A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Flexible data anonymization using ARX-Current status and challenges ahead
2020
Software, Practice & Experience
Finally, we discuss practical experiences with ARX and present remaining issues and challenges ahead. ...
For instance, the effectiveness of different anonymization techniques depends on context, and thus tools need to support a large set of methods to ensure that the usefulness of data is not overly affected ...
Moreover, we would like to thank the anonymous ...
doi:10.1002/spe.2812
fatcat:5mzoacmnjjdwrn2xsoincydjyy
Flexible and scalable privacy assessment for very large datasets, with an application to official governmental microdata
[article]
2022
arXiv
pre-print
The approach we suggest brings three principal advantages: it is flexible, allowing for precise quantification and comparison of privacy risks for attacks both known and novel; it can be computationally ...
tractable for very large, longitudinal datasets; and its results are explainable both to politicians and to the general public. ...
They have been adopted in practice by the popular ARX data-anonymization tool [40] , among others. ...
arXiv:2204.13734v1
fatcat:2lyslkcw4rfjxecvxnqxqfgof4
Advanced Statistical Learning on Short Term Load Process Forecasting
[article]
2021
arXiv
pre-print
We propose different statistical nonlinear models to manage these challenges of hard type datasets and forecast 15-min frequency electricity load up to 2-days ahead. ...
The predictive information is fundamental for the risk and production management of electricity consumers. ...
The decision to which expectile level the current data belongs and, hence, where the forecast of the load will be, is entirely data-driven and is evaluated by a change-point test. ...
arXiv:2110.09920v1
fatcat:mpe4kouebrbstbbpigdhtt52ou
Data-Powered Positive Deviance during the SARS-CoV-2 Pandemic—An Ecological Pilot Study of German Districts
2021
International Journal of Environmental Research and Public Health
Our qualitative analysis suggests that quick, proactive, decisive, and flexible/pragmatic actions, the willingness to take risks and deviate from standard procedures, good information flows both in terms ...
We introduced the mixed-methods Data-Powered Positive Deviance (DPPD) framework as a potential addition to the set of tools used to search for effective response strategies against the SARS-CoV-2 pandemic ...
"But that is precisely the point, acting flexibly and pragmatically, looking ahead and staying ahead of the situation, as you say in crisis response circles. ...
doi:10.3390/ijerph18189765
pmid:34574701
fatcat:rwjs7w3hnrcmrl32i6bfsz4hwi
D3.2 - First version of the framework for the collection, cleaning, integration & anonymization of big data
2018
Zenodo
, interoperability, and data privacy solutions; iv) describes the software to fetch the data to the platform; as well as v) discusses challenges and future work. ...
This report delivers the first version of the CUTLER data collection and pre-processing framework. It describes architectural and software solutions developed so far. ...
Another option for anonymization is the ARX data anonymization tool [41] , an open source tool for anonymizing sensitive personal data. ...
doi:10.5281/zenodo.3385965
fatcat:rakmp6iztbgivfbeza3mmpxleq
D2.4 Profiling Analytics and Privacy Methodological Foundations Release I
2018
Zenodo
The results reported in the previous three deliverables of WP2 (D2.1, D2.2 and D2.3) will be aggregated in one deliverable, which will be independently assessed by the Ethics Advisory Board of ChildRescue ...
,
Past cases profile data, Current child
Table 3 - 3 12 Data sources to be used for profiling Type
Data sources
Mandatory
Past cases data, current Child Profile
Optional
Social media data ...
, data-related, challenge. ...
doi:10.5281/zenodo.2542731
fatcat:ecplhyb5hrapffb4amahnfr6ry
Quantifying SARS‐CoV‐2 Infection Risk Within the Google/Apple Exposure Notification Framework to Inform Quarantine Recommendations
2021
Risk Analysis
Public health authorities can either set a threshold on initial infection risk to determine 14-day quarantine onset, or on the conditional probability of current and future infectiousness conditions to ...
It can be adjusted for negative test results using Bayes' theorem. ...
The Covid Watch app is currently programmed either to use a threshold on infection risk to determine 14-day quarantine onset, or on risk of current and future infectiousness to determine both quarantine ...
doi:10.1111/risa.13768
pmid:34155669
pmcid:PMC8447042
fatcat:vmv2luz4krbfph4rgohgt7auaq
LIPIcs : an Open-Access Series for International Conference Proceedings
2016
ERCIM News
However, current technological and social landscapes are now calling for a shift towards the introduction of a more flexible, hybrid computing paradigm. ...
also as a metaboliser statuses) from individual genotype profiles. ...
and integrated security assurance to allow application self-protection at runtime. ...
doi:10.18154/rwth-2018-223393
fatcat:ddo7qz65l5b7peuksw2amaoxai
On the Opportunities and Risks of Foundation Models
[article]
2021
arXiv
pre-print
., BERT, DALL-E, GPT-3) that are trained on broad data at scale and are adaptable to a wide range of downstream tasks. ...
Despite the impending widespread deployment of foundation models, we currently lack a clear understanding of how they work, when they fail, and what they are even capable of due to their emergent properties ...
Fernando Pereira, Vinodkumar Prabhakaran, Colin Raffel, Marten van Schijndel, Ludwig Schmidt, Yoav Shoham, Madalsa Singh, Megha Srivastava, Jacob Steinhardt, Emma Strubell, Qian Yang, Luke Zettlemoyer, and ...
arXiv:2108.07258v2
fatcat:yktkv4diyrgzzfzqlpvaiabc2m
Security and privacy issues in implantable medical devices: A comprehensive survey
2015
Journal of Biomedical Informatics
On the one hand, the security proposals must have into consideration the inherent constraints of these small and implanted devices: energy, storage and computing power. ...
Several research works in the computer security field have identified serious security and privacy risks in IMDs that could compromise the implant and even the health of the patient who carries it. ...
The authors would like to thank the anonymous reviewers for constructive feedback and insightful suggestions that helped to improve the quality of this paper. ...
doi:10.1016/j.jbi.2015.04.007
pmid:25917056
fatcat:mhk7q2cckvbuffva6whz2kywee
Digitally Connected: Global Perspectives on Youth and Digital Media
2015
Social Science Research Network
The opportunity to share our experiences with our international colleagues was invaluable, and we eagerly look forward to a collaborative future.
References / Resources / Links ...
It cannot be stressed enough that training courses need an ICT professional -not necessarily an expertwho can stay ahead of, engage with, and challenge the youth-and the teachers. ...
Even where companies share data with researchers -as several US Internet companies do on an individual and ad hoc basis -a second challenge emerges: In big data environments, traditional methods of data ...
doi:10.2139/ssrn.2585686
fatcat:ehi5kz4qmrc2ni5kiqfc5btzbe
Study of Plasmid-Mediated Extended-Spectrum β-Lactamase-Producing Strains of Enterobacteriaceae, Isolated from Diabetic Foot Infections in a North Indian Tertiary-Care Hospital
2012
Diabetes Technology & Therapeutics
Detailed history and patient's profile, grade of DFU, co-morbidities and complications, laboratory data, and final outcome were collected. ...
Standard methods were used for culture identification, sensitivity testing, and ESBL detection. ...
Rafat Fatima, Diabetic Educator, Center for Diabetes and Endocrinology, for dietary advice and monitoring the patient's diet. The authors also like to thank Dr. Danish H and Dr. S. Y. ...
doi:10.1089/dia.2011.0197
pmid:22225456
fatcat:lvm52fx5u5flvkvv7o5wjyzehi
Iterative Most-Likely Point Registration (IMLP): A Robust Algorithm for Computing Optimal Shape Alignment
2015
PLoS ONE
Our GTLS approach has improved accuracy, efficiency, and stability compared to prior methods presented for this problem and offers a straightforward implementation using standard least squares. ...
The performance of IMLP is shown to be superior with respect to these algorithms over a wide range of noise conditions, outliers, and misalignments using both mesh and point-cloud representations of various ...
Acknowledgments The authors would like to thank our anonymous reviewers for their helpful insights and suggestions, which have improved the clarity and strengthened the content of this manuscript
Author ...
doi:10.1371/journal.pone.0117688
pmid:25748700
pmcid:PMC4352012
fatcat:yjucfnygn5gyfiki67tqofysru
Tarpeia: workings of a Roman myth
2016
ChoiceReviews
Note how Ennius, Junius, and Sulpicius are given status as individual speakers, and in the second passage anonymous speakers, collectively at least, actively exert their voice ( prodiderunt, dicunt). ...
What is it to belong to and in Rome? The third chapter jumps ahead a little more than a century. ...
She used his love to the advantage of her native Naxians; she bargained that she would be his if he would consent to her wishes. ...
doi:10.5860/choice.195263
fatcat:omuvla6ftzgotef7qjx34gmxzm
Farewell to the self-employed: deconstructing a socioeconomic and legal solipsism
1992
ChoiceReviews
H D 8036.L 56 1992 3 3 1 .1 2 -dc20 91-39643 British Library Cataloguing in Publication Data is available. ...
In German Idealism and in Marx, self-consciousness, self determination, and self-realization qualified as the concepts in which the normative content of modernity was summarized. ...
, the Bureau of the Census
What You See Is What You Conceived: The Current Population Survey There is a sense in which many of the facts presented by the bureaucracies did not even exist ahead of time ...
doi:10.5860/choice.30-0388
fatcat:pzej6bcu5zbiddyqbdcmzbmg2i
« Previous
Showing results 1 — 15 out of 47 results