Strategic behavior and database privacy
暂无分享,去创建一个
[1] Ran Raz,et al. A sub-constant error-probability low-degree test, and a sub-constant error-probability PCP characterization of NP , 1997, STOC '97.
[2] Maria-Florina Balcan,et al. Near-Optimality in Covering Games by Exposing Global Information , 2014, TEAC.
[3] Martin Hoefer,et al. Selfish Service Installation in Networks , 2006, WINE.
[4] Marco Zennaro,et al. Long distance wireless sensor networks: simulation vs reality , 2010, NSDR '10.
[5] Santosh S. Vempala,et al. Fourier PCA , 2013, ArXiv.
[6] Vasek Chvátal,et al. A Greedy Heuristic for the Set-Covering Problem , 1979, Math. Oper. Res..
[7] Quoc V. Le,et al. Tiled convolutional neural networks , 2010, NIPS.
[8] Phong Q. Nguyen,et al. Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures , 2006, EUROCRYPT.
[9] Pierre Comon,et al. Independent component analysis, A new concept? , 1994, Signal Process..
[10] Tzyy-Ping Jung,et al. Extended ICA Removes Artifacts from Electroencephalographic Recordings , 1997, NIPS.
[11] E. H. Clarke. Multipart pricing of public goods , 1971 .
[12] Martin Hoefer,et al. Non-cooperative facility location and covering games , 2006, Theor. Comput. Sci..
[13] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[14] R. Vershynin. How Close is the Sample Covariance Matrix to the Actual Covariance Matrix? , 2010, 1004.3484.
[15] Moshe Tennenholtz,et al. Approximately optimal mechanism design via differential privacy , 2010, ITCS '12.
[16] Georgios Piliouras,et al. Beating the best Nash without regret , 2011, SECO.
[17] Honglak Lee,et al. Sparse deep belief net model for visual area V2 , 2007, NIPS.
[18] R. Adamczak,et al. Quantitative estimates of the convergence of the empirical covariance matrix in log-concave ensembles , 2009, 0903.2323.
[19] Éva Tardos,et al. Beyond the Nash Equilibrium Barrier , 2011, ICS.
[20] Britta Peis,et al. Resource Buying Games , 2012, ESA.
[21] T. Groves. The allocation of resources under uncertainty : the informational and incentive roles of prices and demands in a team , 1970 .
[22] Yeheskel Bar-ness,et al. Bootstrapping adaptive interference cancelers - Some practical limitations , 1982 .
[23] Arpita Ghosh,et al. Privacy and coordination: computing on databases with endogenous participation , 2013, EC '13.
[24] Roman Vershynin,et al. Introduction to the non-asymptotic analysis of random matrices , 2010, Compressed Sensing.
[25] Scott Shenker,et al. On a network creation game , 2003, PODC '03.
[26] Georgios Piliouras,et al. No Regret Learning in Oligopolies: Cournot vs. Bertrand , 2010, SAGT.
[27] Jérôme Monnot,et al. On the Impact of Local Taxes in a Set Cover Game , 2010, SIROCCO.
[28] David P. Williamson,et al. Stackelberg thresholds in network routing games or the value of altruism , 2007, EC '07.
[29] William Vickrey,et al. Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .
[30] Anima Anandkumar,et al. Tensor decompositions for learning latent variable models , 2012, J. Mach. Learn. Res..
[31] M. Rudelson,et al. Lp-moments of random vectors via majorizing measures , 2005, math/0507023.
[32] Santosh S. Vempala,et al. Structure from Local Optima: Learning Subspace Juntas via Higher Order PCA , 2011, 1108.3329.
[33] Tim Roughgarden,et al. Algorithmic Game Theory , 2007 .
[34] Erkki Oja,et al. Independent Component Analysis , 2001 .
[35] Stefan Schmid,et al. Algorithmic models for sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[36] Larry A. Wasserman,et al. Differential privacy with compression , 2009, 2009 IEEE International Symposium on Information Theory.
[37] Morteza Zadimoghaddam,et al. Constant Price of Anarchy in Network Creation Games via Public Service Advertising , 2010, WAW.
[38] Éva Tardos,et al. Near-Optimal Network Design with Selfish Agents , 2008, Theory Comput..
[39] Nicole Immorlica,et al. Coalition Formation and Price of Anarchy in Cournot Oligopolies , 2010, WINE.
[40] Cynthia Dwork,et al. Differential privacy and robust statistics , 2009, STOC '09.
[41] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[42] Mitali Singh,et al. Decentralized Utility-based Sensor Network Design , 2006, Mob. Networks Appl..
[43] Anand D. Sarwate,et al. Near-optimal Differentially Private Principal Components , 2012, NIPS.
[44] Stephen Chong,et al. Truthful mechanisms for agents that value privacy , 2011, EC.
[45] L. Shapley,et al. Potential Games , 1994 .
[46] László A. Végh,et al. LP-Based Covering Games with Low Price of Anarchy , 2012, WINE.
[47] Aaron Roth,et al. Beating randomized response on incoherent matrices , 2011, STOC '12.
[48] Aaron Roth,et al. Beyond worst-case analysis in private singular vector computation , 2012, STOC '13.
[49] Erkki Oja,et al. Independent Component Analysis for Identification of Artifacts in Magnetoencephalographic Recordings , 1997, NIPS.
[50] Erkki Oja,et al. Independent component approach to the analysis of EEG and MEG recordings , 2000, IEEE Transactions on Biomedical Engineering.
[51] Sanjeev Arora,et al. Provable ICA with Unknown Gaussian Noise, and Implications for Gaussian Mixtures and Autoencoders , 2012, Algorithmica.
[52] Chris Peikert,et al. How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE , 2013, ACNS.
[53] Jinwoo Shin,et al. On the impact of global information on diffusion of innovations over social networks , 2013, INFOCOM Workshops.
[54] Éva Tardos,et al. Influential Nodes in a Diffusion Model for Social Networks , 2005, ICALP.
[55] Martin Hoefer. Competitive Cost Sharing with Economies of Scale , 2009, Algorithmica.
[56] Joseph Naor,et al. Non-Cooperative Cost Sharing Games via Subsidies , 2010, Theory of Computing Systems.
[57] T. Groves,et al. Optimal Allocation of Public Goods: A Solution to the 'Free Rider Problem' , 1977 .
[58] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[59] B. Biswal,et al. Blind source separation of multiple signal sources of fMRI data sets using independent component analysis. , 1999, Journal of computer assisted tomography.
[60] Aaron Roth,et al. Selling privacy at auction , 2015, Games Econ. Behav..
[61] Quoc V. Le,et al. ICA with Reconstruction Cost for Efficient Overcomplete Feature Learning , 2011, NIPS.
[62] R. Mathias. A Bound for the Matrix Square Root with Application to Eigenvector Perturbation , 1997, SIAM J. Matrix Anal. Appl..
[63] Georgios Piliouras,et al. MEDIUM AND LONG-RUN PROPERTIES OF LINGUISTIC COMMUNITY EVOLUTION , 2012 .
[64] M. Rudelson. Random Vectors in the Isotropic Position , 1996, math/9608208.
[65] Éva Tardos,et al. Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..
[66] Sara Krehbiel Georgia. Markets for Database Privacy , 2014 .
[67] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[68] Erkki Oja,et al. Independent Component Analysis for Parallel Financial Time Series , 1998, International Conference on Neural Information Processing.
[69] J. Nash. NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.
[70] Yoshua. Bengio,et al. Learning Deep Architectures for AI , 2007, Found. Trends Mach. Learn..
[71] Aaron Roth,et al. Take It or Leave It: Running a Survey When Privacy Comes at a Cost , 2012, WINE.
[72] Kobbi Nissim,et al. Redrawing the boundaries on purchasing data from privacy-sensitive individuals , 2014, ITCS.
[73] Aaron Roth,et al. Privacy and mechanism design , 2013, SECO.
[74] H. Chen,et al. Independent component analysis for human epileptic spikes extraction , 2005, Proceedings. 2005 First International Conference on Neural Interface and Control, 2005..
[75] Sirin Tekinay,et al. Diffusion-based Approach to Deploying Wireless Sensors to Satisfy Coverage, Connectivity and Reliability , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).
[76] Christian Jutten,et al. Blind separation of sources, part I: An adaptive algorithm based on neuromimetic architecture , 1991, Signal Process..
[77] Yu-Han Lyu,et al. Approximately optimal auctions for selling privacy when costs are correlated with data , 2012, EC '12.
[78] Éva Tardos,et al. Multiplicative updates outperform generic no-regret learning in congestion games: extended abstract , 2009, STOC '09.
[79] P. Samuelson. The Pure Theory of Public Expanditure , 1954 .
[80] Hyunseung Choo,et al. Energy-efficient Area Coverage by Sensors with Adjustable Ranges , 2009, 2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.
[81] Maria-Florina Balcan,et al. Improved equilibria via public service advertising , 2009, SODA.
[82] Alan M. Frieze,et al. Learning linear transformations , 1996, Proceedings of 37th Conference on Foundations of Computer Science.
[83] Christos H. Papadimitriou,et al. Worst-case equilibria , 1999 .
[84] Kobbi Nissim,et al. Privacy-aware mechanism design , 2011, EC '12.
[85] Alfredo García,et al. A Game-Theoretic Approach to Efficient Power Management in Sensor Networks , 2008, Oper. Res..
[86] John Porrill,et al. Analysis of Optical Imaging Data Using Weak Models and ICA , 2000 .
[87] Mechanism Design in Large Games: Incentives and Privacy , 2014 .
[88] Adam D. Smith,et al. Efficient, Differentially Private Point Estimators , 2008, ArXiv.
[89] Maria-Florina Balcan,et al. Circumventing the Price of Anarchy: Leading Dynamics to Good Behavior , 2013, SIAM J. Comput..
[90] Jeff S. Shamma,et al. Optimization Despite Chaos: Convex Relaxations to Complex Limit Sets via Poincaré Recurrence , 2014, SODA.
[91] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[92] R. Vershynin,et al. Covariance estimation for distributions with 2+ε moments , 2011, 1106.2775.
[93] Hironori Yamauchi,et al. Signal and noise separation in medical diagnostic system based on independent component analysis , 2010, 2010 IEEE Asia Pacific Conference on Circuits and Systems.
[94] David Xiao,et al. Is privacy compatible with truthfulness? , 2013, ITCS '13.
[95] Vitaly Shmatikov,et al. Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[96] Anima Anandkumar,et al. A Spectral Algorithm for Latent Dirichlet Allocation , 2012, Algorithmica.
[97] Aaron Roth,et al. A learning theory approach to non-interactive database privacy , 2008, STOC.
[98] Kunal Talwar,et al. Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).