Sciweavers

254 search results - page 7 / 51
» Analysis of Privacy Loss in Distributed Constraint Optimizat...
Sort
View
104
Voted
PET
2005
Springer
15 years 3 months ago
An Analysis of Parallel Mixing with Attacker-Controlled Inputs
Parallel mixing [7] is a technique for optimizing the latency of a synchronous re-encryption mix network. We analyze the anonymity of this technique when an adversary can learn the...
Nikita Borisov
77
Voted
ANOR
2010
112views more  ANOR 2010»
14 years 7 months ago
Online stochastic optimization under time constraints
This paper considers online stochastic optimization problems where uncertainties are characterized by a distribution that can be sampled and where time constraints severely limit t...
Pascal Van Hentenryck, Russell Bent, Eli Upfal
ICC
2009
IEEE
144views Communications» more  ICC 2009»
15 years 4 months ago
Capacity of Optical Intensity Channels with Peak and Average Power Constraints
— The design and analysis of capacity-approaching input signalling for optical intensity channels are presented. Both peak and average optical power constraints are considered in...
Ahmed A. Farid, Steve Hranilovic
84
Voted
FOCS
2010
IEEE
14 years 7 months ago
A Multiplicative Weights Mechanism for Privacy-Preserving Data Analysis
Abstract--We consider statistical data analysis in the interactive setting. In this setting a trusted curator maintains a database of sensitive information about individual partici...
Moritz Hardt, Guy N. Rothblum
DASFAA
2009
IEEE
252views Database» more  DASFAA 2009»
15 years 4 months ago
Optimal Privacy-Aware Path in Hippocratic Databases
Abstract. Privacy becomes a major concern for both customers and enterprises in today’s corporate marketing strategies, many research efforts have been put into developing new p...
Min Li, Xiaoxun Sun, Hua Wang, Yanchun Zhang