Sciweavers

5344 search results - page 72 / 1069
» Privacy-Preserving Set Operations
Sort
View
LICS
2002
IEEE
14 years 2 months ago
Computational Adequacy for Recursive Types in Models of Intuitionistic Set Theory
This paper provides a unifying axiomatic account of the interpretation of recursive types that incorporates both domain-theoretic and realizability models as concrete instances. O...
Alex K. Simpson
SODA
2010
ACM
171views Algorithms» more  SODA 2010»
13 years 7 months ago
Differential Privacy in New Settings
Differential privacy is a recent notion of privacy tailored to the problem of statistical disclosure control: how to release statistical information about a set of people without ...
Cynthia Dwork
MANSCI
2008
54views more  MANSCI 2008»
13 years 10 months ago
Pricing and Operational Recourse in Coproduction Systems
Coproduction systems, in which multiple products are produced simultaneously in a single production run, are prevalent in many industries. Such systems typically produce a random ...
Brian Tomlin, Yimin Wang
ICDE
2011
IEEE
245views Database» more  ICDE 2011»
13 years 1 months ago
Stochastic skyline operator
— In many applications involving the multiple criteria optimal decision making, users may often want to make a personal trade-off among all optimal solutions. As a key feature, t...
Xuemin Lin, Ying Zhang, Wenjie Zhang, Muhammad Aam...
DAM
2000
69views more  DAM 2000»
13 years 9 months ago
Simple image set of (max, +) linear mappings
Let us denote a b = max(a; b) and a b = a + b for a; b R and extend this pair of operations to matrices and vectors in the same way as in conventional linear algebra, that is i...
Peter Butkovic