نتایج جستجو برای: data sanitization

تعداد نتایج: 2410486  

Journal: :Sustainability 2023

Whether non-compliance with hand sanitization is related to impatience or impulsivity an unresolved issue. Several studies have argued that not maintaining requirements during a pandemic could relate impulsivity. However, the of needs be investigated in pandemic-free situations, as government for influence subjective preferences. Little research, however, has examined such associations pandemic...

Journal: :Horticulturae 2022

Berry crops are increasingly being harvested mechanically to reduce labor costs, but there is a lack of research on best practices for cleaning and sanitizing mechanical harvesters maintain proper food hygiene. Laboratory experiments were conducted with surface coupons cut from materials commonly used blueberry harvesters, including polyethylene, high-density aluminum, extruded polycarbonate, a...

Journal: :Journal of food protection 2009
Mustafa Vurma Ram B Pandit Sudhir K Sastry Ahmed E Yousef

The aim of this study was to integrate an ozone-based sanitization step into existing processing practices for fresh produce and to evaluate the efficacy of this step against Escherichia coli O157:H7. Baby spinach inoculated with E. coli O157:H7 (approximately 10(7) CFU/g) was treated in a pilot-scale system with combinations of vacuum cooling and sanitizing levels of ozone gas (SanVac). The co...

2009
Gabriela F. Cretu-Ciocarlie Angelos Stavrou Michael E. Locasto Salvatore J. Stolfo

The deployment and use of Anomaly Detection (AD) sensors often requires the intervention of a human expert to manually calibrate and optimize their performance. Depending on the site and the type of traffic it receives, the operators might have to provide recent and sanitized training data sets, the characteristics of expected traffic (i.e. outlier ratio), and exceptions or even expected future...

2015
Wei Chang Jie Wu

Many smartphone-based applications need microdata, but publishing a microdata table may leak respondents’ privacy. Conventional researches on privacy-preserving data publishing focus on providing identical privacy protection to all data requesters. Considering that, instead of trapping in a small coterie, information usually propagates from friend to friend. The authors study the privacy-preser...

2010
Wei Xu Ling Huang Michael I. Jordan

We describe our early experience in applying our console log mining techniques [19, 20] to logs from production Google systems with thousands of nodes. This data set is five orders of magnitude in size and contains almost 20 times as many messages types as the Hadoop data set we used in [19]. It also has many properties that are unique to large scale production deployments (e.g., the system sta...

Journal: :Journal of biomedical informatics 2014
Ada Wai-Chee Fu Ke Wang Raymond Chi-Wing Wong Jia Wang Minhao Jiang

While the study of privacy preserving data publishing has drawn a lot of interest, some recent work has shown that existing mechanisms do not limit all inferences about individuals. This paper is a positive note in response to this finding. We point out that not all inference attacks should be countered, in contrast to all existing works known to us, and based on this we propose a model called ...

2017

In this paper we use information retrieval metrics to evaluate the effect of a document sanitization process, measuring information loss and risk of disclosure. In order to sanitize the documents we have developed a semiautomatic anonymization process following the guidelines of Executive Order 13526 (2009) of the US Administration. It embodies two main and independent steps: (i) identifying an...

2015
Edmund W. Ballou V. N. Venkatakrishnan Rigel Gjomemo

Software security problems in inherently unsafe languages (C/C++) can be addressed by compiler tools that automatically insert checks that trap execution when exploitable faults are encountered at runtime. Such checks are seldom incorporated in production code because of the performance cost they impose, as the check injection to ensure safety is applied indiscriminately to every memory access....

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید