Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:3549600

zbMath1232.68047MaRDI QIDQ3549600

Frank McSherry, Cynthia Dwork, Kunal Talwar

Publication date: 5 January 2009


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (only showing first 100 items - show all)

Federated personalized random forest for human activity recognitionConfidentiality and differential privacy in the dissemination of frequency tablesAn Improved Private Mechanism for Small DatabasesSample Complexity Bounds on Differentially Private Learning via Communication ComplexityInapproximability for Antiferromagnetic Spin Systems in the Tree Nonuniqueness RegionCommunication is Bounded by Root of RankAre Lock-Free Concurrent Algorithms Practically Wait-Free?Robust Protocols for Securely Expanding Randomness and Distributing Keys Using Untrusted Quantum DevicesThe Power of Localization for Efficiently Learning Linear Separators with NoiseConcentrated Differential Privacy: Simplifications, Extensions, and Lower BoundsEfficient noise generation to achieve differential privacy with applications to secure multiparty computationSecure random sampling in differential privacyPrivacy and Truthful Equilibrium Selection for Aggregative GamesMeasured continuous greedy with differential privacyFingerprinting Codes and the Price of Approximate Differential PrivacyUnnamed ItemUnnamed ItemThe backbone method for ultra-high dimensional sparse machine learningEfficient and secure outsourcing of differentially private data publicationA Survey on Approximation Mechanism Design Without Money for Facility GamesDifferentially Private Learning of Geometric ConceptsPreserving differential privacy in deep neural networks with relevance-based adaptive noise impositionAttacks on statistical databases: the highly noisy caseBuying Data from Privacy-Aware Individuals: The Effect of Negative PaymentsThe Core of the Participatory Budgeting ProblemPreserving differential privacy in convolutional deep belief networksSuper-Polylogarithmic Hypergraph Coloring Hardness via Low-Degree Long CodesAn Almost-Optimally Fair Three-Party Coin-Flipping ProtocolOptimal CUR Matrix DecompositionsPrivacy in implementationEXPONENTIAL IMPROVEMENT IN PRECISION FOR SIMULATING SPARSE HAMILTONIANSDiscrimination- and privacy-aware patternsComparative study of differentially private data synthesis methodsLearning privately with labeled and unlabeled examplesPerturbation Paradigms of Maintaining Privacy-Preserving Monotonicity for Differential PrivacyNew algorithms and lower bounds for circuits with linear threshold gatesDiscrete optimization methods for group model selection in compressed sensingOptimal data-independent noise for differential privacyDeciding First-Order Properties of Nowhere Dense GraphsThe Matching Polytope has Exponential Extension ComplexityDifferentially private nearest neighbor classificationDifferentially private distance learning in categorical dataApproximate relational Hoare logic for continuous random samplingsEfficient money burning in general domainsUnnamed ItemEconomic efficiency requires interactionDistributed Private Data Analysis: Simultaneously Solving How and WhatProcessing text for privacy: an information flow perspectiveTruthful Mechanisms with Implicit Payment ComputationThe Geometry of Differential Privacy: The Small Database and Approximate CasesThe cost of privacy: optimal rates of convergence for parameter estimation with differential privacyOn the power of multiple anonymous messages: frequency estimation and selection in the shuffle model of differential privacyWhat Can We Learn Privately?Differentially private data release via statistical election to partition sequentiallyPrivacy, patience, and protectionBounds on the Sample Complexity for Private Learning and Private Data ReleaseAlgorithmic Stability for Adaptive Data AnalysisComputing (and Life) Is All about TradeoffsPufferfishFingerprinting codes and the price of approximate differential privacyAnalyze gaussPrivate matchings and allocationsRounding sum-of-squares relaxationsConstant factor approximation for balanced cut in the PIE modelEntropy, optimization and countingPolynomial bounds for the grid-minor theoremAn excluded half-integral grid theorem for digraphs and the directed disjoint paths problemCops, robbers, and threatening skeletonsPseudorandom generators with optimal seed length for non-boolean poly-size circuitsOn derandomizing algorithms that err extremely rarelySuper-polynomial lower bounds for depth-4 homogeneous arithmetic formulasLower bounds for depth 4 formulas computing iterated matrix multiplicationThe limits of depth reduction for arithmetic formulasA super-polynomial lower bound for regular arithmetic formulasA characterization of locally testable affine-invariant properties via decomposition theoremsL p -testingTurnstile streaming algorithms might as well be linear sketchesLinear time construction of compressed text indices in compact spaceFormulas vs. circuits for small distance connectivityToward better formula lower boundsBreaking the minsky-papert barrier for constant-depth circuitsThe sample complexity of revenue maximizationOptimal competitive auctionsHomological product codesA quantum algorithm for computing the unit group of an arbitrary degree number fieldPrimal beats dual on online packing LPs in the random-order modelCompetitive algorithms from competitive equilibriaMinimum bisection is fixed parameter tractableAn efficient parallel solver for SDD linear systemsSolving SDD linear systems in nearly m log 1/2 n timeFrom hierarchical partitions to hierarchical coversShortest paths on polyhedral surfaces and terrainsEmbedding and canonizing graphs of bounded genus in logspaceTesting surface area with arbitrary accuracyCoin flipping of any constant bias implies one-way functionsInfinite randomness expansion with a constant number of devicesThe Complexity of Differential PrivacyA differentially private hybrid approach to traffic monitoringLow rank matrix recovery with adversarial sparse noise*SYLVESTER–GALLAI TYPE THEOREMS FOR APPROXIMATE COLLINEARITY




This page was built for publication: