首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9篇
  免费   0篇
工业技术   9篇
  2017年   1篇
  2015年   2篇
  2013年   1篇
  2010年   1篇
  2008年   1篇
  2005年   2篇
  2003年   1篇
排序方式: 共有9条查询结果,搜索用时 15 毫秒
1
1.
2.
A dual concentric core fibre exhibiting a chromatic dispersion coefficient around -350 ps/(nm km) is used in a dispersion compensating module designed for WDM application. The optimised length ratio is larger than 20 and the residual chromatic dispersion is measured at 0.4 ps/(nm km) in the C-band  相似文献   
3.
A photonic bandgap fibre consisting of a 34 /spl mu/m diameter pure silica core surrounded by a periodic cladding has been modelled and characterised. It guides a robust HE/sub 11/ mode at 1.55 /spl mu/m with a 517 /spl mu/m/sup 2/ effective area and 0.4 dB/m propagation losses.  相似文献   
4.
The use of dual concentric core fibres to realise a flattening filter is reported. The power spectrum of an ASE source has been flattened in the C-band from 5.8 to 1.4 dB.  相似文献   
5.
Resisting structural re-identification in anonymized social networks   总被引:1,自引:0,他引:1  
We identify privacy risks associated with releasing network datasets and provide an algorithm that mitigates those risks. A network dataset is a graph representing entities connected by edges representing relations such as friendship, communication or shared activity. Maintaining privacy when publishing a network dataset is uniquely challenging because an individual’s network context can be used to identify them even if other identifying information is removed. In this paper, we introduce a parameterized model of structural knowledge available to the adversary and quantify the success of attacks on individuals in anonymized networks. We show that the risks of these attacks vary based on network structure and size and provide theoretical results that explain the anonymity risk in random networks. We then propose a novel approach to anonymizing network data that models aggregate network structure and allows analysis to be performed by sampling from the model. The approach guarantees anonymity for entities in the network while allowing accurate estimates of a variety of network measures with relatively little bias.  相似文献   
6.
Auditing the changes to a database is critical for identifying malicious behavior, maintaining data quality, and improving system performance. But an accurate audit log is an historical record of the past that can also pose a serious threat to privacy. Policies that limit data retention conflict with the goal of accurate auditing, and data owners have to carefully balance the need for policy compliance with the goal of accurate auditing. In this paper, we provide a framework for auditing the changes to a database system while respecting data retention policies. Our framework includes an historical data model that supports flexible audit queries, along with a language for retention policies that can hide individual attribute values or remove entire tuples from the history. Under retention policies, the audit history is partially incomplete. Thus, audit queries on the protected history can include imprecise results. We propose two different models (a tuple-independent model and a tuple-correlated model) for formalizing the meaning of audit queries. We implement policy application and query answering efficiently in a standard relational system and characterize the cases where accurate auditing can be achieved under retention restrictions.  相似文献   
7.
8.
9.
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号