines between the categories are bec
Style APA, Harvard, Vancouver, ISO itp.
7

Timofeeva, Liliya, Elena Korneicheva, and Natal'ya Gracheva. Organization of educational activities in the OED. Approximate planning. The second youngest group (3-4 years). INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1072118.

Pełny tekst źródła
Streszczenie:
Submitted effective forms of organization of various types of children's activities during the actual educational activities; educational activities carried out in sensitive moments; interaction with the families of the pupils for the implementation of the basic educational program of preschool education.&#x0D; Planning tailored specifically to the laws of development of children of the fourth year of life, the need to address the program objectives, maintain partner relationships with preschoolers and their families, on the basis of modern ideas about the fluctuations in the health of younger
Style APA, Harvard, Vancouver, ISO itp.
8

Timofeeva, Liliya, Elena Korneicheva, and Natal'ya Gracheva. Organization of educational activities in the OED. Approximate planning. Preparation for school group (6-7 years). INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1072122.

Pełny tekst źródła
Streszczenie:
Submitted effective forms of organization of various types of children's activities during the actual educational activities; educational activities carried out in sensitive moments; interaction with the families of the pupils for the implementation of the basic educational program of preschool education.&#x0D; Planning tailored specifically to the laws of development of children the seventh year of life, the need to address the program objectives, maintain partner relationships with preschoolers and their families, on the basis of modern ideas about the fluctuations in the health of senior pr
Style APA, Harvard, Vancouver, ISO itp.
9

Office, General Accounting. Defense inventory: Controls over C-4 explosive and other sensitive munitions : briefing report to the Chairman, Legislation and National Security Subcommittee, Committee on Government Operations, House of Representatives. The Office, 1990.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Kosiara-Pedersen, Karina, Susan E. Scarrow, and Emilie van Haute. Rules of Engagement? Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198758631.003.0010.

Pełny tekst źródła
Streszczenie:
This chapter investigates whether variations in party affiliation rules have political consequences, looking in particular at their effects on partisan participation. The research presented here combines data from the Political Party Database (PPDB) with surveys of party members and party supporters, looking for evidence of whether potential affiliates’ behaviour is sensitive to the relative costs of party membership. The data suggest that such sensitivity exists, with supporters being more likely to join parties which offer more benefits, and which offer membership at a lower price. They are
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Części książek na temat "SENSITIVE RULES"

1

Hezart, Armin, Abhaya Nayak, and Mehmet Orgun. "Towards Context Sensitive Defeasible Rules." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88833-8_11.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Jain, Dhyanendra, Pallavi Khatri, Rishi Soni, and Brijesh Kumar Chaurasia. "Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s)." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27299-8_52.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Lesaint, David, Deepak Mehta, Barry O’Sullivan, Luis Quesada, and Nic Wilson. "Context-Sensitive Call Control Using Constraints and Rules." In Principles and Practice of Constraint Programming – CP 2010. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15396-9_46.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Díaz, Irene, Luis J. Rodríguez-Mũniz, and Luigi Troiano. "On Mining Sensitive Rules to Identify Privacy Threats." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40846-5_24.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Patin, Cédric, and Annie Rialland. "On the Nature of Rules Sensitive to Syntax." In Prosody and Syntax. John Benjamins Publishing Company, 2006. http://dx.doi.org/10.1075/ubli.3.16pat.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Shepherd, Dean A., Holger Patzelt, and Nicola Breugst. "Simples Rules for Developing the Social Aspects of Your Venture." In 66 Simple Rules for Entrepreneurs. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62032-4_11.

Pełny tekst źródła
Streszczenie:
Abstract This chapter offers simple rules for developing the social aspects of your venture. These simple rules are: do amazing things with your venture to help those suffering; align your motivation with the type of venture you want to build; be sensitive to the needs of your venture members; and don’t burn out in pursuing your venture’s social mission.
Style APA, Harvard, Vancouver, ISO itp.
7

Modi, Chirag, U. P. Rao, and Dhiren R. Patel. "A Survey on Preserving Privacy for Sensitive Association Rules in Databases." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12214-9_96.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Domadiya, Nikunj H., and Udai Pratap Rao. "A Hybrid Technique for Hiding Sensitive Association Rules and Maintaining Database Quality." In Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 2. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30927-9_35.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

de Souza Amorim, Luís Eduardo, and Eelco Visser. "Multi-purpose Syntax Definition with SDF3." In Software Engineering and Formal Methods. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58768-0_1.

Pełny tekst źródła
Streszczenie:
Abstract SDF3 is a syntax definition formalism that extends plain context-free grammars with features such as constructor declarations, declarative disambiguation rules, character-level grammars, permissive syntax, layout constraints, formatting templates, placeholder syntax, and modular composition. These features support the multi-purpose interpretation of syntax definitions, including derivation of type schemas for abstract syntax tree representations, scannerless generalized parsing of the full class of context-free grammars, error recovery, layout-sensitive parsing, parenthesization and f
Style APA, Harvard, Vancouver, ISO itp.
10

Fan, Weijie, Hongjin Liang, Xinyu Feng, and Hanru Jiang. "A Program Logic for Concurrent Randomized Programs in the Oblivious Adversary Model." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-91118-7_13.

Pełny tekst źródła
Streszczenie:
Abstract Concurrent randomized programs in the oblivious adversary model are extremely difficult for modular verification because the interaction between threads is very sensitive to the program structure and the execution steps. We propose a new program logic supporting thread-local verification. With a novel “split” mechanism, one can split the state distribution into smaller partitions, and the reasoning can be done based on each partition independently, which allows us to avoid considering different execution paths of branch statements simultaneously. The logic rules are compositional and
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "SENSITIVE RULES"

1

Wang, Dingmin, Przemysław Andrzej Wałęga, and Bernardo Cuenca Grau. "MTLearn: Extracting Temporal Rules Using Datalog Rule Learners." In 21st International Conference on Principles of Knowledge Representation and Reasoning {KR-2023}. International Joint Conferences on Artificial Intelligence Organization, 2024. http://dx.doi.org/10.24963/kr.2024/90.

Pełny tekst źródła
Streszczenie:
We propose a framework for temporal rule learning from datasets, which capitalises on the availability of increasingly mature Datalog rule learners. Our approach is based on the idea of splitting a temporal dataset into windows, extracting static rules from each window with an off-the-shelf Datalog rule learner, and then combining the obtained static rules into temporal rules corresponding to the whole dataset. Temporal rules generated by our approach are expressed in DatalogMTL and are assigned time-sensitive confidence scores. We have implemented our approach in a system MTLearn compatible w
Style APA, Harvard, Vancouver, ISO itp.
2

Tian, Meng, Shihai Wang, Wentao Wu, and Wandong Xie. "A Novel Approach for Software Defect Prediction Through Relational Association Rules Based on Cost-Sensitive Learning." In 2024 IEEE 24th International Conference on Software Quality, Reliability, and Security Companion (QRS-C). IEEE, 2024. http://dx.doi.org/10.1109/qrs-c63300.2024.00117.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Lin, Pengfei, Ehsan Javanmardi, Yuze Jiang, and Manabu Tsukada. "A Rule-Compliance Path Planner for Lane-Merge Scenarios Based on Responsibility-Sensitive Safety." In 2024 18th International Conference on Control, Automation, Robotics and Vision (ICARCV). IEEE, 2024. https://doi.org/10.1109/icarcv63323.2024.10821557.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Wang, Shyue-Liang, Tzung-Pei Hong, Yu-Chuan Tsai, and Hung-Yu Kao. "Hiding Sensitive Association Rules on Stars." In 2010 IEEE International Conference on Granular Computing (GrC-2010). IEEE, 2010. http://dx.doi.org/10.1109/grc.2010.123.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Bakshi, Arjun, and Raj Bhatnagar. "Learning Cost-Sensitive Rules for Non-forced Classification." In 2012 IEEE 12th International Conference on Data Mining Workshops. IEEE, 2012. http://dx.doi.org/10.1109/icdmw.2012.62.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Wang, S. L., and A. Jafari. "Using unknowns for hiding sensitive predictive association rules." In Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration. IEEE, 2005. http://dx.doi.org/10.1109/iri-05.2005.1506477.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Navale, Geeta S., and Suresh N. Mali. "A Survey on Sensitive Association Rules Hiding Methods." In 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA). IEEE, 2017. http://dx.doi.org/10.1109/iccubea.2017.8464012.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Weng, Chih-Chia, Shan-Tai Chen, and Hung-Che Lo. "A Novel Algorithm for Completely Hiding Sensitive Association Rules." In 2008 Eighth International Conference on Intelligent Systems Design and Applications (ISDA). IEEE, 2008. http://dx.doi.org/10.1109/isda.2008.180.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Choi, K. S., and J. Pan. "An Anisotropic Hardening Rule With Non-Associated Flow Rule for Pressure-Sensitive Materials." In ASME 2009 Pressure Vessels and Piping Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/pvp2009-77951.

Pełny tekst źródła
Streszczenie:
In this paper, cyclic plastic behaviors of pressure-sensitive materials based on an anisotropic hardening rule with two non-associated flow rules are examined. The Drucker-Prager pressure-sensitive yield function and the Mises plastic potential function are adopted to explore the cyclic plastic behaviors of pressure-sensitive materials or strength-differential materials. The constitutive relations are formulated for the initial loading and unloading/reloading processes based on the anisotropic hardening rule of Choi and Pan [1]. Non-associated flow rules are employed to derive closed-form stre
Style APA, Harvard, Vancouver, ISO itp.
10

Li, Xueming, Zhijun Liu, and Chuan Zuo. "Hiding association rules based on relative-non-sensitive frequent itemsets." In 2009 8th IEEE International Conference on Cognitive Informatics (ICCI). IEEE, 2009. http://dx.doi.org/10.1109/coginf.2009.5250708.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "SENSITIVE RULES"

1

Hudson-Vitale, Cynthia, and Katherine Klosek. Issue Brief: New US Federal Compliance Rules for Sensitive Information. Association of Research Libraries, 2021. http://dx.doi.org/10.29242/brief.sensitiveinfo2021.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Ulloa-Suarez, Carolina, and Oscar Valencia. Sustaining Compliance with Fiscal Rules: A Future at Risk? Inter-American Development Bank, 2024. https://doi.org/10.18235/0013256.

Pełny tekst źródła
Streszczenie:
Fiscal rules in Latin American and Caribbean (LAC) countries rarely have fixed objectives, exhibiting significant heterogeneity in design and implementation. This document analyzes how different factors influence the ease or difficulty of compliance with these rules and introduces an update of the Compliance dataset, highlighting new trends. The updated dataset shows that fiscal rule compliance in the region is sensitive to economic conditions, with a notable peak in 2022 due to favorable circumstances. However, the seemingly high compliance in 2022 was largely driven by favorable conditions,
Style APA, Harvard, Vancouver, ISO itp.
3

Dvorianyn, Paraskoviya. Сенситивне інтерв’ю: переживання колективної травми війни. Ivan Franko National University of Lviv, 2023. http://dx.doi.org/10.30970/vjo.2023.52-53.11727.

Pełny tekst źródła
Streszczenie:
The article analyzes the process of preparation and features of conducting interviews with persons who have fased traumatic experiences in war conditions. A comparative analysis of the typical interview and sensitive interview is presented, which allows journalists to comply with all requirements that would not harm interviewees and preserve the balance in the journalist-guest-audience triad. The essence of the new terminology that began to be used in Ukraine during the full-scale war – «journalism of trauma» and «collective trauma» – is revealed. Emphasis is put on society’s ability to experi
Style APA, Harvard, Vancouver, ISO itp.
4

Raju, Nivedita, and Laura Bruun. Integrating Gender Perspectives into International Humanitarian Law. Stockholm International Peace Research Institute, 2023. http://dx.doi.org/10.55163/qilu7567.

Pełny tekst źródła
Streszczenie:
International humanitarian law (IHL) aims to limit the impacts of armed conflict through rules and protections. However, while IHL seemingly accords protection to ‘all persons’, it may fail to do so, especially on the basis of gender. In turn, failure to include gender perspectives in IHL can result in inaccurate assessments of civilian harm. This paper explores the missing gender perspectives in IHL and proposes that they be integrated with intersectional considerations. The paper first examines inherent gender bias in the wording of certain IHL rules, highlighting several issues including ge
Style APA, Harvard, Vancouver, ISO itp.
5

Nang, Phirun, and Chhuong Ouch. Gender and Water Governance: Women’s Role in Irrigation Management and Development in the Context of Climate Change. Cambodia Development Resource Institute, 2014. https://doi.org/10.64202/wp.89.201401.

Pełny tekst źródła
Streszczenie:
This study explores the role of women in irrigation management and agricultural development in Cambodia, particularly in the context of climate change. Drawing on fieldwork in three provinces—Kompong Thom, Pursat, and Kompong Chhnang—the research examines gender roles, constraints, and adaptive capacities within Farmer Water User Communities (FWUCs). Despite increasing participation, women remain underrepresented in decision-making positions due to socio-cultural norms, limited capacity, and household responsibilities. Climate change impacts such as floods, droughts, and pest infestations disp
Style APA, Harvard, Vancouver, ISO itp.
6

Khadan, Jeetendra. An Econometric Analysis of Energy Revenue and Government Expenditure Shocks on Economic Growth in Trinidad and Tobago. Inter-American Development Bank, 2016. http://dx.doi.org/10.18235/0011776.

Pełny tekst źródła
Streszczenie:
Energy revenues represent roughly 45 percent of Trinidad and Tobago's GDP and are highly volatile since they are correlated with the price of oil and gas. Hence, sharp changes in energy prices, whether temporary or sustained, can have important consequences for economic growth and overall macroeconomic performance. After the 2014 crash in oil prices, a key challenge that emerged for policymakers in hydrocarbon-exporting countries is how to manage fiscal retrenchment in an environment of subdued growth. Using structural vector autoregression, this article examines three questions related to thi
Style APA, Harvard, Vancouver, ISO itp.
7

Owusu, Samuel Ening, and Bahman Peyravi. The Impact of Trade Policies on International Marketing Strategies. Vilnius Business College, 2024. http://dx.doi.org/10.57005/ab.2024.1.3.

Pełny tekst źródła
Streszczenie:
This study explores the dynamic interplay between trade rules and worldwide marketing tactics, with the goal of elucidating the varied influence of global economic regulations on multinational firms. The research takes a mixed-methods approach, focusing on various industries and geographical locations and includes qualitative studies of trade regulations as well as quantitative assessments of their consequences for marketing tactics. The extensive literature analysis establishes a theoretical framework by investigating how tariff reductions, non-tariff obstacles, and free trade agreements affe
Style APA, Harvard, Vancouver, ISO itp.
8

Parkins, R. N. NR198706 Environmental Aspects of the Stress-Corrosion Cracking of Pipeline Steels. Pipeline Research Council International, Inc. (PRCI), 1987. http://dx.doi.org/10.55274/r0011886.

Pełny tekst źródła
Streszczenie:
A brief review of the circumstances whereby carbonate-bicarbonate solutions are considered the most likely potent environment for the stress corrosion cracking of pipelines is given. The possibility that other environments may also promote environment-sensitive cracking of pipelines cannot be completely ruled out.
Style APA, Harvard, Vancouver, ISO itp.
9

Appleyard, Bruce, Anurag Pande, Joseph Gibbons, et al. Right Turn on Red: Energy-Saving Measure or Unsafe Maneuver? Mineta Transportation Institute, 2024. https://doi.org/10.31979/mti.2024.2347.

Pełny tekst źródła
Streszczenie:
There is a growing interest in prohibiting right turn on red (RTOR) policies in the name of pedestrian and bicycle safety but there is not enough research on the subject to help agencies make informed decisions. When Congress passed the Energy Policy and Conservation Act of 1975, they included a provision requiring states to permit right turns on red lights as an energy-saving measure to receive federal assistance for mandated conservation programs. Since 1980, all states have permitted right turns on red as a general rule. More research is needed to help guide state policies that can support
Style APA, Harvard, Vancouver, ISO itp.
10

Hertel, Thomas, David Hummels, Maros Ivanic, and Roman Keeney. How Confident Can We Be in CGE-Based Assessments of Free Trade Agreements? GTAP Working Paper, 2003. http://dx.doi.org/10.21642/gtap.wp26.

Pełny tekst źródła
Streszczenie:
With the proliferation of Free Trade Agreements (FTAs) over the past decade, demand for quantitative analysis of their likely impacts has surged. The main quantitative tool for performing such analysis is Computable General Equilibrium (CGE) modeling. Yet these models have been widely criticized for performing poorly (Kehoe, 2002) and having weak econometric foundations (McKitrick, 1998; Jorgenson, 1984). FTA results have been shown to be particularly sensitive to the trade elasticities, with small trade elasticities generating large terms of trade effects and relatively modest efficiency gain
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!