Gotowa bibliografia na temat „SENSITIVE RULES”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „SENSITIVE RULES”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "SENSITIVE RULES"
Wang, Hui. "Hiding Sensitive Association Rules by Sanitizing." Advanced Materials Research 694-697 (May 2013): 2317–21. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2317.
Pełny tekst źródłaBansal, Meenakshi, Dinesh Grover, and Dhiraj Sharma. "Sensitivity Association Rule Mining using Weight based Fuzzy Logic." Global Journal of Enterprise Information System 9, no. 2 (2017): 1. http://dx.doi.org/10.18311/gjeis/2017/15480.
Pełny tekst źródłaSuma, B., and G. Shobha. "Association rule hiding using integer linear programming." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 4 (2021): 3451–58. https://doi.org/10.11591/ijece.v11i4.pp3451-3458.
Pełny tekst źródłaNguyen, Khac-Chien. "Mining Association Rules on Time-sensitive Data." ICT Research 2024, no. 2 (2024): 130–40. http://dx.doi.org/10.32913/mic-ict-research.v2024.n2.1256.
Pełny tekst źródłaWang, Hui. "Hiding Sensitive Association Rules by Adjusting Support." Advanced Materials Research 756-759 (September 2013): 1875–78. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1875.
Pełny tekst źródłaRao, K. Srinivasa, CH Suresh Babu, A. Damodaram, and Tai-hoon Kim. "Distortion Technique for Hiding Sensitive Association Rules." International Journal of Multimedia and Ubiquitous Engineering 9, no. 10 (2014): 57–66. http://dx.doi.org/10.14257/ijmue.2014.9.10.06.
Pełny tekst źródłaWhittle, P. "Entropy-minimising and risk-sensitive control rules." Systems & Control Letters 13, no. 1 (1989): 1–7. http://dx.doi.org/10.1016/0167-6911(89)90014-5.
Pełny tekst źródłaDiwan, Abhishek, and Alpana Singh. "An Efficient Technique for Protecting Sensitive Information." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 03 (2013): 79–82. https://doi.org/10.5281/zenodo.14594519.
Pełny tekst źródłaAlayiaboozar, Elham. "Studying the possibility of improving the function of a POS tagger system." Comparative Linguistic Research 10, no. 19 (2020): 95–110. https://doi.org/10.22084/RJHLL.2019.16614.1834.
Pełny tekst źródłaHameed, S., F. Shahzad, and S. Asghar. "SANITIZING SENSITIVE ASSOCIATION RULES USING FUZZY CORRELATION SCHEME." Nucleus 50, no. 4 (2013): 359–67. https://doi.org/10.71330/thenucleus.2013.739.
Pełny tekst źródłaRozprawy doktorskie na temat "SENSITIVE RULES"
Bakshi, Arjun. "Methodology For Generating High-Confidence Cost-Sensitive Rules For Classification." University of Cincinnati / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1377868085.
Pełny tekst źródłaDimitrova, Katica. "Order-sensitive view maintenance of materialized XQuery views." Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0505103-151827.
Pełny tekst źródłaMurphy, Brian R. "Order-sensitive XML query processing over relational sources." Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0505103-123753.
Pełny tekst źródłaBaladová, Šárka. "THE IMPACT ANALYSIS OF THE EU-KOREA FTA ON THE CZECH SENSITIVE SECTORS WITH SPECIAL ATTENTION TO THE AUTOMOTIVE INDUSTRY." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-74890.
Pełny tekst źródłaAljandal, Waleed A. "Itemset size-sensitive interestingness measures for association rule mining and link prediction." Diss., Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/1119.
Pełny tekst źródłaZhao, Mingjun. "Essays on model uncertainty in macroeconomics." Columbus, Ohio : Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1153244452.
Pełny tekst źródłaOliveira, Paulo Henrique Maestrello Assad. "Detecção de fraudes em cartões: um classificador baseado em regras de associação e regressão logística." Universidade de São Paulo, 2015. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-01022016-204144/.
Pełny tekst źródłaPinsolle, Julie. "L'éducation familiale transformée, approche anthropo-didactique de l'autorité à la préadolescence : Appréhension des pratiques dans la région bordelaise." Thesis, Bordeaux, 2015. http://www.theses.fr/2015BORD0388.
Pełny tekst źródłaYang, Jei-Hung, and 楊介宏. "Hiding Sensitive Rules Based on Transaction Grouping." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/58538882177123969090.
Pełny tekst źródłaKao, Tai-wei, and 高黛威. "Hiding dynamic sensitive association rules in incremental data." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/29229249691498416855.
Pełny tekst źródłaKsiążki na temat "SENSITIVE RULES"
Kutz, Gregory D. Sales of sensitive military property to the public. United States Government Accountability Office, 2007.
Znajdź pełny tekst źródłaUnited States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, ed. Contractor integrity: Stronger safeguards needed for contractor access to sensitive information : report to the Chairman, Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Governmental Affairs, U.S. Senate. U.S. Govt. Accountability Office, 2010.
Znajdź pełny tekst źródłaOffice, General Accounting. Environmental information: EPA could better address concerns about disseminating sensitive business information : report to the Chairman and Ranking Minority Member, Subcommittee on VA, HUD, and Independent Agencies, Committee on Appropriations, U.S. Senate. The Office, 1999.
Znajdź pełny tekst źródłaOffice, General Accounting. Defense inventory: Inadequate compliance with controls for excess firearms and other sensitive items : report to the Chairman, Committee on Armed Services, House of Representatives. The Office, 1999.
Znajdź pełny tekst źródłaOffice, General Accounting. Defense inventory: Controls over C-4 explosive and other sensitive munitions : briefing report to the Chairman, Legislation and National Security Subcommittee, Committee on Government Operations, House of Representatives. The Office, 1990.
Znajdź pełny tekst źródłavan der Sloot, Bart, and Sascha van Schendel. The Boundaries of Data. Amsterdam University Press, 2024. http://dx.doi.org/10.5117/9789463729192.
Pełny tekst źródłaTimofeeva, Liliya, Elena Korneicheva, and Natal'ya Gracheva. Organization of educational activities in the OED. Approximate planning. The second youngest group (3-4 years). INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1072118.
Pełny tekst źródłaTimofeeva, Liliya, Elena Korneicheva, and Natal'ya Gracheva. Organization of educational activities in the OED. Approximate planning. Preparation for school group (6-7 years). INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1072122.
Pełny tekst źródłaOffice, General Accounting. Defense inventory: Controls over C-4 explosive and other sensitive munitions : briefing report to the Chairman, Legislation and National Security Subcommittee, Committee on Government Operations, House of Representatives. The Office, 1990.
Znajdź pełny tekst źródłaKosiara-Pedersen, Karina, Susan E. Scarrow, and Emilie van Haute. Rules of Engagement? Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198758631.003.0010.
Pełny tekst źródłaCzęści książek na temat "SENSITIVE RULES"
Hezart, Armin, Abhaya Nayak, and Mehmet Orgun. "Towards Context Sensitive Defeasible Rules." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88833-8_11.
Pełny tekst źródłaJain, Dhyanendra, Pallavi Khatri, Rishi Soni, and Brijesh Kumar Chaurasia. "Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s)." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27299-8_52.
Pełny tekst źródłaLesaint, David, Deepak Mehta, Barry O’Sullivan, Luis Quesada, and Nic Wilson. "Context-Sensitive Call Control Using Constraints and Rules." In Principles and Practice of Constraint Programming – CP 2010. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15396-9_46.
Pełny tekst źródłaDíaz, Irene, Luis J. Rodríguez-Mũniz, and Luigi Troiano. "On Mining Sensitive Rules to Identify Privacy Threats." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40846-5_24.
Pełny tekst źródłaPatin, Cédric, and Annie Rialland. "On the Nature of Rules Sensitive to Syntax." In Prosody and Syntax. John Benjamins Publishing Company, 2006. http://dx.doi.org/10.1075/ubli.3.16pat.
Pełny tekst źródłaShepherd, Dean A., Holger Patzelt, and Nicola Breugst. "Simples Rules for Developing the Social Aspects of Your Venture." In 66 Simple Rules for Entrepreneurs. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62032-4_11.
Pełny tekst źródłaModi, Chirag, U. P. Rao, and Dhiren R. Patel. "A Survey on Preserving Privacy for Sensitive Association Rules in Databases." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12214-9_96.
Pełny tekst źródłaDomadiya, Nikunj H., and Udai Pratap Rao. "A Hybrid Technique for Hiding Sensitive Association Rules and Maintaining Database Quality." In Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 2. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30927-9_35.
Pełny tekst źródłade Souza Amorim, Luís Eduardo, and Eelco Visser. "Multi-purpose Syntax Definition with SDF3." In Software Engineering and Formal Methods. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58768-0_1.
Pełny tekst źródłaFan, Weijie, Hongjin Liang, Xinyu Feng, and Hanru Jiang. "A Program Logic for Concurrent Randomized Programs in the Oblivious Adversary Model." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-91118-7_13.
Pełny tekst źródłaStreszczenia konferencji na temat "SENSITIVE RULES"
Wang, Dingmin, Przemysław Andrzej Wałęga, and Bernardo Cuenca Grau. "MTLearn: Extracting Temporal Rules Using Datalog Rule Learners." In 21st International Conference on Principles of Knowledge Representation and Reasoning {KR-2023}. International Joint Conferences on Artificial Intelligence Organization, 2024. http://dx.doi.org/10.24963/kr.2024/90.
Pełny tekst źródłaTian, Meng, Shihai Wang, Wentao Wu, and Wandong Xie. "A Novel Approach for Software Defect Prediction Through Relational Association Rules Based on Cost-Sensitive Learning." In 2024 IEEE 24th International Conference on Software Quality, Reliability, and Security Companion (QRS-C). IEEE, 2024. http://dx.doi.org/10.1109/qrs-c63300.2024.00117.
Pełny tekst źródłaLin, Pengfei, Ehsan Javanmardi, Yuze Jiang, and Manabu Tsukada. "A Rule-Compliance Path Planner for Lane-Merge Scenarios Based on Responsibility-Sensitive Safety." In 2024 18th International Conference on Control, Automation, Robotics and Vision (ICARCV). IEEE, 2024. https://doi.org/10.1109/icarcv63323.2024.10821557.
Pełny tekst źródłaWang, Shyue-Liang, Tzung-Pei Hong, Yu-Chuan Tsai, and Hung-Yu Kao. "Hiding Sensitive Association Rules on Stars." In 2010 IEEE International Conference on Granular Computing (GrC-2010). IEEE, 2010. http://dx.doi.org/10.1109/grc.2010.123.
Pełny tekst źródłaBakshi, Arjun, and Raj Bhatnagar. "Learning Cost-Sensitive Rules for Non-forced Classification." In 2012 IEEE 12th International Conference on Data Mining Workshops. IEEE, 2012. http://dx.doi.org/10.1109/icdmw.2012.62.
Pełny tekst źródłaWang, S. L., and A. Jafari. "Using unknowns for hiding sensitive predictive association rules." In Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration. IEEE, 2005. http://dx.doi.org/10.1109/iri-05.2005.1506477.
Pełny tekst źródłaNavale, Geeta S., and Suresh N. Mali. "A Survey on Sensitive Association Rules Hiding Methods." In 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA). IEEE, 2017. http://dx.doi.org/10.1109/iccubea.2017.8464012.
Pełny tekst źródłaWeng, Chih-Chia, Shan-Tai Chen, and Hung-Che Lo. "A Novel Algorithm for Completely Hiding Sensitive Association Rules." In 2008 Eighth International Conference on Intelligent Systems Design and Applications (ISDA). IEEE, 2008. http://dx.doi.org/10.1109/isda.2008.180.
Pełny tekst źródłaChoi, K. S., and J. Pan. "An Anisotropic Hardening Rule With Non-Associated Flow Rule for Pressure-Sensitive Materials." In ASME 2009 Pressure Vessels and Piping Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/pvp2009-77951.
Pełny tekst źródłaLi, Xueming, Zhijun Liu, and Chuan Zuo. "Hiding association rules based on relative-non-sensitive frequent itemsets." In 2009 8th IEEE International Conference on Cognitive Informatics (ICCI). IEEE, 2009. http://dx.doi.org/10.1109/coginf.2009.5250708.
Pełny tekst źródłaRaporty organizacyjne na temat "SENSITIVE RULES"
Hudson-Vitale, Cynthia, and Katherine Klosek. Issue Brief: New US Federal Compliance Rules for Sensitive Information. Association of Research Libraries, 2021. http://dx.doi.org/10.29242/brief.sensitiveinfo2021.
Pełny tekst źródłaUlloa-Suarez, Carolina, and Oscar Valencia. Sustaining Compliance with Fiscal Rules: A Future at Risk? Inter-American Development Bank, 2024. https://doi.org/10.18235/0013256.
Pełny tekst źródłaDvorianyn, Paraskoviya. Сенситивне інтерв’ю: переживання колективної травми війни. Ivan Franko National University of Lviv, 2023. http://dx.doi.org/10.30970/vjo.2023.52-53.11727.
Pełny tekst źródłaRaju, Nivedita, and Laura Bruun. Integrating Gender Perspectives into International Humanitarian Law. Stockholm International Peace Research Institute, 2023. http://dx.doi.org/10.55163/qilu7567.
Pełny tekst źródłaNang, Phirun, and Chhuong Ouch. Gender and Water Governance: Women’s Role in Irrigation Management and Development in the Context of Climate Change. Cambodia Development Resource Institute, 2014. https://doi.org/10.64202/wp.89.201401.
Pełny tekst źródłaKhadan, Jeetendra. An Econometric Analysis of Energy Revenue and Government Expenditure Shocks on Economic Growth in Trinidad and Tobago. Inter-American Development Bank, 2016. http://dx.doi.org/10.18235/0011776.
Pełny tekst źródłaOwusu, Samuel Ening, and Bahman Peyravi. The Impact of Trade Policies on International Marketing Strategies. Vilnius Business College, 2024. http://dx.doi.org/10.57005/ab.2024.1.3.
Pełny tekst źródłaParkins, R. N. NR198706 Environmental Aspects of the Stress-Corrosion Cracking of Pipeline Steels. Pipeline Research Council International, Inc. (PRCI), 1987. http://dx.doi.org/10.55274/r0011886.
Pełny tekst źródłaAppleyard, Bruce, Anurag Pande, Joseph Gibbons, et al. Right Turn on Red: Energy-Saving Measure or Unsafe Maneuver? Mineta Transportation Institute, 2024. https://doi.org/10.31979/mti.2024.2347.
Pełny tekst źródłaHertel, Thomas, David Hummels, Maros Ivanic, and Roman Keeney. How Confident Can We Be in CGE-Based Assessments of Free Trade Agreements? GTAP Working Paper, 2003. http://dx.doi.org/10.21642/gtap.wp26.
Pełny tekst źródła