標(biāo)題: Titlebook: Elements of Statistical Disclosure Control; Leon Willenborg,Ton Waal Book 2001 Springer Science+Business Media New York 2001 Variance.codi [打印本頁(yè)] 作者: VER 時(shí)間: 2025-3-21 18:18
書目名稱Elements of Statistical Disclosure Control影響因子(影響力)
書目名稱Elements of Statistical Disclosure Control影響因子(影響力)學(xué)科排名
書目名稱Elements of Statistical Disclosure Control網(wǎng)絡(luò)公開度
書目名稱Elements of Statistical Disclosure Control網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Elements of Statistical Disclosure Control被引頻次
書目名稱Elements of Statistical Disclosure Control被引頻次學(xué)科排名
書目名稱Elements of Statistical Disclosure Control年度引用
書目名稱Elements of Statistical Disclosure Control年度引用學(xué)科排名
書目名稱Elements of Statistical Disclosure Control讀者反饋
書目名稱Elements of Statistical Disclosure Control讀者反饋學(xué)科排名
作者: MOAT 時(shí)間: 2025-3-21 22:51
Joan Marques,Satinder Dhiman,Jerry Biberman to one of these statistical products may, through inappropriate use of the data, be able to disclose confidential information about the individual units which originally provided the data. These units might, for example, be respondents to a survey or persons completing forms for administrative purposes.作者: 全能 時(shí)間: 2025-3-22 02:01
https://doi.org/10.1007/978-3-642-56614-1or they may be analytic parameters, such as the coefficients of a regression model. We consider the impact of SDC techniques on the estimation of these parameters and, specifically, the impact of the SDC techniques discussed in Chapter 1.作者: 控訴 時(shí)間: 2025-3-22 05:53
Mohammed Shakaib,George L. Bakriss it is the more basic one. Increasingly, however, attention is being paid to the hierarchical and linked table case. Since this generalization has not been settled at the time of writing we do not dwell very extensively on this subject.作者: 令人發(fā)膩 時(shí)間: 2025-3-22 10:28
Overview of the Area, to one of these statistical products may, through inappropriate use of the data, be able to disclose confidential information about the individual units which originally provided the data. These units might, for example, be respondents to a survey or persons completing forms for administrative purposes.作者: Cerebrovascular 時(shí)間: 2025-3-22 15:36
Data Analytic Impact of SDC Techniques on Microdata,or they may be analytic parameters, such as the coefficients of a regression model. We consider the impact of SDC techniques on the estimation of these parameters and, specifically, the impact of the SDC techniques discussed in Chapter 1.作者: Cerebrovascular 時(shí)間: 2025-3-22 20:52 作者: moribund 時(shí)間: 2025-3-22 23:31
0930-0325 researchers. This book concentrates on the methodology of the area. It deals with both microdata (individual data) and tabular (aggregated) data. The book attempts to develop the theory from what can be called the paradigm of statistical confidentiality: to modify unsafe data in such a way that safe作者: 裙帶關(guān)系 時(shí)間: 2025-3-23 02:05 作者: AUGUR 時(shí)間: 2025-3-23 06:38 作者: 披肩 時(shí)間: 2025-3-23 11:21
Overview of the Area,oducts” in a variety of formats. For example, they may release tables to the public through published reports or release microdata files to academics for secondary data analysis. The problem addressed in statistical disclosure control (SDC) is that it is conceivable that a person who is given access作者: 姑姑在炫耀 時(shí)間: 2025-3-23 15:43 作者: 的是兄弟 時(shí)間: 2025-3-23 21:25 作者: parasite 時(shí)間: 2025-3-23 23:07
Application of Non-Perturbative SDC Techniques for Microdata,scussed in Chapter 1. In our discussion we assume disclosure scenarios of the type discussed in Chapter 2. These scenarios have in common that an intruder is supposed to use a number of low-dimensional combinations of key variables in an attempt to disclose private information. Global recoding and l作者: CAB 時(shí)間: 2025-3-24 03:16 作者: enlist 時(shí)間: 2025-3-24 10:35
Disclosure Risk for Tabular Data,y for each cell into which the table is organized. We shall sometimes use the term . as an alternative term for the disclosure risk of a table or cell. We suppose that a threshold may be specified as the maximum value below which the disclosure risk is deemed acceptable. Disclosure risk exceeding th作者: neoplasm 時(shí)間: 2025-3-24 12:15
Application of Non-Perturbative Techniques for Tabular Data, namely table redesign and secondary cell suppression. We start our discussion by considering a single table with its marginals, and then consider the more general case of hierarchical and linked tables. In fact the single table case is the one that has been given most attention in the literature, a作者: cavity 時(shí)間: 2025-3-24 14:57
Application of Perturbative Techniques for Tabular Data,in a table by adding random values to them. The random values are generated according to a prescribed probability distribution. “Rounding” in fact refers not to a particular SDC-technique but rather to a class of SDC-techniques. Each of these SDC-techniques has its own advantages and disadvantages.作者: Foam-Cells 時(shí)間: 2025-3-24 21:33 作者: Axillary 時(shí)間: 2025-3-25 02:11
Ramkishen S. Rajan,Venkataramana Yanamandrain a table by adding random values to them. The random values are generated according to a prescribed probability distribution. “Rounding” in fact refers not to a particular SDC-technique but rather to a class of SDC-techniques. Each of these SDC-techniques has its own advantages and disadvantages.作者: hazard 時(shí)間: 2025-3-25 06:43 作者: ostensible 時(shí)間: 2025-3-25 07:53 作者: esthetician 時(shí)間: 2025-3-25 14:59 作者: Electrolysis 時(shí)間: 2025-3-25 18:03
Information Loss in Tabular Data,In the present chapter we discuss the impact of SDC techniques on the statistical quality of tables. This impact on the quality is subsumed under the heading “information loss”.作者: 音樂等 時(shí)間: 2025-3-25 20:30 作者: dysphagia 時(shí)間: 2025-3-26 01:34
https://doi.org/10.1007/978-1-4613-0121-9Variance; coding; linear optimization; operations research; optimization; statistical method作者: 標(biāo)準(zhǔn) 時(shí)間: 2025-3-26 07:31 作者: 秘密會(huì)議 時(shí)間: 2025-3-26 09:51
Managing Nano-Bio-Info-Cogno Innovationsgular data file containing values of variables which at this stage have undergone no SDC treatment. We consider first possible scenarios by which an intruder might attempt to achieve disclosure. This enables us to specify a framework within which disclosure risk may be defined in terms of an intrude作者: 美學(xué) 時(shí)間: 2025-3-26 13:51 作者: 落葉劑 時(shí)間: 2025-3-26 17:08
Challenge of Digital Transformation,scussed in Chapter 1. In our discussion we assume disclosure scenarios of the type discussed in Chapter 2. These scenarios have in common that an intruder is supposed to use a number of low-dimensional combinations of key variables in an attempt to disclose private information. Global recoding and l作者: CRANK 時(shí)間: 2025-3-26 22:04 作者: Panacea 時(shí)間: 2025-3-27 01:42
Preventing Deafness: Two Medical Approaches,y for each cell into which the table is organized. We shall sometimes use the term . as an alternative term for the disclosure risk of a table or cell. We suppose that a threshold may be specified as the maximum value below which the disclosure risk is deemed acceptable. Disclosure risk exceeding th作者: innate 時(shí)間: 2025-3-27 08:57
Mohammed Shakaib,George L. Bakris namely table redesign and secondary cell suppression. We start our discussion by considering a single table with its marginals, and then consider the more general case of hierarchical and linked tables. In fact the single table case is the one that has been given most attention in the literature, a作者: VOC 時(shí)間: 2025-3-27 10:09 作者: 違反 時(shí)間: 2025-3-27 16:03 作者: moratorium 時(shí)間: 2025-3-27 19:39 作者: 慢慢啃 時(shí)間: 2025-3-28 01:41
Challenge of Digital Transformation, loss (using an information loss measure as discussed in Chapter 3). Clearly to obtain such a safe microdata through modification of the original unsafe microdata set requires an optimization problem to be solved.作者: chronology 時(shí)間: 2025-3-28 05:05 作者: DENT 時(shí)間: 2025-3-28 08:24 作者: Deceit 時(shí)間: 2025-3-28 10:46 作者: 預(yù)測(cè) 時(shí)間: 2025-3-28 15:31 作者: Manifest 時(shí)間: 2025-3-28 19:57 作者: synovium 時(shí)間: 2025-3-29 01:11
https://doi.org/10.1007/978-3-031-00917-4utopianism; women‘s utopian writing; Thomas More; Margaret Cavendish; monastic traditions; women‘s Cathol