Add SODA acceptance.

This commit is contained in:
Justin Hsu 2015-09-11 20:23:51 +03:00
parent 86eb4a6f37
commit 52cdd93510
3 changed files with 127 additions and 57 deletions

View File

@ -324,6 +324,7 @@
@STRING{soda11 = soda # ", San Francisco, California"}
@STRING{soda12 = soda # ", Kyoto, Japan"}
@STRING{soda14 = soda # ", Portland, Oregon"}
@STRING{soda16 = soda # ", Arlington, Virginia"}
% ----
@STRING{tcc = "{IACR} {T}heory of {C}ryptography {C}onference (TCC)"}

View File

@ -13,18 +13,6 @@
eprint = yes
}
@unpublished{HHRW15,
author = {Hsu, Justin and
Huang, Zhiyi and
Roth, Aaron and
Wu, Zhiwei Steven},
title = {Jointly private convex programming},
year = {2015},
url = {http://arxiv.org/abs/1411.0998},
jh = yes,
eprint = yes
}
@unpublished{BEGGHS15,
title = {Formal Certification of Randomized Algorithms},
author = {Barthe, Gilles and
@ -39,6 +27,20 @@
}
%%%%%%%%%%%%%%%%%%%%%%%%%%%% CONFERENCES %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
@inproceedings{HHRW16,
author = {Hsu, Justin and
Huang, Zhiyi and
Roth, Aaron and
Wu, Zhiwei Steven},
title = {Jointly private convex programming},
booktitle = soda16,
year = {2016},
url = {http://arxiv.org/abs/1411.0998},
jh = yes,
eprint = yes,
note = {To appear.}
}
@inproceedings{BEGHSS15,
title = {Relational reasoning via probabilistic coupling},
author = {Barthe, Gilles and
@ -621,7 +623,7 @@
booktitle = sp08,
year = {2008},
pages = {111--125},
url = {http://arxiv.org/abs/cs/0610105.pdf}
url = {http://arxiv.org/abs/cs/0610105}
}
@inproceedings{BLST10,
@ -1170,7 +1172,7 @@ url={http://goto.ucsd.edu/~nvazou/refinement_types_for_haskell.pdf}
@book{McIver:2005,
Author = {{M}c{I}ver, A. and Morgan, C.},
Publisher = {Springer},
Publisher = springer,
Series = {Monographs in Computer Science},
Title = {Abstraction, Refinement, and Proof for Probabilistic Systems},
Year = {2005}}
@ -1322,7 +1324,7 @@ url = {http://research.microsoft.com/pubs/208236/asplos077-bornholtA.pd
title = {Information Flow Analysis in Logical Form},
booktitle = sas04,
pages = {100--115},
publisher = {Springer},
publisher = springer,
address = {Heidelberg},
series = lncs,
volume = {3148},
@ -1349,7 +1351,7 @@ url = {http://research.microsoft.com/pubs/208236/asplos077-bornholtA.pd
booktitle = crypto11,
year = {2011},
pages = {71--90},
url = {http://dx.doi.org/10.1007/978--3-642--22792--9_5},
url = {http://software.imdea.org/~szanella/Zanella.2011.CRYPTO.pdf},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@ -1394,8 +1396,8 @@ url = {http://research.microsoft.com/pubs/208236/asplos077-bornholtA.pd
year = {2013},
pages = {23--40},
url = {http://dx.doi.org/10.1007/978--3-319--07602--7_4},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
publisher = springer,
series = lncs,
volume = {8348},
}
@ -1408,8 +1410,8 @@ url = {http://research.microsoft.com/pubs/208236/asplos077-bornholtA.pd
year = {2007},
pages = {288--297},
url = {http://dx.doi.org/10.1007/978--3-540--75254--7_29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
publisher = springer,
series = lncs,
volume = {4696},
}
@ -1470,8 +1472,8 @@ year = {2014}
title = {A Qualitative Comparison of the Suitability of Four Theorem
Provers for Basic Auction Theory},
booktitle = {MKM/Calculemus/DML},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
publisher = springer,
series = lncs,
volume = {7961},
year = {2013},
pages = {200--215},
@ -1491,16 +1493,18 @@ year = {2014}
url = {http://dl.acm.org/citation.cfm?id=2240262}
}
@inproceedings{BartheDR04,
author = {Gilles Barthe and
Pedro R. D'Argenio and
Tamara Rezk},
title = {Secure Information Flow by Self-Composition},
booktitle = csfw04,
year = {2004},
pages = {100--114},
url = {http://doi.ieeecomputersociety.org/10.1109/CSFW.2004.17},
bibsource = {DBLP, http://dblp.uni-trier.de}
@article{BartheDR04,
title={Secure information flow by self-composition},
author={Barthe, Gilles and
D'Argenio, Pedro R and
Rezk, Tamara},
journal=mscs,
volume={21},
number={06},
pages={1207--1252},
year={2011},
publisher=cup,
url = {http://www-sop.inria.fr/lemme/Tamara.Rezk/publication/Barthe-DArgenio-Rezk-Journal.pdf}
}
@inproceedings{ZaksP08,
@ -1508,9 +1512,9 @@ year = {2014}
title = {{CoVaC}: Compiler Validation by Program Analysis of the Cross-Product},
booktitle = fm08,
pages = {35--51},
publisher = {Springer},
publisher = springer,
address = {Heidelberg},
series = {Lecture Notes in Computer Science},
series = lncs,
volume = {5014},
year = {2008},
url = {http://llvm.org/pubs/2008-05-CoVaC.pdf}
@ -1522,8 +1526,8 @@ year = {2014}
Author = {Terauchi, Tachio and Aiken, Alex},
Booktitle = sas05,
Pages = {352--367},
Publisher = {Springer},
Series = {Lecture Notes in Computer Science},
Publisher = springer,
Series = lncs,
Title = {Secure Information Flow as a Safety Problem},
Volume = {3672},
Year = {2005},
@ -1539,8 +1543,7 @@ year = {2014}
booktitle = fm11,
year = {2011},
pages = {200--214},
url = {http://dx.doi.org/10.1007/978--3-642--21437--0_17},
bibsource = {DBLP, http://dblp.uni-trier.de}
url = {http://software.imdea.org/~ckunz/rellog/long-rellog.pdf},
}
@inproceedings{BartheCK13,
@ -1654,7 +1657,7 @@ year = {2014}
booktitle={Advanced Functional Programming},
pages={130--170},
year={2005},
publisher={Springer},
publisher=springer,
url={http://cs.ru.nl/~freek/courses/tt-2010/tvftl/epigram-notes.pdf}
}
@inproceedings{Vytiniotis+13,
@ -2182,12 +2185,20 @@ year = {2014}
publisher = {ACM}
}
@inproceedings{Barthe11,
Author = {Gilles Barthe and Benjamin Gr{\'e}goire and Sylvain Heraud and Santiago Zanella B{\'e}guelin},
@inproceedings{BartheGHZ11,
author = {Gilles Barthe and
Benjamin Gr{\'e}goire and
Sylvain Heraud and
Santiago Zanella B{\'e}guelin},
title = {Computer-Aided Security Proofs for the Working Cryptographer},
Booktitle = crypto11,
Pages = {71-90},
Title = {Computer-Aided Security Proofs for the Working Cryptographer},
Year = {2011}}
year = {2011},
Pages = {71--90},
publisher = springer,
series = lncs,
volume = {6841}
}
@inproceedings{flanagan2001,
title={Avoiding exponential explosion: Generating compact
verification conditions},
@ -2205,14 +2216,17 @@ verification conditions},
C{\'{e}}sar Kunz and
Benedikt Schmidt and
Pierre{-}Yves Strub},
title = {Easy{C}rypt: {A} Tutorial},
editor = {Alessandro Aldini and
Javier Lopez and
Fabio Martinelli},
title = {EasyCrypt: {A} Tutorial},
booktitle = {Foundations of Security Analysis and Design {VII} - {FOSAD} 2012/2013
Tutorial Lectures},
pages = {146--166},
series = {LNCS},
year = {2014},
series = lncs,
volume = {8604},
publisher = {Springer}
pages = {146--166},
publisher = springer,
year = {2013}
}
@article{Hoare69,
@ -2297,7 +2311,7 @@ verification conditions},
booktitle=cp03,
pages={19--36},
year={2003},
organization={Springer}
organization=springer
}
@inproceedings{BP14,
@ -2401,7 +2415,7 @@ language={English}
booktitle = {{CEEMAS 2007}},
year = {2007},
pages = {288--297},
publisher = {Springer},
publisher = springer,
series = {LNCS},
volume = {4696},
}
@ -2430,13 +2444,13 @@ language={English}
title = {A Qualitative Comparison of the Suitability of Four Theorem
Provers for Basic Auction Theory},
booktitle={Intelligent Computer Mathematics},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
publisher = springer,
series = lncs,
volume = {7961},
year = {2013},
pages = {200--215},
url = {http://dx.doi.org/10.1007/978--3-642--39320--4_13},
publisher={Springer}
publisher=springer
}
@article{DBLP:journals/ipl/Vestergaard06,
@ -2506,7 +2520,7 @@ language={English}
number={1},
pages={17--33},
year={1971},
publisher={Springer}
publisher=springer
}
@article{groves73,
@ -2522,8 +2536,8 @@ language={English}
author = {Bellare, Mihir and Rogaway, Phillip},
booktitle = eucrypt06,
pages = {409--426},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
publisher = springer,
series = lncs,
title = {The Security of Triple Encryption and a Framework for
Code-Based Game-Playing Proofs},
volume = {4004},
@ -2971,3 +2985,56 @@ year={2011}
pages={159--169},
year={2008},
}
@book{Thorisson00,
author = {Hermann Thorisson},
title = {Coupling, Stationarity, and Regeneration},
publisher = springer,
year = {2000}
}
@book{Lindvall02,
title={Lectures on the coupling method},
author={Lindvall, Torgny},
year={2002},
publisher={Courier Corporation}
}
@book{Villani08,
title={Optimal transport: old and new},
author={Villani, C{\'e}dric},
year={2008},
publisher={Springer Science}
}
@techreport{DengD11,
Author = {Deng, Yuxin and Du, Wenjie},
Institution = {Carnegie Mellon University},
Month = {March},
Number = {CMU-CS-11-110},
Title = {Logical, Metric, and Algorithmic Characterisations of Probabilistic Bisimulation},
Year = {2011},
url = {http://arxiv.org/abs/1103.4577}
}
@article{Yang07,
author = {H. Yang},
title = {Relational separation logic},
journal = tcs,
volume = 375,
number = {1-3},
year = 2007,
pages = {308--334},
url = {http://www.cs.ox.ac.uk/people/hongseok.yang/paper/data.pdf}
}
@article{mufa1994optimal,
title={Optimal Markovian couplings and applications},
author={Mufa, Chen},
journal={Acta Mathematica Sinica},
volume={10},
number={3},
pages={260--275},
year={1994},
publisher=springer
}

View File

@ -1,3 +1,5 @@
+ **09/2015** Our paper **Jointly private convex programming** has been accepted
to **SODA 2016**!
+ **09/2015** Our paper **Relational reasoning via probabilistic coupling**
has been accepted to **LPAR 2015**!
+ **08/2015** Our preprint **Online Assignment with Heterogeneous Tasks in