{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:11:32Z","timestamp":1763968292940,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,27]],"date-time":"2018-05-27T00:00:00Z","timestamp":1527379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1253327,1408982,1409125,1443014,1421325,1409143"],"award-info":[{"award-number":["1253327,1408982,1409125,1443014,1421325,1409143"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["N66001-15-C-4067"],"award-info":[{"award-number":["N66001-15-C-4067"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,27]]},"DOI":"10.1145\/3183713.3196921","type":"proceedings-article","created":{"date-parts":[[2018,5,25]],"date-time":"2018-05-25T12:39:28Z","timestamp":1527251968000},"page":"115-130","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["EKTELO"],"prefix":"10.1145","author":[{"given":"Dan","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]},{"given":"Ryan","family":"McKenna","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]},{"given":"Ios","family":"Kotsogiannis","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Michael","family":"Hay","sequence":"additional","affiliation":[{"name":"Colgate University, Hamilton, NY, USA"}]},{"given":"Ashwin","family":"Machanavajjhala","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Gerome","family":"Miklau","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,5,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2010. https:\/\/onthemap.ces.census.gov\/. (2010).  2010. https:\/\/onthemap.ces.census.gov\/. (2010)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.80"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1265530.1265569"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978371"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020598"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.16"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Hamid Ebadi and David Sands. 2017. Featherweight PINQ. JPC 7 2 (2017).  Hamid Ebadi and David Sands. 2017. Featherweight PINQ. JPC 7 2 (2017).","DOI":"10.29012\/jpc.v7i2.653"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1137\/10079687X"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2429069.2429113"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3035940"},{"key":"e_1_3_2_1_14_1","unstructured":"Moritz Hardt Katrina Ligett and Frank McSherry. 2012. A Simple and Practical Algorithm for Differentially Private Data Release. In NIPS.   Moritz Hardt Katrina Ligett and Frank McSherry. 2012. A Simple and Practical Algorithm for Differentially Private Data Release. In NIPS."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882931"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920970"},{"key":"e_1_3_2_1_17_1","volume-title":"Differentially Private Histograms for Range-Sum Queries: A Modular Approach. arXiv","author":"Kellaris Georgios","year":"2015","unstructured":"Georgios Kellaris , Stavros Papadopoulos , and Dimitris Papadias . 2015. Differentially Private Histograms for Range-Sum Queries: A Modular Approach. arXiv ( 2015 ). Georgios Kellaris, Stavros Papadopoulos, and Dimitris Papadias. 2015. Differentially Private Histograms for Range-Sum Queries: A Modular Approach. arXiv (2015)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3035945"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783366"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732269.2732271"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807085.1807104"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.14778\/2168651.2168653"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-015-0398-x"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382264"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342549.2342553"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732296.2732300"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544872"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14778\/2556549.2556576"},{"key":"e_1_3_2_1_30_1","volume-title":"Airavat: Security and Privacy for MapReduce. In NSDI.","author":"Roy Indrajit","year":"2010","unstructured":"Indrajit Roy , Srinath T. V. Setty , Ann Kilzer , Vitaly Shmatikov , and Emmett Witchel . 2010 . Airavat: Security and Privacy for MapReduce. In NSDI. Indrajit Roy, Srinath T. V. Setty, Ann Kilzer, Vitaly Shmatikov, and Emmett Witchel. 2010. Airavat: Security and Privacy for MapReduce. In NSDI."},{"key":"e_1_3_2_1_31_1","volume-title":"Probabilistic Inference and Differential Privacy. NIPS","author":"Williams Oliver","year":"2010","unstructured":"Oliver Williams and Frank McSherry . 2010. Probabilistic Inference and Differential Privacy. NIPS ( 2010 ), 2451--2459. Oliver Williams and Frank McSherry. 2010. Probabilistic Inference and Differential Privacy. NIPS (2010), 2451--2459."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Xiaokui Xiao Guozhang Wang and Johannes Gehrke. 2010. Differential privacy via wavelet transforms. In ICDE. 225--236.  Xiaokui Xiao Guozhang Wang and Johannes Gehrke. 2010. Differential privacy via wavelet transforms. In ICDE. 225--236.","DOI":"10.1109\/ICDE.2010.5447831"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.12.020"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3009837.3009884"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134428"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882928"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Xiaojian Zhang Rui Chen Jianliang Xu Xiaofeng Meng and Yingtao Xie. 2014. Towards Accurate Histogram Publication under Differential Privacy. In SDM.  Xiaojian Zhang Rui Chen Jianliang Xu Xiaofeng Meng and Yingtao Xie. 2014. Towards Accurate Histogram Publication under Differential Privacy. In SDM.","DOI":"10.1137\/1.9781611973440.68"}],"event":{"name":"SIGMOD\/PODS '18: International Conference on Management of Data","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"],"location":"Houston TX USA","acronym":"SIGMOD\/PODS '18"},"container-title":["Proceedings of the 2018 International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3183713.3196921","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3183713.3196921","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3183713.3196921","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:28Z","timestamp":1750208908000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3183713.3196921"}},"subtitle":["A Framework for Defining Differentially-Private Computations"],"short-title":[],"issued":{"date-parts":[[2018,5,27]]},"references-count":37,"alternative-id":["10.1145\/3183713.3196921","10.1145\/3183713"],"URL":"https:\/\/doi.org\/10.1145\/3183713.3196921","relation":{},"subject":[],"published":{"date-parts":[[2018,5,27]]},"assertion":[{"value":"2018-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}