8,570 research outputs found
PriPeARL: A Framework for Privacy-Preserving Analytics and Reporting at LinkedIn
Preserving privacy of users is a key requirement of web-scale analytics and
reporting applications, and has witnessed a renewed focus in light of recent
data breaches and new regulations such as GDPR. We focus on the problem of
computing robust, reliable analytics in a privacy-preserving manner, while
satisfying product requirements. We present PriPeARL, a framework for
privacy-preserving analytics and reporting, inspired by differential privacy.
We describe the overall design and architecture, and the key modeling
components, focusing on the unique challenges associated with privacy,
coverage, utility, and consistency. We perform an experimental study in the
context of ads analytics and reporting at LinkedIn, thereby demonstrating the
tradeoffs between privacy and utility needs, and the applicability of
privacy-preserving mechanisms to real-world data. We also highlight the lessons
learned from the production deployment of our system at LinkedIn.Comment: Conference information: ACM International Conference on Information
and Knowledge Management (CIKM 2018
Solution of partial differential equations on vector and parallel computers
The present status of numerical methods for partial differential equations on vector and parallel computers was reviewed. The relevant aspects of these computers are discussed and a brief review of their development is included, with particular attention paid to those characteristics that influence algorithm selection. Both direct and iterative methods are given for elliptic equations as well as explicit and implicit methods for initial boundary value problems. The intent is to point out attractive methods as well as areas where this class of computer architecture cannot be fully utilized because of either hardware restrictions or the lack of adequate algorithms. Application areas utilizing these computers are briefly discussed
A bibliography on parallel and vector numerical algorithms
This is a bibliography of numerical methods. It also includes a number of other references on machine architecture, programming language, and other topics of interest to scientific computing. Certain conference proceedings and anthologies which have been published in book form are listed also
Maximally Entangled Mixed-State Generation via Local Operations
We present a general theoretical method to generate maximally entangled mixed
states of a pair of photons initially prepared in the singlet polarization
state. This method requires only local operations upon a single photon of the
pair and exploits spatial degrees of freedom to induce decoherence. We report
also experimental confirmation of these theoretical results.Comment: 5 pages, 2 figures, to be published in Physical Review
The light CP-even MSSM Higgs mass resummed to fourth logarithmic order
We present the calculation of the light neutral CP-even Higgs mass in the
MSSM for a heavy SUSY spectrum by resumming enhanced terms through fourth
logarithmic order (NLL), keeping terms of leading order in the top Yukawa
coupling , and NNLO in the strong coupling . To this goal,
the three-loop matching coefficient for the quartic Higgs coupling of the SM to
the MSSM is derived to order by comparing the
perturbative EFT to the fixed-order expression for the Higgs mass. The new
matching coefficient is made available through an updated version of the
program Himalaya. Numerical effects of the higher-order resummation are studied
using specific examples, and sources of theoretical uncertainty on this result
are discussed.Comment: 26 pages, 3 figures, matches version published in EPJ
Detailed Diagnosis of Performance Anomalies in Sensornets
We address the problem of analysing performance anomalies in sensor networks. In this paper, we propose an approach that uses the local flash storage of the motes for logging system data, in combination with online statistical analysis. Our results show not only that this is a feasible method but that the overhead is significantly lower than that of communication-centric methods, and that interesting patterns can be revealed when calculating the correlation of large data sets of separate event types.GINSENGCONE
BurstProbe: Debugging Time-Critical Data Delivery in Wireless Sensor Networks
In this paper we present BurstProbe, a new technique to accurately measure link burstiness in a wireless sensor network employed for time-critical data delivery. Measurement relies on shared probing slots that are embedded in the transmission schedule and used by nodes to assess link burstiness over time. The acquired link burstiness information can be stored in the node's flash memory and relied upon to diagnose transmission problems when missed deadlines occur. Thus, accurate diagnosis is achieved in a distributed manner and without the overhead of transmitting rich measurement data to a central collection point. For the purpose of evaluation we have implemented BurstProbe in the GinMAC WSN protocol and we are able to demonstrate it is an accurate tool to debug time-critical data delivery. In addition, we analyze the cost of implementingBurstProbe and investigate its effectiveness
- …