Sciweavers

254 search results - page 7 / 51
» Analysis of Privacy Loss in Distributed Constraint Optimizat...
Sort
View
PET
2005
Springer
14 years 25 days ago
An Analysis of Parallel Mixing with Attacker-Controlled Inputs
Parallel mixing [7] is a technique for optimizing the latency of a synchronous re-encryption mix network. We analyze the anonymity of this technique when an adversary can learn the...
Nikita Borisov
ANOR
2010
112views more  ANOR 2010»
13 years 5 months ago
Online stochastic optimization under time constraints
This paper considers online stochastic optimization problems where uncertainties are characterized by a distribution that can be sampled and where time constraints severely limit t...
Pascal Van Hentenryck, Russell Bent, Eli Upfal
ICC
2009
IEEE
144views Communications» more  ICC 2009»
14 years 2 months ago
Capacity of Optical Intensity Channels with Peak and Average Power Constraints
— The design and analysis of capacity-approaching input signalling for optical intensity channels are presented. Both peak and average optical power constraints are considered in...
Ahmed A. Farid, Steve Hranilovic
FOCS
2010
IEEE
13 years 5 months ago
A Multiplicative Weights Mechanism for Privacy-Preserving Data Analysis
Abstract--We consider statistical data analysis in the interactive setting. In this setting a trusted curator maintains a database of sensitive information about individual partici...
Moritz Hardt, Guy N. Rothblum
DASFAA
2009
IEEE
252views Database» more  DASFAA 2009»
14 years 2 months ago
Optimal Privacy-Aware Path in Hippocratic Databases
Abstract. Privacy becomes a major concern for both customers and enterprises in today’s corporate marketing strategies, many research efforts have been put into developing new p...
Min Li, Xiaoxun Sun, Hua Wang, Yanchun Zhang