Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Power of Linear Reconstruction Attacks, , and . CoRR, (2012)Contextual Online False Discovery Rate Control., and . AISTATS, volume 108 of Proceedings of Machine Learning Research, page 952-961. PMLR, (2020)Novel document detection for massive data streams using distributed dictionary learning., , , and . IBM J. Res. Dev., 57 (3/4): 9 (2013)Private Incremental Regression., , and . PODS, page 167-182. ACM, (2017)Bandwidth provisioning in infrastructure-based wireless networks employing directional antennas., , , and . Pervasive Mob. Comput., 7 (1): 114-127 (2011)The Rigidity Transition in Random Graphs., , and . SODA, page 1237-1252. SIAM, (2011)Balancing utility and scalability in metric differential privacy., , , , and . UAI, volume 180 of Proceedings of Machine Learning Research, page 885-894. PMLR, (2022)Online L1-Dictionary Learning with Application to Novel Document Detection., , , and . NIPS, page 2267-2275. (2012)Exact Max 2-Sat: Easier and Faster., and . SOFSEM (1), volume 4362 of Lecture Notes in Computer Science, page 272-283. Springer, (2007)Combinatorics of TCP reordering., , and . J. Comb. Optim., 12 (1-2): 57-70 (2006)