Sciweavers

TCC
2012
Springer
218views Cryptology» more  TCC 2012»
12 years 9 days ago
Iterative Constructions and Private Data Release
In this paper we study the problem of approximately releasing the cut function of a graph while preserving differential privacy, and give new algorithms (and new analyses of exis...
Anupam Gupta, Aaron Roth, Jonathan Ullman
PAMI
2011
12 years 7 months ago
Construction of Iso-Contours, Bisectors, and Voronoi Diagrams on Triangulated Surfaces
—In the research of computer vision and machine perception, three-dimensional objects are usually represented by 2-manifold triangular meshes M. In this paper, we present practic...
Yong-Jin Liu, Zhanqing Chen, Kai Tang