5 resultados para Hiding

em University of Queensland eSpace - Australia


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Beginning with the sole literary text that does figure at any length in the first volume of Foucault's history--Diderot's Les Bijoux indiscrets, which dates from 1748--Cryle examines some semiotic routines involved in that telling of secrets, and to understand more about scientia sexualis through its literary development. He tries to show that narratives of the time tended to gather the mysterious, the unknown, and the generally inscrutable in the same functional place, holding them close to a thematics of the sexual. And returns to eighteenth-century texts from time to time in order to mark this as a fundamental shift in the literary constitution of sexual knowledge.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sharing data among organizations often leads to mutual benefit. Recent technology in data mining has enabled efficient extraction of knowledge from large databases. This, however, increases risks of disclosing the sensitive knowledge when the database is released to other parties. To address this privacy issue, one may sanitize the original database so that the sensitive knowledge is hidden. The challenge is to minimize the side effect on the quality of the sanitized database so that nonsensitive knowledge can still be mined. In this paper, we study such a problem in the context of hiding sensitive frequent itemsets by judiciously modifying the transactions in the database. To preserve the non-sensitive frequent itemsets, we propose a border-based approach to efficiently evaluate the impact of any modification to the database during the hiding process. The quality of database can be well maintained by greedily selecting the modifications with minimal side effect. Experiments results are also reported to show the effectiveness of the proposed approach. © 2005 IEEE

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Chimpanzees (Pan troglodytes) and young children (Homo sapiens) have difficulty with double invisible displacements in which an object is hidden in two nonadjacent boxes in a linear array. Experiment 1 eliminated the possibility that chimpanzees' previous poor performance was due to the hiding direction of the displacement device. As in Call (2001), subjects failed double nonadjacent displacements, showing a tendency to select adjacent boxes. In Experiments 2 and 3, chimpanzees and 24-month-old children were tested on a new adaptation of the task in which four hiding boxes were presented in a diamond-shaped array on a vertical plane. Both species performed above chance on double invisible displacements using this format, suggesting that previous poor performance was due to a response bias or inhibition problem rather than a fundamental limitation in representational capacity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Object-orientation supports software reuse via features such as abstraction, information hiding, polymorphism, inheritance and redefinition. However, while libraries of classes do exist, one of the challenges that still remains is to locate suitable classes and adapt them to meet the specific requirements of the software developer. Traditional approaches to library retrieval are text-based; it is therefore difficult for the developer to express their requirements in a precise and unambiguous manner. A more promising approach is specification-based retrieval, where library component interfaces and requirements are expressed using a formal specification language. In this case retrieval is based on matching formal specifications. In this paper we describe how existing approaches to specification matching can be extended to handle object-oriented components.