{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T05:02:31Z","timestamp":1773378151910,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:00:00Z","timestamp":1656201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:00:00Z","timestamp":1656201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100011102","name":"Seventh Framework Programme","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100011102","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,26]]},"DOI":"10.1109\/isit50566.2022.9834805","type":"proceedings-article","created":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T15:34:22Z","timestamp":1659540862000},"page":"1028-1033","source":"Crossref","is-referenced-by-count":10,"title":["Distributed Matrix-Vector Multiplication with Sparsity and Privacy Guarantees"],"prefix":"10.1109","author":[{"given":"Marvin","family":"Xhemrishi","sequence":"first","affiliation":[{"name":"Technical University of Munich,Institute for Communications Engineering,Munich,Germany"}]},{"given":"Rawad","family":"Bitar","sequence":"additional","affiliation":[{"name":"Technical University of Munich,Institute for Communications Engineering,Munich,Germany"}]},{"given":"Antonia","family":"Wachter-Zeh","sequence":"additional","affiliation":[{"name":"Technical University of Munich,Institute for Communications Engineering,Munich,Germany"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2010.5707092"},{"key":"ref32","author":"cover","year":"2012","journal-title":"Elements of Information Theory"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2017.8262883"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.79"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1571-0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1654059.1654078"},{"key":"ref13","first-page":"5152","article-title":"Coded Sparse Matrix Multiplication","author":"wang","year":"2018","journal-title":"Proceedings of the 35th International Conference on Machine Learning"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT45174.2021.9518059"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8007060"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-020-01887-y"},{"key":"ref17","article-title":"Adaptive Private Distributed Matrix Multiplication","volume":"abs 2101 5681","author":"bitar","year":"2021","journal-title":"CoRR"},{"key":"ref18","article-title":"Rate-Efficiency and Straggler-Robustness through Partition in Distributed Two-Sided Secure Matrix Computation","volume":"abs 1810 13006","author":"kakar","year":"2018","journal-title":"CoRR"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT45174.2021.9517739"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2002.1181950"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018628609742"},{"key":"ref27","article-title":"Lagrange Coded Computing: Optimal Design for Resiliency, Security and Privacy","volume":"abs 1806 939","author":"yu","year":"2018","journal-title":"CoRR"},{"key":"ref3","article-title":"Simple Demographics Often Identify People Uniquely","author":"sweeney","year":"2018"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2877391"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2019.8919966"},{"key":"ref5","volume":"329","author":"seber","year":"2012","journal-title":"Linear Regression Analysis"},{"key":"ref8","article-title":"Random Convolutional Coding for Robust and Straggler Resilient Distributed Matrix Computation","volume":"abs 1907 8064","author":"das","year":"2019","journal-title":"CoRR"},{"key":"ref7","article-title":"Rateless Codes for Near-Perfect Load Balancing in Distributed Matrix-Vector Multiplication","volume":"abs 1804 10331","author":"mallick","year":"2018","journal-title":"CoRR"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2736066"},{"key":"ref9","article-title":"Coded Computing","volume":"17","author":"li","year":"2020","journal-title":"Foundations and Trends? in Communications and Information Theory"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408794"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3105365"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3103822"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISWCS49558.2021.9562193"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2020.2975021"},{"key":"ref23","article-title":"On the Optimal Recovery Threshold of Coded Matrix Multiplication","volume":"abs 1801 10292","author":"dutta","year":"2018","journal-title":"CoRR"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174167"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647313"}],"event":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","location":"Espoo, Finland","start":{"date-parts":[[2022,6,26]]},"end":{"date-parts":[[2022,7,1]]}},"container-title":["2022 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9834325\/9834269\/09834805.pdf?arnumber=9834805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:36:32Z","timestamp":1773347792000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9834805\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,26]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/isit50566.2022.9834805","relation":{},"subject":[],"published":{"date-parts":[[2022,6,26]]}}}