Exponential mechanism

Results: 71



#Item
21Differential privacy / Applied mathematics / Science / Exponential mechanism / Privacy / Data mining / Internet privacy / Information privacy / Computational learning theory / Data privacy / Ethics / Formal sciences

shutterstock_134444528 [Converted]

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2014-07-01 22:41:41
22Point location / Entropy / Information / Probability and statistics / Search algorithms / Quantum relative entropy / Exponential mechanism / Information theory / Statistical theory / Statistics

Lower Bounds for Expected-Case Planar Point Location Theocharis Malamatos∗ point lies on a segment or vertex of S is zero.) The entropy P of S, denoted H throughout, is defined as

Add to Reading List

Source URL: www.cccg.ca

Language: English - Date: 2005-07-31 13:55:46
23Ethics / Artificial intelligence / Learning / Statistical classification / Applied probability / Exponential mechanism / Differential privacy / Empirical risk minimization / VC dimension / Machine learning / Data privacy / Statistics

JMLR: Workshop and Conference Proceedings vol–32 24th Annual Conference on Learning Theory Sample Complexity Bounds for Differentially Private Learning

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2011-09-27 03:12:47
24Applied mathematics / Machine learning / Differential privacy / Exponential mechanism / Stability / Cross-validation / Support vector machine / Algorithm / Time complexity / Data privacy / Theoretical computer science / Statistics

A Stability-based Validation Procedure for Differentially Private Machine Learning Kamalika Chaudhuri Department of Computer Science and Engineering UC San Diego, La Jolla CA 92093

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2014-01-05 20:06:51
25Cybernetics / Information Age / Channel capacity / Mutual information / Telecommunications engineering / Science / Exponential mechanism / Kullback–Leibler divergence / Information theory / Information / Communication

Mutual Information for a Deletion Channel

Add to Reading List

Source URL: www.dmg.tuwien.ac.at

Language: English - Date: 2012-09-14 04:25:12
26Convex optimization / Linear programming / Conjunctive query / Algorithm / Randomized rounding / Exponential mechanism / Mathematics / Operations research / Applied mathematics

Worst-case Optimal Join Algorithms Hung Q. Ngo Ely Porat Christopher Ré

Add to Reading List

Source URL: www.cse.buffalo.edu

Language: English - Date: 2012-03-21 08:53:44
27Matrix theory / Abstract algebra / Numerical linear algebra / Differential calculus / Vector space / Eigenvalues and eigenvectors / Exponential mechanism / Singular value decomposition / Rayleigh quotient / Algebra / Mathematics / Linear algebra

On differentially private low rank approximation Michael Kapralov∗ Kunal Talwar† October 3, 2012

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-12-09 10:13:50
28Randomized algorithm / Factorial / Hash function / Bloom filter / Exponential mechanism / Mathematics / Analysis of algorithms / Probabilistic complexity theory

Min-d-Occur: Ensuring Future Occurrences in Streaming Sets Vidit Jain Yahoo Labs Bangalore, India

Add to Reading List

Source URL: labs.yahoo.com

Language: English - Date: 2014-07-23 05:16:38
29Internet privacy / Constraint satisfaction problem / Privacy / Flow network / Exponential mechanism / Ethics / Identity management / Social issues

Evaluating data utility of privacy-preserving pseudonymized location datasets* Tomoya Tanjo1† , Kazuhiro Minami1 , Ken Mano2 , and Hiroshi Maruyama1 1 Institute of Statistical Mathematics, Tokyo, Japan {tanjo, kminami,

Add to Reading List

Source URL: isyou.info

Language: English - Date: 2014-09-21 04:11:00
30Distribution / Mathematics / Analysis / Differential privacy / Data privacy / Applied probability / Exponential mechanism

Differential Privacy: A Survey of Results Cynthia Dwork Microsoft Research [removed] Abstract. Over the past five years a new approach to privacy-preserving

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2008-12-01 20:17:59
UPDATE