2034 lines
61 KiB
BibTeX
2034 lines
61 KiB
BibTeX
@article{job-matching,
|
||
title = {Job Matching, Coalition Formation, and Gross Substitutes},
|
||
volume = {50},
|
||
doi = {10.2307/1913392},
|
||
number = {6},
|
||
urldate = {2013--07--07},
|
||
journal = {{Econometrica}},
|
||
author = {Kelso, Alexander and Crawford, Vincent},
|
||
year = {1982},
|
||
pages = {1483--1504},
|
||
}
|
||
@article{CSS10,
|
||
title = {Private and continual release of statistics},
|
||
volume = {14},
|
||
url = {http://eprint.iacr.org/2010/076.pdf},
|
||
number = {3},
|
||
urldate = {2013--06--23},
|
||
journal = tissec,
|
||
author = {Chan, T.-H. Hubert and Shi, Elaine and Song, Dawn},
|
||
year = {2011},
|
||
pages = {26},
|
||
}
|
||
|
||
@inproceedings{DNPR10,
|
||
title = {Differential privacy under continual observation},
|
||
author = {Dwork, Cynthia and Naor, Moni and Pitassi, Toniann and Rothblum, Guy N.},
|
||
url = {http://www.mit.edu/~rothblum/papers/continalobs.pdf},
|
||
booktitle = stoc10,
|
||
pages = {715--724},
|
||
year = {2010},
|
||
}
|
||
|
||
@inproceedings{DNV12,
|
||
title = {The privacy of the analyst and the power of the state},
|
||
author = {Dwork, Cynthia and Naor, Moni and Vadhan, Salil},
|
||
booktitle = focs12,
|
||
pages = {400--409},
|
||
doi = {10.1109/FOCS.2012.87},
|
||
url = {http://projects.iq.harvard.edu/files/privacytools/files/06375318.pdf},
|
||
year = {2012}
|
||
}
|
||
|
||
@article{PR13,
|
||
title = {Privacy and Mechanism Design},
|
||
author = {Pai, Mallesh and Roth, Aaron},
|
||
url = {http://arxiv.org/abs/1306.2083},
|
||
journal = sigecom,
|
||
year = {2013}
|
||
}
|
||
|
||
@inproceedings{NRS07,
|
||
title = {Smooth sensitivity and sampling in private data analysis},
|
||
url = {http://www.cse.psu.edu/~asmith/pubs/NRS07/NRS07-full-draft-v1.pdf},
|
||
author = {Nissim, Kobbi and Raskhodnikova, Sofya and Smith, Adam},
|
||
booktitle = stoc07,
|
||
pages = {75--84},
|
||
year = {2007},
|
||
}
|
||
|
||
@inproceedings{RR14,
|
||
title={Asymptotically truthful equilibrium selection in large congestion games},
|
||
author={Rogers, Ryan M and Roth, Aaron},
|
||
booktitle=ec14,
|
||
pages={771--782},
|
||
year={2014},
|
||
url = {http://arxiv.org/abs/1311.2625}
|
||
}
|
||
|
||
@inproceedings{GLMRT10,
|
||
title = {Differentially private combinatorial optimization},
|
||
url = {http://arxiv.org/abs/0903.4510},
|
||
author = {Gupta, Anupam and Ligett, Katrina and Mc{S}herry, Frank and Roth,
|
||
Aaron and Talwar, Kunal},
|
||
booktitle = soda10,
|
||
pages = {1106--1125},
|
||
year = {2010},
|
||
}
|
||
|
||
@inproceedings{DMNS06,
|
||
title = {Calibrating noise to sensitivity in private data analysis},
|
||
author = {Cynthia Dwork and
|
||
Frank McSherry and
|
||
Kobbi Nissim and
|
||
Adam Smith},
|
||
pages = {265--284},
|
||
url = {http://dx.doi.org/10.1007/11681878_14},
|
||
booktitle = tcc06,
|
||
year = {2006}
|
||
}
|
||
|
||
@article{GS99,
|
||
title = {Walrasian equilibrium with gross substitutes},
|
||
author = {Gul, Faruk and Stacchetti, Ennio},
|
||
url = {http://www.princeton.edu/~fgul/walras.pdf},
|
||
journal = jet,
|
||
volume = {87},
|
||
number = {1},
|
||
pages = {95--124},
|
||
year = {1999},
|
||
publisher = elsevier
|
||
}
|
||
|
||
@article{BLR08,
|
||
title = {A learning theory approach to noninteractive database privacy},
|
||
author = {Blum, Avrim and Ligett, Katrina and Roth, Aaron},
|
||
journal = jacm,
|
||
url = {http://arxiv.org/abs/1109.2229},
|
||
volume = {60},
|
||
number = {2},
|
||
pages = {12},
|
||
year = {2013},
|
||
}
|
||
|
||
@inproceedings{HRU13,
|
||
title = {Differential privacy for the analyst via private equilibrium computation},
|
||
author = {Justin Hsu and Aaron Roth and Jonathon Ullman},
|
||
url = {http://arxiv.org/abs/1211.0877},
|
||
booktitle = stoc13,
|
||
pages = {341--350},
|
||
year = {2013},
|
||
jh = yes,
|
||
slides = yes,
|
||
eprint = yes
|
||
}
|
||
|
||
@inproceedings{HR10,
|
||
title = {A multiplicative weights mechanism for privacy-preserving data analysis},
|
||
author = {Hardt, Moritz and Rothblum, Guy N.},
|
||
url = {http://www.mit.edu/~rothblum/papers/pmw.pdf},
|
||
booktitle = focs10,
|
||
pages = {61--70},
|
||
year = {2010},
|
||
}
|
||
|
||
@inproceedings{DN03,
|
||
title = {Revealing information while preserving privacy},
|
||
author = {Dinur, Irit and Nissim, Kobbi},
|
||
url = {http://www.cse.psu.edu/~asmith/privacy598/papers/dn03.pdf},
|
||
booktitle = pods03,
|
||
pages = {202--210},
|
||
year = {2003},
|
||
}
|
||
|
||
@article{DR14,
|
||
author = {Cynthia Dwork and
|
||
Aaron Roth},
|
||
title = {The Algorithmic Foundations of Differential Privacy},
|
||
journal = {Foundations and Trends in Theoretical Computer Science},
|
||
year = {2014},
|
||
volume = {9},
|
||
number = {3-4},
|
||
pages = {211--407},
|
||
url = {http://dx.doi.org/10.1561/0400000042},
|
||
doi = {10.1561/0400000042},
|
||
timestamp = {Tue, 28 Oct 2014 14:00:24 +0100},
|
||
biburl = {http://dblp.uni-trier.de/rec/bib/journals/fttcs/DworkR14},
|
||
bibsource = {dblp computer science bibliography, http://dblp.org}
|
||
}
|
||
@inproceedings{KPRU14,
|
||
title = {Mechanism Design in Large Games: Incentives and Privacy},
|
||
url = {http://arxiv.org/abs/1207.4084},
|
||
author = {Kearns, Michael and Pai, Mallesh and Roth, Aaron and Ullman, Jonathan},
|
||
pages = {403--410},
|
||
booktitle = itcs14,
|
||
year = {2014}
|
||
}
|
||
|
||
@inproceedings{DRV10,
|
||
title = {Boosting and differential privacy},
|
||
url = {http://research.microsoft.com/pubs/155170/dworkrv10.pdf},
|
||
booktitle = focs10,
|
||
author = {Dwork, Cynthia and Rothblum, Guy N. and Vadhan, Salil},
|
||
year = {2010},
|
||
keywords = {Algorithms, {CS}, {DP}, Learning Theory},
|
||
pages = {51-–60},
|
||
}
|
||
|
||
@inproceedings{FPT04,
|
||
title = {The complexity of pure Nash equilibria},
|
||
author = {Fabrikant, Alex and Papadimitriou, Christos and Talwar, Kunal},
|
||
url = {http://research.microsoft.com/pubs/74349/pub10-pure.pdf},
|
||
booktitle = stoc04,
|
||
pages = {604--612},
|
||
year = {2004},
|
||
}
|
||
|
||
@article{MS96,
|
||
title = {Potential games},
|
||
author = {Monderer, Dov and Shapley, Lloyd S.},
|
||
journal = geb,
|
||
url = {http://www.cs.bu.edu/~steng/teaching/Fall2008/potential.pdf},
|
||
volume = {14},
|
||
number = {1},
|
||
pages = {124--143},
|
||
year = {1996},
|
||
publisher = {Elsevier}
|
||
}
|
||
|
||
@inproceedings{CK05,
|
||
title = {The price of anarchy of finite congestion games},
|
||
author = {Christodoulou, George and Koutsoupias, Elias},
|
||
url = {http://dl.acm.org/citation.cfm?id=1060600},
|
||
booktitle = stoc05,
|
||
pages = {67--73},
|
||
year = {2005},
|
||
}
|
||
|
||
@inproceedings{AAE05,
|
||
title = {The price of routing unsplittable flow},
|
||
author = {Awerbuch, Baruch and Azar, Yossi and Epstein, Amir},
|
||
booktitle = stoc05,
|
||
url = {http://dl.acm.org/citation.cfm?id=1060599},
|
||
pages = {57--66},
|
||
year = {2005},
|
||
}
|
||
|
||
@inproceedings{Rou09,
|
||
title = {Intrinsic robustness of the price of anarchy},
|
||
author = {Roughgarden, Tim},
|
||
url = {http://theory.stanford.edu/~tim/papers/robust.pdf},
|
||
booktitle = stoc09,
|
||
pages = {513--522},
|
||
year = {2009},
|
||
}
|
||
|
||
@inproceedings{BHLR08,
|
||
title = {Regret minimization and the price of total anarchy},
|
||
author = {Blum, Avrim and Haji{A}ghayi, Mohammad{T}aghi and Ligett, Katrina
|
||
and Roth, Aaron},
|
||
url = {http://dl.acm.org/citation.cfm?id=1374430},
|
||
booktitle = stoc08,
|
||
pages = {373--382},
|
||
year = {2008},
|
||
}
|
||
|
||
@inproceedings{WHE13,
|
||
title = {Towards dependently typed {H}askell: System {FC} with kind equality},
|
||
author = {Stephanie Weirich and Justin Hsu and Richard A Eisenberg},
|
||
booktitle = icfp13,
|
||
url = {http://www.cis.upenn.edu/~justhsu/docs/nokinds.pdf},
|
||
volume = {13},
|
||
year = {2013},
|
||
jh = yes,
|
||
docs = yes,
|
||
}
|
||
|
||
@inproceedings{GGHHP13,
|
||
title = {Automatic sensitivity analysis using linear dependent types},
|
||
author = {Marco Gaboardi and
|
||
Emilio Jes{\'u}s Gallego Arias and
|
||
Andreas Haeberlen and
|
||
Justin Hsu and
|
||
Benjamin C Pierce},
|
||
url = {http://fopara2013.cs.unibo.it/paper_8.pdf},
|
||
booktitle = fopara,
|
||
year = {2013},
|
||
jh = yes,
|
||
}
|
||
|
||
@inproceedings{GHHNP13,
|
||
title = {Linear dependent types for differential privacy},
|
||
author = {Marco Gaboardi and
|
||
Andreas Haeberlen and
|
||
Justin Hsu and
|
||
Arjun Narayan and
|
||
Benjamin C Pierce},
|
||
booktitle = popl13,
|
||
pages = {357--370},
|
||
url = {http://dl.acm.org/citation.cfm?id=2429113},
|
||
year = {2013},
|
||
jh = yes,
|
||
docs = yes,
|
||
}
|
||
|
||
@inproceedings{HKR12,
|
||
title = {Distributed private heavy hitters},
|
||
author = {Justin Hsu and Sanjeev Khanna and Aaron Roth},
|
||
booktitle = icalp12,
|
||
pages = {461--472},
|
||
year = {2012},
|
||
publisher = springer,
|
||
url = {http://arxiv.org/abs/1202.4910},
|
||
jh = yes,
|
||
slides = yes,
|
||
eprint = yes
|
||
}
|
||
|
||
@inproceedings{HLM12,
|
||
title = {A Simple and Practical Algorithm for Differentially Private Data Release},
|
||
author = {Moritz Hardt and Katrina Ligett and Frank {McSherry}},
|
||
booktitle = nips12,
|
||
pages = {2348--2356},
|
||
url = {http://arxiv.org/abs/1012.4763},
|
||
year = 2012
|
||
}
|
||
|
||
@inproceedings{Ullman13,
|
||
title = {Answering $n^{2+ o(1)}$ counting queries with differential
|
||
privacy is hard},
|
||
author = {Ullman, Jonathan},
|
||
booktitle = stoc13,
|
||
pages = {361--370},
|
||
url = {http://arxiv.org/abs/1207.6945},
|
||
year = 2013
|
||
}
|
||
}
|
||
@inproceedings{MT07,
|
||
author = {Frank McSherry and
|
||
Kunal Talwar},
|
||
title = {Mechanism Design via Differential Privacy},
|
||
booktitle = focs07,
|
||
pages = {94--103},
|
||
url = {http://doi.ieeecomputersociety.org/10.1109/FOCS.2007.41},
|
||
year = 2007
|
||
}
|
||
|
||
@inproceedings{FS96,
|
||
title = {Game theory, on-line prediction and boosting},
|
||
author = {Freund, Y. and Schapire, R.E.},
|
||
booktitle = colt96,
|
||
pages = {325--332},
|
||
url = {http://dl.acm.org/citation.cfm?id=238163 },
|
||
year = 1996
|
||
}
|
||
|
||
@inproceedings{BDMN05,
|
||
title = {Practical privacy: the {SuLQ} framework},
|
||
author = {Avrim Blum and
|
||
Cynthia Dwork and
|
||
Frank Mc{S}herry and
|
||
Kobbi Nissim},
|
||
booktitle = pods05,
|
||
pages = {128--138},
|
||
url = {http://research.microsoft.com/pubs/64351/bdmn.pdf},
|
||
year = 2005
|
||
}
|
||
|
||
@inproceedings{GRU12,
|
||
title = {Iterative constructions and private data release},
|
||
author = {Gupta, Anupam and Roth, Aaron and Jonathan Ullman},
|
||
booktitle = tcc12,
|
||
pages = {339--356},
|
||
url = {http://arxiv.org/abs/1107.3731},
|
||
year = 2012
|
||
}
|
||
|
||
@inproceedings{airavat,
|
||
author = {Indrajit Roy and Srinath Setty and Ann Kilzer and Vitaly
|
||
Shmatikov and Emmett Witchel},
|
||
title = {Airavat: Security and Privacy for {MapReduce}},
|
||
booktitle = nsdi10,
|
||
url = {http://dl.acm.org/citation.cfm?id=1855731 },
|
||
year = 2010
|
||
}
|
||
|
||
@inproceedings{pinq,
|
||
author = {{McSherry}, Frank},
|
||
booktitle = sigmod09,
|
||
title = {Privacy integrated queries},
|
||
url = {http://research.microsoft.com/pubs/80218/sigmod115-mcsherry.pdf},
|
||
year = 2009
|
||
}
|
||
|
||
@inproceedings{zhang-2011-privatemining,
|
||
author = {Zhang, Ning and Li, Ming and Lou, Wenjing},
|
||
title = {Distributed Data Mining with Differential Privacy},
|
||
booktitle = icc11,
|
||
url = {http://dl.acm.org/citation.cfm?id=1835868},
|
||
year = 2011
|
||
}
|
||
|
||
@inproceedings{evfimievski-2002-associationrules,
|
||
author = {Evfimievski, Alexandre and
|
||
Srikant, Ramakrishnan and
|
||
Agrawal, Rakesh and
|
||
Gehrke, Johannes},
|
||
title = {Privacy preserving mining of association rules},
|
||
booktitle = kdd02,
|
||
url = {http://www.cs.cornell.edu/johannes/papers/2002/kdd2002-privacy.pdf},
|
||
year = 2002
|
||
}
|
||
|
||
@inproceedings{t-closeness,
|
||
author = {Ninghui Li and Tiancheng Li and Suresh Venkatasubramanian},
|
||
title = {$t$-{C}loseness: {P}rivacy beyond $k$-anonymity and $l$-diversity},
|
||
booktitle = icde07,
|
||
url = {https://www.cs.purdue.edu/homes/ninghui/papers/t_closeness_icde07.pdf},
|
||
year = 2007
|
||
}
|
||
|
||
@inproceedings{l-diversity,
|
||
author = {Machanavajjhala, A. and Gehrke, J. and Kifer, D. and Venkitasubramaniam, M.},
|
||
title = {$l$-{D}iversity: {P}rivacy beyond $k$-anonymity},
|
||
booktitle = icde06,
|
||
url = {http://dl.acm.org/citation.cfm?id=1217302},
|
||
year = 2006
|
||
}
|
||
|
||
@article{k-anonymity,
|
||
author = {Sweeney, Latanya},
|
||
title = {$k$-{A}nonymity: {A} model for protecting privacy},
|
||
journal = jufks,
|
||
volume = {10},
|
||
number = {5},
|
||
month = oct,
|
||
year = {2002},
|
||
pages = {557--570},
|
||
url = {http://dl.acm.org/citation.cfm?id=774552}
|
||
}
|
||
|
||
@article{aol,
|
||
author = {Michael Barbaro and Tom Zeller},
|
||
title = {A Face Is Exposed for {AOL} Searcher {N}o. 4417749},
|
||
journal = {The New York Times},
|
||
day = 9,
|
||
month = aug,
|
||
year = 2006,
|
||
url = {http://www.nytimes.com/2006/08/09/technology/09aol.html}
|
||
}
|
||
|
||
@inproceedings{NV08,
|
||
author = {Arvind Narayanan and
|
||
Vitaly Shmatikov},
|
||
title = {Robust De-anonymization of Large Sparse Datasets},
|
||
booktitle = sp08,
|
||
year = {2008},
|
||
pages = {111--125},
|
||
url = {http://arxiv.org/abs/cs/0610105.pdf}
|
||
}
|
||
|
||
@inproceedings{BLST10,
|
||
author = {Raghav Bhaskar and
|
||
Srivatsan Laxman and
|
||
Adam Smith and
|
||
Abhradeep Thakurta},
|
||
title = {Discovering frequent patterns in sensitive data},
|
||
booktitle = kdd10,
|
||
pages = {503--512},
|
||
year = 2010,
|
||
url = {http://dl.acm.org/citation.cfm?id=1835869}
|
||
}
|
||
|
||
@inproceedings{CM08,
|
||
author = {Kamalika Chaudhuri and
|
||
Claire Monteleoni},
|
||
title = {Privacy-preserving logistic regression},
|
||
booktitle = nips08,
|
||
pages = {289--296},
|
||
year = 2008,
|
||
url = {http://books.nips.cc/papers/files/nips21/NIPS2008_0964.pdf}
|
||
}
|
||
|
||
@article{CH11,
|
||
title = {Sample Complexity Bounds for Differentially Private Learning},
|
||
author = {Chaudhuri, Kamalika and Hsu, Daniel},
|
||
journal = jmlr,
|
||
volume = {19},
|
||
pages = {155--186},
|
||
url = {http://jmlr.org/proceedings/papers/v19/chaudhuri11a/chaudhuri11a.pdf},
|
||
year = {2011}
|
||
}
|
||
|
||
@inproceedings{k-anon-attack,
|
||
author = {Srivatsava Ranjit Ganta and
|
||
Shiva Prasad Kasiviswanathan and
|
||
Adam Smith},
|
||
title = {Composition attacks and auxiliary information in data privacy},
|
||
booktitle = kdd08,
|
||
pages = {265--273},
|
||
year = 2008,
|
||
url = {http://arxiv.org/abs/0803.0032}
|
||
}
|
||
|
||
@inproceedings{HGH+13,
|
||
author = {Justin Hsu and
|
||
Marco Gaboardi and
|
||
Andreas Haeberlen and
|
||
Sanjeev Khanna and
|
||
Arjun Narayan and
|
||
Benjamin C Pierce and
|
||
Aaron Roth},
|
||
title = {Differential privacy: An economic method for choosing epsilon},
|
||
booktitle = csf14,
|
||
year = 2014,
|
||
url = {http://arxiv.org/abs/1402.3329},
|
||
jh = yes,
|
||
slides = yes,
|
||
eprint = yes
|
||
}
|
||
|
||
@inproceedings{certipriv,
|
||
author = {Barthe, Gilles and K\"{o}pf, Boris and Olmedo, Federico and
|
||
Zanella B{\'e}guelin, Santiago},
|
||
title = {Probabilistic relational reasoning for differential privacy},
|
||
booktitle = popl12,
|
||
year = {2012},
|
||
pages = {97--110},
|
||
numpages = {14},
|
||
keywords = {coq proof assistant, differential privacy, relational hoare logic},
|
||
url = {http://dl.acm.org/citation.cfm?id=2103670}
|
||
}
|
||
|
||
@inproceedings{fuzz,
|
||
author = {Jason Reed and Benjamin C Pierce},
|
||
title = {Distance Makes the Types Grow Stronger: {A} Calculus for
|
||
Differential Privacy},
|
||
booktitle = icfp10,
|
||
year = 2010,
|
||
url = {http://dl.acm.org/citation.cfm?id=1863568}
|
||
}
|
||
|
||
@inproceedings{winq,
|
||
title = {A workflow for differentially-private graph synthesis},
|
||
author = {Proserpio, Davide and Goldberg, Sharon and {McSherry}, Frank},
|
||
booktitle = wosn12,
|
||
year = 2012,
|
||
pages = {13--18},
|
||
url = {http://arxiv.org/abs/1203.3453}
|
||
}
|
||
|
||
@article{KLNRS08,
|
||
title = {What can we learn privately?},
|
||
author = {Kasiviswanathan, Shiva Prasad and Lee, Homin K. and Nissim, Kobbi
|
||
and Raskhodnikova, Sofya and Smith, Adam},
|
||
journal = siamjc,
|
||
volume = {40},
|
||
number = {3},
|
||
pages = {793--826},
|
||
year = {2011},
|
||
url = {http://arxiv.org/abs/0803.0924},
|
||
publisher = {SIAM}
|
||
}
|
||
|
||
@inproceedings{UV11,
|
||
title = {{PCPs} and the hardness of generating private synthetic data},
|
||
author = {Ullman, Jonathan and Vadhan, Salil},
|
||
booktitle = tcc11,
|
||
pages = {400--416},
|
||
url = {http://eccc.hpi-web.de/report/2010/017/revision/2/download},
|
||
year = {2011}
|
||
}
|
||
|
||
@inproceedings{DNRRV09,
|
||
title = {On the complexity of differentially private data release: efficient
|
||
algorithms and hardness results},
|
||
author = {Cynthia Dwork and
|
||
Moni Naor and
|
||
Omer Reingold and
|
||
Guy N. Rothblum and
|
||
Salil P. Vadhan},
|
||
booktitle = stoc09,
|
||
pages = {381--390},
|
||
year = {2009},
|
||
url = {http://dl.acm.org/citation.cfm?id=1536467}
|
||
}
|
||
|
||
@article{AHK12,
|
||
title = {The Multiplicative Weights Update Method: a Meta-Algorithm and
|
||
Applications},
|
||
author = {Arora, Sanjeev and Hazan, Elad and Kale, Satyen},
|
||
journal = toc,
|
||
volume = {8},
|
||
number = {1},
|
||
pages = {121--164},
|
||
url = {http://tocbeta.cs.uchicago.edu/articles/v008a006/v008a006.pdf},
|
||
year = {2012}
|
||
}
|
||
|
||
@phdthesis{Garg13,
|
||
title = {Candidate Multilinear Maps},
|
||
author = {Sanjam Garg},
|
||
school = {{UCLA}},
|
||
year = {2013},
|
||
url = {http://www.cs.ucla.edu/~sanjamg/Sanjam%20Garg_files/sanjam-thesis.pdf}
|
||
}
|
||
|
||
@inproceedings{GargGentryHalevi13,
|
||
title = {Candidate multilinear maps from ideal lattices},
|
||
author = {Garg, Sanjam and Gentry, Craig and Halevi, Shai},
|
||
booktitle = eucrypt13,
|
||
pages = {1--17},
|
||
year = {2013},
|
||
url = {http://http://eprint.iacr.org/2012/610.pdf}
|
||
}
|
||
|
||
@article{BonehSilverberg03,
|
||
title = {Applications of multilinear forms to cryptography},
|
||
author = {Boneh, Dan and Silverberg, Alice},
|
||
journal = {Contemporary Mathematics},
|
||
volume = {324},
|
||
number = {1},
|
||
pages = {71--90},
|
||
year = {2003},
|
||
publisher = {AMS},
|
||
url = {http://https://eprint.iacr.org/2002/080.pdf}
|
||
}
|
||
|
||
@inproceedings{barak2007privacy,
|
||
title = {Privacy, accuracy, and consistency too: a holistic solution to
|
||
contingency table release},
|
||
author = {Barak, Boaz and Chaudhuri, Kamalika and Dwork, Cynthia and Kale,
|
||
Satyen and Mc{S}herry, Frank and Talwar, Kunal},
|
||
booktitle = pods07,
|
||
pages = {273--282},
|
||
url = {http://research.microsoft.com/en-us/projects/DatabasePrivacy/contingency.pdf},
|
||
year = {2007}
|
||
}
|
||
|
||
@inproceedings{BNS13,
|
||
title = {Characterizing the sample complexity of private learners},
|
||
author = {Beimel, Amos and Nissim, Kobbi and Stemmer, Uri},
|
||
booktitle = itcs13,
|
||
pages = {97--110},
|
||
year = {2013},
|
||
url = {http://dl.acm.org/citation.cfm?id=2422450}
|
||
}
|
||
|
||
@article{CMS11,
|
||
title = {Differentially private empirical risk minimization},
|
||
author = {Chaudhuri, Kamalika and Monteleoni, Claire and Sarwate, Anand D.},
|
||
journal = jmlr,
|
||
volume = {12},
|
||
pages = {1069--1109},
|
||
year = {2011},
|
||
url = {http://jmlr.org/papers/volume12/chaudhuri11a/chaudhuri11a.pdf}
|
||
}
|
||
|
||
@article{RBHT09,
|
||
title = {Learning in a Large Function Space: Privacy-Preserving Mechanisms
|
||
for {SVM} Learning},
|
||
author = {Rubinstein, Benjamin I. P. and Bartlett, Peter L. and Huang, Ling
|
||
and Taft, Nina},
|
||
journal = jpc,
|
||
volume = {4},
|
||
number = {1},
|
||
pages = {4},
|
||
year = {2012},
|
||
url = {http://repository.cmu.edu/cgi/viewcontent.cgi?article=1065&context=jpc}
|
||
}
|
||
|
||
@article{KST12,
|
||
title = {Private convex empirical risk minimization and high-dimensional regression},
|
||
author = {Kifer, Daniel and Smith, Adam and Thakurta, Abhradeep},
|
||
journal = jmlr,
|
||
volume = {1},
|
||
pages = {41},
|
||
year = {2012},
|
||
url = {http://jmlr.org/proceedings/papers/v23/kifer12/kifer12.pdf}
|
||
}
|
||
|
||
@inproceedings{CSS12,
|
||
title = {Near-optimal differentially private principal components},
|
||
author = {Chaudhuri, Kamalika and Sarwate, Anand and Sinha, Kaushik},
|
||
booktitle = nips12,
|
||
pages = {998--1006},
|
||
url = {http://books.nips.cc/papers/files/nips25/NIPS2012_0482.pdf},
|
||
year = {2012}
|
||
}
|
||
|
||
@inproceedings{DJW13,
|
||
title = {Local privacy and statistical minimax rates},
|
||
author = {Duchi, John C and Jordan, Michael I. and Wainwright, Martin J.},
|
||
booktitle = focs13,
|
||
url = {http://www.cs.berkeley.edu/~jduchi/projects/DuchiJoWa13_focs.pdf},
|
||
year = {2013}
|
||
}
|
||
|
||
@inproceedings{TS13,
|
||
title = {(Nearly) Optimal Algorithms for Private Online Learning in
|
||
Full-information and Bandit Settings},
|
||
author = {Thakurta, Abhradeep G. and Smith, Adam},
|
||
booktitle = nips13,
|
||
pages = {2733--2741},
|
||
url = {http://media.nips.cc/nipsbooks/nipspapers/paper_files/nips26/1270.pdf},
|
||
year = {2013}
|
||
}
|
||
|
||
@inproceedings{FS95,
|
||
title = {A desicion-theoretic generalization of on-line learning and an
|
||
application to boosting},
|
||
author = {Freund, Yoav and Schapire, Robert E.},
|
||
booktitle = colt95,
|
||
pages = {23--37},
|
||
year = {1995},
|
||
organization = springer
|
||
}
|
||
|
||
@inproceedings{RR10,
|
||
author = {Aaron Roth and
|
||
Tim Roughgarden},
|
||
title = {Interactive privacy via the median mechanism},
|
||
booktitle = stoc10,
|
||
pages = {765--774},
|
||
url = {http://arxiv.org/abs/0911.1813},
|
||
}
|
||
|
||
@inproceedings{GHRU11,
|
||
title = {Privately releasing conjunctions and the statistical query barrier},
|
||
author = {Gupta, Anupam and Hardt, Moritz and Roth, Aaron and Ullman, Jonathan},
|
||
booktitle = stoc11,
|
||
pages = {803--812},
|
||
url = {http://arxiv.org/abs/1011.1296},
|
||
year = {2011}
|
||
}
|
||
|
||
@inproceedings{TS13a,
|
||
title = {Differentially Private Feature Selection via Stability Arguments,
|
||
and the Robustness of the Lasso},
|
||
author = {Thakurta, Abhradeep G. and Smith, Adam},
|
||
booktitle = colt13,
|
||
pages = {819--850},
|
||
url = {http://jmlr.org/proceedings/papers/v30/Guha13.pdf},
|
||
year = {2013}
|
||
}
|
||
|
||
@inproceedings{DL09,
|
||
title = {Differential privacy and robust statistics},
|
||
author = {Dwork, Cynthia and Lei, Jing},
|
||
booktitle = stoc09,
|
||
pages = {371--380},
|
||
year = {2009},
|
||
url = {http://research.microsoft.com/pubs/80239/dl09.pdf},
|
||
organization = {ACM}
|
||
}
|
||
|
||
@article{LW94,
|
||
title = {The Weighted Majority Algorithm},
|
||
author = {Littlestone, N. and Warmuth, Manfred K.},
|
||
journal = ic,
|
||
volume = {108},
|
||
number = {2},
|
||
pages = {212--261},
|
||
year = {1994},
|
||
publisher = elsevier,
|
||
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=63487}
|
||
}
|
||
|
||
@article{PST95,
|
||
title = {Fast approximation algorithms for fractional packing and covering
|
||
problems},
|
||
author = {Plotkin, Serge A. and Shmoys, David B. and Tardos, {\'E}va},
|
||
journal = mor,
|
||
volume = {20},
|
||
number = {2},
|
||
pages = {257--301},
|
||
year = {1995},
|
||
publisher = informs,
|
||
doi = {10.1287/moor.20.2.257}
|
||
}
|
||
|
||
@inproceedings{AK07,
|
||
title = {A combinatorial, primal-dual approach to semidefinite programs},
|
||
author = {Arora, Sanjeev and Kale, Satyen},
|
||
booktitle = stoc07,
|
||
pages = {227--236},
|
||
year = {2007},
|
||
url = {http://dl.acm.org/citation.cfm?id=1250823}
|
||
}
|
||
|
||
@inproceedings{CHRMM10,
|
||
title = {Optimizing linear counting queries under differential privacy},
|
||
author = {Li, Chao and Hay, Michael and Rastogi, Vibhor and Miklau, Gerome
|
||
and Mc{G}regor, Andrew},
|
||
booktitle = pods10,
|
||
pages = {123--134},
|
||
year = {2010},
|
||
url = {http://arxiv.org/abs/0912.4742}
|
||
}
|
||
|
||
@inproceedings{LM12,
|
||
title = {An adaptive mechanism for accurate query answering under differential privacy},
|
||
author = {Li, Chao and Miklau, Gerome},
|
||
journal = vldb12,
|
||
volume = {5},
|
||
number = {6},
|
||
pages = {514--525},
|
||
year = {2012},
|
||
url = {http://arxiv.org/abs/1202.3807}
|
||
}
|
||
|
||
@inproceedings{CPSY12,
|
||
author = {Grigory Yaroslavtsev and
|
||
Graham Cormode and
|
||
Cecilia M. Procopiuc and
|
||
Divesh Srivastava},
|
||
title = {Accurate and efficient private release of datacubes and
|
||
contingency tables},
|
||
booktitle = icde13,
|
||
year = {2013},
|
||
pages = {745--756},
|
||
url = {http://doi.ieeecomputersociety.org/10.1109/ICDE.2013.6544871}
|
||
}
|
||
|
||
@inproceedings{CV13,
|
||
title = {A Stability-based Validation Procedure for Differentially Private
|
||
Machine Learning},
|
||
author = {Chaudhuri, Kamalika and Vinterbo, Staal A.},
|
||
booktitle = nips2013,
|
||
pages = {2652--2660},
|
||
year = {2013},
|
||
url = {http://papers.nips.cc/paper/5014-a-stability-based-validation-procedure-for-differentially-private-machine-learning.pdf}
|
||
}
|
||
|
||
@article{HW01,
|
||
title = {Tracking the best linear predictor},
|
||
author = {Herbster, Mark and Warmuth, Manfred K.},
|
||
journal = jmlr,
|
||
volume = {1},
|
||
pages = {281--309},
|
||
url =
|
||
{http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.90.7354&rep=rep1&type=pdf},
|
||
year = {2001}
|
||
}
|
||
|
||
@inproceedings{DworkSurvey,
|
||
title = {Differential privacy: A survey of results},
|
||
author = {Dwork, Cynthia},
|
||
booktitle = tamc08,
|
||
pages = {1--19},
|
||
year = {2008},
|
||
url = {http://research.microsoft.com/apps/pubs/default.aspx?id=74339},
|
||
publisher = springer
|
||
}
|
||
|
||
@inproceedings{NS-social,
|
||
title = {De-anonymizing social networks},
|
||
author = {Narayanan, Arvind and Shmatikov, Vitaly},
|
||
booktitle = sp09,
|
||
pages = {173--187},
|
||
url = {http://arxiv.org/abs/0903.3276},
|
||
year = {2009}
|
||
}
|
||
|
||
@inproceedings{DNT14,
|
||
title={Using Convex Relaxations for Efficiently and Privately Releasing
|
||
Marginals},
|
||
author={Dwork, Cynthia and Nikolov, Aleksandar and Talwar, Kunal},
|
||
booktitle=socg14,
|
||
pages={261},
|
||
year={2014},
|
||
url={http://arxiv.org/abs/1308.1385}
|
||
}
|
||
|
||
@inproceedings{TUV12,
|
||
title={Faster algorithms for privately releasing marginals},
|
||
author={Thaler, Justin and Ullman, Jonathan and Vadhan, Salil},
|
||
booktitle=icalp12,
|
||
pages={810--821},
|
||
year={2012},
|
||
url={http://arxiv.org/abs/1205.1758}
|
||
}
|
||
|
||
@article{GHRU13,
|
||
title={Privately releasing conjunctions and the statistical query barrier},
|
||
author={Gupta, Anupam and Hardt, Moritz and Roth, Aaron and Ullman,
|
||
Jonathan},
|
||
journal=siamjc,
|
||
volume={42},
|
||
number={4},
|
||
pages={1494--1520},
|
||
year={2013},
|
||
publisher={SIAM},
|
||
url={http://epubs.siam.org/doi/abs/10.1137/110857714}
|
||
}
|
||
|
||
@inproceedings{DunfieldP04,
|
||
author = {Joshua Dunfield and
|
||
Frank Pfenning},
|
||
title = {Tridirectional typechecking},
|
||
booktitle = popl04,
|
||
pages = {281--292},
|
||
url =
|
||
{http://www.cs.cmu.edu/~joshuad/papers/tridirectional-typechecking/Dunfield04_tridirectional.pdf}
|
||
}
|
||
|
||
|
||
@article{Meyer92,
|
||
title={Applying ``{D}esign by contract''},
|
||
author={Meyer, Bertrand},
|
||
journal={Computer},
|
||
volume={25},
|
||
number={10},
|
||
pages={40--51},
|
||
year={1992},
|
||
publisher={IEEE},
|
||
url={http://www-public.int-evry.fr/~gibson/Teaching/CSC7322/ReadingMaterial/Meyer92.pdf}
|
||
}
|
||
|
||
@inproceedings{Vazou+14:ICFP,
|
||
author={N. Vazou and E. L. Seidel and R. Jhala and D. Vytiniotis and
|
||
S. {P}eyton-{J}ones},
|
||
title={{Refinement Types for Haskell}},
|
||
booktitle=icfp14,
|
||
year={2014},
|
||
url={http://goto.ucsd.edu/~nvazou/refinement_types_for_haskell.pdf}
|
||
}
|
||
|
||
@inproceedings{NR99,
|
||
title={Algorithmic mechanism design},
|
||
author={Nisan, Noam and Ronen, Amir},
|
||
booktitle=stoc99,
|
||
pages={129--140},
|
||
year={1999},
|
||
url={http://www.cs.yale.edu/homes/jf/nisan-ronen.pdf}
|
||
}
|
||
|
||
@book{NRTV07,
|
||
title={Algorithmic game theory},
|
||
author={Nisan, Noam and Roughgarden, Tim and Tardos, Eva and Vazirani, Vijay V},
|
||
year={2007},
|
||
publisher={Cambridge University Press}
|
||
}
|
||
|
||
@article{BBHM08,
|
||
title={Reducing mechanism design to algorithm design via machine learning},
|
||
author={Balcan, {M}aria-{F}lorina and Blum, Avrim and Hartline, Jason D and Mansour, Yishay},
|
||
journal={Journal of Computer and System Sciences},
|
||
volume={74},
|
||
number={8},
|
||
pages={1245--1270},
|
||
year={2008},
|
||
publisher={Elsevier},
|
||
url={http://www.cs.cmu.edu/~ninamf/papers/ml_md_bbhm.pdf}
|
||
}
|
||
|
||
@techreport{CKRW14,
|
||
title={Privacy and Truthful Equilibrium Selection for Aggregative Games},
|
||
author={Cummings, Rachel and Kearns, Michael and Roth, Aaron and Wu, Zhiwei Steven},
|
||
year={2014},
|
||
url={http://arxiv.org/abs/1407.7740}
|
||
}
|
||
|
||
@inproceedings{DD09,
|
||
title={On the power of randomization in algorithmic mechanism design},
|
||
author={Dobzinski, Shahar and Dughmi, Shaddin},
|
||
booktitle=focs09,
|
||
pages={505--514},
|
||
url={http://arxiv.org/abs/0904.4193}
|
||
}
|
||
|
||
@article{DugR14,
|
||
title={Black-box randomized reductions in algorithmic mechanism design},
|
||
author={Dughmi, Shaddin and Roughgarden, Tim},
|
||
journal=siamjc,
|
||
volume={43},
|
||
number={1},
|
||
pages={312--336},
|
||
year={2014},
|
||
url={http://theory.stanford.edu/~tim/papers/blackbox.pdf}
|
||
}
|
||
|
||
@inproceedings{CIL12,
|
||
title={On the limits of black-box reductions in mechanism design},
|
||
author={Chawla, Shuchi and Immorlica, Nicole and Lucier, Brendan},
|
||
booktitle=stoc12,
|
||
year={2012},
|
||
url={http://arxiv.org/abs/1109.2067}
|
||
}
|
||
|
||
@inproceedings{HL10,
|
||
title={Bayesian algorithmic mechanism design},
|
||
author={Hartline, Jason D and Lucier, Brendan},
|
||
booktitle=stoc10,
|
||
pages={301--310},
|
||
year={2010},
|
||
url={http://arxiv.org/abs/0909.4756}
|
||
}
|
||
|
||
@inproceedings{Ramsey:2002,
|
||
Author = {Ramsey, Norman and Pfeffer, Avi},
|
||
Booktitle = popl02,
|
||
Pages = {154--165},
|
||
Publisher = {ACM},
|
||
Title = {Stochastic lambda calculus and monads of probability distributions},
|
||
Year = {2002},
|
||
url = {http://www.cs.tufts.edu/~nr/pubs/pmonad.pdf}
|
||
}
|
||
|
||
|
||
@inproceedings{Park:2005,
|
||
author = {Sungwoo Park and
|
||
Frank Pfenning and
|
||
Sebastian Thrun},
|
||
title = {A probabilistic language based upon sampling functions},
|
||
booktitle = popl05,
|
||
year = {2005},
|
||
pages = {171--182},
|
||
url = {https://www.cs.cmu.edu/~fp/papers/popl05.pdf}
|
||
}
|
||
|
||
@article{Hurd:2005,
|
||
Author = {Hurd, Joe and {M}c{I}ver, Annabelle and Morgan, Carroll},
|
||
Journal = tcs,
|
||
Number = {1},
|
||
Pages = {96--112},
|
||
Title = {Probabilistic guarded commands mechanized in {HOL}},
|
||
Volume = {346},
|
||
Year = {2005},
|
||
url = {http://www.cse.unsw.edu.au/~carrollm/probs/Papers/Hurd-05.pdf}
|
||
}
|
||
|
||
@book{McIver:2005,
|
||
Author = {{M}c{I}ver, A. and Morgan, C.},
|
||
Publisher = {Springer},
|
||
Series = {Monographs in Computer Science},
|
||
Title = {Abstraction, Refinement, and Proof for Probabilistic Systems},
|
||
Year = {2005}}
|
||
|
||
@inproceedings{Borgstrom:2011,
|
||
author = {Johannes Borgstr{\"o}m and
|
||
Andrew D Gordon and
|
||
Michael Greenberg and
|
||
James Margetson and
|
||
Jurgen Van Gael},
|
||
title = {Measure Transformer Semantics for Bayesian Machine Learning},
|
||
booktitle = esop11,
|
||
year = {2011},
|
||
pages = {77--96},
|
||
url = {http://cis.upenn.edu/~mgree/papers/esop2011_mts.pdf}
|
||
}
|
||
|
||
@inproceedings{Kiselyov:2009,
|
||
author = {Oleg Kiselyov and
|
||
{C}hung-{C}hieh Shan},
|
||
title = {Embedded Probabilistic Programming},
|
||
booktitle = {DSL},
|
||
year = {2009},
|
||
pages = {360--384}
|
||
}
|
||
|
||
@inproceedings{Goodman:2013,
|
||
author = {Noah D Goodman},
|
||
title = {The principles and practice of probabilistic programming},
|
||
booktitle = popl13,
|
||
year = {2013},
|
||
pages = {399--402},
|
||
url = {https://web.stanford.edu/~ngoodman/papers/POPL2013-abstract.pdf}
|
||
}
|
||
|
||
@inproceedings{Sampson+14,
|
||
title={Expressing and verifying probabilistic assertions},
|
||
author={Sampson, Adrian and Panchekha, Pavel and Mytkowicz, Todd and {M}c{K}inley, Kathryn S and Grossman, Dan and Ceze, Luis},
|
||
booktitle=pldi14,
|
||
pages={14},
|
||
year={2014},
|
||
url={http://research.microsoft.com/pubs/211410/passert-pldi2014.pdf}
|
||
}
|
||
|
||
@Inproceedings {Bornholt+14,
|
||
author = {James Bornholt and Todd Mytkowicz and Kathryn S {M}c{K|inley}},
|
||
booktitle = asplos14,
|
||
title = {Uncertain$\langle$T$\rangle$: A First-Order Type for Uncertain Data},
|
||
year = {2014},
|
||
url = {http://research.microsoft.com/pubs/208236/asplos077-bornholtA.pdf}
|
||
}
|
||
|
||
|
||
@article{Giry82,
|
||
author = {Giry, Mich\`{e}le},
|
||
journal = {Categorical Aspects of Topology and Analysis},
|
||
pages = {68--85},
|
||
title = {{A categorical approach to probability theory}},
|
||
year = {1982},
|
||
}
|
||
|
||
|
||
@inproceedings{FreemanP91,
|
||
title={Refinement types for {ML}},
|
||
author={Freeman, Tim and Pfenning, Frank},
|
||
booktitle=pldi91,
|
||
pages={268--277},
|
||
year={1991},
|
||
url={https://www.cs.cmu.edu/~fp/papers/pldi91.pdf}
|
||
}
|
||
|
||
@inproceedings{BBFGM08,
|
||
author="J. Bengtson and K. Bhargavan and C. Fournet and A. D. Gordon and S. Maffeis",
|
||
title="Refinement types for secure implementations",
|
||
booktitle=csf08,
|
||
year=2008,
|
||
url={http://prosecco.gforge.inria.fr/personal/karthik/pubs/refinement-types-for-secure-implementations-proceedings-csf08.pdf}
|
||
}
|
||
|
||
|
||
@inproceedings{fstar,
|
||
author = {Swamy, Nikhil and Chen, Juan and Fournet, C{\'e}dric and Strub, {P}ierre-{Y}ves and Bhargavan, Karthikeyan and Yang, Jean},
|
||
title = {Secure distributed programming with value-dependent types},
|
||
booktitle =icfp11,
|
||
year = 2011,
|
||
url = {http://research.microsoft.com/pubs/150012/icfp-camera-ready.pdf}
|
||
}
|
||
|
||
|
||
@inproceedings{liquid,
|
||
title={Liquid types},
|
||
author={Rondon, Patrick M and Kawaguci, Ming and Jhala, Ranjit},
|
||
booktitle=pldi08,
|
||
pages={159--169},
|
||
year={2008},
|
||
url={http://goto.ucsd.edu/~rjhala/papers/liquid_types.pdf}
|
||
}
|
||
|
||
@inproceedings{rfstar,
|
||
title={Probabilistic relational verification for cryptographic implementations},
|
||
author={Barthe, Gilles and Fournet, C{\'e}dric and Gr{\'e}goire, Benjamin and Strub, {P}ierre-{Y}ves and Swamy, Nikhil and Zanella-B{\'e}guelin, Santiago},
|
||
booktitle=popl14,
|
||
pages={193--206},
|
||
year={2014},
|
||
url={http://research.microsoft.com/en-us/um/people/nswamy/papers/rfstar.pdf}
|
||
}
|
||
|
||
|
||
@inproceedings{BGZ09,
|
||
Address = {New York},
|
||
Author = {Barthe, Gilles and Gr{\'e}goire, Benjamin and {Zanella-B{\'e}guelin}, Santiago},
|
||
Booktitle = popl09,
|
||
Title = {Formal Certification of Code-Based Cryptographic Proofs},
|
||
Year = {2009},
|
||
url = {http://research.microsoft.com/pubs/185309/Zanella.2009.POPL.pdf}
|
||
}
|
||
|
||
@INPROCEEDINGS{polymonad,
|
||
TITLE = {Polymonadic Programming},
|
||
AUTHOR = {Michael Hicks and Gavin Bierman and Nataliya Guts and Daan Leijen and Nikhil Swamy},
|
||
BOOKTITLE = mfps14,
|
||
YEAR = 2014,
|
||
url = {http://arxiv.org/abs/1406.2060}
|
||
}
|
||
|
||
|
||
@inproceedings{Dwork06,
|
||
Author = {Dwork, Cynthia},
|
||
Booktitle = icalp06,
|
||
Pages = {1--12},
|
||
Title = {Differential Privacy},
|
||
Year = {2006},
|
||
url =
|
||
{http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.7534&rep=rep1&type=pdf}
|
||
}
|
||
|
||
@inproceedings{Benton04,
|
||
Author = {Benton, Nick},
|
||
Booktitle = popl04,
|
||
Pages = {14--25},
|
||
Title = {Simple relational correctness proofs for static analyses and program transformations},
|
||
Year = {2004},
|
||
url = {http://research.microsoft.com/en-us/um/people/nick/correctnessfull.pdf}
|
||
}
|
||
|
||
@inproceedings{AmtoftB04,
|
||
author = {Torben Amtoft and
|
||
Anindya Banerjee},
|
||
title = {Information Flow Analysis in Logical Form},
|
||
booktitle = sas04,
|
||
pages = {100--115},
|
||
publisher = {Springer},
|
||
address = {Heidelberg},
|
||
series = lncs,
|
||
volume = {3148},
|
||
year = {2004},
|
||
url = {http://software.imdea.org/~ab/Publications/ifalftr.pdf}
|
||
}
|
||
|
||
@inproceedings{BartheGZ09,
|
||
Address = {New York},
|
||
Author = {Barthe, Gilles and Gr{\'e}goire, Benjamin and {Zanella-B{\'e}guelin}, Santiago},
|
||
Booktitle = popl09,
|
||
Pages = {90--101},
|
||
Title = {Formal Certification of Code-Based Cryptographic Proofs},
|
||
Year = {2009},
|
||
url = {http://research.microsoft.com/pubs/185309/Zanella.2009.POPL.pdf}
|
||
}
|
||
|
||
@inproceedings{BartheGHZ11,
|
||
author = {Gilles Barthe and
|
||
Benjamin Gr{\'e}goire and
|
||
Sylvain Heraud and
|
||
Santiago Zanella B{\'e}guelin},
|
||
title = {Computer-Aided Security Proofs for the Working Cryptographer},
|
||
booktitle = crypto11,
|
||
year = {2011},
|
||
pages = {71--90},
|
||
url = {http://dx.doi.org/10.1007/978--3-642--22792--9_5},
|
||
bibsource = {DBLP, http://dblp.uni-trier.de}
|
||
}
|
||
|
||
@inproceedings{BartheDGKZ13,
|
||
author = {Gilles Barthe and
|
||
George Danezis and
|
||
Benjamin Gr{\'e}goire and
|
||
C{\'e}sar Kunz and
|
||
Santiago Zanella B{\'e}guelin},
|
||
title = {Verified Computational Differential Privacy with Applications
|
||
to Smart Metering},
|
||
booktitle = csf13,
|
||
year = {2013},
|
||
pages = {287--301},
|
||
url = {http://www0.cs.ucl.ac.uk/staff/G.Danezis/papers/easypriv.pdf}
|
||
}
|
||
|
||
|
||
|
||
|
||
@inproceedings{DBLP:journals/corr/BaiTG14,
|
||
author = {Wei Bai and
|
||
Emmanuel M Tadjouddine and
|
||
Yu Guo},
|
||
title = {Enabling Automatic Certification of Online Auctions},
|
||
booktitle = fesca14,
|
||
series = {EPTCS},
|
||
volume = {147},
|
||
year = {2014},
|
||
pages = {123--132},
|
||
url = {http://dx.doi.org/10.4204/EPTCS.147.9},
|
||
}
|
||
|
||
|
||
@inproceedings{DBLP:conf/facs2/BaiTPG13,
|
||
author = {Wei Bai and
|
||
Emmanuel M Tadjouddine and
|
||
Terry R Payne and
|
||
Sheng-Uei Guan},
|
||
title = {A Proof-Carrying Code Approach to Certificate Auction Mechanisms},
|
||
booktitle = {FACS},
|
||
year = {2013},
|
||
pages = {23--40},
|
||
url = {http://dx.doi.org/10.1007/978--3-319--07602--7_4},
|
||
publisher = {Springer},
|
||
series = {Lecture Notes in Computer Science},
|
||
volume = {8348},
|
||
}
|
||
|
||
|
||
@inproceedings{DBLP:conf/ceemas/TadjouddineG07,
|
||
author = {Emmanuel M Tadjouddine and
|
||
Frank Guerin},
|
||
title = {Verifying Dominant Strategy Equilibria in Auctions},
|
||
booktitle = ceemas07,
|
||
year = {2007},
|
||
pages = {288--297},
|
||
url = {http://dx.doi.org/10.1007/978--3-540--75254--7_29},
|
||
publisher = {Springer},
|
||
series = {Lecture Notes in Computer Science},
|
||
volume = {4696},
|
||
}
|
||
|
||
@article{DBLP:journals/ipl/Vestergaard06,
|
||
author = {Ren{\'e} Vestergaard},
|
||
title = {A constructive approach to sequential Nash equilibria},
|
||
journal = {Inf. Process. Lett.},
|
||
volume = {97},
|
||
number = {2},
|
||
year = {2006},
|
||
pages = {46--51},
|
||
url = {http://dx.doi.org/10.1016/j.ipl.2005.09.010},
|
||
bibsource = {DBLP, http://dblp.uni-trier.de}
|
||
}
|
||
|
||
|
||
@inproceedings{Roux:2009,
|
||
author = {Le Roux, St{\'e}phane},
|
||
title = {Acyclic Preferences and Existence of Sequential Nash Equilibria: A Formal and Constructive Equivalence},
|
||
booktitle = tphol09,
|
||
year = {2009}
|
||
}
|
||
|
||
|
||
@techreport{BUCS-TR-2008--026,
|
||
author = {Andrei Lapets and Alex Levin and David Parkes},
|
||
title = {{A Typed Truthful Language for One-dimensional Truthful Mechanism Design}},
|
||
number = {BUCS-TR-2008--026},
|
||
year = {2008},
|
||
url = {http://cs-people.bu.edu/lapets/resource/typed-ec-mech.pdf}
|
||
}
|
||
|
||
@misc{Fang14,
|
||
author = {Ye Fang and Swarat Chaudhuri and Moshe Vardi},
|
||
title = {{Computer-aided mechanism design}},
|
||
note = {Poster at POPL'14},
|
||
year = {2014}
|
||
}
|
||
|
||
|
||
@inproceedings{CasinghinoSW14,
|
||
author = {Chris Casinghino and Vilhelm Sj\"{o}berg and Stephanie Weirich},
|
||
title = {Combining Proofs and Programs in a Dependently Typed Langauge},
|
||
booktitle = popl14,
|
||
year = {2014},
|
||
url = {http://www.seas.upenn.edu/~ccasin/papers/combining-TR.pdf}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/mkm/0002CKMRWW13,
|
||
author = {Christoph Lange and
|
||
Marco B Caminati and
|
||
Manfred Kerber and
|
||
Till Mossakowski and
|
||
Colin Rowat and
|
||
Makarius Wenzel and
|
||
Wolfgang Windsteiger},
|
||
title = {A Qualitative Comparison of the Suitability of Four Theorem
|
||
Provers for Basic Auction Theory},
|
||
booktitle = {MKM/Calculemus/DML},
|
||
publisher = {Springer},
|
||
series = {Lecture Notes in Computer Science},
|
||
volume = {7961},
|
||
year = {2013},
|
||
pages = {200--215},
|
||
url = {http://dx.doi.org/10.1007/978--3-642--39320--4_13}
|
||
}
|
||
|
||
@article{DBLP:journals/cacm/ChaudhuriGL12,
|
||
author = {Swarat Chaudhuri and
|
||
Sumit Gulwani and
|
||
Roberto Lublinerman},
|
||
title = {Continuity and robustness of programs},
|
||
journal = cacm,
|
||
volume = {55},
|
||
number = {8},
|
||
year = {2012},
|
||
pages = {107--115},
|
||
url = {http://dl.acm.org/citation.cfm?id=2240262}
|
||
}
|
||
|
||
@inproceedings{BartheDR04,
|
||
author = {Gilles Barthe and
|
||
Pedro R. D'Argenio and
|
||
Tamara Rezk},
|
||
title = {Secure Information Flow by Self-Composition},
|
||
booktitle = csf04,
|
||
year = {2004},
|
||
pages = {100--114},
|
||
url = {http://doi.ieeecomputersociety.org/10.1109/CSFW.2004.17},
|
||
bibsource = {DBLP, http://dblp.uni-trier.de}
|
||
}
|
||
|
||
@inproceedings{ZaksP08,
|
||
author = {Anna Zaks and Amir Pnueli},
|
||
title = {CoVaC: Compiler Validation by Program Analysis of the Cross-Product},
|
||
booktitle = fm08,
|
||
pages = {35--51},
|
||
publisher = {Springer},
|
||
address = {Heidelberg},
|
||
series = {Lecture Notes in Computer Science},
|
||
volume = {5014},
|
||
year = {2008},
|
||
url = {http://llvm.org/pubs/2008-05-CoVaC.pdf}
|
||
}
|
||
|
||
|
||
@inproceedings{TerauchiA05,
|
||
Address = {Heidelberg},
|
||
Author = {Terauchi, Tachio and Aiken, Alex},
|
||
Booktitle = sas05,
|
||
Pages = {352--367},
|
||
Publisher = {Springer},
|
||
Series = {Lecture Notes in Computer Science},
|
||
Title = {Secure Information Flow as a Safety Problem},
|
||
Volume = {3672},
|
||
Year = {2005},
|
||
url = {http://theory.stanford.edu/~aiken/publications/papers/sas05b.pdf}
|
||
}
|
||
|
||
|
||
@inproceedings{BartheCK11,
|
||
author = {Gilles Barthe and
|
||
Juan Manuel Crespo and
|
||
C{\'e}sar Kunz},
|
||
title = {Relational Verification Using Product Programs},
|
||
booktitle = fm11,
|
||
year = {2011},
|
||
pages = {200--214},
|
||
url = {http://dx.doi.org/10.1007/978--3-642--21437--0_17},
|
||
bibsource = {DBLP, http://dblp.uni-trier.de}
|
||
}
|
||
|
||
@inproceedings{BartheCK13,
|
||
author = {Gilles Barthe and
|
||
Juan Manuel Crespo and
|
||
C{\'e}sar Kunz},
|
||
title = {Beyond 2-Safety: Asymmetric Product Programs for Relational
|
||
Program Verification},
|
||
booktitle = lfcs13,
|
||
year = {2013},
|
||
pages = {29--43},
|
||
url = {http://dx.doi.org/10.1007/978--3-642--35722--0_3},
|
||
bibsource = {DBLP, http://dblp.uni-trier.de}
|
||
}
|
||
|
||
|
||
@inproceedings{DBLP:conf/esop/KnowlesF07,
|
||
author = {Kenneth Knowles and
|
||
Cormac Flanagan},
|
||
title = {Type Reconstruction for General Refinement Types},
|
||
booktitle = esop07,
|
||
year = {2007},
|
||
pages = {505--519},
|
||
url = {http://users.soe.ucsc.edu/~cormac/papers/esop07.pdf}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/esop/WadlerF09,
|
||
author = {Philip Wadler and
|
||
Robert Bruce Findler},
|
||
title = {Well-Typed Programs Can't Be Blamed},
|
||
booktitle = esop09,
|
||
year = {2009},
|
||
pages = {1--16},
|
||
url = {http://homepages.inf.ed.ac.uk/wadler/papers/blame/blame.pdf}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/popl/GreenbergPW10,
|
||
author = {Michael Greenberg and
|
||
Benjamin C Pierce and
|
||
Stephanie Weirich},
|
||
title = {Contracts made manifest},
|
||
booktitle = popl10,
|
||
year = {2010},
|
||
pages = {353--364},
|
||
url = {http://www.cis.upenn.edu/~bcpierce/papers/contracts-popl.pdf}
|
||
}
|
||
|
||
@inproceedings{DBLP:conf/sfp/GronskiF07,
|
||
author = {Jessica Gronski and
|
||
Cormac Flanagan},
|
||
title = {Unifying Hybrid Types and Contracts},
|
||
booktitle = tfp07,
|
||
year = {2007},
|
||
pages = {54--70},
|
||
url = {https://sage.soe.ucsc.edu/tfp07-gronski-flanagan.pdf}
|
||
}
|
||
|
||
@inproceedings{OngR11,
|
||
title={Verifying higher-order functional programs with pattern-matching algebraic data types},
|
||
author={Ong, C-H Luke and Ramsay, Steven James},
|
||
booktitle=popl11,
|
||
volume={46},
|
||
number={1},
|
||
pages={587--598},
|
||
year={2011},
|
||
url={https://www.cs.ox.ac.uk/files/3721/main.pdf}
|
||
}
|
||
|
||
@misc{Pierce:2012,
|
||
author = {Benjamin C Pierce},
|
||
title = {Differential Privacy in the Programming Languages Community},
|
||
year = {2012},
|
||
note = {Invited tutorial at DIMACS Workshop on Recent Work on
|
||
Differential Privacy across Computer Science}
|
||
}
|
||
|
||
@inproceedings{FindlerF02,
|
||
author = {Robert Bruce Findler and
|
||
Matthias Felleisen},
|
||
title = {Contracts for higher-order functions},
|
||
booktitle = icfp02,
|
||
year = {2002},
|
||
pages = {48--59},
|
||
url =
|
||
{http://www.eecs.northwestern.edu/~robby/pubs/papers/ho-contracts-techreport.pdf}
|
||
}
|
||
|
||
@INPROCEEDINGS{Augustsson98,
|
||
author = {Lennart Augustsson},
|
||
title = {Cayenne -- a Language With Dependent Types},
|
||
booktitle = icfp98,
|
||
year = {1998},
|
||
pages = {239--250},
|
||
url = {http://link.springer.com/chapter/10.1007%2F10704973_6}
|
||
}
|
||
|
||
|
||
@article{Brady13,
|
||
author = {Edwin Brady},
|
||
title = {Idris, a general-purpose dependently typed programming language:
|
||
Design and implementation},
|
||
journal = jfp,
|
||
volume = {23},
|
||
number = {5},
|
||
year = {2013},
|
||
pages = {552--593},
|
||
url = {http://eb.host.cs.st-andrews.ac.uk/drafts/impldtp.pdf}
|
||
}
|
||
|
||
@incollection{epigram,
|
||
title={Epigram: Practical programming with dependent types},
|
||
author={{M}c{B}ride, Conor},
|
||
booktitle={Advanced Functional Programming},
|
||
pages={130--170},
|
||
year={2005},
|
||
publisher={Springer},
|
||
url={http://cs.ru.nl/~freek/courses/tt-2010/tvftl/epigram-notes.pdf}
|
||
}
|
||
@inproceedings{Vytiniotis+13,
|
||
author = {Vytiniotis, Dimitrios and Peyton Jones, Simon and Claessen, Koen and Ros{\'e}n, Dan},
|
||
title = {HALO: Haskell to Logic Through Denotational Semantics},
|
||
booktitle = popl13,
|
||
year = {2013},
|
||
url = {http://research.microsoft.com/en-us/people/dimitris/hcc-popl.pdf}
|
||
}
|
||
|
||
@INPROCEEDINGS{Flanagan06,
|
||
author = {Jessica Gronski and Kenneth Knowles and Aaron Tomb and Stephen N Freund and Cormac Flanagan},
|
||
title = {Sage: Hybrid checking for flexible specifications},
|
||
booktitle = {Scheme and Functional Programming Workshop},
|
||
year = {2006},
|
||
pages = {93--104},
|
||
url =
|
||
{http://galois.com/wp-content/uploads/2014/07/pub_AT_SAGEHybridChecking.pdf}
|
||
}
|
||
|
||
@inproceedings{GGHRW14,
|
||
author = {Marco Gaboardi and
|
||
Emilio Jes{\'u}s Gallego Arias and
|
||
Justin Hsu and
|
||
Aaron Roth and
|
||
Zhiwei Steven Wu},
|
||
title = {Dual Query: Practical private query release for high dimensional data},
|
||
booktitle = icml14,
|
||
year = {2014},
|
||
url = {http://arxiv.org/abs/1402.1526},
|
||
jh = yes,
|
||
slides = yes,
|
||
poster = yes,
|
||
eprint = yes
|
||
}
|
||
|
||
@inproceedings{BGGHKS14,
|
||
author = {Gilles Barthe and
|
||
Marco Gaboardi and
|
||
Emilio Jes{\'u}s Gallego Arias and
|
||
Justin Hsu and
|
||
C\'esar Kunz and
|
||
Pierre-Yves Strub},
|
||
title = {Proving differential privacy in {H}oare logic},
|
||
booktitle = csf14,
|
||
year = {2014},
|
||
url = {http://arxiv.org/abs/1407.2988},
|
||
jh = yes,
|
||
eprint = yes
|
||
}
|
||
|
||
|
||
@inproceedings{EignerM13,
|
||
author = {Fabienne Eigner and
|
||
Matteo Maffei},
|
||
title = {Differential Privacy by Typing in Security Protocols},
|
||
booktitle = csf13,
|
||
year = {2013},
|
||
pages = {272--286},
|
||
url = {http://sps.cs.uni-saarland.de/publications/dp_proto_long.pdf}
|
||
}
|
||
|
||
|
||
@inproceedings{GordonHNR14,
|
||
author = {Andrew D Gordon and
|
||
Thomas A Henzinger and
|
||
Aditya V Nori and
|
||
Sriram K Rajamani},
|
||
title = {Probabilistic programming},
|
||
booktitle = icse14,
|
||
year = {2014},
|
||
pages = {167--181},
|
||
url = {http://research.microsoft.com/pubs/208585/fose-icse2014.pdf}
|
||
}
|
||
@inproceedings{DaviesP00,
|
||
author = {Rowan Davies and
|
||
Frank Pfenning},
|
||
title = {Intersection types and computational effects},
|
||
booktitle = icfp00,
|
||
year = {2000},
|
||
pages = {198--208},
|
||
url = {http://www.cs.cmu.edu/~fp/papers/icfp00.pdf}
|
||
}
|
||
|
||
@inproceedings{XiP99,
|
||
author = {Hongwei Xi and
|
||
Frank Pfenning},
|
||
title = {Dependent Types in Practical Programming},
|
||
booktitle = popl99,
|
||
year = {1999},
|
||
pages = {214--227},
|
||
url = {http://www.cs.cmu.edu/~fp/papers/popl99.pdf}
|
||
}
|
||
|
||
@inproceedings{DMNS06,
|
||
title = {Calibrating noise to sensitivity in private data analysis},
|
||
author = {Cynthia Dwork and
|
||
Frank McSherry and
|
||
Kobbi Nissim and
|
||
Adam Smith},
|
||
pages = {265--284},
|
||
url = {http://dx.doi.org/10.1007/11681878_14},
|
||
booktitle = tcc06,
|
||
year = {2006}
|
||
}
|
||
|
||
@article{Tschantz201161,
|
||
title = {Formal Verification of Differential Privacy for Interactive Systems
|
||
(Extended Abstract)},
|
||
journal = entcs,
|
||
volume = "276",
|
||
number = "0",
|
||
pages = {61--79},
|
||
year = "2011",
|
||
issn = "1571--0661",
|
||
doi = "http://dx.doi.org/10.1016/j.entcs.2011.09.015",
|
||
url = "http://www.sciencedirect.com/science/article/pii/S157106611100106X",
|
||
author = "Michael Carl Tschantz and Dilsun Kaynar and Anupam Datta",
|
||
}
|
||
|
||
@article{GHKSW06,
|
||
title={Competitive auctions},
|
||
author={Goldberg, Andrew V and Hartline, Jason D and Karlin, Anna R and
|
||
Saks, Michael and Wright, Andrew},
|
||
journal=geb,
|
||
volume={55},
|
||
number={2},
|
||
year={2006},
|
||
url={http://www.ime.usp.br/~yw/papers/games/goldberg2008-competitive-auctions.pdf},
|
||
publisher={Elsevier}
|
||
}
|
||
|
||
@article{mu2008truthful,
|
||
title={Truthful approximation mechanisms for restricted combinatorial auctions},
|
||
author={Mu'{A}lem, Ahuva and Nisan, Noam},
|
||
journal=geb,
|
||
volume={64},
|
||
number={2},
|
||
pages={612--631},
|
||
year={2008},
|
||
url={http://authors.library.caltech.edu/13158/1/MUAgeb08preprint.pdf},
|
||
publisher={Elsevier}
|
||
}
|
||
|
||
@inproceedings{milgrom2014deferred,
|
||
title={Deferred-acceptance auctions and radio spectrum reallocation},
|
||
author={Milgrom, Paul and Segal, Ilya},
|
||
booktitle=ec14,
|
||
pages={185--186},
|
||
year={2014},
|
||
url={http://web.stanford.edu/~isegal/heuristic.pdf}
|
||
}
|
||
|
||
@article{CKRW14,
|
||
author = {Rachel Cummings and
|
||
Michael Kearns and
|
||
Aaron Roth and
|
||
Zhiwei Steven Wu},
|
||
title = {Privacy and Truthful Equilibrium Selection for Aggregative Games},
|
||
journal = {CoRR},
|
||
year = {2014},
|
||
volume = {abs/1407.7740},
|
||
url = {http://arxiv.org/abs/1407.7740},
|
||
timestamp = {Sun, 26 Oct 2014 15:36:31 +0100},
|
||
biburl = {http://dblp.uni-trier.de/rec/bib/journals/corr/CummingsKRW14},
|
||
bibsource = {dblp computer science bibliography, http://dblp.org}
|
||
}
|
||
|
||
@inproceedings{HK12,
|
||
title={The exponential mechanism for social welfare: Private, truthful, and nearly optimal},
|
||
author={Huang, Zhiyi and Kannan, Sampath},
|
||
booktitle=focs12,
|
||
pages={140--149},
|
||
year={2012},
|
||
url={http://arxiv.org/abs/1204.1255}
|
||
}
|
||
|
||
@inproceedings{zinkevich,
|
||
author = {Martin Zinkevich},
|
||
title = {Online Convex Programming and Generalized Infinitesimal Gradient Ascent},
|
||
booktitle = icml03,
|
||
year = {2003},
|
||
pages = {928--936},
|
||
url = {http://www.aaai.org/Library/ICML/2003/icml03-120.php},
|
||
timestamp = {Thu, 16 Oct 2014 21:45:09 +0200},
|
||
biburl = {http://dblp.uni-trier.de/rec/bib/conf/icml/Zinkevich03},
|
||
bibsource = {dblp computer science bibliography, http://dblp.org}
|
||
}
|
||
|
||
@article{JKT11,
|
||
title={Differentially private online learning},
|
||
author={Jain, Prateek and Kothari, Pravesh and Thakurta, Abhradeep Guha},
|
||
journal={arXiv preprint arXiv:1109.0105},
|
||
year={2011},
|
||
url= {http://arxiv.org/abs/1109.0105}
|
||
}
|
||
|
||
@inproceedings{JT14,
|
||
title={({N}ear) Dimension Independent Risk Bounds for Differentially Private Learning},
|
||
author={Jain, Prateek and Thakurta, Abhradeep Guha},
|
||
booktitle=icml14,
|
||
pages={476--484},
|
||
year={2014},
|
||
url={http://jmlr.org/proceedings/papers/v32/jain14.pdf}
|
||
}
|
||
|
||
@inproceedings{BST14,
|
||
title={Differentially Private Empirical Risk Minimization: Efficient
|
||
Algorithms and Tight Error Bounds},
|
||
author={Bassily, Raef and Smith, Adam and Thakurta, Abhradeep Guha},
|
||
booktitle=focs14,
|
||
year={2014},
|
||
url={http://arxiv.org/abs/1405.7085}
|
||
}
|
||
|
||
@article{dualdecomp,
|
||
title={Distributed optimization and statistical learning via the alternating
|
||
direction method of multipliers},
|
||
author={Boyd, Stephen and Parikh, Neal and Chu, Eric and Peleato, Borja and
|
||
Eckstein, Jonathan},
|
||
journal={Foundations and Trends{\textregistered} in Machine Learning},
|
||
volume={3},
|
||
number={1},
|
||
pages={1--122},
|
||
year={2011},
|
||
publisher={Now Publishers Inc.},
|
||
url={https://web.stanford.edu/~boyd/papers/pdf/admm_distr_stats.pdf}
|
||
}
|
||
|
||
@inproceedings{NST12,
|
||
title={Approximately optimal mechanism design via differential privacy},
|
||
author={Nissim, Kobbi and Smorodinsky, Rann and Tennenholtz, Moshe},
|
||
booktitle=itcs12,
|
||
pages={203--213},
|
||
year={2012},
|
||
url={http://arxiv.org/abs/1004.2888}
|
||
}
|
||
|
||
@inproceedings{CCKMV13,
|
||
title={Truthful mechanisms for agents that value privacy},
|
||
author={Chen, Yiling and Chong, Stephen and Kash, Ian A and Moran, Tal and Vadhan, Salil},
|
||
booktitle=ec13,
|
||
pages={215--232},
|
||
year={2013},
|
||
url={http://arxiv.org/abs/1111.5472}
|
||
}
|
||
|
||
@inproceedings{HHRRW14,
|
||
author = {Justin Hsu and
|
||
Zhiyi Huang and
|
||
Aaron Roth and
|
||
Tim Roughgarden and
|
||
Zhiwei Steven Wu},
|
||
title = {Private matchings and allocations},
|
||
booktitle = stoc14,
|
||
year = {2014},
|
||
pages = {21--30},
|
||
url = {http://arxiv.org/abs/1311.2828},
|
||
doi = {10.1145/2591796.2591826},
|
||
timestamp = {Wed, 22 Oct 2014 14:44:14 +0200},
|
||
biburl = {http://dblp.uni-trier.de/rec/bib/conf/stoc/HsuHRRW14},
|
||
bibsource = {dblp computer science bibliography, http://dblp.org},
|
||
jh = yes,
|
||
poster = yes,
|
||
eprint = yes
|
||
}
|
||
|
||
@inproceedings{Xia13,
|
||
title={Is privacy compatible with truthfulness?},
|
||
author={Xiao, David},
|
||
booktitle=itcs13,
|
||
pages={67--86},
|
||
year={2013},
|
||
url={https://eprint.iacr.org/2011/005}
|
||
}
|
||
|
||
@inproceedings{BGGHRS15,
|
||
title = {Higher-order approximate relational refinement types for
|
||
mechanism design and differential privacy},
|
||
author = {Gilles Barthe and
|
||
Marco Gaboardi and
|
||
Emilio Jes{\'u}s Gallego Arias and
|
||
Justin Hsu and
|
||
Aaron Roth and
|
||
Pierre-Yves Strub},
|
||
booktitle = popl15,
|
||
year = {2015},
|
||
url = {http://arxiv.org/abs/1407.6845},
|
||
jh = yes,
|
||
eprint = yes
|
||
}
|
||
|
||
@inproceedings{IOh01,
|
||
title={{BI} as an assertion language for mutable data structures},
|
||
author={Ishtiaq, Samin S and O'Hearn, Peter W},
|
||
booktitle=popl01,
|
||
year=2001,
|
||
url={http://dl.acm.org/citation.cfm?id=375719},
|
||
pages={14--26}
|
||
}
|
||
|
||
@inproceedings{OhRY01,
|
||
title={Local reasoning about programs that alter data structures},
|
||
author={O'Hearn, Peter W and Reynolds, John and Yang, Hongseok},
|
||
booktitle=csl01,
|
||
year=2001,
|
||
url={http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.29.1331&rep=rep1&type=pdf},
|
||
pages={1--19}
|
||
}
|
||
|
||
@inproceedings{DOhY06,
|
||
title={A local shape analysis based on separation logic},
|
||
author={Distefano, Dino and O'Hearn, Peter W and Yang, Hongseok},
|
||
booktitle=tacas06,
|
||
year=2006,
|
||
url={http://dl.acm.org/citation.cfm?id=2182039},
|
||
pages={287--302}
|
||
}
|
||
|
||
@inproceedings{BCCC07,
|
||
title={Shape analysis for composite data structures},
|
||
author={Berdine, Josh and Calcagno, Cristiano and Cook, Byron and
|
||
Distefano, Dino and O'Hearn, Peter W and Wies, Thomas and Yang,
|
||
Hongseok},
|
||
booktitle=cav07,
|
||
pages={178--192},
|
||
url={http://research.microsoft.com/pubs/73868/safcds.pdf},
|
||
year={2007}
|
||
}
|
||
|
||
@article{Reynolds01,
|
||
title={Intuitionistic reasoning about shared mutable data structure},
|
||
author={Reynolds, John C},
|
||
journal={Millennial perspectives in computer science},
|
||
volume={2},
|
||
number={1},
|
||
year=2001,
|
||
url={http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.11.5999&rep=rep1&type=pdf},
|
||
pages={303--321}
|
||
}
|
||
|
||
@inproceedings{Reynolds02,
|
||
title={Separation logic: A logic for shared mutable data structures},
|
||
author={Reynolds, John C},
|
||
booktitle=lics02,
|
||
year=2002,
|
||
pages={55--74}
|
||
}
|
||
|
||
@article{Burstall72,
|
||
title = {Some techniques for proving correctness of programs which alter data structuers},
|
||
author = {Rodnew M Burstall},
|
||
journal = {Machine Intelligence},
|
||
volume = {7},
|
||
number = {3},
|
||
year = 1972,
|
||
pages = {23--50}
|
||
}
|
||
|
||
@inproceedings{smallfoot,
|
||
title = {Smallfoot: Modular automatic assertion checking with separation logic},
|
||
author = {Berdine, Josh and Calcagno, Cristiano and O'Hearn, Peter W},
|
||
booktitle = fmco06,
|
||
pages = {115--137},
|
||
url = {http://research.microsoft.com/pubs/67598/smallfoot.pdf},
|
||
year = {2006}
|
||
}
|
||
|
||
@incollection{VP07,
|
||
title = {A marriage of rely/guarantee and separation logic},
|
||
author = {Vafeiadis, Viktor and Parkinson, Matthew},
|
||
booktitle = concur07,
|
||
pages = {256--271},
|
||
url = {http://www.cl.cam.ac.uk/~mjp41/RGSep.pdf},
|
||
year = 2007
|
||
}
|
||
|
||
@inproceedings{NDQC07,
|
||
title = {Automated verification of shape and size properties via separation logic},
|
||
author = {Nguyen, Huu Hai and David, Cristina and Qin, Shengchao and Chin, Wei-Ngan},
|
||
booktitle = vmcai07,
|
||
pages = {251--266},
|
||
url = {http://link.springer.com/chapter/10.1007%2F978-3-540-69738-1_18},
|
||
year = {2007}
|
||
}
|
||
|
||
@inproceedings{BCOh04,
|
||
title = {A decidable fragment of separation logic},
|
||
author = {Berdine, Josh and Calcagno, Cristiano and O'Hearn, Peter W},
|
||
booktitle = fsttcs04,
|
||
pages = {97--109},
|
||
url = {http://research.microsoft.com/pubs/73583/unroll_collapse.pdf},
|
||
year = 2004
|
||
}
|
||
|
||
@incollection{HAN08,
|
||
title = {Oracle semantics for concurrent separation logic},
|
||
author = {Hobor, Aquinas and Appel, Andrew W and Nardelli, Francesco Zappa},
|
||
booktitle = {Programming Languages and Systems (with ESOP)},
|
||
pages = {353--367},
|
||
url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.116.4226&rep=rep1&type=pdf},
|
||
year = {2008}
|
||
}
|
||
|
||
@inproceedings{Krebbers14,
|
||
title = {An operational and axiomatic semantics for non-determinism and sequence points in {C}},
|
||
author = {Krebbers, Robbert},
|
||
booktitle = popl14,
|
||
pages = {101--112},
|
||
url = {http://robbertkrebbers.nl/research/articles/expressions.pdf},
|
||
year = {2014}
|
||
}
|
||
|
||
@article{OhP99,
|
||
title = {The logic of bunched implications},
|
||
author = {O'Hearn, Peter W and Pym, David J},
|
||
journal = bsl,
|
||
pages = {215--244},
|
||
url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi = 10.1.1.27.4742&rep = rep1&type = pdf},
|
||
year = {1999}
|
||
}
|
||
|
||
@article{POhY04,
|
||
title = {Possible worlds and resources: The semantics of {BI}},
|
||
author = {Pym, David J and O'Hearn, Peter W and Yang, Hongseok},
|
||
journal = tcs,
|
||
volume = {315},
|
||
number = {1},
|
||
pages = {257--305},
|
||
year = {2004},
|
||
url = {http://www.sciencedirect.com/science/article/pii/S0304397503006248},
|
||
publisher = {Elsevier}
|
||
}
|
||
|
||
@inproceedings{BCOh05,
|
||
title = {Symbolic execution with separation logic},
|
||
author = {Berdine, Josh and Calcagno, Cristiano and O'Hearn, Peter W},
|
||
booktitle = aplas05,
|
||
url = {http://research.microsoft.com/pubs/64175/execution.pdf},
|
||
year = {2005}
|
||
}
|
||
|
||
@inproceedings{Cousout77,
|
||
title = {Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints},
|
||
author = {Cousot, Patrick and Cousot, Radhia},
|
||
booktitle = popl77,
|
||
pages = {238--252},
|
||
url = {http://www.di.ens.fr/~cousot/publications.www/CousotCousot-POPL-77-ACM-p238--252-1977.pdf},
|
||
year = {1977}
|
||
}
|
||
|
||
@article{Cousout96,
|
||
title = {Abstract interpretation},
|
||
author = {Cousot, Patrick},
|
||
journal = {ACM Computing Surveys (CSUR)},
|
||
volume = {28},
|
||
number = {2},
|
||
pages = {324--328},
|
||
year = {1996},
|
||
url = {http://dl.acm.org/citation.cfm?id = 234740},
|
||
publisher = {ACM}
|
||
}
|
||
|
||
@inproceedings{dwork2010pan,
|
||
title = {Pan-Private Streaming Algorithms.},
|
||
author = {Dwork, Cynthia and
|
||
Naor, Moni and
|
||
Pitassi, Toniann and
|
||
Rothblum, Guy N and
|
||
Yekhanin, Sergey},
|
||
booktitle = itcs10,
|
||
pages = {66--80},
|
||
url = {http://www.cs.toronto.edu/~toni/Papers/panprivacy.pdf},
|
||
year = {2010}
|
||
}
|
||
|
||
@inproceedings{HRRU14,
|
||
author = {Justin Hsu and
|
||
Aaron Roth and
|
||
Tim Roughgarden and
|
||
Jonathan Ullman},
|
||
title = {Privately solving linear programs},
|
||
booktitle = icalp14,
|
||
year = {2014},
|
||
pages = {612--624},
|
||
url = {http://arxiv.org/abs/1402.3631},
|
||
doi = {10.1007/978-3-662-43948-7_51},
|
||
timestamp = {Fri, 31 Oct 2014 14:45:31 +0100},
|
||
biburl = {http://dblp.uni-trier.de/rec/bib/conf/icalp/HsuRRU14},
|
||
bibsource = {dblp computer science bibliography, http://dblp.org},
|
||
jh = yes,
|
||
slides = yes,
|
||
eprint = yes
|
||
}
|
||
|
||
@inproceedings{recommender,
|
||
title = {Differentially private recommender systems: building privacy into the net},
|
||
author = {McSherry, Frank and Mironov, Ilya},
|
||
booktitle = kdd09,
|
||
pages = {627--636},
|
||
year = {2009},
|
||
url = {http://research.microsoft.com/pubs/80511/netflixprivacy.pdf}
|
||
}
|
||
|
||
@book{cvxbook,
|
||
author = {Boyd, Stephen and Vandenberghe, Lieven},
|
||
title = {Convex Optimization},
|
||
year = {2004},
|
||
isbn = {0521833787},
|
||
publisher = {Cambridge University Press},
|
||
address = {New York, NY, USA},
|
||
}
|
||
|
||
@book{concentration-book,
|
||
title = {Concentration of measure for the analysis of randomized algorithms},
|
||
author = {Dubhashi, Devdatt P and Panconesi, Alessandro},
|
||
year = {2009},
|
||
publisher = cup
|
||
}
|
||
|
||
@inproceedings{AGGH14,
|
||
author = {Arthur Azevedo de Amorim and
|
||
Marco Gaboardi and
|
||
Emilio Jes{\'u}s Gallego Arias and
|
||
Justin Hsu},
|
||
title = {Really naturally linear indexed type-checking},
|
||
booktitle = {Proceedings of Implementation of Functional Languages (IFL), Boston, Massachusetts},
|
||
year = {2014},
|
||
url = {http://www.cis.upenn.edu/~justhsu/docs/dfuzztc.pdf},
|
||
jh = yes,
|
||
docs = yes,
|
||
}
|
||
|
||
@unpublished{HHRW15,
|
||
author = {Justin Hsu and
|
||
Zhiyi Huang and
|
||
Aaron Roth and
|
||
Zhiwei Steven Wu},
|
||
title = {Jointly private convex programming},
|
||
year = {2015},
|
||
url = {http://arxiv.org/abs/1411.0998},
|
||
jh = yes,
|
||
eprint = yes
|
||
}
|