منابع مشابه
The Right to Delete
Most of us have incidents in our past that we'd rather leave there, but that is increasingly difficult in a world teeming with devices and services that capture our words and actions and record them indefinitely. Instead of organically being forgotten, records of the past increasingly persist in digital storage unless and until they are deleted by someone. Should an individual have the right to...
متن کاملHow to Delete a Secret
This paper discusses the secure data erasure problem and introduces a new Proof of Deletion protocol, which assures secure data deletion in a way that any independent third party can verify cryptographically. The use of cryptography in data deletion is not new, but previous solutions are unsatisfactory as they merely return a single bit: whether the deletion is successful. However, this single ...
متن کاملMissing data in medical databases: Impute, delete or classify?
BACKGROUND The multiplicity of information sources for data acquisition in modern intensive care units (ICUs) makes the resulting databases particularly susceptible to missing data. Missing data can significantly affect the performance of predictive risk modeling, an important technique for developing medical guidelines. The two most commonly used strategies for managing missing data are to imp...
متن کاملCo-evolving add and delete heuristics
Hyper-heuristics are (meta-)heuristics that operate at a high level to choose or generate a set of low-level (meta-)heuristics to solve difficult search and optimisation problems. Evolutionary algorithms are well-known natureinspired meta-heuristics that simulate Darwinian evolution. In this article, we introduce an evolutionary-based hyper-heuristic in which a set of low-level heuristics compe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Information Processing and Management
سال: 2002
ISSN: 0021-7298,1347-1597
DOI: 10.1241/johokanri.45.641