Results 1 - 10
of
483
A Fast Marching Level Set Method for Monotonically Advancing Fronts
- PROC. NAT. ACAD. SCI
, 1995
"... We present a fast marching level set method for monotonically advancing fronts, which leads to an extremely fast scheme for solving the Eikonal equation. Level set methods are numerical techniques for computing the position of propagating fronts. They rely on an initial value partial differential eq ..."
Abstract
-
Cited by 630 (24 self)
- Add to MetaCart
We present a fast marching level set method for monotonically advancing fronts, which leads to an extremely fast scheme for solving the Eikonal equation. Level set methods are numerical techniques for computing the position of propagating fronts. They rely on an initial value partial differential
Probabilistic Inference and Differential Privacy
"... We identify and investigate a strong connection between probabilistic inference and differential privacy, the latter being a recent privacy definition that permits only indirect observation of data through noisy measurement. Previous research on differential privacy has focused on designing measurem ..."
Abstract
-
Cited by 16 (1 self)
- Add to MetaCart
We identify and investigate a strong connection between probabilistic inference and differential privacy, the latter being a recent privacy definition that permits only indirect observation of data through noisy measurement. Previous research on differential privacy has focused on designing
Probabilistic Relational Reasoning for Differential Privacy
"... Differential privacy is a notion of confidentiality that protects the privacy of individuals while allowing useful computations on their private data. Deriving differential privacy guarantees for real programs is a difficult and error-prone task that calls for principled approaches and tool support. ..."
Abstract
-
Cited by 28 (6 self)
- Add to MetaCart
on top of theCoq proof assistant. The central component ofCertiPriv is a quantitative extension of a probabilistic relational Hoare logic that enables one to derive differential privacy guarantees for programs from first principles. We demonstrate the expressiveness of CertiPriv using a number
Behavioral theories and the neurophysiology of reward,
- Annu. Rev. Psychol.
, 2006
"... ■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories that can ..."
Abstract
-
Cited by 187 (0 self)
- Add to MetaCart
of the infrastructure over a 24-hour day, by avoiding long queues during prime daytime hours and inactive periods during the wee hours of the night. A proper pricing structure known in advance to the captains of the barges will shape their decisions to enter the locks at a moment that is economically most appropriate
The differential privacy frontier (extended abstract
- In TCC
, 2009
"... Abstract. We review the definition of differential privacy and briefly survey a handful of very recent contributions to the differential privacy frontier. 1 Background Differential privacy is a strong privacy guarantee for an individual’s input to a (randomized) function or sequence of functions, wh ..."
Abstract
-
Cited by 30 (0 self)
- Add to MetaCart
Abstract. We review the definition of differential privacy and briefly survey a handful of very recent contributions to the differential privacy frontier. 1 Background Differential privacy is a strong privacy guarantee for an individual’s input to a (randomized) function or sequence of functions
Differential Privacy and Security?
"... Abstract. A quantification of process’s security by differential privacy is defined and studied in the framework of probabilistic process alge-bras. The resulting (quantitative) security properties are studied and compared with other (qualitative) security notions. ..."
Abstract
- Add to MetaCart
Abstract. A quantification of process’s security by differential privacy is defined and studied in the framework of probabilistic process alge-bras. The resulting (quantitative) security properties are studied and compared with other (qualitative) security notions.
Modular reasoning about differential privacy in a probabilistic process calculus
- In TGC
, 1982
"... Abstract. The verification of systems for protecting sensitive and confidential information is becoming an increasingly important issue. Differential privacy is a promising notion of privacy originated from the community of statistical databases, and now widely adopted in various models of computati ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
of computation. We con-sider a probabilistic process calculus as a specification formalism for concurrent systems, and we propose a framework for reasoning about the degree of differ-ential privacy provided by such systems. In particular, we investigate the preser-vation of the degree of privacy under
Publishing SetValued Data via Differential Privacy
"... Set-valued data provides enormous opportunities for various data mining tasks. In this paper, we study the problem of publishing set-valued data for data mining tasks under the rigorous differential privacy model. All existing data publishing methods for set-valued data are based on partitionbased p ..."
Abstract
-
Cited by 31 (13 self)
- Add to MetaCart
Set-valued data provides enormous opportunities for various data mining tasks. In this paper, we study the problem of publishing set-valued data for data mining tasks under the rigorous differential privacy model. All existing data publishing methods for set-valued data are based on partitionbased
Privacy Preserving Association Rule Mining
- Proc. of 12th Intl. Workshop on Research Issues in Data Engineering (RIDE
, 2002
"... The current trend in the application space towards systems of loosely coupled and dynamically bound components that enables just-in-time integration jeopardizes the security of information that is shared between the broker, the requester, and the provider at runtime. In particular, new advances in d ..."
Abstract
-
Cited by 44 (2 self)
- Add to MetaCart
The current trend in the application space towards systems of loosely coupled and dynamically bound components that enables just-in-time integration jeopardizes the security of information that is shared between the broker, the requester, and the provider at runtime. In particular, new advances
Materials for an exploratory theory of the network society.
- The British Journal of Sociology
, 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract
-
Cited by 122 (0 self)
- Add to MetaCart
and uses of the product vis-à-vis consumption, and investment, as well as the differential appropriation of the product (consumption). The structural principle under which surplus is appropriated and controlled characterizes a mode of production, such as capitalism or statism. The concept of mode
Results 1 - 10
of
483