نتایج جستجو برای: intended to re
تعداد نتایج: 10652479 فیلتر نتایج به سال:
This paper provides examples that illustrate the severe analytic distortions of many widely used masking methods that have been in use for a number of years. The masking methods are intended to reduce or eliminate re-identification risk in public-use files. Although the masking methods yield files that do not allow reproduction of the analytic properties of original, confidential files, in a nu...
T preoccupation with violent offenders has heightened following the emphasis on risk appraisal over the past decade. It is there f o re not surprising that in addition to changes in sentencing and policy, correctional jurisdictions are now attending to the treatment and management of high-risk and violent offenders. This article focuses on interventions and p rograms for violent offenders that ...
Proxy re-encryption realizes delegation of decryption rights, enabling a proxy holding a re-encryption key to convert a ciphertext originally intended for Alice into an encryption of the same message for Bob. Proxy re-encryption is a very useful primitive, having many applications in distributed file systems, outsourced filtering of encrypted spam, access control over network storage, and so on...
performance budgeting has been an important theme of public expenditure management for decades. in the 1990s, however, a new wave of enthusiasm for performance budgeting began to sweep through governments. in recent years, however, the level of interest in organizational use of performance-based budgeting re-emerged with more details and support from researchers and practitioners. performance-b...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید