tag:blogger.com,1999:blog-5480445263401958688.comments2023-05-24T01:36:32.684-07:00The Big Red Data BlogJohannes Gehrkehttp://www.blogger.com/profile/14176430471778034513noreply@blogger.comBlogger5125tag:blogger.com,1999:blog-5480445263401958688.post-34995745699623775752010-05-26T10:28:04.778-07:002010-05-26T10:28:04.778-07:00Hello Dr. Xiao,
The organization I’m working with...Hello Dr. Xiao,<br /><br />The organization I’m working with (The Common Data Project) is experimenting with using differential privacy to “automate” the release of sensitive data to the public.<br /><br />One hurdle we’ve run up against is that there doesn’t seem to be an agreed upon “magic number” to quantify the “negligable impact” or “almost indiscernible” language in the guarantee?<br /><br />Without such a quantity, we’re concerned that the differential privacy guarantee runs into some of the same problems that plague current definitions? (ie. vagueness which translates into difficult to enforce)<br /><br />We're wondering how other people working with differential privacy have dealt with this issue. Any leads would be greatly appreciated!<br /><br />We’ve documented our quest for the quantifiable guarantee in excruciating detail here: http://bit.ly/bj8gWF<br /><br />Best,<br />Mimi Yin<br />The Common Data Project<br />http://commondataproject.orgMimi Yinhttps://www.blogger.com/profile/04526553235336206940noreply@blogger.comtag:blogger.com,1999:blog-5480445263401958688.post-13013804114653785392009-09-20T14:08:10.870-07:002009-09-20T14:08:10.870-07:00Indeed, that's better: it uses the wørd! :-)Indeed, that's better: it uses the wørd! :-)Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-5480445263401958688.post-35871789600226645742009-09-17T12:18:46.077-07:002009-09-17T12:18:46.077-07:00Alternatively,
Remember, remember, the fifth of No...Alternatively,<br />Remember, remember, the fifth of November<br />The Sigmod submiision (not PODS)<br />I know of no reason<br />why the Sigmod submiision<br />should ever be forgot.Oliver Kennedyhttps://www.blogger.com/profile/02920985162019599674noreply@blogger.comtag:blogger.com,1999:blog-5480445263401958688.post-33787333968547878192009-09-03T00:38:07.402-07:002009-09-03T00:38:07.402-07:00Hi,
I guess it should be available through a web-...Hi,<br /><br />I guess it should be available through a web-page for the workshop, but haven't found it. So, I've made it available <a href="http://www.idi.ntnu.no/~trulsamu/usetim.pdf" rel="nofollow">here</a>.<br /><br />-TrulsTruls A. Bjørklundhttps://www.blogger.com/profile/05507473407579539307noreply@blogger.comtag:blogger.com,1999:blog-5480445263401958688.post-12788167776457843472009-09-02T21:56:06.972-07:002009-09-02T21:56:06.972-07:00Hi Truls,
I there a URL for the paper?
-- C.Hi Truls,<br /><br />I there a URL for the paper?<br /><br />-- C.Anonymousnoreply@blogger.com