Sharing graphs using differentially private graph models

A Sala, X Zhao, C Wilson, H Zheng… - Proceedings of the 2011 …, 2011 - dl.acm.org
… be shared, generally in the form of social or Internet graphs, … to improve privacy on graphs
only target specific attacks, and … Our work seeks a solution to share meaningful graph datasets …

A general theory of sharing graphs

S Guerrini - Theoretical Computer Science, 1999 - Elsevier
… , the unique proper unshared graph that the unfolding partial order … sharing graph and the
reductions of its least-shared-instance, we prove that the read-back of a proper sharing graph

[BOOK][B] Models of Sharing Graphs: A Categorical Semantics of let and letrec

M Hasegawa - 2012 - books.google.com
… We develop the models of sharing graphs, also known as term graphs, in terms … sharing,
we consider four situations of sharing graphs. The simplest is first-order acyclic sharing graphs

Graph decompositions and secret sharing schemes

C Blundo, A De Santis, DR Stinson, U Vaccaro - Journal of cryptology, 1995 - Springer
… a study of secret sharing schemes for.access structures based on graphs. Given a graph G,
we … how much information in being distributed as shares compared with the size of the secret …

[HTML][HTML] Secret-sharing schemes for very dense graphs

A Beimel, O Farràs, Y Mintz - Journal of Cryptology, 2016 - Springer
graph “hard” for secret-sharing schemes (that is, they require large shares), we study very
dense graphs, that is, graphs … We show that if a graph with \(n\) vertices contains \(\left( {\begin{…

Secret sharing schemes on graphs

L Csirmaz - Studia Scientiarum Mathematicarum Hungarica, 2007 - akjournals.com
… perfect secret sharing scheme is, then connect it to certain submodular function. Let G be a
graph, … A covering of the graph G is a collection of subgraphs of G such that every edge of G is …

[PDF][PDF] Discovering shared interests using graph analysis

MF Schwartz, DCM Wood - Communications of the ACM, 1993 - dl.acm.org
… In this section we present the series of steps we performed to reduce the graph to a core
subset for which shared interests could be effectively deduced. These transformations will be …

Federated learning on non-iid graphs via structural knowledge sharing

Y Tan, Y Liu, G Long, J Jiang, Q Lu… - Proceedings of the AAAI …, 2023 - ojs.aaai.org
… methods to capture commonly shared knowledge and learn a generalized encoder. From
real-world graph datasets, we observe that some structural properties are shared by various …

Descent graphs in pedigree analysis: applications to haplotyping, location scores, and marker-sharing statistics.

E Sobel, K Lange - American journal of human genetics, 1996 - ncbi.nlm.nih.gov
… The current paper follows up on a suggestion by Elizabeth Thompson that genetic descent
graphs offer a more appropriate space for executing a Markov chain. A descent graph

The share size of secret-sharing schemes for almost all access structures and graphs

A Beimel, O Farràs - Theory of Cryptography Conference, 2020 - Springer
… , we improve the total share size for all very dense graphs. … graph there is a scheme with
normalized maximum share size \… all graphs a secret-sharing scheme with maximum share size \(…