期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
最高人民法院关于适用《中华人民共和国企业破产法》若干问题的规定(二) 被引量:4
1
《司法业务文选》 2013年第36期38-47,共10页
1.2013年7月29日最高人民法院审判委员会第1586次会议通过2.2013年9月5日最高人民法院公布3.法释〔2013〕22号4.自2013年9月16日起施行根据《中华人民共和国企业破产法》《中华人民共和国物权法》《中华人民共和国合同法》等相关法律,... 1.2013年7月29日最高人民法院审判委员会第1586次会议通过2.2013年9月5日最高人民法院公布3.法释〔2013〕22号4.自2013年9月16日起施行根据《中华人民共和国企业破产法》《中华人民共和国物权法》《中华人民共和国合同法》等相关法律,结合审判实践。 展开更多
关键词 债务人财产 企业破产法 破产申请 债权人会议 共益债务 取回权 买卖合同 买受人 破产程序 所有权保
原文传递
On the role of optimization algorithms in ownership-preserving data mining 被引量:1
2
作者 Muhammad KAMRAN Ehsan Ullah MUNIR 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第2期151-164,共14页
Knowledge extraction from sensitive data often needs collaborative work. Statistical databases are generated from such data and shared among various stakeholders. In this context, the ownership protection of shared da... Knowledge extraction from sensitive data often needs collaborative work. Statistical databases are generated from such data and shared among various stakeholders. In this context, the ownership protection of shared data becomes important. Watermarking is emerging to be a very effective tool for imposing ownership rights on various digital data formats. Watermarking of such datasets may bring distortions in the data. Consequently, the extracted knowledge may be inaccurate. These distortions are controlled by the usability constraints, which in turn limit the available bandwidth for watermarking. Large bandwidth ensures robustness; however, it may degrade the quality of the data. Such a situation can be resolved by optimizing the available bandwidth subject to the usability constraints. Optimization techniques, particularly bioinspired techniques, have become a preferred choice for solving such issues during the past few years. In this paper, we investigate the usability of various optimization schemes for identifying the maximum available bandwidth to achieve two objectives:(1) preserving the knowledge stored in the data;(2) maximizing the available bandwidth subject to the usability constraints to achieve maximum robustness. The first objective is achieved with a usability constraint model, which ensures that the knowledge is not compromised as a result of watermark embedding. The second objective is achieved by finding the maximum bandwidth subject to the usability constraints specified in the first objective. The performance of optimization schemes is evaluated using different metrics. 展开更多
关键词 Information security Optimization Digital fights WATERMARKING
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部