Sciweavers

59 search results - page 7 / 12
» Fault-Tolerant Privacy-Preserving Statistics
Sort
View
WPES
2003
ACM
14 years 26 days ago
Privacy preserving database application testing
Traditionally, application software developers carry out their tests on their own local development databases. However, such local databases usually have only a small number of sa...
Xintao Wu, Yongge Wang, Yuliang Zheng
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
13 years 9 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
FOCS
2010
IEEE
13 years 5 months ago
A Multiplicative Weights Mechanism for Privacy-Preserving Data Analysis
Abstract--We consider statistical data analysis in the interactive setting. In this setting a trusted curator maintains a database of sensitive information about individual partici...
Moritz Hardt, Guy N. Rothblum
DFT
2005
IEEE
89views VLSI» more  DFT 2005»
14 years 1 months ago
On-Line Identification of Faults in Fault-Tolerant Imagers
Detection of defective pixels that develop on-line is a vital part of fault tolerant schemes for repairing imagers during operation. This paper presents a new algorithm for the id...
Glenn H. Chapman, Israel Koren, Zahava Koren, Jozs...
TWC
2008
156views more  TWC 2008»
13 years 7 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou