Results 1 - 10
of
3,812
Table 1. Impact of several settings on risks related to the disclosure of emotions.
"... In PAGE 2: ...e much information to recipients. Without additional data, causes cannot be deduced. However, with simultaneous communication or context awareness, inferences of reci- pients and third parties can become reliable. Table1 describes the influence of net- working, additional communication channels, and types of displays on risks regarding misunderstandings, leaks, and inferences. Table 1.... ..."
Table 2.3 Justification of a Network Intrusion Detection Tool ITEM AMOUNT Risk: disclosure and damage of
Table 2 displays the risk measure for the different SDC methods for the two tables. The risk is far smaller for the ABS method in comparison to record swapping because, in this case, there is a higher probability that a small cell would receive a non-zero perturbation. Of course, this result is highly dependent on the look-up table (described in section 3.2).The targeted swap focuses on perturbing small cells and hence the risk is less than for the random swapping method. Other risk measures will be considered in future work.
"... In PAGE 4: ...3. Results Table2 : Disclosure risk measures ... ..."
Table 3. DLD and ID values for synthetic data sets with nprime records
2004
"... In PAGE 7: ...11. If synthetic data sets are generated whose number nprime of records is not the same as the number n of original records, the values for DLD and ID are maintained (see Table3 ). Hence, the disclosure risk measures do not depend on the number of records of the synthetic data set.... ..."
Cited by 3
Table 1. Risks in service-oriented applications
"... In PAGE 3: ... 3 Risk Management for Service-Oriented Systems Among a set of risks peculiar for SO systems are risks caused by service providers (disposal of a service, changes in interface and behavioral logics of a service, contract violation, obtrusion of a new contract with worse conditions, disclo- sure of user data) and technical aspects (network or service failures, problems with semantic interoperability). Table1 summarizes some common threats for service-based applications. Security threats (information disclosure, spooflng and tampering, downgrade, repudiation, denial of service, etc.... ..."
Table 1: Security Analysis of Protocols Protected Number of Total number Number of
2002
"... In PAGE 9: ... Therefore, the disclosure risk in this method is based on the number of data values that the other party might know from some external source. Table1 presents the number of unknowns and equations generated for protocols I and II. Two rows are given for each protocol/party: One for the basic protocol, and one for the additional step needed to protect boolean values as described in Section 5.... ..."
Cited by 126
Table 8. Table 8: The Estimated Effect of Disclosure (in days) Disclosure
2006
Table 1. Computation of metadata for disclosures
Table 1. Debt vs. Disclosure Ratio
"... In PAGE 17: ... Table1 presents the pooling interval and the disclosure ratio at various debt levels. Table 1.... ..."
Table 4 Frequency of Disclosure of Items at Web Sites
"... In PAGE 4: ... We subtracted from that score the mean total score for AIMR sample firms in the same industry, and divided by the standard deviation of scores in the same industry to obtain a measure of relative disclosure QUALITY. Table4 provides information about Web site information. There are six items that are found at half or more of the sites.... ..."
Results 1 - 10
of
3,812