Survey of Techniques for Node Differential Privacy
|
|
- Baldwin Miles
- 5 years ago
- Views:
Transcription
1 Survey of Techniques for Noe Differential Privacy Sofya Raskhonikova Penn State University, on sabbatical at BU for privacy year, also visiting Harvar 1
2 Publishing information about graphs Many types of ata can be represente as graphs where noes correspon to iniviuals eges capture relationships Frienships in online social network Financial transactions communication Health networks (of octors an patients) Romantic relationships image source Image source: American J. Sociology, Bearman, Mooy, Stovel Privacy is a big issue! 2
3 Differential privacy (for graph ata) Graph G Truste curator A ( queries answers ) Users Government, researchers, businesses (or) malicious aversary Differential privacy [Dwork McSherry Nissim Smith 06] An algorithm A is ε-ifferentially private if for all pairs of neighbors G, G an all sets of answers S: Pr A G S e ε Pr A G S image source 3
4 Two variants of ifferential privacy for graphs Ege ifferential privacy G: G : Two graphs are neighbors if they iffer in one ege. Noe ifferential privacy G: G : Two graphs are neighbors if one can be obtaine from the other by eleting a noe an its ajacent eges. 4
5 Differentially private analysis of graphs Graph G Truste curator A Two conflicting goals: utility an privacy Impossible to get both in the worst case Want: ifferentially private algorithms that are accurate on realistic graphs ifferentially private (for all graphs) accurate for a subclass of graphs ( queries answers ) Users Government, researchers, businesses (or) malicious aversary image source 5
6 Graph statistics Number of eges Counts of small subgraphs (e.g., triangles, k-triangles, k-stars) (If noes have colors, noe colors can be specifie in template graphs.) Degree istribution fraction of noes of egree Degree 6
7 Ege ifferentially private algorithms pre-2013: graph statistics an techniques number of triangles, MST cost [Nissim Raskhonikova Smith 07] Smooth sensitivity egree istribution [Hay Rastogi Miklau Suciu 09, Hay Li Miklau Jensen 09, Karwa Slavkovic 12, Kifer Lin 13] Global sensitivity an postprocessing small subgraph counts [Karwa Raskhonikova Smith Yaroslavtsev 11] Smooth sensitivity; Propose-Test-Release [Dwork Lei 09] cuts Ranom projections, global sensitivity [Blocki Blum Datta Sheffet 12] Iterative upates [Hart Rothblum 10, Gupta Roth Ullman 12] Kronecker graph moel parameters [Mir Wright 12] Postprocessing of [KRSY 11] 7
8 Other efinitions Ege private against Bayesian aversary (weaker privacy) small subgraph counts [Rastogi Hay Miklau Suciu 09] Noe zero-knowlege private (stronger privacy than DP) average egree, istances to nearest connecte, Eulerian, cycle-free graphs (privacy only for boune-egree graphs) [Gehrke Lui Pass 12] Sublinear-time algorithms + global sensitivity 8
9 Toay New techniques [Blocki Blum Datta Sheffet 13, Kasiviswanathan Nissim Raskhonikova Smith 13, Chen Zhou 13, Raskhonikova Smith] achieve noe ifferential privacy give better ege ifferentially private algorithms Guarantees for resulting algorithms noe ifferentially private for all graphs accurate for a subclass of graphs, which inclues graphs with sublinear (not necessarily constant) egree boun graphs where the tail of the egree istribution is not too heavy ense graphs goo performance in experiments on real graphs for simple statistics 9
10 New Techniques 1. Truncation + smooth sensitivity [BBDS 13, KNRS 13] Generic reuction to privacy over boune-egree graphs Fast 2. Lipschitz extensions [BBDS 13, KNRS 13] Releasing number of eges via max flow [KNRS 13] Releasing subgraph counts via linear programming [KNRS 13] Releasing egree istribution: via convex programming [RS] Slower, but more accurate 3. Recursive mechanism [CZ 13] (can be viewe as an efficient construction of Lipschitz extensions) Releasing (generalization of) subgraph counts The same accuracy as (2), but slower Unifying iea: ``projections on ``graphs with low sensitivity 10
11 Basic question Graph G Truste curator A ( statistic f approximation to f(g) ) Users Government, researchers, businesses (or) malicious aversary How accurately can an ε-ifferentially private algorithm release f(g)? 11
12 Challenge for noe privacy: high sensitivity Global sensitivity of a function f is f = max f G f G noe neighbors G,G Examples: f (G) is the number of eges in G. f (G) is the number of triangles in G. f = n. f = n 2. 12
13 Challenge for noe privacy: high sensitivity Global sensitivity of a function f is f = max f G f G noe neighbors G,G Local sensitivity LS f (G), max G : neighbor of G New measure of sensitivity [Chen Zhou 13] Down sensitivity DS f (G) is f G f G, is also high. max f G f G :subgraph neighbor of G G. Iea: project onto graphs with low own sensitivity. 13
14 Projections on graphs of small egree [BBDS 13,KNRS 13] Let G = family of all graphs, G = family of graphs of egree. G Notation. f = global sensitivity of f over G. f = global sensitivity of f over G. Observation. f is low for many useful f. Examples: f = (compare to f = n) G f = 2 (compare to f = n 2 ) Goal: privacy for all graphs Iea: ``Project on graphs in G for a carefully chosen << n. 14
15 Metho 1 Truncation + local-sensitivitybase frameworks 15
16 Metho 1: reuction to privacy over G [KNRS 13] Input: Algorithm B that is noe-dp over G Output: Algorithm A that is noe-dp over G, has accuracy similar to B on nice graphs Time(A) = Time(B) + O(m+n) Reuction works for all functions f How it works: Truncation T(G) outputs G with noes of egree > remove. Answer queries on T(G) instea of G G G high f low f via local-sensitivity-base frameworks [NRS 07,Dwork Lei 09, KRSY 11] T G A ε T S T(G) boun l on LS T (G) B ε/l 16
17 Metho 2 Lipschitz extensions 17
18 Metho 2: Lipschitz extensions [BBDS 13,KNRS 13] A function f is a Lipschitz extension of f from G to G if f agrees with f on G an f = f Release f via GS framework [DMNS 06] G G high f f = f low f f = f There exist Lipschitz extensions for all real-value functions Lipschitz extensions can be compute efficiently for subgraph counts [KNRS 13] egree istribution [RS] Vector of real values 18
19 Lipschitz extension of f : flow graph For a graph G=(V, E), efine flow graph of G: ' 2' s 3 3' t 4 4' 5 5' A ege (u, v ) iff u, v E. v flow (G) is the value of the maximum flow in this graph. Lemma. v flow (G)/2 is a Lipschitz extension of f. 19
20 Lipschitz extension of f : flow graph For a graph G=(V, E), efine flow graph of G: 1 2 1/ 1 eg v / eg v / 1' 2' s 3 3' t 4 4' 5 5' A ege (u, v ) iff u, v E. v flow (G) is the value of the maximum flow in this graph. Lemma. v flow (G)/2 is a Lipschitz extension of f. Proof: (1) v flow (G) = 2f (G) for all G G (2) v flow = 2 f 20
21 Lipschitz extension of f : flow graph For a graph G=(V, E), efine flow graph of G: ' 2' s 3 3' t 4 5 4' 5' 6 6' v flow (G) is the value of the maximum flow in this graph. Lemma. v flow (G)/2 is a Lipschitz extension of f. Proof: (1) v flow (G) = 2f (G) for all G G (2) v flow = 2 f = 2 21
22 Lipschitz extensions via linear programs For a graph G=([n], E), efine LP with variables x T for all triangles T: Maximize T= of G x T 2 T:v V(T) = f v LP (G) is the value of LP. Lemma. v LP (G) is a Lipschitz extension of f. Computable in time O(n + f G ) using [Plotkin Shmoys Taros] If we use δ instea of 2 0 x T 1 for all triangles T for all noes v as a boun, get a function with GS δ. It is a Lipschitz extension from a large set that inclues G. x T Can be generalize to other counting queries. 22
23 Lipschitz extension for a function that outputs a vector 23
24 Lipschitz extension of egree istribution via convex programming [RS] 1 1 1' 2 2' s 3 3' t 4 4' f v = flow into vertex v 5 flow graph of G 5' Can we use f v as a proxy for egree of v? Issue: max flow is not unique. Want: unique flow that has low global sensitivity. 24
25 Lipschitz extension of egree istribution via convex programming [RS] 1 1 1' 2 2' s f v = flow into vertex v Let h(x) = x(2 x) flow graph of G Iea: maximize v h(f v ) instea of v f v. Let φ be the flow maximizing v h(f v ), an f be the vector of s-out-flows in φ. f is unique, since h is strictly concave. Poly-time computable (e.g., [Lee Rao Srivastava 13]). 3' 4' 5' 2 t h(x) x 25
26 Lipschitz extension of egree istribution via convex programming [RS] 1 1 1' 2 2' s 3 3' 4 4' f 5 5' v = flow into vertex v φ = argmax v h(f v ). If G G, then f v = eg(v) for all v, since h is strictly increasing on [0,]. Lemma. l 1 global sensitivity f 3. 2 t h x = x(2 x) x 26
27 Lipschitz extension of egree istribution via convex programming [RS] s e s Lemma. l 1 global sensitivity f 3. Proof sketch: Consier g = φ new φ ol g is a union of simple s-t-paths an cycles of several types: 1. s-t-paths an cycles using e s. Contribute 2 to f new 2. s-t-paths using e t. 3. Cycles using e t. 4. Remaining paths an cycles. 1 1' 2' 3' 4' 5' 6' et t f ol 0 Do not exist. Use strict concavity of h 27 1
28 Releasing egree istribution: summary ' 2' s f v = flow into vertex v 1. Construct flow graph of G. 2. Compute s-out-flows f φ = argmax v h(f v ). 3. Release vector f, with Lap 3 per coorinate. ε 4. Use post-processing techniques by [Hay Rastogi Miklau Suciu 09, Hay Li Miklau Jensen 09, Karwa Slavkovic 12, Kifer Lin 13] to remove some noise. 3' 4' 5' 2 t h x = x(2 x) x 28
29 Summary 1. Truncation + smooth sensitivity [BBDS 13, KNRS 13] Generic reuction to privacy over boune-egree graphs Fast 2. Lipschitz extensions [BBDS 13, KNRS 13] Releasing number of eges via max flow [KNRS 13] Releasing subgraph counts via linear programming [KNRS 13] Releasing egree istribution: via convex programming [RS] Slower, but more accurate 3. Recursive mechanism [CZ 13] (can be viewe as an efficient construction of Lipschitz extensions) Releasing (generalization of) subgraph counts The same accuracy as (2), but slower 29
30 Experimental evaluation 30
31 Experiments for the flow an LP metho [Lu] Graph # noes # eges Max egree Time, secs # eges CA-GrQc 5,242 28, CA-HepTh 9,877 51, Time, secs # Δs CA-AstroPh 18, , ,222 com-blp-ungraph 317,080 2,099, com-youtube-ungraph 1,134,890 5,975,248 28,
32 Other experimental results [Lu] showe that truncation is less accurate than flow an LPbase methos. [Chen Zhou 13] provie experimental evaluation on ranom an real-worl graphs. (Mostly) better accuracy than in [KRSY 11] for ege-dp algs. Longer running times than in flow- an LP-base methos implemente by [Lu] for noe-dp algorithms. 32
33 Conclusions We are close to having ege-private an noe-private algorithms that work well in practice for basic graph statistics. Interesting projection techniques that might be useful for esign of DP algorithms in other contexts. 33
34 Open questions New techniques: To which other queries o they apply? Specific queries: Releasing cuts with noe-dp Releasing pairwise istances between noes with DP 34
35 Open questions (continue) DP synthetic graphs Simultaneous release of answers to many queries What are the right notions of privacy for graph ata? What are the right ways to state utility guarantees? Some proposals in [KRSY 13, KNRS 13, Chen Zhou 13] Social networks have noe an ege attributes. What queries are useful? Hypergraphs (that capture relationships such as people appearing on the same photo ) 35
Graph Analysis with. Penn State University. Kobbi Nissim (Ben-Gurion U. and Harvard U.),
Graph Analysis with Node Differential Privacy Sofya Raskhodnikova Penn State University Joint work with Shiva Kasiviswanathan (GE Research), Kobbi Nissim (Ben-Gurion U. and Harvard U.), Adam Smith (Penn
More informationLecture 1 September 4, 2013
CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the
More informationLipschitz Extensions for Node-Private Graph Statistics and the Generalized Exponential Mechanism
Lipschitz Extensions for Node-Private Graph Statistics and the Generalized Exponential Mechanism Sofya Raskhodnikova, Adam Smith Computer Science and Engineering Department Pennsylvania State University
More informationPrivate Analysis of Graph Structure
Private Analysis of Graph Structure Vishesh Karwa Sofya Raskhodnikova Adam Smith Grigory Yaroslavtsev Computer Science and Engineering Department Pennsylvania State University University Park, Pennsylvania
More informationPrivately Solving Linear Programs
Privately Solving Linear Programs Justin Hsu 1 Aaron Roth 1 Tim Roughgarden 2 Jonathan Ullman 3 1 University of Pennsylvania 2 Stanford University 3 Harvard University July 8th, 2014 A motivating example
More informationLearning convex bodies is hard
Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples
More informationDesign of Policy-Aware Differentially Private Algorithms
Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft
More informationAnalyzing Graphs with Node Differential Privacy
Analyzing Graphs with Node Differential Privacy Shiva Prasad Kasiviswanathan 1,, Kobbi Nissim 2, Sofya Raskhodnikova 3,, and Adam Smith 3, 1 General Electric Global Research, USA kasivisw@gmail.com 2 Ben-Gurion
More information6 Gradient Descent. 6.1 Functions
6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output
More informationCS573 Data Privacy and Security. Differential Privacy. Li Xiong
CS573 Data Privacy and Security Differential Privacy Li Xiong Outline Differential Privacy Definition Basic techniques Composition theorems Statistical Data Privacy Non-interactive vs interactive Privacy
More informationSkyline Community Search in Multi-valued Networks
Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h
More informationSublinear Algorithms January 12, Lecture 2. First, let us look at a couple of simple testers that do not work well.
Sublinear Algorithms January 12, 2012 Lecture 2 Lecturer: Sofya Raskhodnikova Scribe(s): Madhav Jha 1 Testing if a List is Sorted Input: Goal: a list x 1,..., x n of arbitrary numbers. an -tester for sortedness
More informationarxiv: v1 [cs.ds] 12 Sep 2016
Jaewoo Lee Penn State University, University Par, PA 16801 Daniel Kifer Penn State University, University Par, PA 16801 JLEE@CSE.PSU.EDU DKIFER@CSE.PSU.EDU arxiv:1609.03251v1 [cs.ds] 12 Sep 2016 Abstract
More informationMultilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis
Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT
More informationNon-homogeneous Generalization in Privacy Preserving Data Publishing
Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h
More information2-connected graphs with small 2-connected dominating sets
2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationPairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11:
airwise alignment using shortest path algorithms, Gunnar Klau, November 9,, : 3 3 airwise alignment using shortest path algorithms e will iscuss: it graph Dijkstra s algorithm algorithm (GDU) 3. References
More informationCryptography & Data Privacy Research in the NSRC
Cryptography & Data Privacy Research in the NSRC Adam Smith Assistant Professor Computer Science and Engineering 1 Cryptography & Data Privacy @ CSE NSRC SIIS Algorithms & Complexity Group Cryptography
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html
More informationSublinear Algorithms Lectures 1 and 2. Sofya Raskhodnikova Penn State University
Sublinear Algorithms Lectures 1 and 2 Sofya Raskhodnikova Penn State University 1 Tentative Topics Introduction, examples and general techniques. Sublinear-time algorithms for graphs strings basic properties
More informationAn Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique
International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech
More informationPrivacy Preserving Machine Learning: A Theoretically Sound App
Privacy Preserving Machine Learning: A Theoretically Sound Approach Outline 1 2 3 4 5 6 Privacy Leakage Events AOL search data leak: New York Times journalist was able to identify users from the anonymous
More informationPositions, Iterators, Tree Structures and Tree Traversals. Readings - Chapter 7.3, 7.4 and 8
Positions, Iterators, Tree Structures an Reaings - Chapter 7.3, 7.4 an 8 1 Positional Lists q q q q A position acts as a marker or token within the broaer positional list. A position p is unaffecte by
More informationTop-k Frequent Itemsets via Differentially Private FP-trees
Top-k Frequent Itemsets via Differentially Private FP-trees Jaewoo Lee Dept. of Computer Science / CERIAS Purue University West Lafayette, IN USA jaewoo@cs.purue.eu Chris Clifton Dept. of Computer Science
More informationThroughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem
Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple
More informationClassifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means
Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu
More informationDifferentially Private Algorithm and Auction Configuration
Differentially Private Algorithm and Auction Configuration Ellen Vitercik CMU, Theory Lunch October 11, 2017 Joint work with Nina Balcan and Travis Dick $1 Prices learned from purchase histories can reveal
More informationCrowd-Blending Privacy
Crowd-Blending Privacy Johannes Gehrke, Michael Hay, Edward Lui, and Rafael Pass Department of Computer Science, Cornell University {johannes,mhay,luied,rafael}@cs.cornell.edu Abstract. We introduce a
More informationStudy of Network Optimization Method Based on ACL
Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department
More informationNon-Uniform Sensor Deployment in Mobile Wireless Sensor Networks
01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University
More informationarxiv: v1 [math.co] 15 Dec 2017
Rectilinear Crossings in Complete Balance -Partite -Uniform Hypergraphs Rahul Gangopahyay Saswata Shannigrahi arxiv:171.05539v1 [math.co] 15 Dec 017 December 18, 017 Abstract In this paper, we stuy the
More informationMORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks
: a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications
More informationOptimal Oblivious Path Selection on the Mesh
Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract
More informationExpanders via Local Edge Flips
Expaners via Local Ege Flips Zeyuan Allen-Zhu Princeton University Aitya Bhaskara Google Silvio Lattanzi Google Vahab Mirrokni Google Lorenzo Orecchia Boston Univesity Big Data & Sublinear Algorithms Workshop,
More informationTransient analysis of wave propagation in 3D soil by using the scaled boundary finite element method
Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite
More informationAdditional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication
Aitional Divie an Conquer Algorithms Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Divie an Conquer Closest Pair Let s revisit the closest pair problem. Last
More informationRelationship Privacy: Output Perturbation for Queries with Joins
Relationship Privacy: Output Perturbation for Queries with Joins ABSTRACT Vibhor Rastogi CSE, University of Washington Seattle, WA, USA, 98105-2350 vibhor@cs.washington.edu Gerome Miklau CS, UMass Amherst
More informationA Stochastic Process on the Hypercube with Applications to Peer to Peer Networks
A Stochastic Process on the Hypercube with Applications to Peer to Peer Networs [Extene Abstract] Micah Aler Department of Computer Science, University of Massachusetts, Amherst, MA 0003 460, USA micah@cs.umass.eu
More informationDistribution-Free Models of Social and Information Networks
Distribution-Free Models of Social and Information Networks Tim Roughgarden (Stanford CS) joint work with Jacob Fox (Stanford Math), Rishi Gupta (Stanford CS), C. Seshadhri (UC Santa Cruz), Fan Wei (Stanford
More informationData Anonymization. Graham Cormode.
Data Anonymization Graham Cormode graham@research.att.com 1 Why Anonymize? For Data Sharing Give real(istic) data to others to study without compromising privacy of individuals in the data Allows third-parties
More informationCS675: Convex and Combinatorial Optimization Spring 2018 Consequences of the Ellipsoid Algorithm. Instructor: Shaddin Dughmi
CS675: Convex and Combinatorial Optimization Spring 2018 Consequences of the Ellipsoid Algorithm Instructor: Shaddin Dughmi Outline 1 Recapping the Ellipsoid Method 2 Complexity of Convex Optimization
More informationd 3 d 4 d d d d d d d d d d d 1 d d d d d d
Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching
More informationParallel Algorithms for Geometric Graph Problems Grigory Yaroslavtsev
Parallel Algorithms for Geometric Graph Problems Grigory Yaroslavtsev http://grigory.us Appeared in STOC 2014, joint work with Alexandr Andoni, Krzysztof Onak and Aleksandar Nikolov. The Big Data Theory
More informationData Mining: Clustering
Bi-Clustering COMP 790-90 Seminar Spring 011 Data Mining: Clustering k t 1 K-means clustering minimizes Where ist ( x, c i t i c t ) ist ( x m j 1 ( x ij i, c c t ) tj ) Clustering by Pattern Similarity
More informationParticle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base
More informationSocially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach
Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly
More informationAlmost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control
Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract
More informationIn this lecture, we ll look at applications of duality to three problems:
Lecture 7 Duality Applications (Part II) In this lecture, we ll look at applications of duality to three problems: 1. Finding maximum spanning trees (MST). We know that Kruskal s algorithm finds this,
More informationIEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,
More informationPERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING
PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING PAMELA RUSSELL ADVISOR: PAUL CULL OREGON STATE UNIVERSITY ABSTRACT. Birchall an Teor prove that
More informationBlind Data Classification using Hyper-Dimensional Convex Polytopes
Blin Data Classification using Hyper-Dimensional Convex Polytopes Brent T. McBrie an Gilbert L. Peterson Department of Electrical an Computer Engineering Air Force Institute of Technology 9 Hobson Way
More informationSensitive Label Privacy Protection on Social Network Data
Sensitive Label Privacy Protection on Social Network Data Yi Song, Panagiotis Karras, Qian Xiao, and Stéphane Bressan School of Computing National University of Singapore {songyi, xiaoqian, steph}@nus.edu.sg
More informationAlgorithmic Approaches to Preventing Overfitting in Adaptive Data Analysis. Part 1 Aaron Roth
Algorithmic Approaches to Preventing Overfitting in Adaptive Data Analysis Part 1 Aaron Roth The 2015 ImageNet competition An image classification competition during a heated war for deep learning talent
More informationState Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway
State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle
More informationarxiv: v1 [cs.cr] 22 Apr 2015 ABSTRACT
Differentially Private -Means Clustering arxiv:10.0v1 [cs.cr] Apr 01 ABSTRACT Dong Su #, Jianneng Cao, Ninghui Li #, Elisa Bertino #, Hongxia Jin There are two broa approaches for ifferentially private
More informationMechanism Design in Large Congestion Games
Mechanism Design in Large Congestion Games Ryan Rogers, Aaron Roth, Jonathan Ullman, and Steven Wu July 22, 2015 Routing Game l e (y) Routing Game Routing Game A routing game G is defined by Routing Game
More informationIntensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2
This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar
More informationBIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES
BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations
More informationGRAPH analysis has been attracting increasing attention
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. XX, NO. XX, MAY 7 Graph Embeing Techniques, Applications, an Performance: A Survey Palash Goyal an Emilio Ferrara arxiv:78v [cs.si]
More informationarxiv: v4 [cs.si] 22 Dec 2017
Graph Embeing Techniques, Applications, an Performance: A Survey Palash Goyal an Emilio Ferrara University of Southern California, Information Sciences Institute 4676 Amiralty Way, Suite 1. Marina el Rey,
More informationPrinciples of B-trees
CSE465, Fall 2009 February 25 1 Principles of B-trees Noes an binary search Anoe u has size size(u), keys k 1,..., k size(u) 1 chilren c 1,...,c size(u). Binary search property: for i = 1,..., size(u)
More informationDistributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs
IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,
More informationA Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition
ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural
More informationSecure Network Coding for Distributed Secret Sharing with Low Communication Cost
Secure Network Coing for Distribute Secret Sharing with Low Communication Cost Nihar B. Shah, K. V. Rashmi an Kannan Ramchanran, Fellow, IEEE Abstract Shamir s (n,k) threshol secret sharing is an important
More informationAdjacency Matrix Based Full-Text Indexing Models
1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,
More informationTCOM 501: Networking Theory & Fundamentals. Lecture 11 April 16, 2003 Prof. Yannis A. Korilis
TOM 50: Networking Theory & undamentals Lecture pril 6, 2003 Prof. Yannis. Korilis 2 Topics Routing in ata Network Graph Representation of a Network Undirected Graphs Spanning Trees and Minimum Weight
More informationCryptography & Data Privacy Research in the NSRC
Cryptography & Data Privacy Research in the NSRC Adam Smith Assistant Professor Computer Science and Engineering 1 Cryptography & Data Privacy @ CSE NSRC SIIS Algorithms & Complexity Group Cryptography
More informationTraveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R + Goal: find a tour (Hamiltonian cycle) of minimum cost
Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R + Goal: find a tour (Hamiltonian cycle) of minimum cost Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R
More informationThe Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract
The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie
More informationNAVAL POSTGRADUATE SCHOOL THESIS
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS REALIZABLE TRIPLES IN DOMINATOR COLORINGS by Douglas M. Fletcher II June 2007 Thesis Co-Avisors: Ralucca Gera Craig Rasmussen Approve for public release;
More informationPrivacy-Integrated Graph Clustering Through Differential Privacy
Privacy-Integrated Graph Clustering Through Differential Privacy Yvonne Mülle University of Zurich, Switzerland muelle@ifi.uzh.ch Chris Clifton Purdue University, USA clifton@cs.purdue.edu Klemens Böhm
More informationwith BLENDER: Enabling Local Search a Hybrid Differential Privacy Model
BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model Brendan Avent 1, Aleksandra Korolova 1, David Zeber 2, Torgeir Hovden 2, Benjamin Livshits 3 University of Southern California 1
More informationPrivacy-Preserving Outlier Detection for Data Streams
Privacy-Preserving Outlier Detection for Data Streams Jonas Böhler 1, Daniel Bernau 1, and Florian Kerschbaum 2 1 SAP Research, Karlsruhe, Germany firstname.lastname@sap.com 2 University of Waterloo, Canada
More informationDiffusion and Clustering on Large Graphs
Diffusion and Clustering on Large Graphs Alexander Tsiatas Final Defense 17 May 2012 Introduction Graphs are omnipresent in the real world both natural and man-made Examples of large graphs: The World
More informationAPPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly
International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -
More informationPerfect matchings in O(nlogn) time in regular bipartite graph
Perfect matchings in O(nlogn) time in regular bipartite graphs Research project for computational optimization Presented by:qing Li April 26, 2011 Outline i.. ii.. iii.. iv.. What is d regular bipartite
More informationAnalysis of half-space range search using the k-d search skip list. Here we analyse the expected time for half-space
Analysis of half-space range search using the k- search skip list Mario A. Lopez Brafor G. Nickerson y 1 Abstract We analyse the average cost of half-space range reporting for the k- search skip list.
More informationOffloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization
1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24
More informationDetecting Overlapping Communities from Local Spectral Subspaces
Detecting Overlapping Communities from Local Spectral Subspaces Kun He, Yiwei Sun Huazhong University of Science an Technology Wuhan 430074, China Email: {brooklet60, yiweisun}@hust.eu.cn Davi Binel, John
More informationOn the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems
On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,
More informationImproving Spatial Reuse of IEEE Based Ad Hoc Networks
mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos
More informationDEEP LEARNING WITH DIFFERENTIAL PRIVACY Martin Abadi, Andy Chu, Ian Goodfellow*, Brendan McMahan, Ilya Mironov, Kunal Talwar, Li Zhang Google * Open
DEEP LEARNING WITH DIFFERENTIAL PRIVACY Martin Abadi, Andy Chu, Ian Goodfellow*, Brendan McMahan, Ilya Mironov, Kunal Talwar, Li Zhang Google * Open AI 2 3 Deep Learning Fashion Cognitive tasks: speech,
More informationDistributed Data Anonymization with Hiding Sensitive Node Labels
Distributed Data Anonymization with Hiding Sensitive Node Labels C.EMELDA Research Scholar, PG and Research Department of Computer Science, Nehru Memorial College, Putthanampatti, Bharathidasan University,Trichy
More informationHigh dimensional Apollonian networks
High imensional Apollonian networks Zhongzhi Zhang Institute of Systems Engineering, Dalian University of Technology, Dalian 11604, Liaoning, China E-mail: lutzzz063@yahoo.com.cn Francesc Comellas Dep.
More informationImage Segmentation using K-means clustering and Thresholding
Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,
More informationStreaming verification of graph problems
Streaming verification of graph problems Suresh Venkatasubramanian The University of Utah Joint work with Amirali Abdullah, Samira Daruki and Chitradeep Dutta Roy Outsourcing Computations We no longer
More informationWATER MIST SPRAY MODELLING WITH FDS
PROCEEDINGS, Fire an Evacuation Moeling Technical Conference 0 Baltimore, Marylan, August 5-6, 0 WATER MIST SPRAY MODELLING WITH FDS Simo Hostikka, Jukka Vaari, Topi Sikanen, Antti Paajanen VTT Technical
More informationOptimal Distributed P2P Streaming under Node Degree Bounds
Optimal Distribute P2P Streaming uner Noe Degree Bouns Shaoquan Zhang, Ziyu Shao, Minghua Chen, an Libin Jiang Department of Information Engineering, The Chinese University of Hong Kong Department of EECS,
More informationLarge Monochromatic Components in Two-colored Grids
Large Monochromatic Components in Two-colore Gris Jiří Matoušek 1 Aleš Přívětivý 2 Department of Applie Mathematics 1,2 an Institute of Theoretical Computer Science (ITI) 1 Charles University Malostranské
More informationA shortest path algorithm in multimodal networks: a case study with time varying costs
A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via
More informationOn vertex types of graphs
On vertex types of graphs arxiv:1705.09540v1 [math.co] 26 May 2017 Pu Qiao, Xingzhi Zhan Department of Mathematics, East China Normal University, Shanghai 200241, China Abstract The vertices of a graph
More informationAd-Hoc Networks Beyond Unit Disk Graphs
A-Hoc Networks Beyon Unit Disk Graphs Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerlan {kuhn, wattenhofer, zollinger}@inf.ethz.ch ABSTRACT
More informationAnyTraffic Labeled Routing
AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,
More informationRandom Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation
DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,
More informationPrivacy-Preserving Machine Learning
Privacy-Preserving Machine Learning CS 760: Machine Learning Spring 2018 Mark Craven and David Page www.biostat.wisc.edu/~craven/cs760 1 Goals for the Lecture You should understand the following concepts:
More informationIntroduction to Algorithms A graph G =(V, E) V = set of vertices E = set of edges
Introuction to Algorithms A graph G =(V, E) V = set of vertices E = set of eges In an unirecte graph: ege(u, v) = ege(v, u) Chapter 22: Elementary Graph Algorithms In a irecte graph: ege(u,v) goes from
More informationPage 1 of 1 4-1 Congruent Figures Teks Focus TEKS (6)(C) Apply the efinition of congruence, in terms of rigi transformations, to ientify congruent figures an their corresponing sies an angles. TEKS (1)(B)
More informationClustering Expression Data. Clustering Expression Data
www.cs.washington.eu/ Subscribe if you Din t get msg last night Clustering Exression Data Why cluster gene exression ata? Tissue classification Fin biologically relate genes First ste in inferring regulatory
More informationPreamble. Singly linked lists. Collaboration policy and academic integrity. Getting help
CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure
More information