Filters








51 Hits in 4.8 sec

Quantitative characterization of soil micro-aggregates: New opportunities from sub-micron resolution synchrotron X-ray microtomography

Marco Voltolini, Neslihan Taş, Shi Wang, Eoin L. Brodie, Jonathan B. Ajo-Franklin
2017 Geoderma  
A comprehensive characterization of the aggregate morphology is the first step towards a complete characterization of the soil microaggregates, when trying to correlate morphometric parameters with physical  ...  The role of the microstructure in a scenario microbial population development has been discussed and it has been found that the Barrow microaggregate seems to be more favorable, from a purely geometrical  ...  The new tools make it possible to develop the analysis of the entirety of microaggregates at sub-micron resolution, overcoming the need to crop subvolumes.  ... 
doi:10.1016/j.geoderma.2017.06.005 fatcat:q2iqno67q5d5zbqdpnu4ce2pc4

Mechanisms of Carbon Sequestration in Soil Aggregates

Humberto Blanco-Canqui, Rattan Lal
2004 Critical reviews in plant sciences  
There is a trade-off between plant growth and aggregation. Soil structure moderates soil and plant functions and is the framework for water, air, and nutrient flow to plants.  ...  Plant residues through microbial processes generate complex substances that serve as a mechanical framework for linking soil particles into aggregates.  ... 
doi:10.1080/07352680490886842 fatcat:zpevkks6jregbij32jjvm36fn4

Privacy-Preserving Reengineeringof Model-View-Controller ApplicationArchitectures Using Linked Data

Juan Manuel Dodero, Mercedes Rodriguez-Garcia, Iv�n Ruiz-Rube, Manuel Palomo-Duarte, School of Engineering, University of Cadiz, Av. de la Universidad 10, 11519 Puerto Real, C�diz, Spain, School of Engineering, University of Cadiz, Av. de la Universidad 10, 11519 Puerto Real, C�diz, Spain, School of Engineering, University of Cadiz, Av. de la Universidad 10, 11519 Puerto Real, C�diz, Spain, School of Engineering, University of Cadiz, Av. de la Universidad 10, 11519 Puerto Real, C�diz, Spain
2019 Journal of Web Engineering  
He was a board member in Wikimedia Spain from 2012 to 2016.  ...  Whereas wrapping techniques commonly used to link data of web applications duplicate the security source code, the new approach allows for the controlled disclosure of an application's data, while preserving  ...  It would only be necessary to adjust the current set of sanitization options to a new set of PPDP methods that make it possible to achieve the requirements of a new privacy model.  ... 
doi:10.13052/jwe1540-9589.1875 fatcat:bsgujcmp2fgktoss5sreqejpei

The future of statistical disclosure control [article]

Mark Elliot, Josep Domingo-Ferrer
2018 arXiv   pre-print
Statistical disclosure control (SDC) was not created in a single seminal paper nor following the invention of a new mathematical technique, rather it developed slowly in response to the practical challenges  ...  SDC's subsequent emergence as a specialised academic field was an outcome of three interrelated socio-technical changes: (i) the advent of accessible computing as a research tool in the 1980s meant that  ...  Usually this will involve a mixture of automated and manual processes.  ... 
arXiv:1812.09204v1 fatcat:yujfw2ifzbbffmyneiyll7o2um

Optimization of Privacy-Utility Trade-offs under Informational Self-determination [article]

Thomas Asikis, Evangelos Pournaras
2018 arXiv   pre-print
A generic and novel computational framework is introduced for measuring privacy-utility trade-offs and their optimization.  ...  The framework computes a broad spectrum of such trade-offs that form privacy-utility trajectories under homogeneous and heterogeneous data sharing.  ...  Framework The design of a new privacy preserving optimization framework is introduced in this section to tackle the challenges posed in Section 3.  ... 
arXiv:1710.03186v2 fatcat:6g53qtkfrbazfeaz4l26rfe7vi

Optimization of privacy-utility trade-offs under informational self-determination

Thomas Asikis, Evangelos Pournaras
2018 Future generations computer systems  
Framework The design of a new privacy preserving optimization framework is introduced in this section to tackle the challenges posed in Section 3.  ...  Microaggregation. Microaggregation relies on the replacement of each data value with a representative data value that is derived from the statistical properties of the dataset it belongs to.  ... 
doi:10.1016/j.future.2018.07.018 fatcat:knyayh4gybfcdddtts7i33qe5e

Interview with Josep Domingo-Ferrer and Chris Clifton on Privacy in Spatiotemporal Data Analysis

Christine Körner
2012 Künstliche Intelligenz  
This gives a researcher a starting point to analyze what privacy means in terms of risk. KI: Do you think privacy regulations constrain and slow down innovation and growth of new services?  ...  Of course, it is a bit more complicated to use PPDM than plain data mining, but the overhead can decrease with automation.  ... 
doi:10.1007/s13218-012-0193-4 fatcat:stfxafh2vbeb3esonomeuu2q2e

Microdata [chapter]

2012 Statistical Disclosure Control  
If professional advice or other expert assistance is required, the services of a competent professional should be sought.  ...  This publication is designed to provide accurate and authoritative information in regard to the subject matter covered.  ...  It started with the SDC project from 1996 to 1998 in the Fourth Framework Programme of the EU, followed by the CASC project (2000)(2001)(2002)(2003) in the Fifth Framework Programme of the EU.  ... 
doi:10.1002/9781118348239.ch3 fatcat:cnplzqtu6zdzbffhzgfiiqjgma

INRISCO: INcident monitoRing In Smart COmmunities

Monica Aguilar Igartua, Florina Almenares, Rebeca P. Diaz Redondo, Manuela I. Martin, Jordi Forne, Celeste Campo, Ana Fernandez, Luis J. De la Cruz, Carlos Garcia-Rubio, Andres Marin, Ahmad Mohamad Mezher, Daniel Diaz (+4 others)
2020 IEEE Access  
Finally, for each post content, the module decides between creating a new story or adding the new post to an existing one using a similarity threshold.  ...  We would like to remark that sanitization may not only be applied to the functional data of a system, but also to cybersecurity data employed in the development of intelligent subsystems for automated  ...  This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/. ACRONYMS 3MRP Multimedia  ... 
doi:10.1109/access.2020.2987483 fatcat:hdf3mkezczg47naqm633we47k4

An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval [article]

David Rebollo-Monedero, Javier Parra-Arnau, Jordi Forné
2011 arXiv   pre-print
Secondly, we attempt to bridge the gap between the privacy and the information-theoretic communities by substantially adapting some technicalities of our original work to reach a wider audience, not intimately  ...  In this work, we make a twofold contribution.  ...  Furthermore, automated query generation is naturally bound to be frown upon by network and information providers, thus any practical framework must take traffic overhead into account.  ... 
arXiv:1111.4045v1 fatcat:36wvmgefujbtpjjzdb3kcgg42u

Contributions to Context-Aware Smart Healthcare: A Security and Privacy Perspective [article]

Edgar Batista
2022 arXiv   pre-print
We present an extensive analysis on the security aspects of the underlying sensors and networks deployed in such environments, a novel user-centred privacy framework for analysing ubiquitous computing  ...  The management of health data, from their gathering to their analysis, arises a number of challenging issues due to their highly confidential nature.  ...  Since sensors are resource-constrained, the movement data recorded is transmitted to the smartphone through a BLE connection.  ... 
arXiv:2206.14567v1 fatcat:ntf4t7hwynasnavl7nfrbvig3a

L-Diversity Based Dynamic Update for Large Time-Evolving Microdata [chapter]

Xiaoxun Sun, Hua Wang, Jiuyong Li
2008 Lecture Notes in Computer Science  
The end result is a new ontology, that we call the closure of the original ontology, on which automated inference could be more easily produced (e.g., a query-answering system for legal knowledge).  ...  In this paper, we revise the framework of XCS, and present a complete framework of ... Learning Classifier System (LCS) is an effective tool to solve classification problems.  ... 
doi:10.1007/978-3-540-89378-3_47 fatcat:3srytfhtszejdidu62nvzwia3m

Plankton and Particle Size and Packaging: From Determining Optical Properties to Driving the Biological Pump

L. Stemmann, E. Boss
2012 Annual Review of Marine Science  
and in a synoptic manner.  ...  Understanding pelagic ecology and quantifying energy fluxes through the trophic web and from the surface to the deep ocean requires the ability to detect and identify all organisms and particles in situ  ...  L.S. was supported by funding from the seventh European Framework Program ( JERICO). Support to E.B. was provided by NASA's Ocean Biology and Biogeochemistry program. LITERATURE CITED Aas E. 1996.  ... 
doi:10.1146/annurev-marine-120710-100853 pmid:22457976 fatcat:cqqufqr4kzcqjfqlyc3l7vrsua

Information security and privacy in healthcare: current state of research

Ajit Appari, M. Eric Johnson
2010 International Journal of Internet and Enterprise Management  
In this paper, we provide a holistic view of the recent research and suggest new areas of interest to the information systems community.  ...  Reference to this paper should be made as follows: Appari, A. and Eric Johnson, M. (2010) 'Information security and privacy in healthcare: current state of research', Int.  ...  Thus, to ensure integrity and confidentiality of patient data, direct downloading of a patient's record to a PDA owned by a healthcare professional visiting the patient must be constrained by location  ... 
doi:10.1504/ijiem.2010.035624 fatcat:7qugcjbd7fhybeyw6powb7ieym

A survey of graph-modification techniques for privacy-preserving on networks

Jordi Casas-Roma, Jordi Herrera-Joancomartí, Vicenç Torra
2016 Artificial Intelligence Review  
Recently, a huge amount of social networks have been made publicly available.  ...  These methods allow researchers and third-parties to apply all graph-mining processes on anonymous data, from local to global knowledge extraction.  ...  framework.  ... 
doi:10.1007/s10462-016-9484-8 fatcat:urgdo2l35rag3bneqgmwyxnkhm
« Previous Showing results 1 — 15 out of 51 results