BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
differenti (26)
data (26)
inform (21)
public (15)
releas (12)

Stem privat$ (all stems)

139 papers:

PODSPODS-2015-Ullman #linear #multi #query
Private Multiplicative Weights Beyond Linear Queries (JU), pp. 303–312.
SIGMODSIGMOD-2015-ZhangCPSX #graph #statistics #using
Private Release of Graph Statistics using Ladder Functions (JZ, GC, CMP, DS, XX), pp. 731–745.
VLDBVLDB-2015-HeCMPS #named #synthesis #using
DPT: Differentially Private Trajectory Synthesis Using Hierarchical Reference Systems (XH, GC, AM, CMP, DS), pp. 1154–1165.
STOCSTOC-2015-BassilyS #performance #protocol
Local, Private, Efficient Protocols for Succinct Histograms (RB, ADS), pp. 127–135.
ICALPICALP-v1-2015-Nikolov #big data #database
An Improved Private Mechanism for Small Databases (AN), pp. 1010–1021.
CHICHI-2015-WinklerGLHSDR #security #smarttech
Glass Unlock: Enhancing Security of Smartphone Unlocking through Leveraging a Private Near-eye Display (CW, JG, ADL, GH, PS, DD, ER), pp. 1407–1410.
HCIHCI-UC-2015-Sorum #quality
The Role of Quality in Websites: A Discussion Focusing on Public Versus Private Sector Organizations (HS), pp. 92–101.
HCIHIMI-IKC-2015-TogawaK #collaboration #framework #using
Disaster Recovery Framework for e-Learning Environment Using Private Cloud Collaboration and Emergency Alerts (ST, KK), pp. 588–596.
HCISCSM-2015-AhnL #network #social
An Analytic Study on Private SNS for Bonding Social Networking (HA, SL), pp. 107–117.
CAiSECAiSE-2015-ArellanoDA #editing #wiki
Editing Anxiety in Corporate Wikis: From Private Drafting to Public Edits (CA, OD, MA), pp. 20–34.
ICMLICML-2015-KusnerGGW #optimisation
Differentially Private Bayesian Optimization (MJK, JRG, RG, KQW), pp. 918–927.
ICMLICML-2015-NockPF
Rademacher Observations, Private Data, and Boosting (RN, GP, AF), pp. 948–956.
KDDKDD-2015-ChenXZX
Differentially Private High-Dimensional Data Publication via Sampling-Based Inference (RC, QX, YZ, JX), pp. 129–138.
KDDKDD-2015-ChierichettiEKL #algorithm #network #performance #social
Efficient Algorithms for Public-Private Social Networks (FC, AE, RK, SL, VSM), pp. 139–148.
RecSysRecSys-2015-LiuWS #matrix #performance
Fast Differentially Private Matrix Factorization (ZL, YXW, AJS), pp. 171–178.
HPCAHPCA-2015-RosDK #classification #clustering #performance
Hierarchical private/shared classification: The key to simple and efficient coherence for clustered cache hierarchies (AR, MD, SK), pp. 186–197.
SOSPSOSP-2015-HooffLZZ #analysis #named #scalability
Vuvuzela: scalable private messaging resistant to traffic analysis (JvdH, DL, MZ, NZ), pp. 137–152.
CASECASE-2014-HungLHTC #development
Development of a private cloud-based new-generation virtual metrology system (MHH, YCL, HCH, CCT, FTC), pp. 910–915.
SIGMODSIGMOD-2014-QardajiYL #named
PriView: practical differentially private release of marginal contingency tables (WHQ, WY, NL), pp. 1435–1446.
SIGMODSIGMOD-2014-ZhangCPSX #named #network
PrivBayes: private data release via bayesian networks (JZ, GC, CMP, DS, XX), pp. 1423–1434.
VLDBVLDB-2014-KellarisPXP #infinity #sequence
Differentially Private Event Sequences over Infinite Streams (GK, SP, XX, DP), pp. 1155–1166.
VLDBVLDB-2014-LiXZJ #named #privacy
DPSynthesizer: Differentially Private Data Synthesizer for Privacy Preserving Data Sharing (HL, LX, LZ, XJ), pp. 1677–1680.
VLDBVLDB-2014-ProserpioGM #data analysis
Calibrating Data to Sensitivity in Private Data Analysis (DP, SG, FM), pp. 637–648.
STOCSTOC-2014-HsuHRRW
Private matchings and allocations (JH, ZH, AR, TR, ZSW), pp. 21–30.
ICALPICALP-v1-2014-BravermanG #bound
Public vs Private Coin in Bounded-Round Information (MB, AG), pp. 502–513.
ICALPICALP-v1-2014-HsuRRU #linear #source code
Privately Solving Linear Programs (JH, AR, TR, JU), pp. 612–624.
CHICHI-2014-GaoYHEF #automation #communication #multi
Effects of public vs. private automated transcripts on multiparty communication between native and non-native english speakers (GG, NY, AMJH, AE, SRF), pp. 843–852.
CHICHI-2014-GohCTTS #collaboration #design #framework #game studies #interactive
The MOY framework for collaborative play design in integrated shared and private interactive spaces (WBG, MC, CHT, JT, WS), pp. 391–400.
HCIHIMI-AS-2014-TogawaK #collaboration #framework #smarttech #using
Private Cloud Collaboration Framework for e-Learning Environment for Disaster Recovery Using Smartphone Alert Notification (ST, KK), pp. 118–126.
HCIHIMI-DE-2014-ShiozuKYS #question
Does ICT Promote the Private Provision of Local Public Goods? (YS, KK, KY, KS), pp. 629–640.
ICMLICML-c1-2014-JainT #bound #independence #learning
(Near) Dimension Independent Risk Bounds for Differentially Private Learning (PJ, AGT), pp. 476–484.
ICMLICML-c2-2014-GaboardiAHRW #query
Dual Query: Practical Private Query Release for High Dimensional Data (MG, EJGA, JH, AR, ZSW), pp. 1170–1178.
KDDKDD-2014-LeeC
Top-k frequent itemsets via differentially private FP-trees (JL, CWC), pp. 931–940.
KDDKDD-2014-XiaoCT #network
Differentially private network data release via structural inference (QX, RC, KLT), pp. 911–920.
RecSysRecSys-2014-BhagatWIT #learning #matrix #recommendation #using
Recommending with an agenda: active learning of private attributes using matrix factorization (SB, UW, SI, NT), pp. 65–72.
SACSAC-2014-WenD #performance #protocol
Efficient protocols for private record linkage (ZW, CD), pp. 1688–1694.
SIGMODSIGMOD-2013-FanXS #adaptation #monitoring #named #performance #realtime
FAST: differentially private real-time aggregate monitor with filtering and adaptive sampling (LF, LX, VSS), pp. 1065–1068.
SIGMODSIGMOD-2013-ZhangXYZW #algorithm #named #search-based #using
PrivGene: differentially private model fitting using genetic algorithms (JZ, XX, YY, ZZ, MW), pp. 665–676.
VLDBVLDB-2013-QardajiYL #comprehension
Understanding Hierarchical Methods for Differentially Private Histograms (WHQ, WY, NL), pp. 1954–1965.
STOCSTOC-2013-HardtR #analysis #worst-case
Beyond worst-case analysis in private singular vector computation (MH, AR), pp. 331–340.
STOCSTOC-2013-HsuRU #difference #equilibrium #privacy
Differential privacy for the analyst via private equilibrium computation (JH, AR, JU), pp. 341–350.
CHICHI-2013-ErikssonAS
The secret life of a persona: when the personal becomes private (EE, HA, AS), pp. 2677–2686.
CSCWCSCW-2013-KokkalisKPCBK #crowdsourcing #email #named
EmailValet: managing email overload through private, accountable crowdsourcing (NK, TK, CP, DC, MSB, SRK), pp. 1291–1300.
HCIDUXU-WM-2013-OzturkR13a #case study #mobile #usability
M-Commerce Usability: An Explorative Study on Turkish Private Shopping Apps and Mobile Sites (ÖÖ, KR), pp. 623–630.
HCIHCI-AS-2013-TogawaK #framework
Private Cloud Cooperation Framework for Reducing the Earthquake Damage on e-Learning Environment (ST, KK), pp. 503–510.
ICMLICML-c3-2013-0002T #kernel #learning
Differentially Private Learning with Kernels (PJ, AT), pp. 118–126.
SACSAC-2013-AbrilNT #documentation #towards
Towards a private vector space model for confidential documents (DA, GNA, VT), pp. 944–945.
PPoPPPPoPP-2013-AcarCR #parallel #scheduling #source code
Scheduling parallel programs by work stealing with private deques (UAA, AC, MR), pp. 219–228.
SIGMODSIGMOD-2012-GotzNG #mobile #named #personalisation
MaskIt: privately releasing user context streams for personalized mobile applications (MG, SN, JG), pp. 289–300.
VLDBVLDB-2013-ZengNC12 #mining #on the
On differentially private frequent itemset mining (CZ, JFN, JYC), pp. 25–36.
PLDIPLDI-2012-JohnsonKPZA #reduction
Speculative separation for privatization and reductions (NPJ, HK, PP, AZ, DIA), pp. 359–370.
STOCSTOC-2012-BhaskaraDKT #linear #query
Unconditional differentially private mechanisms for linear queries (AB, DD, RK, KT), pp. 1269–1284.
STOCSTOC-2012-MuthukrishnanN
Optimal private halfspace counting via discrepancy (SM, AN), pp. 1285–1292.
ICALPICALP-v1-2012-HsuKR #distributed
Distributed Private Heavy Hitters (JH, SK, AR), pp. 461–472.
ICALPICALP-v1-2012-ThalerUV #algorithm #performance
Faster Algorithms for Privately Releasing Marginals (JT, JU, SPV), pp. 810–821.
ICMLICML-2012-ChaudhuriH #convergence #estimation #statistics
Convergence Rates for Differentially Private Statistical Estimation (KC, DH), p. 223.
KDDKDD-2012-ChenFDS #case study
Differentially private transit data publication: a case study on the montreal transportation system (RC, BCMF, BCD, NMS), pp. 213–221.
OOPSLAOOPSLA-2012-HuangZ12a #concurrent #execution #source code
Execution privatization for scheduler-oblivious concurrent programs (JH, CZ), pp. 737–752.
SACSAC-2012-KarakasidisV
Reference table based k-anonymous private blocking (AK, VSV), pp. 859–864.
SACSAC-2012-Kerschbaum #outsourcing #set
Collusion-resistant outsourcing of private set intersection (FK), pp. 1451–1456.
SACSAC-2012-NgWZ #protocol
Private data deduplication protocols in cloud storage (WKN, YW, HZ), pp. 441–446.
OSDIOSDI-2012-NarayanH #database #distributed #named #query
DJoin: Differentially Private Join Queries over Distributed Databases (AN, AH), pp. 149–162.
PODSPODS-2011-MirMNW #algorithm #sketching #statistics
Pan-private algorithms via statistics on sketches (DJM, SM, AN, RNW), pp. 37–48.
SIGMODSIGMOD-2011-DingWHL #consistency #optimisation
Differentially private data cubes: optimizing noise sources and consistency (BD, MW, JH, ZL), pp. 217–228.
VLDBVLDB-2011-KarwaRSY #analysis #graph
Private Analysis of Graph Structure (VK, SR, AS, GY), pp. 1146–1157.
VLDBVLDB-2011-MachanavajjhalaKS #personalisation #question #recommendation #social
Personalized Social Recommendations — Accurate or Private? (AM, AK, ADS), pp. 440–450.
STOCSTOC-2011-GuptaHRU #query #statistics
Privately releasing conjunctions and the statistical query barrier (AG, MH, AR, JU), pp. 803–812.
STOCSTOC-2011-Woodruff #approximate #black box #protocol
Near-optimal private approximation protocols via a black box transformation (DPW), pp. 735–744.
KDDKDD-2011-MohammedCFY #data mining #mining
Differentially private data release for data mining (NM, RC, BCMF, PSY), pp. 493–501.
SIGIRSIGIR-2011-FeildAG #distributed #named
CrowdLogging: distributed, private, and anonymous search logging (HAF, JA, JG), pp. 375–384.
SACSAC-2011-LinC #query #towards
Towards communication-efficient private location dependent queries (KPL, MSC), pp. 433–438.
SACSAC-2011-RahmanHA #named #network #reliability
REBIVE: a reliable private data aggregation scheme for wireless sensor networks (FR, MEH, SIA), pp. 439–444.
HPCAHPCA-2011-LeeCC #named
CloudCache: Expanding and shrinking private caches (HL, SC, BRC), pp. 219–230.
SIGMODSIGMOD-2010-RastogiN #distributed #encryption
Differentially private aggregation of distributed time-series with transformation and encryption (VR, SN), pp. 735–746.
VLDBVLDB-2010-HayRMS #consistency
Boosting the Accuracy of Differentially Private Histograms Through Consistency (MH, VR, GM, DS), pp. 1021–1032.
STOCSTOC-2010-KasiviswanathanRSU #correlation #matrix #random
The price of privately releasing contingency tables and the spectra of random matrices with correlated rows (SPK, MR, AS, JU), pp. 775–784.
ICALPICALP-v2-2010-ChanSS #statistics
Private and Continual Release of Statistics (THHC, ES, DS), pp. 405–417.
KDDKDD-2010-ZhengSTLLCH #data mining #mining #network #using
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks (LZ, CS, LT, TL, SL, SCC, VH), pp. 125–134.
KMISKMIS-2010-CalisirGCYB
Intellectual Capital in Turkish Private Banks (FC, CAG, FC, EY, AEB), pp. 189–194.
SACSAC-2010-DolevGK #multi #scalability #trust
Computing multi-party trust privately: in O(n) time units sending one (possibly large) message at a time (SD, NG, MK), pp. 1460–1465.
SACSAC-2010-RodriguesNPM #parallel #thread
A new technique for data privatization in user-level threads and its use in parallel applications (ERR, POAN, JP, CLM), pp. 2149–2154.
ISMMISMM-2010-Anderson #garbage collection #optimisation
Optimizations in a private nursery-based garbage collector (TAA), pp. 21–30.
STOCSTOC-2009-DworkNRRV #algorithm #complexity #on the #performance
On the complexity of differentially private data release: efficient algorithms and hardness results (CD, MN, OR, GNR, SPV), pp. 381–390.
STOCSTOC-2009-FeldmanFKN
Private coresets (DF, AF, HK, KN), pp. 361–370.
KDDKDD-2009-McSherryM #privacy #recommendation
Differentially Private Recommender Systems: Building Privacy into the Netflix Prize Contenders (FM, IM), pp. 627–636.
SIGIRSIGIR-2009-SakumaK #analysis #graph
Link analysis for private weighted graphs (JS, SK), pp. 235–242.
ECOOPECOOP-2009-SteimannT #java #refactoring #source code
From Public to Private to Absent: Refactoring Java Programs under Constrained Accessibility (FS, AT), pp. 419–443.
SIGMODSIGMOD-2008-GhinitaKKST #query
Private queries in location based services: anonymizers are not necessary (GG, PK, AK, CS, KLT), pp. 121–132.
CSCWCSCW-2008-GuyJMRS #email #network #social
Public vs. private: comparing public social network information with email (IG, MJ, NM, IR, ES), pp. 393–402.
CIKMCIKM-2008-AnciauxBHPA
Data degradation: making private data less sensitive over time (NA, LB, HvH, PP, PMGA), pp. 1401–1402.
STOCSTOC-2007-NissimRS #data analysis
Smooth sensitivity and sampling in private data analysis (KN, SR, AS), pp. 75–84.
ICALPICALP-2007-DedicM #database #query
Constant-Round Private Database Queries (ND, PM), pp. 255–266.
ICALPICALP-2007-FurukawaA #black box #encryption
Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys (JF, NA), pp. 496–508.
ICALPICALP-2007-IshaiMSW #approximate #multi
Private Multiparty Sampling and Approximation of Vector Combinations (YI, TM, MJS, RNW), pp. 243–254.
ICALPICALP-2007-OstrovskyPS
Private Locally Decodable Codes (RO, OP, AS), pp. 387–398.
RecSysRecSys-2007-LathiaHC #collaboration #distributed #metric #using
Private distributed collaborative filtering using estimated concordance measures (NL, SH, LC), pp. 1–8.
SACSAC-2007-XiongCL #classification #database #mining #multi #using
Mining multiple private databases using a kNN classifier (LX, SC, LL), pp. 435–440.
HPCAHPCA-2007-DybdahlS #adaptation #clustering #multi
An Adaptive Shared/Private NUCA Cache Partitioning Scheme for Chip Multiprocessors (HD, PS), pp. 2–12.
DRRDRR-2006-TaghvaBCBPN #automation #information management #relational #using
Automatic redaction of private information using relational information extraction (KT, RB, JSC, JB, RP, TAN).
STOCSTOC-2006-BeimelCNW #approximate #problem
Private approximation of search problems (AB, PC, KN, EW), pp. 119–128.
ICEISICEIS-ISAS-2006-QueirosR #approach #information management #social
Structured Approach for the Introduction of Information Services into the Private Social Solidarity Institutions (AQ, NPdR), pp. 343–348.
CIKMCIKM-2006-XiongCL #classification #database #multi #nearest neighbour
k nearest neighbor classification across multiple private databases (LX, SC, LL), pp. 840–841.
CIKMCIKM-2006-YangDB
Practical private data matching deterrent to spoofing attacks (YY, RHD, FB), pp. 852–853.
KDDKDD-2006-LaurLM #encryption
Cryptographically private support vector machines (SL, HL, TM), pp. 618–624.
SIGMODSIGMOD-2005-HuangDC #random
Deriving Private Information from Randomized Data (ZH, WD, BC), pp. 37–48.
ICALPICALP-2005-EisenbrandGOS #design #network
New Approaches for Virtual Private Network Design (FE, FG, GO, MS), pp. 1151–1162.
ICALPICALP-2005-GentryR #communication #constant #information retrieval
Single-Database Private Information Retrieval with Constant Communication Rate (CG, ZR), pp. 803–815.
ICALPICALP-2005-WehnerW #bound #information retrieval
Improved Lower Bounds for Locally Decodable Codes and Private Information Retrieval (SW, RdW), pp. 1424–1436.
ICEISICEIS-v3-2005-Al-Fedaghi
The “Right to be Let Alone” and Private Information (SSAF), pp. 98–107.
SACSAC-2005-RodriguezL #implementation
Implementing private Vickrey auctions (IR, NL), pp. 796–800.
HTHT-2004-MarshallG #hypermedia #requirements
Saving private hypertext: requirements and pragmatic dimensions for preservation (CCM, GG), pp. 130–138.
SIGMODSIGMOD-2003-AgrawalES #database #information management
Information Sharing Across Private Databases (RA, AVE, RS), pp. 86–97.
STOCSTOC-2003-GalR #bound
Lower bounds on the amount of randomness in private computation (AG, AR), pp. 659–666.
ITiCSEITiCSE-2002-LevyL #recursion #syntax
Shared terminology, private syntax: the case of recursive descriptions (DL, TL), pp. 89–93.
SACSAC-2002-FerreiraD #embedded #mobile
Blinded-key signatures: securing private keys embedded in mobile agents (LCF, RD), pp. 82–86.
STOCSTOC-2001-GuptaKKRY #design #multi #network #problem
Provisioning a virtual private network: a network design problem for multicommodity flow (AG, JMK, AK, RR, BY), pp. 389–398.
STOCSTOC-2001-HaleviKKN #approximate #np-hard
Private approximation of NP-hard functions (SH, RK, EK, KN), pp. 550–559.
ICALPICALP-2001-BeimelI #information retrieval
Information-Theoretic Private Information Retrieval: A Unified Construction (AB, YI), pp. 912–926.
CHICHI-2001-ShoemakerI #privacy
Single display privacyware: augmenting public displays with private information (GBDS, KI), pp. 522–529.
STOCSTOC-2000-KatzY #encryption #probability #security
Complete characterization of security notions for probabilistic private-key encryption (JK, MY), pp. 245–254.
STOCSTOC-1999-BeimelIKM #information retrieval
One-Way Functions Are Essential for Single-Server Private Information Retrieval (AB, YI, EK, TM), pp. 89–98.
STOCSTOC-1999-GalR #theorem
A Theorem on Sensitivity and Applications in Private Computation (AG, AR), pp. 348–357.
STOCSTOC-1999-IshaiK #bound #information retrieval
Improved Upper Bounds on Information-Theoretic Private Information Retrieval (Extended Abstract) (YI, EK), pp. 79–88.
STOCSTOC-1998-GertnerIKM #information retrieval #privacy
Protecting Data Privacy in Private Information Retrieval Schemes (YG, YI, EK, TM), pp. 151–160.
STOCSTOC-1997-ChorG #information retrieval
Computationally Private Information Retrieval (Extended Abstract) (BC, NG), pp. 304–313.
STOCSTOC-1997-OstrovskyS
Private Information Storage (Extended Abstract) (RO, VS), pp. 294–303.
ICALPICALP-1997-Ambainis #bound #communication #complexity #information retrieval
Upper Bound on Communication Complexity of Private Information Retrieval (AA), pp. 401–407.
EDOCEDOC-1997-PreussSK #resource management
Virtual Private Resources (TP, JHS, HK), pp. 216–226.
PPoPPPPoPP-1997-GuLL #analysis #array #data flow #experience #performance
Experience with Efficient Array Data-Flow Analysis for Array Privatization (JG, ZL, GL), pp. 157–167.
STOCSTOC-1996-Beaver #complexity #correlation #pseudo
Correlated Pseudorandomness and the Complexity of Private Computations (DB), pp. 479–488.
STOCSTOC-1996-NewmanS #communication #game studies
Public vs. Private Coin Flips in One Round Communication Games (Extended Abstract) (IN, MS), pp. 561–570.
PLDIPLDI-1995-RauchwergerP #parallel #reduction #runtime
The LRPD Test: Speculative Run-Time Parallelization of Loops with Privatization and Reduction Parallelization (LR, DAP), pp. 218–232.
ICALPICALP-1995-BlundoSPV #on the #random
On the Number of Random Bits in Totally Private Computation (CB, ADS, GP, UV), pp. 171–182.
TOOLSTOOLS-EUROPE-1994-Carrillo-CastellonMP #smalltalk
Eiffel-like Assertions and Private Methods in Smalltalk (MCC, JGM, EP), pp. 479–488.
TOOLSTOOLS-EUROPE-1993-DollimoreX #security
The Private Access Channel: A Security Mechanism for Shared Distribution Objects (JD, WX), pp. 211–221.
POPLPOPL-1993-MaydanAL #analysis #array #data flow
Array Data-Flow Analysis and its Use in Array Privatization (DEM, SPA, MSL), pp. 2–15.
SACSAC-1993-DattaM #automation
Automating the Re-Declaration of Unneeded Globals as Private (AD, PM), pp. 87–94.
STOCSTOC-1986-GoldwasserS #interactive #proving
Private Coins versus Public Coins in Interactive Proof Systems (SG, MS), pp. 59–68.
VLDBVLDB-1985-GoldSH #performance
The Private Workspace Model Feasibility and Applications to 2PL Performance Improvements (IG, OS, MH), pp. 192–208.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.