The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In privacy preserving data publishing, to reduce the correlation loss between sensitive attribute (SA) and nonsensitive attributes (NSAs), caused by anonymization methods (such as generalization, anatomy, slicing and randomization, etc.), the records with same NSAs values should be divided into same blocks with the demands of ℓ-diversity. However, there are often many blocks (of the initial partition),...
The disclosure of individuals' sensitive values is a potentially serious problem in privacy preserving data publishing. The popular ℓ-diversity model is able to prevent victim' sensitive value from being revealed with a certainty higher than 1/ℓ. But, the anonymized tables with ℓ-diversity generated by the methods, such as generalization, anatomy and slicing, are all vulnerable to the attacker with...
This paper is presents the finite-time bounded of H∞ predictor-based controller subject to input-delay systems. The predictor-based method is employed in the context of finite-time bounded for discrete-time input-delay systems. By using the novel Lyapunov-Krasokii functional and predictor-based technical, the sufficient condition for H∞ predictor-based controller subject to discrete-time input-delay...
Due to the time-varying nature of real workload, a large scale computer system has quite a number of idle nodes in most time of operation. They consume energy, but do nothing useful. To save the huge energy waste caused by such active idle nodes, most modern compute nodes provide multiple level dynamic sleep mechanisms to reduce power consumption. However, awaking sleeping nodes takes time, thus affects...
Traditional damage assessment approaches can only locate damage caused by reading corrupted data in a post-intrusion database. This paper indicates another kind of damage spreading pattern characterized by omitting maliciously deleted data, which was not considered in previous studies. An extended recovery model arms at this problem is presented and a novel approach based on the model is proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.