نتایج جستجو برای: microaggregation

تعداد نتایج: 185  

2005
Youngjin Park David Stanley

The bacterium, Xenorhabdus nematophila (Poinar and Thomas), is an obligate symbiont of nematodes in the genus Steinernema and a lethal insect pathogen. We investigated the hypothesis that one aspect of the bacterial virulence is the ability of X. nematophila to severely impair host insect cellular immune reactions to infection by inhibiting eicosanoid biosynthesis in the adult male cricket, Gry...

2012
David Stanley Eric Haas Jon Miller

Insects, like all invertebrates, express robust innate, but not adaptive, immune reactions to infection and invasion. Insect immunity is usually resolved into three major components. The integument serves as a physical barrier to infections. Within the hemocoel, the circulating hemocytes are the temporal first line of defense, responsible for clearing the majority of infecting bacterial cells f...

Journal: :Information Fusion 2016
David Sánchez Josep Domingo-Ferrer Sergio Martínez Jordi Soria-Comas

Being able to release and exploit open data gathered in information systems is crucial for researchers, enterprises and the overall society. Yet, these data must be anonymized before release to protect the privacy of the subjects to whom the records relate. Differential privacy is a privacy model for anonymization that offers more robust privacy guarantees than previous models, such as k-anonym...

2015
Z. NI Q. M. LI X. Q. LIU T. LI R. HOU

Frequent pattern mining has been widely employed to analyze transaction datasets, but the question of how sensitive information contained in a dataset should be protected remains remains relatively unanswered. The differential privacy model provides a robust privacy guarantee, but the k-anonymity model provides better dataset utility. In this paper, a synergetic approach is proposed to simultan...

2014
David Sánchez Josep Domingo-Ferrer Sergio Martínez

Differential privacy is a privacy model for anonymization that offers more robust privacy guarantees than previous models, such as k-anonymity and its extensions. However, it is often disregarded that the utility of differentially private outputs is quite limited, either because of the amount of noise that needs to be added to obtain them or because utility is only preserved for a restricted ty...

2012
Josep Domingo-Ferrer Rolando Trujillo-Rasua

Movement data, that is, trajectories of mobile objects, are automatically collected in huge quantities by technologies such as GPS, GSM or RFID, among others. Publishing and exploiting such data is essential to improve transportation, to understand the dynamics of the economy in a region, etc. However, there are obvious threats to the privacy of individuals if their trajectories are published i...

2002
Josep Domingo-Ferrer Vicenç Torra

Defuzzification is one of the fundamental steps in the development of fuzzy knowledge based systems. Given a fuzzy set μ over the reference set X, defuzzification applied to μ returns an element of X. While a large number of methods exists for the case of X being a numerical scale, only few methods are applicable when X corresponds to a categorical scale. Aggregation procedures have been extens...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید