Author:
Wigderson Avi,Yehudayoff Amir
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Software
Reference27 articles.
1. Agrawal, R., & Srikant, R. (2000). Privacy-preserving data mining. ACM SIGMOD Record, 29(2), 439–450.
2. Batman, L., Impagliazzo, R., Murray, C., & Paturi, R. (2013). Finding heavy hitters from partial or noisy data. In APPROX-RANDOM, 2013 (pp. 347–362).
3. Beck, L. (1980). A security mechanism for statistical data bases. ACM Transactions of Databases, 5(3), 316–338.
4. Blum, A. (1994). Relevant examples and relevant features: Thoughts from computational learning theory. In AAAI fall symposium on ’relevance’.
5. Blum, A., Coja-Oghlan, A., Frieze, A., & Zhou, S. (2009). Separating populations with wide data: A spectral analysis. Electronic Journal of Statistics, 3, 76–113.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献