Ecient and Private Distance Approximation in the Communication and Streaming Models
暂无分享,去创建一个
[1] David P. Woodruff. Optimal space lower bounds for all frequency moments , 2004, SODA '04.
[2] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[3] Alexander A. Razborov,et al. On the Distributional Complexity of Disjointness , 1992, Theor. Comput. Sci..
[4] Yehuda Lindell,et al. Universally composable two-party and multi-party secure computation , 2002, STOC '02.
[5] Moni Naor,et al. Communication preserving protocols for secure function evaluation , 2001, STOC '01.
[6] Joe Kilian,et al. One-Round Secure Computation and Secure Autonomous Mobile Agents , 2000, ICALP.
[7] Robert Krauthgamer,et al. Private approximation of NP-hard functions , 2001, STOC '01.
[8] William Feller,et al. An Introduction to Probability Theory and Its Applications , 1967 .
[9] C. Papadimitriou,et al. The complexity of massive data set computations , 2002 .
[10] Ziv Bar-Yossef,et al. Information theory methods in communication complexity , 2002, Proceedings 17th IEEE Annual Conference on Computational Complexity.
[11] Wenliang Du,et al. Protocols for Secure Remote Database Access with Approximate Matching , 2001, E-Commerce Security and Privacy.
[12] J. H. van Lint,et al. Introduction to Coding Theory , 1982 .
[13] Piotr Indyk,et al. A small approximately min-wise independent family of hash functions , 1999, SODA '99.
[14] I. Good. C332. Surprise indexes and p-values , 1989 .
[15] Subhash Khot,et al. Near-optimal lower bounds on the multi-party communication complexity of set disjointness , 2003, 18th IEEE Annual Conference on Computational Complexity, 2003. Proceedings..
[16] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[17] Leonid A. Levin,et al. A Pseudorandom Generator from any One-way Function , 1999, SIAM J. Comput..
[18] Andrew Chi-Chih Yao,et al. Lower Bounds by Probabilistic Arguments (Extended Abstract) , 1983, FOCS 1983.
[19] Xuan Zheng,et al. Private Approximate Heavy Hitters , 2006, ArXiv.
[20] Andrei Z. Broder,et al. A Technique for Measuring the Relative Size and Overlap of Public Web Search Engines , 1998, Comput. Networks.
[21] Russell Impagliazzo,et al. One-way functions are essential for complexity based cryptography , 1989, 30th Annual Symposium on Foundations of Computer Science.
[22] Noga Alon,et al. The space complexity of approximating the frequency moments , 1996, STOC '96.
[23] Noam Nisan,et al. Errata for: "On randomized one-round communication complexity" , 2001, computational complexity.
[24] Jacques Stern,et al. A New Public-Key Cryptosystem , 1997, EUROCRYPT.
[25] Piotr Indyk,et al. Approximate nearest neighbors: towards removing the curse of dimensionality , 1998, STOC '98.
[26] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.
[27] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2000, Journal of Cryptology.
[28] Sumit Ganguly,et al. Estimating Entropy over Data Streams , 2006, ESA.
[29] Ravi Kumar,et al. An improved data stream algorithm for frequency moments , 2004, SODA '04.
[30] Alexandr Andoni,et al. On the Optimality of the Dimensionality Reduction Method , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[31] Graham Cormode,et al. Summarizing and Mining Skewed Data Streams , 2005, SDM.
[32] David P. Woodruff,et al. Tight lower bounds for the distinct elements problem , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..
[33] Rafail Ostrovsky,et al. Efficient search for approximate nearest neighbor in high dimensional spaces , 1998, STOC '98.
[34] Rajeev Motwani,et al. Randomized algorithms , 1996, CSUR.
[35] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[36] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[37] David P. Woodruff,et al. Optimal approximations of the frequency moments of data streams , 2005, STOC '05.
[38] Yuval Ishai,et al. Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing , 2000, CRYPTO.
[39] Silvio Micali,et al. Computationally Private Information Retrieval with Polylogarithmic Communication , 1999, EUROCRYPT.
[40] Graham Cormode,et al. A near-optimal algorithm for computing the entropy of a stream , 2007, SODA '07.
[41] Moses Charikar,et al. Finding frequent items in data streams , 2004, Theor. Comput. Sci..
[42] Piotr Indyk,et al. Stable distributions, pseudorandom generators, embeddings, and data stream computation , 2006, JACM.
[43] Michael E. Saks,et al. Space lower bounds for distance approximation in the data stream model , 2002, STOC '02.
[44] Noga Alon,et al. The Probabilistic Method , 2015, Fundamentals of Ramsey Theory.
[45] Eyal Kushilevitz,et al. Communication Complexity , 1997, Adv. Comput..
[46] Ilan Newman,et al. Private vs. Common Random Bits in Communication Complexity , 1991, Inf. Process. Lett..
[47] Christopher M. Jones,et al. An introduction to coding theory. , 2001 .
[48] Joan Feigenbaum,et al. Secure multiparty computation of approximations , 2001, TALG.
[49] Bala Kalyanasundaram,et al. The Probabilistic Communication Complexity of Set Intersection , 1992, SIAM J. Discret. Math..
[50] Ziv Bar-Yossef,et al. An information statistics approach to data stream and communication complexity , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[51] Yuval Ishai,et al. Protecting data privacy in private information retrieval schemes , 1998, STOC '98.
[52] S. Muthukrishnan,et al. Data streams: algorithms and applications , 2005, SODA '03.
[53] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[54] Philippe Flajolet,et al. Probabilistic Counting Algorithms for Data Base Applications , 1985, J. Comput. Syst. Sci..
[55] Sumit Ganguly,et al. Estimating Frequency Moments of Data Streams Using Random Linear Combinations , 2004, APPROX-RANDOM.
[56] Andrew Chi-Chih Yao,et al. Some complexity questions related to distributive computing(Preliminary Report) , 1979, STOC.
[57] Moni Naor,et al. Private Information Retrieval by Keywords , 1998, IACR Cryptol. ePrint Arch..
[58] Sumit Ganguly,et al. Simpler algorithm for estimating frequency moments of data streams , 2006, SODA '06.
[59] Jacobus H. van Lint,et al. Introduction to Coding Theory , 1982 .
[60] R. Motwani,et al. High-Dimensional Computational Geometry , 2000 .
[61] Luca Trevisan,et al. Counting Distinct Elements in a Data Stream , 2002, RANDOM.
[62] Amos Beimel,et al. Private Approximation of Clustering and Vertex Cover , 2007, TCC.