Add SODA acceptance.
This commit is contained in:
parent
86eb4a6f37
commit
52cdd93510
|
@ -324,6 +324,7 @@
|
|||
@STRING{soda11 = soda # ", San Francisco, California"}
|
||||
@STRING{soda12 = soda # ", Kyoto, Japan"}
|
||||
@STRING{soda14 = soda # ", Portland, Oregon"}
|
||||
@STRING{soda16 = soda # ", Arlington, Virginia"}
|
||||
|
||||
% ----
|
||||
@STRING{tcc = "{IACR} {T}heory of {C}ryptography {C}onference (TCC)"}
|
||||
|
|
181
bibs/myrefs.bib
181
bibs/myrefs.bib
|
@ -13,18 +13,6 @@
|
|||
eprint = yes
|
||||
}
|
||||
|
||||
@unpublished{HHRW15,
|
||||
author = {Hsu, Justin and
|
||||
Huang, Zhiyi and
|
||||
Roth, Aaron and
|
||||
Wu, Zhiwei Steven},
|
||||
title = {Jointly private convex programming},
|
||||
year = {2015},
|
||||
url = {http://arxiv.org/abs/1411.0998},
|
||||
jh = yes,
|
||||
eprint = yes
|
||||
}
|
||||
|
||||
@unpublished{BEGGHS15,
|
||||
title = {Formal Certification of Randomized Algorithms},
|
||||
author = {Barthe, Gilles and
|
||||
|
@ -39,6 +27,20 @@
|
|||
}
|
||||
|
||||
%%%%%%%%%%%%%%%%%%%%%%%%%%%% CONFERENCES %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||
@inproceedings{HHRW16,
|
||||
author = {Hsu, Justin and
|
||||
Huang, Zhiyi and
|
||||
Roth, Aaron and
|
||||
Wu, Zhiwei Steven},
|
||||
title = {Jointly private convex programming},
|
||||
booktitle = soda16,
|
||||
year = {2016},
|
||||
url = {http://arxiv.org/abs/1411.0998},
|
||||
jh = yes,
|
||||
eprint = yes,
|
||||
note = {To appear.}
|
||||
}
|
||||
|
||||
@inproceedings{BEGHSS15,
|
||||
title = {Relational reasoning via probabilistic coupling},
|
||||
author = {Barthe, Gilles and
|
||||
|
@ -621,7 +623,7 @@
|
|||
booktitle = sp08,
|
||||
year = {2008},
|
||||
pages = {111--125},
|
||||
url = {http://arxiv.org/abs/cs/0610105.pdf}
|
||||
url = {http://arxiv.org/abs/cs/0610105}
|
||||
}
|
||||
|
||||
@inproceedings{BLST10,
|
||||
|
@ -1170,7 +1172,7 @@ url={http://goto.ucsd.edu/~nvazou/refinement_types_for_haskell.pdf}
|
|||
|
||||
@book{McIver:2005,
|
||||
Author = {{M}c{I}ver, A. and Morgan, C.},
|
||||
Publisher = {Springer},
|
||||
Publisher = springer,
|
||||
Series = {Monographs in Computer Science},
|
||||
Title = {Abstraction, Refinement, and Proof for Probabilistic Systems},
|
||||
Year = {2005}}
|
||||
|
@ -1322,7 +1324,7 @@ url = {http://research.microsoft.com/pubs/208236/asplos077-bornholtA.pd
|
|||
title = {Information Flow Analysis in Logical Form},
|
||||
booktitle = sas04,
|
||||
pages = {100--115},
|
||||
publisher = {Springer},
|
||||
publisher = springer,
|
||||
address = {Heidelberg},
|
||||
series = lncs,
|
||||
volume = {3148},
|
||||
|
@ -1349,7 +1351,7 @@ url = {http://research.microsoft.com/pubs/208236/asplos077-bornholtA.pd
|
|||
booktitle = crypto11,
|
||||
year = {2011},
|
||||
pages = {71--90},
|
||||
url = {http://dx.doi.org/10.1007/978--3-642--22792--9_5},
|
||||
url = {http://software.imdea.org/~szanella/Zanella.2011.CRYPTO.pdf},
|
||||
bibsource = {DBLP, http://dblp.uni-trier.de}
|
||||
}
|
||||
|
||||
|
@ -1394,8 +1396,8 @@ url = {http://research.microsoft.com/pubs/208236/asplos077-bornholtA.pd
|
|||
year = {2013},
|
||||
pages = {23--40},
|
||||
url = {http://dx.doi.org/10.1007/978--3-319--07602--7_4},
|
||||
publisher = {Springer},
|
||||
series = {Lecture Notes in Computer Science},
|
||||
publisher = springer,
|
||||
series = lncs,
|
||||
volume = {8348},
|
||||
}
|
||||
|
||||
|
@ -1408,8 +1410,8 @@ url = {http://research.microsoft.com/pubs/208236/asplos077-bornholtA.pd
|
|||
year = {2007},
|
||||
pages = {288--297},
|
||||
url = {http://dx.doi.org/10.1007/978--3-540--75254--7_29},
|
||||
publisher = {Springer},
|
||||
series = {Lecture Notes in Computer Science},
|
||||
publisher = springer,
|
||||
series = lncs,
|
||||
volume = {4696},
|
||||
}
|
||||
|
||||
|
@ -1470,8 +1472,8 @@ year = {2014}
|
|||
title = {A Qualitative Comparison of the Suitability of Four Theorem
|
||||
Provers for Basic Auction Theory},
|
||||
booktitle = {MKM/Calculemus/DML},
|
||||
publisher = {Springer},
|
||||
series = {Lecture Notes in Computer Science},
|
||||
publisher = springer,
|
||||
series = lncs,
|
||||
volume = {7961},
|
||||
year = {2013},
|
||||
pages = {200--215},
|
||||
|
@ -1491,16 +1493,18 @@ year = {2014}
|
|||
url = {http://dl.acm.org/citation.cfm?id=2240262}
|
||||
}
|
||||
|
||||
@inproceedings{BartheDR04,
|
||||
author = {Gilles Barthe and
|
||||
Pedro R. D'Argenio and
|
||||
Tamara Rezk},
|
||||
title = {Secure Information Flow by Self-Composition},
|
||||
booktitle = csfw04,
|
||||
year = {2004},
|
||||
pages = {100--114},
|
||||
url = {http://doi.ieeecomputersociety.org/10.1109/CSFW.2004.17},
|
||||
bibsource = {DBLP, http://dblp.uni-trier.de}
|
||||
@article{BartheDR04,
|
||||
title={Secure information flow by self-composition},
|
||||
author={Barthe, Gilles and
|
||||
D'Argenio, Pedro R and
|
||||
Rezk, Tamara},
|
||||
journal=mscs,
|
||||
volume={21},
|
||||
number={06},
|
||||
pages={1207--1252},
|
||||
year={2011},
|
||||
publisher=cup,
|
||||
url = {http://www-sop.inria.fr/lemme/Tamara.Rezk/publication/Barthe-DArgenio-Rezk-Journal.pdf}
|
||||
}
|
||||
|
||||
@inproceedings{ZaksP08,
|
||||
|
@ -1508,9 +1512,9 @@ year = {2014}
|
|||
title = {{CoVaC}: Compiler Validation by Program Analysis of the Cross-Product},
|
||||
booktitle = fm08,
|
||||
pages = {35--51},
|
||||
publisher = {Springer},
|
||||
publisher = springer,
|
||||
address = {Heidelberg},
|
||||
series = {Lecture Notes in Computer Science},
|
||||
series = lncs,
|
||||
volume = {5014},
|
||||
year = {2008},
|
||||
url = {http://llvm.org/pubs/2008-05-CoVaC.pdf}
|
||||
|
@ -1522,8 +1526,8 @@ year = {2014}
|
|||
Author = {Terauchi, Tachio and Aiken, Alex},
|
||||
Booktitle = sas05,
|
||||
Pages = {352--367},
|
||||
Publisher = {Springer},
|
||||
Series = {Lecture Notes in Computer Science},
|
||||
Publisher = springer,
|
||||
Series = lncs,
|
||||
Title = {Secure Information Flow as a Safety Problem},
|
||||
Volume = {3672},
|
||||
Year = {2005},
|
||||
|
@ -1539,8 +1543,7 @@ year = {2014}
|
|||
booktitle = fm11,
|
||||
year = {2011},
|
||||
pages = {200--214},
|
||||
url = {http://dx.doi.org/10.1007/978--3-642--21437--0_17},
|
||||
bibsource = {DBLP, http://dblp.uni-trier.de}
|
||||
url = {http://software.imdea.org/~ckunz/rellog/long-rellog.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{BartheCK13,
|
||||
|
@ -1654,7 +1657,7 @@ year = {2014}
|
|||
booktitle={Advanced Functional Programming},
|
||||
pages={130--170},
|
||||
year={2005},
|
||||
publisher={Springer},
|
||||
publisher=springer,
|
||||
url={http://cs.ru.nl/~freek/courses/tt-2010/tvftl/epigram-notes.pdf}
|
||||
}
|
||||
@inproceedings{Vytiniotis+13,
|
||||
|
@ -2182,12 +2185,20 @@ year = {2014}
|
|||
publisher = {ACM}
|
||||
}
|
||||
|
||||
@inproceedings{Barthe11,
|
||||
Author = {Gilles Barthe and Benjamin Gr{\'e}goire and Sylvain Heraud and Santiago Zanella B{\'e}guelin},
|
||||
@inproceedings{BartheGHZ11,
|
||||
author = {Gilles Barthe and
|
||||
Benjamin Gr{\'e}goire and
|
||||
Sylvain Heraud and
|
||||
Santiago Zanella B{\'e}guelin},
|
||||
title = {Computer-Aided Security Proofs for the Working Cryptographer},
|
||||
Booktitle = crypto11,
|
||||
Pages = {71-90},
|
||||
Title = {Computer-Aided Security Proofs for the Working Cryptographer},
|
||||
Year = {2011}}
|
||||
year = {2011},
|
||||
Pages = {71--90},
|
||||
publisher = springer,
|
||||
series = lncs,
|
||||
volume = {6841}
|
||||
}
|
||||
|
||||
@inproceedings{flanagan2001,
|
||||
title={Avoiding exponential explosion: Generating compact
|
||||
verification conditions},
|
||||
|
@ -2205,14 +2216,17 @@ verification conditions},
|
|||
C{\'{e}}sar Kunz and
|
||||
Benedikt Schmidt and
|
||||
Pierre{-}Yves Strub},
|
||||
title = {Easy{C}rypt: {A} Tutorial},
|
||||
editor = {Alessandro Aldini and
|
||||
Javier Lopez and
|
||||
Fabio Martinelli},
|
||||
title = {EasyCrypt: {A} Tutorial},
|
||||
booktitle = {Foundations of Security Analysis and Design {VII} - {FOSAD} 2012/2013
|
||||
Tutorial Lectures},
|
||||
pages = {146--166},
|
||||
series = {LNCS},
|
||||
year = {2014},
|
||||
series = lncs,
|
||||
volume = {8604},
|
||||
publisher = {Springer}
|
||||
pages = {146--166},
|
||||
publisher = springer,
|
||||
year = {2013}
|
||||
}
|
||||
|
||||
@article{Hoare69,
|
||||
|
@ -2297,7 +2311,7 @@ verification conditions},
|
|||
booktitle=cp03,
|
||||
pages={19--36},
|
||||
year={2003},
|
||||
organization={Springer}
|
||||
organization=springer
|
||||
}
|
||||
|
||||
@inproceedings{BP14,
|
||||
|
@ -2401,7 +2415,7 @@ language={English}
|
|||
booktitle = {{CEEMAS 2007}},
|
||||
year = {2007},
|
||||
pages = {288--297},
|
||||
publisher = {Springer},
|
||||
publisher = springer,
|
||||
series = {LNCS},
|
||||
volume = {4696},
|
||||
}
|
||||
|
@ -2430,13 +2444,13 @@ language={English}
|
|||
title = {A Qualitative Comparison of the Suitability of Four Theorem
|
||||
Provers for Basic Auction Theory},
|
||||
booktitle={Intelligent Computer Mathematics},
|
||||
publisher = {Springer},
|
||||
series = {Lecture Notes in Computer Science},
|
||||
publisher = springer,
|
||||
series = lncs,
|
||||
volume = {7961},
|
||||
year = {2013},
|
||||
pages = {200--215},
|
||||
url = {http://dx.doi.org/10.1007/978--3-642--39320--4_13},
|
||||
publisher={Springer}
|
||||
publisher=springer
|
||||
}
|
||||
|
||||
@article{DBLP:journals/ipl/Vestergaard06,
|
||||
|
@ -2506,7 +2520,7 @@ language={English}
|
|||
number={1},
|
||||
pages={17--33},
|
||||
year={1971},
|
||||
publisher={Springer}
|
||||
publisher=springer
|
||||
}
|
||||
|
||||
@article{groves73,
|
||||
|
@ -2522,8 +2536,8 @@ language={English}
|
|||
author = {Bellare, Mihir and Rogaway, Phillip},
|
||||
booktitle = eucrypt06,
|
||||
pages = {409--426},
|
||||
publisher = {Springer},
|
||||
series = {Lecture Notes in Computer Science},
|
||||
publisher = springer,
|
||||
series = lncs,
|
||||
title = {The Security of Triple Encryption and a Framework for
|
||||
Code-Based Game-Playing Proofs},
|
||||
volume = {4004},
|
||||
|
@ -2971,3 +2985,56 @@ year={2011}
|
|||
pages={159--169},
|
||||
year={2008},
|
||||
}
|
||||
|
||||
@book{Thorisson00,
|
||||
author = {Hermann Thorisson},
|
||||
title = {Coupling, Stationarity, and Regeneration},
|
||||
publisher = springer,
|
||||
year = {2000}
|
||||
}
|
||||
|
||||
@book{Lindvall02,
|
||||
title={Lectures on the coupling method},
|
||||
author={Lindvall, Torgny},
|
||||
year={2002},
|
||||
publisher={Courier Corporation}
|
||||
}
|
||||
|
||||
@book{Villani08,
|
||||
title={Optimal transport: old and new},
|
||||
author={Villani, C{\'e}dric},
|
||||
year={2008},
|
||||
publisher={Springer Science}
|
||||
}
|
||||
|
||||
@techreport{DengD11,
|
||||
Author = {Deng, Yuxin and Du, Wenjie},
|
||||
Institution = {Carnegie Mellon University},
|
||||
Month = {March},
|
||||
Number = {CMU-CS-11-110},
|
||||
Title = {Logical, Metric, and Algorithmic Characterisations of Probabilistic Bisimulation},
|
||||
Year = {2011},
|
||||
url = {http://arxiv.org/abs/1103.4577}
|
||||
}
|
||||
|
||||
@article{Yang07,
|
||||
author = {H. Yang},
|
||||
title = {Relational separation logic},
|
||||
journal = tcs,
|
||||
volume = 375,
|
||||
number = {1-3},
|
||||
year = 2007,
|
||||
pages = {308--334},
|
||||
url = {http://www.cs.ox.ac.uk/people/hongseok.yang/paper/data.pdf}
|
||||
}
|
||||
|
||||
@article{mufa1994optimal,
|
||||
title={Optimal Markovian couplings and applications},
|
||||
author={Mufa, Chen},
|
||||
journal={Acta Mathematica Sinica},
|
||||
volume={10},
|
||||
number={3},
|
||||
pages={260--275},
|
||||
year={1994},
|
||||
publisher=springer
|
||||
}
|
||||
|
|
|
@ -1,3 +1,5 @@
|
|||
+ **09/2015** Our paper **Jointly private convex programming** has been accepted
|
||||
to **SODA 2016**!
|
||||
+ **09/2015** Our paper **Relational reasoning via probabilistic coupling**
|
||||
has been accepted to **LPAR 2015**!
|
||||
+ **08/2015** Our preprint **Online Assignment with Heterogeneous Tasks in
|
||||
|
|
Loading…
Reference in New Issue