Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Auditing and Forensic Analysis., and . Encyclopedia of Database Systems, Springer US, (2009)Architecting a Differentially Private SQL Engine., , , , and . CIDR, www.cidrdb.org, (2019)Pricing Aggregate Queries in a Data Marketplace., and . WebDB, page 19-24. (2012)ϵKTELO: A Framework for Defining Differentially Private Computations., , , , , , and . ACM Trans. Database Syst., 45 (1): 2:1-2:44 (2020)Scalable Probabilistic Databases with Factor Graphs and MCMC., , and . Proc. VLDB Endow., 3 (1): 794-804 (2010)MithraRanking: A System for Responsible Ranking Design., , , , , , and . SIGMOD Conference, page 1913-1916. ACM, (2019)Private Database Synthesis for Outsourced System Evaluation., , and . AMW, volume 749 of CEUR Workshop Proceedings, CEUR-WS.org, (2011)Joint Selection: Adaptively Incorporating Public Information for Private Synthetic Data., , , , and . AISTATS, volume 238 of Proceedings of Machine Learning Research, page 2404-2412. PMLR, (2024)Cryptographically Enforced Conditional Access for XML., and . WebDB, page 101-106. (2002)A Data- and Workload-Aware Query Answering Algorithm for Range Queries Under Differential Privacy., , , and . Proc. VLDB Endow., 7 (5): 341-352 (2014)