While in the past, mobility traces were only available to mobile phone carriers, the advent of smartphones and other means of data collection has made these broadly available. These include the movements of a competitor sales force, attendance of a particular church or an individual's presence in a motel or at an abortion clinic.
A list of potentially sensitive professional and personal information that could be inferred about an individual knowing only his mobility trace was published recently by the Electronic Frontier Foundation 20. Individual mobility traces T have been used in the past for research purposes 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18 and to provide personalized services to users 19. Mobility data contains the approximate whereabouts of individuals and can be used to reconstruct individuals' movements across space and time. Mobility data is among the most sensitive data currently being collected. Modern information technologies such as the Internet and mobile phones, however, magnify the uniqueness of individuals, further enhancing the traditional challenges to privacy. in which Samuel Warren and Louis Brandeis argued that privacy law must evolve in response to technological changes 3. This resulted in one of the first publications advocating privacy in the U.S. In the late 19th century, de-facto privacy was similarly threatened by photographs and yellow journalism. In 1086, William I of England commissioned the creation of the Doomsday book, a written record of major property holdings in England containing individual information collected for tax and draft purposes 2. For centuries, information technologies have challenged these informal protection mechanisms. For instance, tracking individuals' movements has been historically difficult, making them de-facto private. Despite its importance, privacy has mainly relied on informal protection mechanisms.
See also the implementations in libstdc++, libc++, and MSVC STL.Derived from the Latin Privatus, meaning “withdraw from public life,” the notion of privacy has been foundational to the development of our diverse societies, forming the basis for individuals' rights such as free speech and religious freedom 1.
A call to unique is typically followed by a call to a container's erase member function, which erases the unspecified values and reduces the physical size of the container to match its new logical size. Iterators in [r, last) (if any), where r is the return value, are still dereferenceable, but the elements themselves have unspecified values.
Relative order of the elements that remain is preserved and the physical size of the container is unchanged. If the algorithm fails to allocate memory, std::bad_alloc is thrown.For any other ExecutionPolicy, the behavior is implementation-defined.