Year |
Citation |
Score |
2016 |
Hay M, Machanavajjhala A, Miklau G, Chen Y, Zhang D, Bissias G. Exploring privacy-accuracy tradeoffs using DPComp Proceedings of the Acm Sigmod International Conference On Management of Data. 26: 2101-2104. DOI: 10.1145/2882903.2899387 |
0.304 |
|
2015 |
Moffitt VZ, Stoyanovich J, Abiteboul S, Miklau G. Collaborative access control in WebdamLog Proceedings of the Acm Sigmod International Conference On Management of Data. 2015: 197-211. DOI: 10.1145/2723372.2749433 |
0.328 |
|
2015 |
Li C, Miklau G. Lower Bounds on the Error of Query Sets Under the Differentially-Private Matrix Mechanism Theory of Computing Systems. 57: 1159-1201. DOI: 10.1007/S00224-015-9610-Z |
0.474 |
|
2014 |
Lu W, Miklau G, Gupta V. Generating private synthetic databases for untrusted system evaluation Proceedings - International Conference On Data Engineering. 652-663. DOI: 10.1109/ICDE.2014.6816689 |
0.407 |
|
2013 |
Li C, Li DY, Miklau G, Suciu D. A theory of pricing private data Acm International Conference Proceeding Series. 33-44. DOI: 10.1145/3139457 |
0.602 |
|
2013 |
Abiteboul S, Antoine E, Miklau G, Stoyanovich J, Testard J. Rule-based application development using webdamlog Proceedings of the Acm Sigmod International Conference On Management of Data. 965-968. DOI: 10.1145/2463676.2465251 |
0.349 |
|
2013 |
Lu W, Miklau G, Immerman N. Auditing a database under retention policies Vldb Journal. 22: 203-228. DOI: 10.1007/s00778-012-0282-x |
0.316 |
|
2012 |
Yang Y, Zhang Z, Miklau G, Winslett M, Xiao X. Differential privacy in data publication and analysis Proceedings of the Acm Sigmod International Conference On Management of Data. 601-605. DOI: 10.1145/2213836.2213910 |
0.349 |
|
2011 |
Gupta V, Miklau G, Polyzotis N. Private database synthesis for outsourced system evaluation Ceur Workshop Proceedings. 749. |
0.373 |
|
2010 |
Li C, Hay M, Rastogi V, Miklau G, McGregor A. Optimizing linear counting queries under differential privacy Proceedings of the Acm Sigact-Sigmod-Sigart Symposium On Principles of Database Systems. 123-134. DOI: 10.1145/1807085.1807104 |
0.412 |
|
2010 |
Hay M, Rastogi V, Miklau G, Suciu D. Boosting the accuracy of differentially private histograms through consistency Proceedings of the Vldb Endowment. 3: 1021-1032. |
0.558 |
|
2009 |
Rastogi V, Miklau G, Hay M, Suciu D. Relationship privacy: Output perturbation for queries with joins Proceedings of the Acm Sigact-Sigmod-Sigart Symposium On Principles of Database Systems. 107-116. DOI: 10.1145/1559795.1559812 |
0.587 |
|
2009 |
Lu W, Miklau G. Auditing a database under retention restrictions Proceedings - International Conference On Data Engineering. 42-53. DOI: 10.1109/ICDE.2009.125 |
0.315 |
|
2008 |
Mostafa H, Lesser V, Miklau G. Self-interested database managers playing the view maintenance game Proceedings of the International Joint Conference On Autonomous Agents and Multiagent Systems, Aamas. 2: 853-860. |
0.341 |
|
2007 |
Stahlberg P, Miklau G, Levine BN. Threats to privacy in the forensic analysis of database systems Proceedings of the Acm Sigmod International Conference On Management of Data. 91-102. DOI: 10.1145/1247480.1247492 |
0.411 |
|
2007 |
Miklau G, Suciu D. A formal analysis of information disclosure in data exchange Journal of Computer and System Sciences. 73: 507-534. DOI: 10.1016/J.Jcss.2006.10.004 |
0.608 |
|
2007 |
Miklau G, Levine B, Stahlberg P. Securing history: Privacy and accountability in database systems Cidr 2007 - 3rd Biennial Conference On Innovative Data Systems Research. 387-396. |
0.33 |
|
2007 |
Mimno D, McCallum A, Miklau G. Probabilistic representations for integrating unreliable data sources Aaai Workshop - Technical Report. 74-79. |
0.332 |
|
2005 |
Dalvi N, Miklau G, Suciu D. Asymptotic conditional probabilities for conjunctive queries Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3363: 289-305. DOI: 10.1007/978-3-540-30570-5_20 |
0.634 |
|
2005 |
Miklau G, Suciu D. Implementing a tamper-evident database system Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3818: 28-48. DOI: 10.1007/11596370_5 |
0.609 |
|
2004 |
Miklau G, Suciu D. Containment and equivalence for a fragment of XPath Journal of the Acm. 51: 2-45. DOI: 10.1145/962446.962448 |
0.602 |
|
2004 |
Green TJ, Gupta A, Miklau G, Onizuka M, Suciu D. Processing XML streams with deterministic automata and stream indexes Acm Transactions On Database Systems. 29: 752-788. DOI: 10.1145/1042046.1042051 |
0.577 |
|
2004 |
Miklau G, Suciu D. Modeling integrity in data exchange Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3178: 41-54. |
0.579 |
|
2003 |
Tatarinov I, Ives Z, Madhavan J, Halevy A, Suciu D, Dalvi N, Dong X, Kadiyska Y, Miklau G, Mork P. The Piazza peer data management project Sigmod Record. 32: 47-52. DOI: 10.1145/945721.945732 |
0.65 |
|
2002 |
Miklau G, Suciu D. Containment and equivalence for an XPath fragment Proceedings of the Acm Sigact-Sigmod-Sigart Symposium On Principles of Database Systems. 65-76. |
0.582 |
|
Show low-probability matches. |