Applications of network optimization
Publisher Summary This chapter discusses several applications of the following network
optimization problems: shortest paths, maximum flows, minimum cost flows, assignment and …
optimization problems: shortest paths, maximum flows, minimum cost flows, assignment and …
Differential privacy: A survey of results
C Dwork - International conference on theory and applications of …, 2008 - Springer
Over the past five years a new approach to privacy-preserving data analysis has born fruit
[13, 18, 7, 19, 5, 37, 35, 8, 32]. This approach differs from much (but not all!) of the related …
[13, 18, 7, 19, 5, 37, 35, 8, 32]. This approach differs from much (but not all!) of the related …
Keyword search and oblivious pseudorandom functions
We study the problem of privacy-preserving access to a database. Particularly, we consider
the problem of privacy-preserving keyword search (KS), where records in the database are …
the problem of privacy-preserving keyword search (KS), where records in the database are …
Differential privacy for statistics: What we know and what we want to learn
We motivate and review the definition of differential privacy, survey some results on
differentially private statistical estimators, and outline a research agenda. This survey is …
differentially private statistical estimators, and outline a research agenda. This survey is …
Toward privacy in public databases
We initiate a theoretical study of the census problem. Informally, in a census individual
respondents give private information to a trusted party (the census bureau), who publishes a …
respondents give private information to a trusted party (the census bureau), who publishes a …
Very simple methods for all pairs network flow analysis
D Gusfield - SIAM Journal on Computing, 1990 - SIAM
A very simple algorithm for the classical problem of computing the maximum network flow
value between every pair of nodes in an undirected, capacitated n node graph is presented; …
value between every pair of nodes in an undirected, capacitated n node graph is presented; …
Rectangular arrays with fixed margins
P Diaconis, A Gangolli - Discrete probability and algorithms, 1995 - Springer
In a variety of combinatorial and statistical applications, one needs to know the number of
rectangular arrays of nonnegative integers with given row and column sums. The …
rectangular arrays of nonnegative integers with given row and column sums. The …
On the computational complexity of reconstructing lattice sets from their X-rays
RJ Gardner, P Gritzmann, D Prangenberg - Discrete Mathematics, 1999 - Elsevier
We study the computational complexity of various inverse problems in discrete tomography.
These questions are motivated by demands from the material sciences for the reconstruction …
These questions are motivated by demands from the material sciences for the reconstruction …
A fast algorithm for optimally increasing the edge connectivity
D Naor, D Gusfield, C Martel - SIAM Journal on Computing, 1997 - SIAM
Let G=(V, E) be an undirected, unweighted graph with n nodes, m edges and edge
connectivity λ. Given an input parameter δ, the edge augmentation problem is to find the …
connectivity λ. Given an input parameter δ, the edge augmentation problem is to find the …
Three-dimensional statistical data security problems
RW Irving, MR Jerrum - SIAM Journal on Computing, 1994 - SIAM
Suppose there is a three-dimensional table of cross-tabulated nonnegative integer statistics,
and suppose that all of the row, column, and “file” sums are revealed together with the …
and suppose that all of the row, column, and “file” sums are revealed together with the …