Gerome Miklau, Ph.D. - Publications

Affiliations: 
2005 University of Washington, Seattle, Seattle, WA 
Area:
Computer Science

25 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2016 Hay M, Machanavajjhala A, Miklau G, Chen Y, Zhang D, Bissias G. Exploring privacy-accuracy tradeoffs using DPComp Proceedings of the Acm Sigmod International Conference On Management of Data. 26: 2101-2104. DOI: 10.1145/2882903.2899387  0.304
2015 Moffitt VZ, Stoyanovich J, Abiteboul S, Miklau G. Collaborative access control in WebdamLog Proceedings of the Acm Sigmod International Conference On Management of Data. 2015: 197-211. DOI: 10.1145/2723372.2749433  0.328
2015 Li C, Miklau G. Lower Bounds on the Error of Query Sets Under the Differentially-Private Matrix Mechanism Theory of Computing Systems. 57: 1159-1201. DOI: 10.1007/S00224-015-9610-Z  0.474
2014 Lu W, Miklau G, Gupta V. Generating private synthetic databases for untrusted system evaluation Proceedings - International Conference On Data Engineering. 652-663. DOI: 10.1109/ICDE.2014.6816689  0.407
2013 Li C, Li DY, Miklau G, Suciu D. A theory of pricing private data Acm International Conference Proceeding Series. 33-44. DOI: 10.1145/3139457  0.602
2013 Abiteboul S, Antoine E, Miklau G, Stoyanovich J, Testard J. Rule-based application development using webdamlog Proceedings of the Acm Sigmod International Conference On Management of Data. 965-968. DOI: 10.1145/2463676.2465251  0.349
2013 Lu W, Miklau G, Immerman N. Auditing a database under retention policies Vldb Journal. 22: 203-228. DOI: 10.1007/s00778-012-0282-x  0.316
2012 Yang Y, Zhang Z, Miklau G, Winslett M, Xiao X. Differential privacy in data publication and analysis Proceedings of the Acm Sigmod International Conference On Management of Data. 601-605. DOI: 10.1145/2213836.2213910  0.349
2011 Gupta V, Miklau G, Polyzotis N. Private database synthesis for outsourced system evaluation Ceur Workshop Proceedings. 749.  0.373
2010 Li C, Hay M, Rastogi V, Miklau G, McGregor A. Optimizing linear counting queries under differential privacy Proceedings of the Acm Sigact-Sigmod-Sigart Symposium On Principles of Database Systems. 123-134. DOI: 10.1145/1807085.1807104  0.412
2010 Hay M, Rastogi V, Miklau G, Suciu D. Boosting the accuracy of differentially private histograms through consistency Proceedings of the Vldb Endowment. 3: 1021-1032.  0.558
2009 Rastogi V, Miklau G, Hay M, Suciu D. Relationship privacy: Output perturbation for queries with joins Proceedings of the Acm Sigact-Sigmod-Sigart Symposium On Principles of Database Systems. 107-116. DOI: 10.1145/1559795.1559812  0.587
2009 Lu W, Miklau G. Auditing a database under retention restrictions Proceedings - International Conference On Data Engineering. 42-53. DOI: 10.1109/ICDE.2009.125  0.315
2008 Mostafa H, Lesser V, Miklau G. Self-interested database managers playing the view maintenance game Proceedings of the International Joint Conference On Autonomous Agents and Multiagent Systems, Aamas. 2: 853-860.  0.341
2007 Stahlberg P, Miklau G, Levine BN. Threats to privacy in the forensic analysis of database systems Proceedings of the Acm Sigmod International Conference On Management of Data. 91-102. DOI: 10.1145/1247480.1247492  0.411
2007 Miklau G, Suciu D. A formal analysis of information disclosure in data exchange Journal of Computer and System Sciences. 73: 507-534. DOI: 10.1016/J.Jcss.2006.10.004  0.608
2007 Miklau G, Levine B, Stahlberg P. Securing history: Privacy and accountability in database systems Cidr 2007 - 3rd Biennial Conference On Innovative Data Systems Research. 387-396.  0.33
2007 Mimno D, McCallum A, Miklau G. Probabilistic representations for integrating unreliable data sources Aaai Workshop - Technical Report. 74-79.  0.332
2005 Dalvi N, Miklau G, Suciu D. Asymptotic conditional probabilities for conjunctive queries Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3363: 289-305. DOI: 10.1007/978-3-540-30570-5_20  0.634
2005 Miklau G, Suciu D. Implementing a tamper-evident database system Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3818: 28-48. DOI: 10.1007/11596370_5  0.609
2004 Miklau G, Suciu D. Containment and equivalence for a fragment of XPath Journal of the Acm. 51: 2-45. DOI: 10.1145/962446.962448  0.602
2004 Green TJ, Gupta A, Miklau G, Onizuka M, Suciu D. Processing XML streams with deterministic automata and stream indexes Acm Transactions On Database Systems. 29: 752-788. DOI: 10.1145/1042046.1042051  0.577
2004 Miklau G, Suciu D. Modeling integrity in data exchange Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3178: 41-54.  0.579
2003 Tatarinov I, Ives Z, Madhavan J, Halevy A, Suciu D, Dalvi N, Dong X, Kadiyska Y, Miklau G, Mork P. The Piazza peer data management project Sigmod Record. 32: 47-52. DOI: 10.1145/945721.945732  0.65
2002 Miklau G, Suciu D. Containment and equivalence for an XPath fragment Proceedings of the Acm Sigact-Sigmod-Sigart Symposium On Principles of Database Systems. 65-76.  0.582
Show low-probability matches.