نتایج جستجو برای: microaggregation
تعداد نتایج: 185 فیلتر نتایج به سال:
Abstract The protection of private information is vital importance in data-driven research, business and government. conflict between privacy utility has triggered intensive research the computer science statistics communities, who have developed a variety methods for privacy-preserving data release. Among main concepts that emerged are anonymity differential privacy. Today, another solution ga...
Abstract. The aim of this study was to compare different microdata protection methods for numerical variables under various conditions. Most of the 21 methods used in this paper have been implemented in the R-package sdcMicro which is available for free on the comprehensive R archive network (http://cran.r-project.org). The rest of the methods used can easily applied within other R-packages. Wh...
Eighteen pharmaceutical inhibitors of eicosanoid biosynthesis were tested for their effects on gypsy moth, Lymantria dispar and its susceptibility to the nucleopoly-hedrovirus LdMNPV. None of the inhibitors tested had any detrimental effects upon larval growth and development. Treatment with nine inhibitor/NPV combinations (e.g., bromophenacylbromide, clotrimazole, dexamethasone, esculetin, flu...
Trajectories of mobile objects, are automatically collected in huge quantities. Publishing and exploiting such data is essential to improve planning, but it threatens the privacy of individuals: re-identification of the individual behind a trajectory is easy unless precautions are taken. We present two heuristics for privacy-preserving publication of trajectories. Both of them publish only true...
This review outlines aspects on the developmental stages of Trypanosoma cruzi and Trypanosoma rangeli in the invertebrate host, Rhodnius prolixus. Special attention is given to the interactions of these parasites with gut and hemolymph molecules and the effects of the organization of midgut epithelial cells on the parasite development. The vector insect's permissiveness to T. cruzi, which devel...
0140-3664/$ see front matter 2009 Elsevier B.V. A doi:10.1016/j.comcom.2009.08.012 q Part of this work has been published at the 5t Workshop on Sensor Networks and Systems for Perva [1]. The extension to the PerSeNS paper include applicability of the concept of l-diversity in the cont the algorithm implementation and evaluations. * Corresponding author. Tel.: +61 406120793. E-mail addresses: kl...
It is currently unclear whether the T cell dysfunctions observed during active systemic lupus erythematosus (SLE) reflect a disorder intrinsic to the T cell or defects that result from interaction with anti-T cell autoantibody. To determine whether a disorder intrinsic to the T cell exists in SLE, the T cell capping mechanism was selected as a model of cellular function. The normal T cell cappi...
Abstract k -Anonymity is one of the most well-known privacy models. Internal and external attacks were discussed for this model, both focusing on categorical data. These can be seen as attribute disclosure a particular attribute. Then, p -sensitivity -diversity proposed solutions these That is, way to avoid very In paper we discuss case numerical data, show that also take place. For this, use r...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید