نتایج جستجو برای: microaggregation

تعداد نتایج: 185  

Journal: :Foundations of Computational Mathematics 2022

Abstract The protection of private information is vital importance in data-driven research, business and government. conflict between privacy utility has triggered intensive research the computer science statistics communities, who have developed a variety methods for privacy-preserving data release. Among main concepts that emerged are anonymity differential privacy. Today, another solution ga...

2008
Matthias Templ Bernhard Meindl

Abstract. The aim of this study was to compare different microdata protection methods for numerical variables under various conditions. Most of the 21 methods used in this paper have been implemented in the R-package sdcMicro which is available for free on the comprehensive R archive network (http://cran.r-project.org). The rest of the methods used can easily applied within other R-packages. Wh...

Journal: :Journal of invertebrate pathology 2007
David Stanley Martin Shapiro

Eighteen pharmaceutical inhibitors of eicosanoid biosynthesis were tested for their effects on gypsy moth, Lymantria dispar and its susceptibility to the nucleopoly-hedrovirus LdMNPV. None of the inhibitors tested had any detrimental effects upon larval growth and development. Treatment with nine inhibitor/NPV combinations (e.g., bromophenacylbromide, clotrimazole, dexamethasone, esculetin, flu...

2011
Josep Domingo-Ferrer Rolando Trujillo-Rasua

Trajectories of mobile objects, are automatically collected in huge quantities. Publishing and exploiting such data is essential to improve planning, but it threatens the privacy of individuals: re-identification of the individual behind a trajectory is easy unless precautions are taken. We present two heuristics for privacy-preserving publication of trajectories. Both of them publish only true...

Journal: :Anais da Academia Brasileira de Ciencias 2005
Patrícia Azambuja Norman A Ratcliffe Eloi S Garcia

This review outlines aspects on the developmental stages of Trypanosoma cruzi and Trypanosoma rangeli in the invertebrate host, Rhodnius prolixus. Special attention is given to the interactions of these parasites with gut and hemolymph molecules and the effects of the organization of midgut epithelial cells on the parasite development. The vector insect's permissiveness to T. cruzi, which devel...

Journal: :Computer Communications 2010
Kuan Lun Huang Salil S. Kanhere Wen Hu

0140-3664/$ see front matter 2009 Elsevier B.V. A doi:10.1016/j.comcom.2009.08.012 q Part of this work has been published at the 5t Workshop on Sensor Networks and Systems for Perva [1]. The extension to the PerSeNS paper include applicability of the concept of l-diversity in the cont the algorithm implementation and evaluations. * Corresponding author. Tel.: +61 406120793. E-mail addresses: kl...

Journal: :The Journal of clinical investigation 1983
G M Kammer

It is currently unclear whether the T cell dysfunctions observed during active systemic lupus erythematosus (SLE) reflect a disorder intrinsic to the T cell or defects that result from interaction with anti-T cell autoantibody. To determine whether a disorder intrinsic to the T cell exists in SLE, the T cell capping mechanism was selected as a model of cellular function. The normal T cell cappi...

Journal: :International Journal of Information Security 2023

Abstract k -Anonymity is one of the most well-known privacy models. Internal and external attacks were discussed for this model, both focusing on categorical data. These can be seen as attribute disclosure a particular attribute. Then, p -sensitivity -diversity proposed solutions these That is, way to avoid very In paper we discuss case numerical data, show that also take place. For this, use r...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید