نتایج جستجو برای: sensitive synthetic schemes side

تعداد نتایج: 715793  

2003
J. P. Reiter

To limit disclosure risks, one approach is to release partially synthetic, public use microdata sets. These comprise the units originally surveyed, but some collected values, for example sensitive values at high risk of disclosure or values of key identifiers, are replaced with multiple imputations. This article presents and evaluates the use of classification and regression trees to generate p...

A hybrid censoring scheme is a mixture of type I and type II censoring schemes. When $n$ items are placed on a life test, the experiment terminates under type I or type II hybrid censoring scheme if either a pre-fixed censoring time T or the rth (1<=r<=n&nbsp;is fixed) failure is first or later observed, respectively. In this paper, we investigate the decomposition of entropy in both hybrid cen...

1994
Benny Chor Amos Fiat Moni Naor

We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. A very relevant application is in the context of pay television, where only paying customers should be able to view certain programs. In this application, the programs are normally encrypted, and then the sensitive data is the decryption keys that are...

Journal: :Tsinghua Science & Technology 2023

In cloud storage, client-side deduplication is widely used to reduce storage and communication costs. deduplication, if the server detects that user's outsourced data have been stored, then clients will not need reupload data. However, information on whether be uploaded can as a side-channel, which consequently exploited by adversaries compromise privacy. this paper, we propose new threat model...

2000
Stergios Stergiopoulos Geoffrey Edelson

Progress in the implementation of state-of-the-art signal processing schemes in sonar systems has been limited mainly by the moderate advancements made in sonar computing architectures and the lack of operational evaluation of the advanced processing schemes. Until recently, sonar computing architectures allowed only fast-Fourier-transform (FFT), vector-based processing schemes because of their...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید