-
1
-
-
13344271360
-
The Use of Special Matrix Operations in Statistical Calculus
-
Educational Testing Service, Princeton, NJ
-
Beaton, A. E. (1964), "The Use of Special Matrix Operations in Statistical Calculus," Research Bulletin RB-64-51, Educational Testing Service, Princeton, NJ.
-
(1964)
Research Bulletin RB
, vol.64 -51
-
-
Beaton, A.E.1
-
2
-
-
84898960610
-
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
-
Chicago: ACM, Press, pp
-
Ben-Or, M., Goldwasser, S., and Wigderson, A. (1988), "Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation," in Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, Chicago: ACM, Press, pp. 1-10.
-
(1988)
Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
3
-
-
85034837254
-
Secret Sharing Homomorphisms: Keeping Shares of a Secret Sharing
-
ed. A. M. Odlyzko, New York: SpringerVerlag, pp
-
Benaloh, J. (1987), "Secret Sharing Homomorphisms: Keeping Shares of a Secret Sharing," in CRYPTO86, ed. A. M. Odlyzko, New York: SpringerVerlag, pp. 251-260.
-
(1987)
CRYPTO86
, pp. 251-260
-
-
Benaloh, J.1
-
4
-
-
0002629270
-
Maximum Likelihood From Incomplete Data via the EM Algorithm
-
Dempster, A., Laird, N., and Rubin, D. B. (1977), "Maximum Likelihood From Incomplete Data via the EM Algorithm," Journal of the Royal Statistical Society, Ser. B, 39, 1-38.
-
(1977)
Journal of the Royal Statistical Society, Ser. B
, vol.39
, pp. 1-38
-
-
Dempster, A.1
Laird, N.2
Rubin, D.B.3
-
5
-
-
0242612156
-
A Practical Approach to Solve Secure MultiParty Computation Problems
-
New York: ACM Press, pp
-
Du, W., and Zhan, Z. (2002), "A Practical Approach to Solve Secure MultiParty Computation Problems," in New Security Paradigms Workshop, New York: ACM Press, pp. 127-135.
-
(2002)
New Security Paradigms Workshop
, pp. 127-135
-
-
Du, W.1
Zhan, Z.2
-
6
-
-
34547198481
-
Secure Computation With Horizontally Partitioned Data Using Adaptive Regression Splines
-
to appear
-
Ghosh, J., Reiter, J. P., and Karr, A. F. (2007), "Secure Computation With Horizontally Partitioned Data Using Adaptive Regression Splines," Computational Statistics and Data Analysis, to appear.
-
(2007)
Computational Statistics and Data Analysis
-
-
Ghosh, J.1
Reiter, J.P.2
Karr, A.F.3
-
8
-
-
33644559345
-
Secure Analysis of Distributed Chemical Databases Without Data Integration
-
Karr, A. R, Feng, J., Lin, X., Reiter, J. P., Sanil, A. P., and Young, S. S. (2005a), "Secure Analysis of Distributed Chemical Databases Without Data Integration," Journal of Computer-Aided Molecular Design, 1-9.
-
(2005)
Journal of Computer-Aided Molecular Design
, pp. 1-9
-
-
Karr, A.R.1
Feng, J.2
Lin, X.3
Reiter, J.P.4
Sanil, A.P.5
Young, S.S.6
-
9
-
-
24944432807
-
Analysis of Integrated Data Without Data Integration
-
Karr, A. F., Lin, X., Reiter, J. P., and Sanil, A. P. (2004), "Analysis of Integrated Data Without Data Integration," Chance, 17, 26-29.
-
(2004)
Chance
, vol.17
, pp. 26-29
-
-
Karr, A.F.1
Lin, X.2
Reiter, J.P.3
Sanil, A.P.4
-
10
-
-
20744460179
-
Secure Regression on Distributed Databases
-
_ (2005b), "Secure Regression on Distributed Databases," Journal of Computational and Graphical Statistics, 14, 263-279.
-
(2005)
Journal of Computational and Graphical Statistics
, vol.14
, pp. 263-279
-
-
Karr, A.F.1
Lin, X.2
Reiter, J.P.3
Sanil, A.P.4
-
11
-
-
34548101006
-
-
_ (2006), Secure Analysis of Distributed Databases, in Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometrie Authentication, eds. D. Olwell, A. G. Wilson, and G. Wilson, New York: Springer-Verlag, pp. 237-261.
-
_ (2006), "Secure Analysis of Distributed Databases," in Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometrie Authentication, eds. D. Olwell, A. G. Wilson, and G. Wilson, New York: Springer-Verlag, pp. 237-261.
-
-
-
-
13
-
-
0001828003
-
Cached Sufficient Statistics for Efficient Machine Learning With Large Datasets
-
Moore, A., and Lee, M. (1998), "Cached Sufficient Statistics for Efficient Machine Learning With Large Datasets," Journal Artificial Intelligence Research, 8, 67-91.
-
(1998)
Journal Artificial Intelligence Research
, vol.8
, pp. 67-91
-
-
Moore, A.1
Lee, M.2
-
14
-
-
0001008029
-
An Efficient Method for Finding the Minimum of a Function of Several Variables Without Calculating Derivatives
-
Powell, M. J. D. (1964), "An Efficient Method for Finding the Minimum of a Function of Several Variables Without Calculating Derivatives," Computer Journal, 7, 152-162.
-
(1964)
Computer Journal
, vol.7
, pp. 152-162
-
-
Powell, M.J.D.1
-
15
-
-
0346171307
-
Model Diagnostics for Remote Access Regression Servers
-
Reiter, J. P. (2003), "Model Diagnostics for Remote Access Regression Servers," Statistics and Computing, 13, 371-380.
-
(2003)
Statistics and Computing
, vol.13
, pp. 371-380
-
-
Reiter, J.P.1
-
16
-
-
20744455072
-
PrivacyPreserving Analysis of Vertically Partitioned Data Using Secure Matrix Products
-
available at
-
Sanil, A. P., Karr, A. E, Lin, X., and Reiter, J. P. (2004a), "PrivacyPreserving Analysis of Vertically Partitioned Data Using Secure Matrix Products," Journal of Official Statistics, available at www.niss.org/dgii/technicalreports.html.
-
(2004)
Journal of Official Statistics
-
-
Sanil, A.P.1
Karr, A.E.2
Lin, X.3
Reiter, J.P.4
-
19
-
-
34548101563
-
Software for Secure Analysis of Distributed Databases
-
manuscript
-
Vera, F., FuIp, W. J., and Karr, A. F. (2007), "Software for Secure Analysis of Distributed Databases," manuscript.
-
(2007)
-
-
Vera, F.1
FuIp, W.J.2
Karr, A.F.3
|