• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 483
Next 10 →

A Fast Marching Level Set Method for Monotonically Advancing Fronts

by J. A. Sethian - PROC. NAT. ACAD. SCI , 1995
"... We present a fast marching level set method for monotonically advancing fronts, which leads to an extremely fast scheme for solving the Eikonal equation. Level set methods are numerical techniques for computing the position of propagating fronts. They rely on an initial value partial differential eq ..."
Abstract - Cited by 630 (24 self) - Add to MetaCart
We present a fast marching level set method for monotonically advancing fronts, which leads to an extremely fast scheme for solving the Eikonal equation. Level set methods are numerical techniques for computing the position of propagating fronts. They rely on an initial value partial differential

Probabilistic Inference and Differential Privacy

by Oliver Williams, Frank Mcsherry
"... We identify and investigate a strong connection between probabilistic inference and differential privacy, the latter being a recent privacy definition that permits only indirect observation of data through noisy measurement. Previous research on differential privacy has focused on designing measurem ..."
Abstract - Cited by 16 (1 self) - Add to MetaCart
We identify and investigate a strong connection between probabilistic inference and differential privacy, the latter being a recent privacy definition that permits only indirect observation of data through noisy measurement. Previous research on differential privacy has focused on designing

Probabilistic Relational Reasoning for Differential Privacy

by Gilles Barthe, Boris Köpf, Federico Olmedo, Santiago Zanella Béguelin
"... Differential privacy is a notion of confidentiality that protects the privacy of individuals while allowing useful computations on their private data. Deriving differential privacy guarantees for real programs is a difficult and error-prone task that calls for principled approaches and tool support. ..."
Abstract - Cited by 28 (6 self) - Add to MetaCart
on top of theCoq proof assistant. The central component ofCertiPriv is a quantitative extension of a probabilistic relational Hoare logic that enables one to derive differential privacy guarantees for programs from first principles. We demonstrate the expressiveness of CertiPriv using a number

Behavioral theories and the neurophysiology of reward,

by Wolfram Schultz - Annu. Rev. Psychol. , 2006
"... ■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories that can ..."
Abstract - Cited by 187 (0 self) - Add to MetaCart
of the infrastructure over a 24-hour day, by avoiding long queues during prime daytime hours and inactive periods during the wee hours of the night. A proper pricing structure known in advance to the captains of the barges will shape their decisions to enter the locks at a moment that is economically most appropriate

The differential privacy frontier (extended abstract

by Cynthia Dwork - In TCC , 2009
"... Abstract. We review the definition of differential privacy and briefly survey a handful of very recent contributions to the differential privacy frontier. 1 Background Differential privacy is a strong privacy guarantee for an individual’s input to a (randomized) function or sequence of functions, wh ..."
Abstract - Cited by 30 (0 self) - Add to MetaCart
Abstract. We review the definition of differential privacy and briefly survey a handful of very recent contributions to the differential privacy frontier. 1 Background Differential privacy is a strong privacy guarantee for an individual’s input to a (randomized) function or sequence of functions

Differential Privacy and Security?

by Damas P. Gruska
"... Abstract. A quantification of process’s security by differential privacy is defined and studied in the framework of probabilistic process alge-bras. The resulting (quantitative) security properties are studied and compared with other (qualitative) security notions. ..."
Abstract - Add to MetaCart
Abstract. A quantification of process’s security by differential privacy is defined and studied in the framework of probabilistic process alge-bras. The resulting (quantitative) security properties are studied and compared with other (qualitative) security notions.

Modular reasoning about differential privacy in a probabilistic process calculus

by Lili Xu - In TGC , 1982
"... Abstract. The verification of systems for protecting sensitive and confidential information is becoming an increasingly important issue. Differential privacy is a promising notion of privacy originated from the community of statistical databases, and now widely adopted in various models of computati ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
of computation. We con-sider a probabilistic process calculus as a specification formalism for concurrent systems, and we propose a framework for reasoning about the degree of differ-ential privacy provided by such systems. In particular, we investigate the preser-vation of the degree of privacy under

Publishing SetValued Data via Differential Privacy

by Rui Chen, Bipin C. Desai, Noman Mohammed, Li Xiong, Benjamin C. M. Fung
"... Set-valued data provides enormous opportunities for various data mining tasks. In this paper, we study the problem of publishing set-valued data for data mining tasks under the rigorous differential privacy model. All existing data publishing methods for set-valued data are based on partitionbased p ..."
Abstract - Cited by 31 (13 self) - Add to MetaCart
Set-valued data provides enormous opportunities for various data mining tasks. In this paper, we study the problem of publishing set-valued data for data mining tasks under the rigorous differential privacy model. All existing data publishing methods for set-valued data are based on partitionbased

Privacy Preserving Association Rule Mining

by Yucel Saygin, Vassilios Verykios, and Ahmed Elmagarmid, Ahmed K. Elmagarmid - Proc. of 12th Intl. Workshop on Research Issues in Data Engineering (RIDE , 2002
"... The current trend in the application space towards systems of loosely coupled and dynamically bound components that enables just-in-time integration jeopardizes the security of information that is shared between the broker, the requester, and the provider at runtime. In particular, new advances in d ..."
Abstract - Cited by 44 (2 self) - Add to MetaCart
The current trend in the application space towards systems of loosely coupled and dynamically bound components that enables just-in-time integration jeopardizes the security of information that is shared between the broker, the requester, and the provider at runtime. In particular, new advances

Materials for an exploratory theory of the network society.

by Manuel Castells , Anthony Giddens , Alain Touraine , Anthony Smith , Benjamin Barber , Peter Hall , Roger-Pol Droit , Sophie Watson , Frank Webster , Krishan Kumar , David Lyon , Craig Calhoun , Jeffrey Henderson , Ramon Ramos , Jose E Rodrigues-Ibanez , Jose F Tezanos , Mary Kaldor , Stephen Jones , Christopher Freeman - The British Journal of Sociology , 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract - Cited by 122 (0 self) - Add to MetaCart
and uses of the product vis-à-vis consumption, and investment, as well as the differential appropriation of the product (consumption). The structural principle under which surplus is appropriated and controlled characterizes a mode of production, such as capitalism or statism. The concept of mode
Next 10 →
Results 1 - 10 of 483
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University