Results 1 - 10
of
296,031
Table 22: Importance of Child Care Serv
2004
"... In PAGE 12: ... Most respondents used child care centers and the Tennessee Department of Hu- man Services (DHS) paid all or part of the expenses for a large majority (Table 21). Table22 indicates that more than three quarters of respondents believed that they would not be able to work without child care help. Lack of availability, not affordability, appears to be the larger problem for respon- dents as 15-18 percent had experienced a disruption in work, education, or training due to the lack of affordable childcare, while almost one-third could not locate child care providers.... ..."
TABLE II COMPUTATIONAL OVERHEADS OF THE MAJOR STEPS OF PRIVACY-PRESERVING WIRELESS COMMUNICATION. *THE OVERHEAD OF THE SERVER DOES NOT INCLUDE THE OVERHEAD OF THE VERIFICATION OF THE CREDIT CARD INFORMATION OR THE OVERHEAD OF SEARCHING AND STORING DATA IN A DATABASE
2004
Cited by 1
Table 5. Examples of the privacy-preserving methods evaluated with real data in the literature.
"... In PAGE 45: ... The problem with a real-world application is that these privacy-preserving data mining techniques have not yet been adopted on a large scale. Table5 presents some examples found in the literature in which the methods were evaluated with real data. It can be clearly seen that four of the seven studies presented used synthetic data instead of real data.... In PAGE 45: ... It can be clearly seen that four of the seven studies presented used synthetic data instead of real data. The use of real data does not produce better results; the idea that almost none of the methods is really adapted to real-world applications can be seen from Table5 . As can also be seen in Table 5, various data mining algorithms have been considered in isolation from each other.... ..."
Table 2: Variation in Child Care Regulations
in -DQXDU\
"... In PAGE 12: ... Hence we include measures for both types of child care setting.4 Table2 shows the number of states that require head caregivers in either setting to have more than a high school degree, that require insurance, or that have more than one required inspection per year. Mean maximum ratios of children to caregivers for two age groups are also shown.... In PAGE 12: ... Mean maximum ratios of children to caregivers for two age groups are also shown. Table2 shows that on average, there was little change in these ratios over time, something that is also true within states.5 Potentially more significant changes in state child care regulations occurred between 1986 and 1987, when 6 states added requirements that head caregivers have some training beyond a high school degree.... In PAGE 13: ... Often such training would consist of a specified number of courses in child development from a local community college. Finally, Table2 indicates that there has been a slow decline in the use of direct inspections and an increase in the number of states that require at least some types of child care providers to carry insurance. b) Individual-Level Data The National Longitudinal Survey of Youth began in 1978 with approximately 6,000 young men and 6,000 young women.... In PAGE 22: ... All models are estimated by weighted least squares, where the weights are given by the cell sizes. In addition to (7), we estimate a model that includes the vector of child care regulation variables described in Table2 , and we also estimate these models separately by race. Although we include state and year effects in these models, it is possible that the estimated effects of the policy variables are biased by the omission of other things that are varying within states over time.... ..."
Table 3. Examples of how the privacy is preserved in the data mining context in literature.
"... In PAGE 28: ... The main objective in privacy-preserving data mining is to develop algorithms for modifying the original data in some way, so that the private data and private knowledge remain private even after the mining process [1]. This approach requires definition what is private, and, because this has many different definitions (examples can be seen in Table3 ), the approaches ... In PAGE 30: .... does not constitute an intrusion. Formal definitions for both of these are challenging. In Table3 , some examples of how privacy is said to be preserved in the literature are presented. To the best of my understanding, only Agrawal et al.... In PAGE 76: ...g. [61]), while a few others try to formulate privacy within a mathematical framework (see, for example, Table3 ). The privacy issue is controversial and, as the discussion in Chapter 2.... ..."
Table 6. The cluster assignments of the privacy-preserving k-means algorithm compared to the regular k-means clustering.
"... In PAGE 64: ... Although the descriptive information might provide interesting insights about the data, the actual use of the clustering method for predictions will be the cluster assignments The cluster assignments tell us which segment each customer belongs to and, in case of a new customer, the potential segment. Table6 shows the assignments of the models, how the assignments of the protocols differ. The assignments of the normal k-means are taken as the baseline to which the assignments of our privacy-preserving k-means are being compared.... In PAGE 64: ... The assignments of the normal k-means are taken as the baseline to which the assignments of our privacy-preserving k-means are being compared. The results in Table6 show that misassignments grow as the number ... ..."
Table 6 the cluster assignments of the privacy preserving k means algorithm compared to the regular k means clustering.
"... In PAGE 61: ... Although the descriptive information might provide interesting insights about the data, the actual use of clustering method on predictions will be the cluster assignments The cluster assignments tell us which segment each customer belongs to and in case of a new customer, the potential segment. The Table6 shows the assignments of the models, how the assignments of the protocols differ. The assignments of the normal k means are taken as baseline to which the assignments of our privacy preserving k means are being compared at.... In PAGE 61: ... The assignments of the normal k means are taken as baseline to which the assignments of our privacy preserving k means are being compared at. The results in the Table6 shows that the miss assignments grow as the number of... ..."
Table 2: Percentage Change in Child Care Services Enrollment between 1993-2000
"... In PAGE 12: ... To provide some insight into the magnitude of change in child care enrollment, data from 1993-1994 were compared to current data for those countries in which they were available. Out of 14 countries for which data were available, four experienced significant change (see Table2 ). Results for older women, especially the four countries that experienced significant change (Sweden, Great Britain, Denmark, and Finland), should be interpreted with caution because their childbearing predates the child care environment examined.... ..."
Table A-5. Logit Coefficients Predicting Whether a Family IncurredChild Care Expenses: 1992
2001
Results 1 - 10
of
296,031