Experiments with Sensitive Loss demonstrate how simple discrimination-aware rules can guide the learning process towards fairer and more accurate representations. The results of the proposed Sensitive Loss representation outperform the baseline models for the three evaluated databases, both in terms of ...
In one embodiment, the user may be restricted from invoking multiple network profiles simultaneously, such that a specific default profile will be used at each startup. In another embodiment, the user may define rules that will determine which profile is used under defined circumstances. For exampl...
Based upon the access requirements rules, user profiles or other factors, the user interface may provide the aliases or sensitive identifiers for use by, for example, another computer-based system. In one embodiment, encryption block 204 and decryption block 214 are implemented with a single ...
For instance, coupled analysis performs worse than the analysis of a single dataset when the underlying common factors constitute only a small part of the data under inspection or when the shared factors only contribute a little to each dataset. To solve the sparsity problem affecting tensor ...
and Rob Brennan Abstract This chapter presents the Trusted Integrated Knowledge Dataspace (TIKD)—a trusted data sharing approach, based on Linked Data technologies, that supports compliance with the General Data Privacy Regulation (GDPR) for personal data handling as part of data security infrastructu...
That’s the question. Of course,I’m not going to discard myself; I’m not going to wear a burqa [Islamic religious symbol]. If I go to that country and have to work there,and those are the rules,I will follow them. But one cannot expect me to sit behind my desk wearing a hea...
The Board decided that the study was carried out in accordance with the rules pertaining to the review of research ethics committees and informed consent (NERB-file number 539, 8-7-2015). The authors confirm that all personal identifiers were removed or disguised so that the student(s) ...
Security policies for these devices are all over the map, Barnett says. "Policies are both set and enforced differently," she says. Among the typical policies are rules for what a device can be used for; how the company monitors the end user's communications on the device; device pa...
[40]. The tool was developed in the GIS package ArcView, using SQL rules to search for potential lots. However, not all steps were automated; e.g., retrofitting roofs with green roofs was based on firstly manual digitization of flat roofs using aerial photography, secondly GIS was used ...
Ensuring full compliance with all infant formula and human food production rules or regulations Evaluating and improving all in-process controls and production stages (including inspection of the raw ingredients and identifying all areas of concern at manufacturing facilities) Ensuring the FDA i...