Sciweavers

315 search results - page 35 / 63
» Algebraic Lower Bounds for Computing on Encrypted Data
Sort
View
FOCS
2010
IEEE
14 years 10 months ago
The Limits of Two-Party Differential Privacy
We study differential privacy in a distributed setting where two parties would like to perform analysis of their joint data while preserving privacy for both datasets. Our results ...
Andrew McGregor, Ilya Mironov, Toniann Pitassi, Om...
107
Voted
IMR
2004
Springer
15 years 6 months ago
Non-Replicating Indexing for Out-Of-Core Processing of Semi-Regular Triangular Surface Meshes
We introduce an indexing scheme for the vertices of semi-regular meshes, based on interleaving quadtrees rooted on the edges of the base mesh. Using this indexing scheme we develo...
Igor Guskov
116
Voted
MDM
2007
Springer
111views Communications» more  MDM 2007»
15 years 6 months ago
FragDB - Secure Localized Storage Based on Super-Distributed RFID-Tag Infrastructures
Smart environments and wearables will make the storage and subsequent sharing of digitized multimedia diaries and meeting protocols – whom we meet, or what we say or do – chea...
Marc Langheinrich
118
Voted
IDA
2007
Springer
15 years 14 days ago
Approximate mining of frequent patterns on streams
Abstract. This paper introduces a new algorithm for approximate mining of frequent patterns from streams of transactions using a limited amount of memory. The proposed algorithm co...
Claudio Silvestri, Salvatore Orlando
MP
2010
132views more  MP 2010»
14 years 7 months ago
Exploiting group symmetry in semidefinite programming relaxations of the quadratic assignment problem
We consider semidefinite programming relaxations of the quadratic assignment problem, and show how to exploit group symmetry in the problem data. Thus we are able to compute the b...
Etienne de Klerk, Renata Sotirov