46,969 Works

Decentralized differentially private algorithms for matrix and tensor factorization

Hafiz Imtiaz
Many applications of machine learning, such as human health research, involve processing private or sensitive information. Privacy concerns may impose significant hurdles to collaboration in scenarios where there are multiple sites holding data and the goal is to estimate properties jointly across all datasets. Conventional differentially private decentralized algorithms can provide strong privacy guarantees. However, the utility/accuracy of the joint estimates may be poor when the datasets at each site are small. In this work,...

Liber R-3

No Name Supplied
This volume contains approved New Jersey Bureau of Tidelands grants listed from Conveyance Maps indexes.

Liber Q-3

No Name Supplied
This volume contains approved New Jersey Bureau of Tidelands grants listed from Conveyance Maps indexes.

Liber P-3b

No Name Supplied
This volume contains approved New Jersey Bureau of Tidelands grants listed from Conveyance Maps indexes.

Liber P-3a

No Name Supplied
This volume contains approved New Jersey Bureau of Tidelands grants listed from Conveyance Maps indexes.

Liber P-3

No Name Supplied
This volume contains approved New Jersey Bureau of Tidelands grants listed from Conveyance Maps indexes.

Liber O-3

No Name Supplied
This volume contains approved New Jersey Bureau of Tidelands grants listed from Conveyance Maps indexes.

Liber N-3a

No Name Supplied
This volume contains approved New Jersey Bureau of Tidelands grants listed from Conveyance Maps indexes.

Securing safety-critical systems using physical and control invariants

Sriharsha Etigowni
The critical infrastructures such as electrical power systems, telecommunication, transportation systems, and safety systems in vehicles and avionics comprise some critical safety systems. Safety critical systems use real-time control, including the software used in the design of physical systems and structures, whose failure can have a life-threatening impact. Failure or malfunctioning of such systems will lead to damage to the equipment/property, cause serious injuries or death to people. Since the safety-critical systems use embedded systems...

Liber N-3

No Name Supplied
This volume contains approved New Jersey Bureau of Tidelands grants listed from Conveyance Maps indexes.

Liber M-3

No Name Supplied
This volume contains approved New Jersey Bureau of Tidelands grants listed from Conveyance Maps indexes.

Liber L-3

No Name Supplied
This volume contains approved New Jersey Bureau of Tidelands grants listed from Conveyance Maps indexes.

Liber K-3a

No Name Supplied
This volume contains approved New Jersey Bureau of Tidelands grants listed from Conveyance Maps indexes.

Liber K-3

No Name Supplied
This volume contains approved New Jersey Bureau of Tidelands grants listed from Conveyance Maps indexes.

Liber J-3

No Name Supplied
This volume contains approved New Jersey Bureau of Tidelands grants listed from Conveyance Maps indexes.

Liber I-3a

No Name Supplied
This volume contains approved New Jersey Bureau of Tidelands grants listed from Conveyance Maps indexes.

Liber I-3

No Name Supplied
This volume contains approved New Jersey Bureau of Tidelands grants listed from Conveyance Maps indexes.

Codes for private distributed computation with applications to machine learning

Rawad Bitar
We consider the problem of private distributed computation. Our main interest in this problem stems from machine learning applications. A master node (referred to as master) possesses a tremendous amount of {em confidential} data (e.g., personal, genomic or medical data) and wants to perform intensive computations on it. The master divides these computations into smaller computational tasks and distribute them to {em untrusted} workers that perform these tasks in parallel. The workers return their results...

Liber H-3

No Name Supplied
This volume contains approved New Jersey Bureau of Tidelands grants listed from Conveyance Maps indexes.

Liber G-3

No Name Supplied
This volume contains approved New Jersey Bureau of Tidelands grants listed from Conveyance Maps indexes.

Liber F-3a

No Name Supplied
This volume contains approved New Jersey Bureau of Tidelands grants listed from Conveyance Maps indexes.

Liber F-3

No Name Supplied
This volume contains approved New Jersey Bureau of Tidelands grants listed from Conveyance Maps indexes.

Scalable algorithm and workload execution for geo locating satellite imagery

Aymen Al-Saadi
Climate change is having an impact on the polar regions, causing the retreat of sea ice and mountain glaciers as well as mass loss from the Greenland and Antarctic ice sheets. A better and deeper understanding of these changes requires processing large volumes of imagery data. Efficient analysis of these increasingly large volumes of data requires scalable computing, advanced and efficiently implemented algorithms and petabytes of dedicated storage on high-performance computing (HPC) platforms.Image geolocation is...

Liber E-3

No Name Supplied
This volume contains approved New Jersey Bureau of Tidelands grants listed from Conveyance Maps indexes.

Liber D-3

No Name Supplied
This volume contains approved New Jersey Bureau of Tidelands grants listed from Conveyance Maps indexes.

Registration Year

  • 2013
    1,107
  • 2014
    18,877
  • 2015
    10,343
  • 2016
    2,180
  • 2017
    4,865
  • 2018
    3,871
  • 2019
    4,711
  • 2020
    1,015

Resource Types

  • Text
    27,519
  • Image
    16,784
  • Collection
    1,252
  • Film
    761
  • Sound
    423
  • Audiovisual
    118
  • Dataset
    74
  • PhysicalObject
    33
  • Software
    4