Sharing graphs using differentially private graph models
… be shared, generally in the form of social or Internet graphs, … to improve privacy on graphs
only target specific attacks, and … Our work seeks a solution to share meaningful graph datasets …
only target specific attacks, and … Our work seeks a solution to share meaningful graph datasets …
A general theory of sharing graphs
S Guerrini - Theoretical Computer Science, 1999 - Elsevier
… , the unique proper unshared graph that the unfolding partial order … sharing graph and the
reductions of its least-shared-instance, we prove that the read-back of a proper sharing graph …
reductions of its least-shared-instance, we prove that the read-back of a proper sharing graph …
[BOOK][B] Models of Sharing Graphs: A Categorical Semantics of let and letrec
M Hasegawa - 2012 - books.google.com
… We develop the models of sharing graphs, also known as term graphs, in terms … sharing,
we consider four situations of sharing graphs. The simplest is first-order acyclic sharing graphs …
we consider four situations of sharing graphs. The simplest is first-order acyclic sharing graphs …
Graph decompositions and secret sharing schemes
… a study of secret sharing schemes for.access structures based on graphs. Given a graph G,
we … how much information in being distributed as shares compared with the size of the secret …
we … how much information in being distributed as shares compared with the size of the secret …
[HTML][HTML] Secret-sharing schemes for very dense graphs
… graph “hard” for secret-sharing schemes (that is, they require large shares), we study very
dense graphs, that is, graphs … We show that if a graph with \(n\) vertices contains \(\left( {\begin{…
dense graphs, that is, graphs … We show that if a graph with \(n\) vertices contains \(\left( {\begin{…
Secret sharing schemes on graphs
L Csirmaz - Studia Scientiarum Mathematicarum Hungarica, 2007 - akjournals.com
… perfect secret sharing scheme is, then connect it to certain submodular function. Let G be a
graph, … A covering of the graph G is a collection of subgraphs of G such that every edge of G is …
graph, … A covering of the graph G is a collection of subgraphs of G such that every edge of G is …
[PDF][PDF] Discovering shared interests using graph analysis
MF Schwartz, DCM Wood - Communications of the ACM, 1993 - dl.acm.org
… In this section we present the series of steps we performed to reduce the graph to a core
subset for which shared interests could be effectively deduced. These transformations will be …
subset for which shared interests could be effectively deduced. These transformations will be …
Federated learning on non-iid graphs via structural knowledge sharing
… methods to capture commonly shared knowledge and learn a generalized encoder. From
real-world graph datasets, we observe that some structural properties are shared by various …
real-world graph datasets, we observe that some structural properties are shared by various …
Descent graphs in pedigree analysis: applications to haplotyping, location scores, and marker-sharing statistics.
… The current paper follows up on a suggestion by Elizabeth Thompson that genetic descent
graphs offer a more appropriate space for executing a Markov chain. A descent graph …
graphs offer a more appropriate space for executing a Markov chain. A descent graph …
The share size of secret-sharing schemes for almost all access structures and graphs
… , we improve the total share size for all very dense graphs. … graph there is a scheme with
normalized maximum share size \… all graphs a secret-sharing scheme with maximum share size \(…
normalized maximum share size \… all graphs a secret-sharing scheme with maximum share size \(…