En poursuivant votre navigation sur ce site, vous acceptez l'utilisation d'un simple cookie d'identification. Aucune autre exploitation n'est faite de ce cookie. OK

Documents 68-02 3 results

Filter
Select: All / None
Q
Déposez votre fichier ici pour le déplacer vers cet enregistrement.
y

Böhm trees and Taylor expansion - Manzonetto, Giulio (Author of the conference) | CIRM H

Multi angle

We revise the classical theory of program approximation based on Scott-continuity and Böhm trees. We then present the more recent theory proposed by Ehrhard&Regnier, based on Taylor expansion. We first introduce the resource calculus and its properties, and then the Taylor expansion associating each term with a power series of resource terms. Finally, we show how to apply this technique to prove results in lambda calculus in an easier way.

68-02 ; 68N15 ; 68Q55

Bookmarks Report an error
Déposez votre fichier ici pour le déplacer vers cet enregistrement.
y

Taylor expansion, at work - Manzonetto, Giulio (Author of the conference) | CIRM H

Multi angle

In this talk we define the resource calculus as a target of the Taylor development. Connections with the classical theory of program approximation based on Böhm trees are presented, and simple examples of application are given.

68-02 ; 68N15 ; 68Q55

Bookmarks Report an error
Déposez votre fichier ici pour le déplacer vers cet enregistrement.
y

Privacy in machine learning - Cummings, Rachel (Author of the conference) | CIRM H

Multi angle

Privacy concerns are becoming a major obstacle to using data in the way that we want. It's often unclear how current regulations should translate into technology, and the changing legal landscape surrounding privacy can cause valuable data to go unused. How can data scientists make use of potentially sensitive data, while providing rigorous privacy guarantees to the individuals who provided data? A growing literature on differential privacy has emerged in the last decade to address some of these concerns. Differential privacy is a parameterized notion of database privacy that gives a mathematically rigorous worst-case bound on the maximum amount of information that can be learned about any one individual's data from the output of a computation. Differential privacy ensures that if a single entry in the database were to be changed, then the algorithm would still have approximately the same distribution over outputs. In this talk, we will see the definition and properties of differential privacy; survey a theoretical toolbox of differentially private algorithms that come with a strong accuracy guarantee; and discuss recent applications of differential privacy in major technology companies and government organizations.[-]
Privacy concerns are becoming a major obstacle to using data in the way that we want. It's often unclear how current regulations should translate into technology, and the changing legal landscape surrounding privacy can cause valuable data to go unused. How can data scientists make use of potentially sensitive data, while providing rigorous privacy guarantees to the individuals who provided data? A growing literature on differential privacy has ...[+]

68W40 ; 68-02 ; 62-02 ; 90-02

Bookmarks Report an error