-
1
-
-
33745781693
-
Step-indexed syntactic logical relations for recursive and quantified types
-
A. Ahmed. Step-indexed syntactic logical relations for recursive and quantified types. In of Lecture Notes in Computer Science, volume 3924, pages 69-83, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3924
, pp. 69-83
-
-
Ahmed, A.1
-
2
-
-
51249184131
-
Sorting in c log n parallel steps
-
1-19, March ISSN 0209-9683
-
M. Ajtai, J. Komlós, and E. Szemerédi. Sorting in c log n parallel steps. Combinatorica, 3(1):1-19, March 1983. ISSN 0209-9683.
-
(1983)
Combinatorica
, vol.3
, pp. 1
-
-
Ajtai, M.1
Komlós, J.2
Szemerédi, E.3
-
3
-
-
0038559204
-
An indexed model of recursive types for foundational proof-carrying code
-
ISSN 0164-0925
-
A. W. Appel and D. McAllester. An indexed model of recursive types for foundational proof-carrying code. ACM Trans. Program. Lang. Syst., 23(5):657-683, 2001. ISSN 0164-0925.
-
(2001)
ACM Trans. Program. Lang. Syst.
, vol.23
, Issue.5
, pp. 657-683
-
-
Appel, A.W.1
McAllester, D.2
-
4
-
-
0004308029
-
-
Technical Report ECS-LFCS-96-347, University of Edinburgh
-
A. Barber. Dual intuitionistic linear logic. Technical Report ECS-LFCS-96-347, University of Edinburgh, 1996.
-
(1996)
Dual Intuitionistic Linear Logic
-
-
Barber, A.1
-
5
-
-
85154002090
-
Sorting networks and their applications
-
New York, NY, USA, ACM
-
K. E. Batcher. Sorting networks and their applications. In AFIPS '68 (Spring): Proceedings of the April 30-May 2, 1968, spring joint computer conference, pages 307-314, New York, NY, USA, 1968. ACM.
-
(1968)
AFIPS '68 (Spring): Proceedings of the April 30-May 2, 1968, Spring Joint Computer Conference
, pp. 307-314
-
-
Batcher, K.E.1
-
6
-
-
33244468835
-
Practical privacy: The sulq framework
-
New York, NY, USA, ACM
-
A. Blum, C. Dwork, F. McSherry, and K. Nissim. Practical privacy: the sulq framework. In PODS '05: Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, pages 128-138, New York, NY, USA, 2005. ACM.
-
(2005)
PODS '05: Proceedings of the Twenty-fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
7
-
-
57049136138
-
A learning theory approach to noninteractive database privacy
-
New York, NY, USA, ACM
-
A. Blum, K. Ligett, and A. Roth. A learning theory approach to noninteractive database privacy. In STOC '08: Proceedings of the 40th annual ACM symposium on Theory of computing, pages 609-618, New York, NY, USA, 2008. ACM.
-
(2008)
STOC '08: Proceedings of the 40th Annual ACM Symposium on Theory of Computing
, pp. 609-618
-
-
Blum, A.1
Ligett, K.2
Roth, A.3
-
8
-
-
79960570447
-
Why and where: A characterization of data provenance
-
J. Bussche and V. Vianu, editors, Database Theory ICDT 2001, chapter 20, Springer Berlin Heidelberg, Berlin, Heidelberg, October
-
P. Buneman, S. Khanna, and T. Wang-Chiew. Why and where: A characterization of data provenance. In J. Bussche and V. Vianu, editors, Database Theory ICDT 2001, volume 1973 of Lecture Notes in Computer Science, chapter 20, pages 316-330. Springer Berlin Heidelberg, Berlin, Heidelberg, October 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.1973
, pp. 316-330
-
-
Buneman, P.1
Khanna, S.2
Wang-Chiew, T.3
-
9
-
-
80052004303
-
Private and continual release of statistics
-
Report 2010/076
-
T.-H. H. Chan, E. Shi, and D. Song. Private and continual release of statistics. Cryptology ePrint Archive, Report 2010/076, 2010. http://eprint.iacr.org/.
-
(2010)
Cryptology EPrint Archive
-
-
Chan, T.-H.H.1
Shi, E.2
Song, D.3
-
10
-
-
77149142916
-
Continuity analysis of programs
-
ISSN 0362-1340
-
S. Chaudhuri, S. Gulwani, and R. Lublinerman. Continuity analysis of programs. SIGPLAN Not., 45(1):57-70, 2010. ISSN 0362-1340.
-
(2010)
SIGPLAN Not.
, vol.45
, Issue.1
, pp. 57-70
-
-
Chaudhuri, S.1
Gulwani, S.2
Lublinerman, R.3
-
11
-
-
67650088338
-
Probabilistic databases: Diamonds in the dirt
-
N. Dalvi, C. Ré, and D. Suciu. Probabilistic databases: diamonds in the dirt. Commun. ACM, 52(7):86-94, 2009.
-
(2009)
Commun. ACM
, vol.52
, Issue.7
, pp. 86-94
-
-
Dalvi, N.1
Ré, C.2
Suciu, D.3
-
12
-
-
70350645515
-
The differential privacy frontier (extended abstract)
-
Theory of Cryptography, chapter 29
-
C. Dwork. The differential privacy frontier (extended abstract). In Theory of Cryptography, Lecture Notes in Computer Science, chapter 29, pages 496-502. 2009.
-
(2009)
Lecture Notes in Computer Science
, pp. 496-502
-
-
Dwork, C.1
-
14
-
-
50249086141
-
Differential privacy
-
Part
-
C. Dwork. Differential privacy. In Proceedings of ICALP (Part, volume 2, pages 1-12, 2006.
-
(2006)
Proceedings of ICALP
, vol.2
, pp. 1-12
-
-
Dwork, C.1
-
17
-
-
35448944434
-
Provenance semirings
-
New York, NY, USA, ACM
-
T. J. Green, G. Karvounarakis, and V. Tannen. Provenance semirings. In PODS '07: Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, pages 31-40, New York, NY, USA, 2007. ACM.
-
(2007)
PODS '07: Proceedings of the Twenty-sixth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
, pp. 31-40
-
-
Green, T.J.1
Karvounarakis, G.2
Tannen, V.3
-
19
-
-
0346279676
-
A decidable fragment of predicate calculus
-
ISSN 03043975
-
J. Ketonen. A decidable fragment of predicate calculus. Theoretical Computer Science, 32(3):297-307, 1984. ISSN 03043975.
-
(1984)
Theoretical Computer Science
, vol.32
, Issue.3
, pp. 297-307
-
-
Ketonen, J.1
-
20
-
-
0001065597
-
The mathematics of sentence structure
-
J. Lambek. The mathematics of sentence structure. American Mathematical Monthly, 65(3):154-170, 1958.
-
(1958)
American Mathematical Monthly
, vol.65
, Issue.3
, pp. 154-170
-
-
Lambek, J.1
-
22
-
-
52649169678
-
Privacy: Theory meets practice on the map
-
Washington, DC, USA, IEEE Computer Society
-
A. Machanavajjhala, D. Kifer, J. Abowd, J. Gehrke, and L. Vilhuber. Privacy: Theory meets practice on the map. In ICDE '08: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering, pages 277-286, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
ICDE '08: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
, pp. 277-286
-
-
Machanavajjhala, A.1
Kifer, D.2
Abowd, J.3
Gehrke, J.4
Vilhuber, L.5
-
23
-
-
57349180506
-
Quantitative information flow as network flow capacity
-
New York, NY, USA, ACM
-
S. McCamant and M. D. Ernst. Quantitative information flow as network flow capacity. In PLDI '08: Proceedings of the 2008 ACM SIGPLAN conference on Programming language design and implementation, pages 193-205, New York, NY, USA, 2008. ACM.
-
(2008)
PLDI '08: Proceedings of the 2008 ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 193-205
-
-
McCamant, S.1
Ernst, M.D.2
-
24
-
-
46749128577
-
Mechanism design via differential privacy
-
Washington, DC, USA, IEEE Computer Society
-
F. McSherry and K. Talwar. Mechanism design via differential privacy. In FOCS '07: Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, pages 94-103, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
FOCS '07: Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science
, pp. 94-103
-
-
McSherry, F.1
Talwar, K.2
-
25
-
-
70849116921
-
Privacy integrated queries: An extensible platform for privacy-preserving data analysis
-
New York, NY, USA, ACM
-
F. D. McSherry. Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In SIGMOD '09: Proceedings of the 35th SIGMOD international conference on Management of data, pages 19-30, New York, NY, USA, 2009. ACM.
-
(2009)
SIGMOD '09: Proceedings of the 35th SIGMOD International Conference on Management of Data
, pp. 19-30
-
-
McSherry, F.D.1
-
26
-
-
50249142450
-
Robust de-anonymization of large sparse datasets
-
Washington, DC, USA, IEEE Computer Society. ISBN 978-0-7695-3168-7. doi
-
A. Narayanan and V. Shmatikov. Robust de-anonymization of large sparse datasets. In SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy, pages 111-125, Washington, DC, USA, 2008. IEEE Computer Society. ISBN 978-0-7695-3168-7. doi: http://dx.doi.org/10.1109/SP.2008.33.
-
(2008)
SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy
, pp. 111-125
-
-
Narayanan, A.1
Shmatikov, V.2
-
27
-
-
35448955271
-
Smooth sensitivity and sampling in private data analysis
-
New York, NY, USA, ACM
-
K. Nissim, S. Raskhodnikova, and A. Smith. Smooth sensitivity and sampling in private data analysis. In STOC '07: Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, pages 75-84, New York, NY, USA, 2007. ACM.
-
(2007)
STOC '07: Proceedings of the Thirty-ninth Annual ACM Symposium on Theory of Computing
, pp. 75-84
-
-
Nissim, K.1
Raskhodnikova, S.2
Smith, A.3
-
28
-
-
0033420437
-
The logic of bunched implications
-
P. O'Hearn and D. Pym. The logic of bunched implications. Bulletin of Symbolic Logic, 5(2):215-244, 1999.
-
(1999)
Bulletin of Symbolic Logic
, vol.5
, Issue.2
, pp. 215-244
-
-
O'Hearn, P.1
Pym, D.2
-
30
-
-
0036039863
-
Stochastic lambda calculus and monads of probability distributions
-
ACM Press
-
N. Ramsey and A. Pfeffer. Stochastic lambda calculus and monads of probability distributions. In In 29th ACM POPL, pages 154-165. ACM Press, 2002.
-
(2002)
29th ACM POPL
, pp. 154-165
-
-
Ramsey, N.1
Pfeffer, A.2
-
31
-
-
77954719763
-
The median mechanism: Interactive and efficient privacy with multiple queries
-
To appear
-
A. Roth and T. Roughgarden. The median mechanism: Interactive and efficient privacy with multiple queries, 2010. To appear in STOC 2010.
-
(2010)
STOC 2010
-
-
Roth, A.1
Roughgarden, T.2
|