نتایج جستجو برای: data sanitization
تعداد نتایج: 2410486 فیلتر نتایج به سال:
Whether non-compliance with hand sanitization is related to impatience or impulsivity an unresolved issue. Several studies have argued that not maintaining requirements during a pandemic could relate impulsivity. However, the of needs be investigated in pandemic-free situations, as government for influence subjective preferences. Little research, however, has examined such associations pandemic...
Berry crops are increasingly being harvested mechanically to reduce labor costs, but there is a lack of research on best practices for cleaning and sanitizing mechanical harvesters maintain proper food hygiene. Laboratory experiments were conducted with surface coupons cut from materials commonly used blueberry harvesters, including polyethylene, high-density aluminum, extruded polycarbonate, a...
The aim of this study was to integrate an ozone-based sanitization step into existing processing practices for fresh produce and to evaluate the efficacy of this step against Escherichia coli O157:H7. Baby spinach inoculated with E. coli O157:H7 (approximately 10(7) CFU/g) was treated in a pilot-scale system with combinations of vacuum cooling and sanitizing levels of ozone gas (SanVac). The co...
The deployment and use of Anomaly Detection (AD) sensors often requires the intervention of a human expert to manually calibrate and optimize their performance. Depending on the site and the type of traffic it receives, the operators might have to provide recent and sanitized training data sets, the characteristics of expected traffic (i.e. outlier ratio), and exceptions or even expected future...
Many smartphone-based applications need microdata, but publishing a microdata table may leak respondents’ privacy. Conventional researches on privacy-preserving data publishing focus on providing identical privacy protection to all data requesters. Considering that, instead of trapping in a small coterie, information usually propagates from friend to friend. The authors study the privacy-preser...
We describe our early experience in applying our console log mining techniques [19, 20] to logs from production Google systems with thousands of nodes. This data set is five orders of magnitude in size and contains almost 20 times as many messages types as the Hadoop data set we used in [19]. It also has many properties that are unique to large scale production deployments (e.g., the system sta...
While the study of privacy preserving data publishing has drawn a lot of interest, some recent work has shown that existing mechanisms do not limit all inferences about individuals. This paper is a positive note in response to this finding. We point out that not all inference attacks should be countered, in contrast to all existing works known to us, and based on this we propose a model called ...
In this paper we use information retrieval metrics to evaluate the effect of a document sanitization process, measuring information loss and risk of disclosure. In order to sanitize the documents we have developed a semiautomatic anonymization process following the guidelines of Executive Order 13526 (2009) of the US Administration. It embodies two main and independent steps: (i) identifying an...
Software security problems in inherently unsafe languages (C/C++) can be addressed by compiler tools that automatically insert checks that trap execution when exploitable faults are encountered at runtime. Such checks are seldom incorporated in production code because of the performance cost they impose, as the check injection to ensure safety is applied indiscriminately to every memory access....
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید