Applications of network optimization

RK Ahuja, TL Magnanti, JB Orlin, MR Reddy - Handbooks in Operations …, 1995 - Elsevier
Publisher Summary This chapter discusses several applications of the following network
optimization problems: shortest paths, maximum flows, minimum cost flows, assignment and …

Differential privacy: A survey of results

C Dwork - International conference on theory and applications of …, 2008 - Springer
Over the past five years a new approach to privacy-preserving data analysis has born fruit
[13, 18, 7, 19, 5, 37, 35, 8, 32]. This approach differs from much (but not all!) of the related …

Keyword search and oblivious pseudorandom functions

MJ Freedman, Y Ishai, B Pinkas, O Reingold - Theory of Cryptography …, 2005 - Springer
We study the problem of privacy-preserving access to a database. Particularly, we consider
the problem of privacy-preserving keyword search (KS), where records in the database are …

Differential privacy for statistics: What we know and what we want to learn

C Dwork, A Smith - Journal of Privacy and …, 2010 - journalprivacyconfidentiality.org
We motivate and review the definition of differential privacy, survey some results on
differentially private statistical estimators, and outline a research agenda. This survey is …

Toward privacy in public databases

S Chawla, C Dwork, F McSherry, A Smith… - Theory of Cryptography …, 2005 - Springer
We initiate a theoretical study of the census problem. Informally, in a census individual
respondents give private information to a trusted party (the census bureau), who publishes a …

Very simple methods for all pairs network flow analysis

D Gusfield - SIAM Journal on Computing, 1990 - SIAM
A very simple algorithm for the classical problem of computing the maximum network flow
value between every pair of nodes in an undirected, capacitated n node graph is presented; …

Rectangular arrays with fixed margins

P Diaconis, A Gangolli - Discrete probability and algorithms, 1995 - Springer
In a variety of combinatorial and statistical applications, one needs to know the number of
rectangular arrays of nonnegative integers with given row and column sums. The …

On the computational complexity of reconstructing lattice sets from their X-rays

RJ Gardner, P Gritzmann, D Prangenberg - Discrete Mathematics, 1999 - Elsevier
We study the computational complexity of various inverse problems in discrete tomography.
These questions are motivated by demands from the material sciences for the reconstruction …

A fast algorithm for optimally increasing the edge connectivity

D Naor, D Gusfield, C Martel - SIAM Journal on Computing, 1997 - SIAM
Let G=(V, E) be an undirected, unweighted graph with n nodes, m edges and edge
connectivity λ. Given an input parameter δ, the edge augmentation problem is to find the …

Three-dimensional statistical data security problems

RW Irving, MR Jerrum - SIAM Journal on Computing, 1994 - SIAM
Suppose there is a three-dimensional table of cross-tabulated nonnegative integer statistics,
and suppose that all of the row, column, and “file” sums are revealed together with the …