Sciweavers

INNOVATIONS
2016
56views more  INNOVATIONS 2016»
10 years 1 months ago
How to Incentivize Data-Driven Collaboration Among Competing Parties
The availability of vast amounts of data is changing how we can make medical discoveries, predict global market trends, save energy, and develop new educational strategies. In cer...
Pablo Daniel Azar, Shafi Goldwasser, Sunoo Park
INNOVATIONS
2016
43views more  INNOVATIONS 2016»
10 years 1 months ago
Secure Multiparty Computation with General Interaction Patterns
abstract of this work published in ITCS 2016 We present a unified framework for studying secure multi-party computation (MPC) with arbitrarily restricted interaction patterns. Ou...
Shai Halevi, Yuval Ishai, Abhishek Jain, Eyal Kush...
INNOVATIONS
2016
35views more  INNOVATIONS 2016»
10 years 1 months ago
Permanent v. Determinant: An Exponential Lower Bound Assuming Symmetry
We initiate a study of determinantal representations with symmetry. We show that Grenet’s determinantal representation for the permanent is optimal among determinantal representa...
Joseph M. Landsberg, Nicolas Ressayre
INNOVATIONS
2016
47views more  INNOVATIONS 2016»
10 years 1 months ago
Is There an Oblivious RAM Lower Bound?
An Oblivious RAM (ORAM), introduced by Goldreich and Ostrovsky (JACM 1996), is a (probabilistic) RAM that hides its access pattern, i.e. for every input the observed locations acc...
Elette Boyle, Moni Naor
INNOVATIONS
2016
40views more  INNOVATIONS 2016»
10 years 1 months ago
Rational Proofs with Multiple Provers
Interactive proofs model a world where a verifier delegates computation to an untrustworthy prover, verifying the prover’s claims before accepting them. These proofs have appli...
Jing Chen, Samuel McCauley, Shikha Singh 0002
INNOVATIONS
2016
54views more  INNOVATIONS 2016»
10 years 1 months ago
Fully Succinct Garbled RAM
Ran Canetti, Justin Holmgren
INNOVATIONS
2016
55views more  INNOVATIONS 2016»
10 years 1 months ago
Auction Revenue in the General Spiteful-Utility Model
It is well accepted that, in some auctions, a player’s “true utility”may depend not only on the price he pays and whether or not he wins the good, but also on various forms ...
Jing Chen, Silvio Micali
INNOVATIONS
2016
47views more  INNOVATIONS 2016»
10 years 1 months ago
Cryptography for Parallel RAM from Indistinguishability Obfuscation
Yu-Chi Chen, Sherman S. M. Chow, Kai-Min Chung, Ru...
INNOVATIONS
2016
34views more  INNOVATIONS 2016»
10 years 1 months ago
On Sketching Quadratic Forms
We undertake a systematic study of sketching a quadratic form: given an n × n matrix A, create a succinct sketch sk(A) which can produce (without further access to A) a multiplic...
Alexandr Andoni, Jiecao Chen, Robert Krauthgamer, ...
INNOVATIONS
2016
65views more  INNOVATIONS 2016»
10 years 1 months ago
An Axiomatic Approach to Community Detection
Inspired by social choice theory in voting and other contexts [2], we provide the first axiomatic approach to community identification in social and information networks. We sta...
Christian Borgs, Jennifer T. Chayes, Adrian Marple...