نتایج جستجو برای: 3 logs p

تعداد نتایج: 2762761  

2011
Arnau Erola Jordi Castellà-Roca Guillermo Navarro-Arribas Vicenç Torra

Web search engines gather information from the queries performed by the user in the form of query logs. These logs are extremely useful for research, marketing, or profiling, but at the same time they are a great threat to the user’s privacy. We provide a novel approach to anonymize query logs so they ensure user k-anonymity, by extending a common method used in statistical disclosure control: ...

Journal: :Acta Crystallographica Section E Structure Reports Online 2007

Journal: :Bulletin of the American Mathematical Society 1969

2014
Ines Levin Michael Alvarez

This paper presents a systematic approach to automating the analysis of event logs recorded by the electronic voting tabulators in the course of an election. An attribute context-free grammar is used to specify the language of the event logs, and to distinguish compliant event logs (those that adhere to the defined proper conduct of an election) and non-compliant logs (those that deviate from t...

2014
Laurent D. Michel Alexander A. Shvartsman Nikolaj Volgushev

This paper presents a systematic approach to automating the analysis of event logs recorded by the electronic voting tabulators in the course of an election. An attribute context-free grammar is used to specify the language of the event logs, and to distinguish compliant event logs (those that adhere to the defined proper conduct of an election) and non-compliant logs (those that deviate from t...

2013
Anna A. Kalenkova Irina A. Lomazova

Process mining is a relatively new field of computer science which deals with process discovery and analysis based on event logs. In this work we consider the problem of discovering workflow nets with cancellation regions from event logs. Cancellations occur in the majority of real-life event logs. In spite of huge amount of process mining techniques little has been done on cancellation regions...

Journal: :J. Economic Theory 2004
David Cass Anna Pavlova

In this paper we critically examine the main workhorse model in asset pricing theory, the Lucas (1978) tree model (LT-Model), extended to include heterogeneous agents and multiple goods, and contrast it to the benchmark model in ...nancial equilibrium theory, the real assets model (RA-Model). Households in the LT-Model trade goods together with claims to Lucas trees (exogenous stochastic divide...

2015
Umbreen Sabir Mian Jerry den Hartog Sandro Etalle Nicola Zannone

The protection of sensitive information is of utmost importance for organizations. The complexity and dynamism of modern businesses are forcing a re-think of traditional protection mechanisms. In particular, a priori policy enforcement mechanisms are often complemented with auditing mechanisms that rely on an a posteriori analysis of logs recording users’ activities to prove conformity to polic...

Journal: :Proceedings of the Japan Academy 1952

Journal: :J. Chem. Soc., Trans. 1917

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید