Results 141 to 150 of about 2,428,237 (192)
Some of the next articles are maybe not open access.
2015
The discrepancies between synthetic and observed waveforms can be quantified in various ways. The waveform difference (i.e., subtracting the synthetic waveform from the observed waveform and minimizing the energy of the difference) is one approach that has been widely adopted in the active-source full-wave inversion community.
Po Chen, En-Jui Lee
openaire +1 more source
The discrepancies between synthetic and observed waveforms can be quantified in various ways. The waveform difference (i.e., subtracting the synthetic waveform from the observed waveform and minimizing the energy of the difference) is one approach that has been widely adopted in the active-source full-wave inversion community.
Po Chen, En-Jui Lee
openaire +1 more source
Aggregation for Sensitive Data
2019 13th International conference on Sampling Theory and Applications (SampTA), 2019In many modern applications, considerations like privacy, security and legal doctrines like the GDPR put limitations on data storage and sharing with third parties. Specifically, access to individual level data points is restricted and machine learning models need to be trained with aggregated versions of the datasets.
Avradeep Bhowmik +2 more
openaire +1 more source
Network Security, 2014
There's a lot of discussion these days about putting security 'close to the data'. This can mean many things, including encryption, database firewalls and so on. But what about when data is used? How do you go about ensuring that only the right people get to see sensitive information while still making maximum use of the information you hold?
openaire +1 more source
There's a lot of discussion these days about putting security 'close to the data'. This can mean many things, including encryption, database firewalls and so on. But what about when data is used? How do you go about ensuring that only the right people get to see sensitive information while still making maximum use of the information you hold?
openaire +1 more source
2018
Big Data provides a tremendous amount of detailed data for improved decision making, from overall strategic decisions, to automated operational micro-decisions. Directly, or with the right analytical methods, these data may reveal private information such as preferences and choices, as well as bargaining positions.
openaire +2 more sources
Big Data provides a tremendous amount of detailed data for improved decision making, from overall strategic decisions, to automated operational micro-decisions. Directly, or with the right analytical methods, these data may reveal private information such as preferences and choices, as well as bargaining positions.
openaire +2 more sources
2020
In this chapter, we will discuss some principles for protecting sensitive data. We will consider sensitive data to be information that are not secrets but might still result in damage when putting multiple pieces of data together. For example, driver’s licenses, birthdays, medical history, and so on are sensitive data.
openaire +1 more source
In this chapter, we will discuss some principles for protecting sensitive data. We will consider sensitive data to be information that are not secrets but might still result in damage when putting multiple pieces of data together. For example, driver’s licenses, birthdays, medical history, and so on are sensitive data.
openaire +1 more source
2006
Nowadays, more and more applications use sensitive and personal information, and preserving citizens' privacy is becoming extremely important. Addressing this issue, this paper suggests a rigorous approach to define data anonymization requirements, as well as how to characterize, select and build anonymizing solutions.
Abou El Kalam, Anas, Deswarte, Yves
openaire +1 more source
Nowadays, more and more applications use sensitive and personal information, and preserving citizens' privacy is becoming extremely important. Addressing this issue, this paper suggests a rigorous approach to define data anonymization requirements, as well as how to characterize, select and build anonymizing solutions.
Abou El Kalam, Anas, Deswarte, Yves
openaire +1 more source
Data-sensitive visual navigation
Computers & Graphics, 2017A model for navigation sensitive to the underlying data is proposed.A user-interface element, TreeSlider, for traversing tree structures is proposed.The data-sensitive navigation model is applied to various user-interface elements. Display Omitted In visualization systems it is often the case that the changes of the input parameters are not ...
Peter Mindek +3 more
openaire +1 more source
2016
You may be familiar with popular Windows products like CCleaner; they clean up temporary files to help with privacy and as a result free up disk space. They also help declutter your registry from previously installed software. These actions are supposed to help improve the startup time of your computer after a reboot and improve performance overall ...
openaire +1 more source
You may be familiar with popular Windows products like CCleaner; they clean up temporary files to help with privacy and as a result free up disk space. They also help declutter your registry from previously installed software. These actions are supposed to help improve the startup time of your computer after a reboot and improve performance overall ...
openaire +1 more source
Annals of Internal Medicine, 1981
Excerpt To the editor: In the October issue, Peacock and associates (1) presented results of qualitative and quantitative antibiotic sensitivity testing on 34 isolates of methicillin-resistantStaph...
openaire +1 more source
Excerpt To the editor: In the October issue, Peacock and associates (1) presented results of qualitative and quantitative antibiotic sensitivity testing on 34 isolates of methicillin-resistantStaph...
openaire +1 more source
Decoupling and data sensitivity
IEEE Transactions on Automatic Control, 1975For the perturbed system \dot{x} = (A_{0} + \delta A)x + (B_{0} + \delta B)u, z_{i} = D_{i}x, i\in k , constructive necessary and sufficient conditions are given, that the decoupling problem, when solved via extension for the nominal data A_{0}, B_{0}, D_{i}, i\in k , remains solved when the perturbations \delta A and \delta B are sufficiently small.
Fabian, E., Wonham, W. M.
openaire +2 more sources

