Sciweavers

5344 search results - page 72 / 1069
» Privacy-Preserving Set Operations
Sort
View
125
Voted
LICS
2002
IEEE
15 years 7 months ago
Computational Adequacy for Recursive Types in Models of Intuitionistic Set Theory
This paper provides a unifying axiomatic account of the interpretation of recursive types that incorporates both domain-theoretic and realizability models as concrete instances. O...
Alex K. Simpson
SODA
2010
ACM
171views Algorithms» more  SODA 2010»
15 years 7 days ago
Differential Privacy in New Settings
Differential privacy is a recent notion of privacy tailored to the problem of statistical disclosure control: how to release statistical information about a set of people without ...
Cynthia Dwork
MANSCI
2008
54views more  MANSCI 2008»
15 years 2 months ago
Pricing and Operational Recourse in Coproduction Systems
Coproduction systems, in which multiple products are produced simultaneously in a single production run, are prevalent in many industries. Such systems typically produce a random ...
Brian Tomlin, Yimin Wang
ICDE
2011
IEEE
245views Database» more  ICDE 2011»
14 years 6 months ago
Stochastic skyline operator
— In many applications involving the multiple criteria optimal decision making, users may often want to make a personal trade-off among all optimal solutions. As a key feature, t...
Xuemin Lin, Ying Zhang, Wenjie Zhang, Muhammad Aam...
DAM
2000
69views more  DAM 2000»
15 years 2 months ago
Simple image set of (max, +) linear mappings
Let us denote a b = max(a; b) and a b = a + b for a; b R and extend this pair of operations to matrices and vectors in the same way as in conventional linear algebra, that is i...
Peter Butkovic