نتایج جستجو برای: ouafi phan privacy model

تعداد نتایج: 2140727  

Journal: :CoRR 2017
Genqiang Wu Xianyao Xia Yeping He

Differential privacy is a strong privacy notion based on indistinguishability of outputs of two neighboring datasets, which represent two states of one’s information is within or without of a dataset. However, when facing dependent records, the representation would lose its foundation. Motivated by the observation, we introduce a variant of differential privacy notion based on the influence of ...

2005
Shu-Heng Chen Li-Cheng Sun Chih-Chien Wang

The economic implications of network topologies are studied via a monopolist’s model of market networks originally proposed by Phan, et al. (2003). By embedding the market into a larger collection of network topologies, in particular, a class of scale-free networks, we extend the early analysis built upon a class of ring networks. To facilitate the study of the impacts of network topologies upo...

Journal: :International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 2002
Latanya Sweeney

Consider a data holder, such as a hospital or a bank, that has a privately held collection of person-specific, field structured data. Suppose the data holder wants to share a version of the data with researchers. How can a data holder release a version of its private data with scientific guarantees that the individuals who are the subjects of the data cannot be re-identified while the data rema...

2007
Luís Moniz Pereira Alexandre Miguel Pinto

We introduce an original 2-valued semantics for Normal Logic Programs (NLPs) extending the well-known Argumentation work of Phan Minh Dung on Admissible Arguments and Preferred Extensions. In the 2-valued Approved Models Semantics set forth, an Approved Model (AM) correspond to the minimal positive strict consistent 2-valued completion of a Dung Preferred Extension. The AMs Semantics enjoys sev...

2006
Qingfeng He

Privacy enforcement has been one of the most important challenges in IT area. Current privacy practices within companies and organizations, e.g. enabling a P3P compliant policy, incorporating a privacy seal program, etc., cannot truly protect consumer privacy. Privacy protection can only be achieved by enforcing privacy policies within an organization’s online and offline data processing system...

Journal: :Information Systems Research 2004
Naresh K. Malhotra Sung S. Kim James Agarwal

Journal: :Acta of bioengineering and biomechanics 2017
Abas Ramiar Morsal Momenti Larimi Ali Akbar Ranjbar

PURPOSE Hemodynamic factors, such as Wall Shear Stress (WSS), play a substantial role in arterial diseases. In the larger arteries, such as the carotid artery, interaction between the vessel wall and blood flow affects the distribution of hemodynamic factors. The fluid is considered to be non-Newtonian, whose flow is governed by the equation of a second-grade viscoelastic fluid and the effects ...

2013
Flavius Kehr Daniel Wentzel Peter Mayer

Existing research on information privacy has mostly relied on the privacy calculus model which views privacy-related decision-making as a rational process where individuals weigh the anticipated risks of disclosing personal data against the potential benefits. However, scholars have recently challenged two basic propositions of the privacy calculus model. First, some authors have distinguished ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید