{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:08:07Z","timestamp":1771330087532,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T00:00:00Z","timestamp":1698019200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-2104292"],"award-info":[{"award-number":["CNS-2104292"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,23]]},"DOI":"10.1145\/3600006.3613174","type":"proceedings-article","created":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T14:44:17Z","timestamp":1696344257000},"page":"579-594","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Turbo: Effective Caching in Differentially-Private Databases"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-2148-9767","authenticated-orcid":false,"given":"Kelly","family":"Kostopoulou","sequence":"first","affiliation":[{"name":"Columbia University, New York City, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2815-5357","authenticated-orcid":false,"given":"Pierre","family":"Tholoniat","sequence":"additional","affiliation":[{"name":"Columbia University, New York City, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4046-2022","authenticated-orcid":false,"given":"Asaf","family":"Cidon","sequence":"additional","affiliation":[{"name":"Columbia University, New York City, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5209-9206","authenticated-orcid":false,"given":"Roxana","family":"Geambasu","sequence":"additional","affiliation":[{"name":"Columbia University, New York City, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9828-1688","authenticated-orcid":false,"given":"Mathias","family":"L\u00e9cuyer","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, Canada"}]}],"member":"320","published-online":{"date-parts":[[2023,10,23]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Citibike tableau story. https:\/\/public.tableau.com\/app\/profile\/james.jeffrey\/viz\/CitiBikeRideAnalyzer\/CitiBikeRdeAnalyzer. Accessed: 2023-04-13.  Citibike tableau story. https:\/\/public.tableau.com\/app\/profile\/james.jeffrey\/viz\/CitiBikeRideAnalyzer\/CitiBikeRdeAnalyzer. Accessed: 2023-04-13."},{"key":"e_1_3_2_2_2_1","unstructured":"Tableau. https:\/\/public.tableau.com\/app\/discover. Accessed: 2023-04-13.  Tableau. https:\/\/public.tableau.com\/app\/discover. Accessed: 2023-04-13."},{"key":"e_1_3_2_2_3_1","volume-title":"https:\/\/www.citibikenyc.com\/system-data","author":"Citibike","year":"2018","unstructured":"Citibike system data. https:\/\/www.citibikenyc.com\/system-data , 2018 . Citibike system data. https:\/\/www.citibikenyc.com\/system-data, 2018."},{"key":"e_1_3_2_2_4_1","volume-title":"Apr.","year":"2023","unstructured":"NOT-OD-17-110 : Request for Comments: Proposal to Update Data Management of Genomic Summary Results Under the NIH Genomic Data Sharing Policy , Apr. 2023 . [Online; accessed 17. Apr. 2023]. NOT-OD-17-110: Request for Comments: Proposal to Update Data Management of Genomic Summary Results Under the NIH Genomic Data Sharing Policy, Apr. 2023. [Online; accessed 17. Apr. 2023]."},{"key":"e_1_3_2_2_5_1","series-title":"Special Issue 2","volume-title":"The 2020 census disclosure avoidance system topdown algorithm. Harvard Data Science Review,","author":"Abowd J. M.","year":"2022","unstructured":"J. M. Abowd , R. Ashmead , R. Cumings-Menon , S. Garfinkel , M. Heineck , C. Heiss , R. Johns , D. Kifer , P. Leclerc , A. Machanavajjhala , The 2020 census disclosure avoidance system topdown algorithm. Harvard Data Science Review, ( Special Issue 2 ) , 2022 . J. M. Abowd, R. Ashmead, R. Cumings-Menon, S. Garfinkel, M. Heineck, C. Heiss, R. Johns, D. Kifer, P. Leclerc, A. Machanavajjhala, et al. The 2020 census disclosure avoidance system topdown algorithm. Harvard Data Science Review, (Special Issue 2), 2022."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465355"},{"key":"e_1_3_2_2_7_1","volume-title":"Jan.","author":"Amin K.","year":"2022","unstructured":"K. Amin , J. Gillenwater , M. Joseph , A. Kulesza , and S. Vassilvitskii . Plume: Differential Privacy at Scale. arXiv , Jan. 2022 . K. Amin, J. Gillenwater, M. Joseph, A. Kulesza, and S. Vassilvitskii. Plume: Differential Privacy at Scale. arXiv, Jan. 2022."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254756.2254766"},{"key":"e_1_3_2_2_9_1","series-title":"Proceedings of Machine Learning Research","first-page":"457","volume-title":"Proceedings of the 38th International Conference on Machine Learning, ICML","author":"Ayd\u00f6re S.","year":"2021","unstructured":"S. Ayd\u00f6re , W. Brown , M. Kearns , K. Kenthapadi , L. Melis , A. Roth , and A. A. Siva . Differentially private query release through adaptive projection . In M. Meila and T. Zhang, editors, Proceedings of the 38th International Conference on Machine Learning, ICML 2021 , 18--24 July 2021, Virtual Event, volume 139 of Proceedings of Machine Learning Research , pages 457 -- 467 . PMLR , 2021. S. Ayd\u00f6re, W. Brown, M. Kearns, K. Kenthapadi, L. Melis, A. Roth, and A. A. Siva. Differentially private query release through adaptive projection. In M. Meila and T. Zhang, editors, Proceedings of the 38th International Conference on Machine Learning, ICML 2021, 18--24 July 2021, Virtual Event, volume 139 of Proceedings of Machine Learning Research, pages 457--467. PMLR, 2021."},{"key":"e_1_3_2_2_10_1","volume-title":"Sept.","author":"Bavadekar S.","year":"2020","unstructured":"S. Bavadekar , A. Dai , J. Davis , D. Desfontaines , I. Eckstein , K. Everett , A. Fabrikant , G. Flores , E. Gabrilovich , K. Gadepalli , S. Glass , R. Huang , C. Kamath , D. Kraft , A. Kumok , H. Marfatia , Y. Mayer , B. Miller , A. Pearce , I. M. Perera , V. Ramachandran , K. Raman , T. Roessler , I. Shafran , T. Shekel , C. Stanton , J. Stimes , M. Sun , G. Wellenius , and M. Zoghi . Google COVID-19 Search Trends Symptoms Dataset: Anonymization Process Description (version 1.0). arXiv , Sept. 2020 . S. Bavadekar, A. Dai, J. Davis, D. Desfontaines, I. Eckstein, K. Everett, A. Fabrikant, G. Flores, E. Gabrilovich, K. Gadepalli, S. Glass, R. Huang, C. Kamath, D. Kraft, A. Kumok, H. Marfatia, Y. Mayer, B. Miller, A. Pearce, I. M. Perera, V. Ramachandran, K. Raman, T. Roessler, I. Shafran, T. Shekel, C. Stanton, J. Stimes, M. Sun, G. Wellenius, and M. Zoghi. Google COVID-19 Search Trends Symptoms Dataset: Anonymization Process Description (version 1.0). arXiv, Sept. 2020."},{"key":"e_1_3_2_2_11_1","first-page":"389","volume-title":"Proceedings of the 15th USENIX Conference on Networked Systems Design and Implementation, NSDI'18","author":"Beckmann N.","year":"2018","unstructured":"N. Beckmann , H. Chen , and A. Cidon . Lhd: Improving cache hit rate by maximizing hit density . In Proceedings of the 15th USENIX Conference on Networked Systems Design and Implementation, NSDI'18 , page 389 -- 403 , USA, 2018 . USENIX Association. N. Beckmann, H. Chen, and A. Cidon. Lhd: Improving cache hit rate by maximizing hit density. In Proceedings of the 15th USENIX Conference on Networked Systems Design and Implementation, NSDI'18, page 389--403, USA, 2018. USENIX Association."},{"key":"e_1_3_2_2_12_1","volume-title":"Tumult analytics: a robust, easy-to-use, scalable, and expressive framework for differential privacy. CoRR, abs\/2212.04133","author":"Berghel S.","year":"2022","unstructured":"S. Berghel , P. Bohannon , D. Desfontaines , C. Estes , S. Haney , L. Hartman , M. Hay , A. Machanavajjhala , T. Magerlein , G. Miklau , A. Pai , W. Sexton , and R. Shrestha . Tumult analytics: a robust, easy-to-use, scalable, and expressive framework for differential privacy. CoRR, abs\/2212.04133 , 2022 . S. Berghel, P. Bohannon, D. Desfontaines, C. Estes, S. Haney, L. Hartman, M. Hay, A. Machanavajjhala, T. Magerlein, G. Miklau, A. Pai, W. Sexton, and R. Shrestha. Tumult analytics: a robust, easy-to-use, scalable, and expressive framework for differential privacy. CoRR, abs\/2212.04133, 2022."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374464"},{"key":"e_1_3_2_2_14_1","series-title":"Proceedings of Machine Learning Research","first-page":"2397","volume-title":"International Conference on Artificial Intelligence and Statistics, AISTATS","author":"Cardoso A. R.","year":"2022","unstructured":"A. R. Cardoso and R. Rogers . Differentially private histograms under continual observation: Streaming selection into the unknown . In G. Camps-Valls, F. J. R. Ruiz, and I. Valera, editors, International Conference on Artificial Intelligence and Statistics, AISTATS 2022 , 28--30 March 2022, Virtual Event, volume 151 of Proceedings of Machine Learning Research , pages 2397 -- 2419 . PMLR , 2022. A. R. Cardoso and R. Rogers. Differentially private histograms under continual observation: Streaming selection into the unknown. In G. Camps-Valls, F. J. R. Ruiz, and I. Valera, editors, International Conference on Artificial Intelligence and Statistics, AISTATS 2022, 28--30 March 2022, Virtual Event, volume 151 of Proceedings of Machine Learning Research, pages 2397--2419. PMLR, 2022."},{"key":"e_1_3_2_2_15_1","volume-title":"Private and continual release of statistics. ACM Trans. Inf. Syst. Secur., 14(3), nov","author":"Chan T.-H. H.","year":"2011","unstructured":"T.-H. H. Chan , E. Shi , and D. Song . Private and continual release of statistics. ACM Trans. Inf. Syst. Secur., 14(3), nov 2011 . T.-H. H. Chan, E. Shi, and D. Song. Private and continual release of statistics. ACM Trans. Inf. Syst. Secur., 14(3), nov 2011."},{"issue":"1305","key":"e_1_3_2_2_16_1","first-page":"1314","article-title":"Hierarchical web caching systems: Modeling, design and experimental results. Selected Areas in Communications","volume":"20","author":"Che H.","year":"2002","unstructured":"H. Che , y. Tung, and Z. Wang . Hierarchical web caching systems: Modeling, design and experimental results. Selected Areas in Communications , IEEE Journal on , 20 : 1305 -- 1314 , 10 2002 . H. Che, y. Tung, and Z. Wang. Hierarchical web caching systems: Modeling, design and experimental results. Selected Areas in Communications, IEEE Journal on, 20:1305 -- 1314, 10 2002.","journal-title":"IEEE Journal on"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.711"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807152"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"e_1_3_2_2_20_1","volume-title":"Differential privacy for growing databases. CoRR, abs\/1803.06416","author":"Cummings R.","year":"2018","unstructured":"R. Cummings , S. Krehbiel , K. A. Lai , and U. Tantipongpipat . Differential privacy for growing databases. CoRR, abs\/1803.06416 , 2018 . R. Cummings, S. Krehbiel, K. A. Lai, and U. Tantipongpipat. Differential privacy for growing databases. CoRR, abs\/1803.06416, 2018."},{"key":"e_1_3_2_2_21_1","volume-title":"Unique in the crowd: The privacy bounds of human mobility. Scientific reports","author":"De Montjoye Y.-A.","year":"2013","unstructured":"Y.-A. De Montjoye , C. A. Hidalgo , M. Verleysen , and V. D. Blondel . Unique in the crowd: The privacy bounds of human mobility. Scientific reports , 2013 . Y.-A. De Montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel. Unique in the crowd: The privacy bounds of human mobility. Scientific reports, 2013."},{"key":"e_1_3_2_2_22_1","unstructured":"D. Desfontaines. Real world DP use-cases. https:\/\/desfontain.es\/privacy\/real-world-differential-privacy.html. Accessed: 2023-04-13.  D. Desfontaines. Real world DP use-cases. https:\/\/desfontain.es\/privacy\/real-world-differential-privacy.html. Accessed: 2023-04-13."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773173"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1111\/rssb.12454"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_2_26_1","volume-title":"The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science, 9(3--4):211--407","author":"Dwork C.","year":"2014","unstructured":"C. Dwork and A. Roth . The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science, 9(3--4):211--407 , 2014 . C. Dwork and A. Roth. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science, 9(3--4):211--407, 2014."},{"key":"e_1_3_2_2_27_1","volume-title":"Foundations and Trends\u00ae in Theoretical Computer Science","author":"Dwork C.","year":"2014","unstructured":"C. Dwork and A. Roth . The algorithmic foundations of differential privacy . Foundations and Trends\u00ae in Theoretical Computer Science , 2014 . C. Dwork and A. Roth. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science, 2014."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401926"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287287"},{"key":"e_1_3_2_2_30_1","volume-title":"Advances in Neural Information Processing Systems","author":"Hardt M.","year":"2012","unstructured":"M. Hardt , K. Ligett , and F. Mcsherry . A simple and practical algorithm for differentially private data release . In F. Pereira, C. Burges, L. Bottou, and K. Weinberger, editors, Advances in Neural Information Processing Systems , volume 25 . Curran Associates, Inc. , 2012 . M. Hardt, K. Ligett, and F. Mcsherry. A simple and practical algorithm for differentially private data release. In F. Pereira, C. Burges, L. Bottou, and K. Weinberger, editors, Advances in Neural Information Processing Systems, volume 25. Curran Associates, Inc., 2012."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.85"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.85"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pgen.1000167"},{"key":"e_1_3_2_2_34_1","volume-title":"Differential privacy: An economic method for choosing epsilon","author":"Hsu J.","year":"2014","unstructured":"J. Hsu , M. Gaboardi , A. Haeberlen , S. Khanna , A. Narayan , B. Pierce , and A. Roth . Differential privacy: An economic method for choosing epsilon . volume 2014 , 07 2014 . J. Hsu, M. Gaboardi, A. Haeberlen, S. Khanna, A. Narayan, B. Pierce, and A. Roth. Differential privacy: An economic method for choosing epsilon. volume 2014, 07 2014."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14162-1_34"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00041"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3187009.3177733"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.14778\/3342263.3342274"},{"key":"e_1_3_2_2_39_1","volume-title":"Practical Privacy Filters and Odometers with R\u00e9nyi Differential Privacy and Applications to Differentially Private Deep Learning. In arXiv","author":"L\u00e9cuyer M.","year":"2021","unstructured":"M. L\u00e9cuyer . Practical Privacy Filters and Odometers with R\u00e9nyi Differential Privacy and Applications to Differentially Private Deep Learning. In arXiv , 2021 . M. L\u00e9cuyer. Practical Privacy Filters and Odometers with R\u00e9nyi Differential Privacy and Applications to Differentially Private Deep Learning. In arXiv, 2021."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359639"},{"key":"e_1_3_2_2_41_1","volume-title":"Privacy accounting and quality control in the sage differentially private ML platform. Online Supplements (also available on https:\/\/arxiv.org\/abs\/1909.01502)","author":"Lecuyer M.","year":"2019","unstructured":"M. Lecuyer , R. Spahn , K. Vodrahalli , R. Geambasu , and D. Hsu . Privacy accounting and quality control in the sage differentially private ML platform. Online Supplements (also available on https:\/\/arxiv.org\/abs\/1909.01502) , 2019 . M. Lecuyer, R. Spahn, K. Vodrahalli, R. Geambasu, and D. Hsu. Privacy accounting and quality control in the sage differentially private ML platform. Online Supplements (also available on https:\/\/arxiv.org\/abs\/1909.01502), 2019."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732269.2732271"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-015-0398-x"},{"key":"e_1_3_2_2_44_1","series-title":"Proceedings of Machine Learning Research","first-page":"6968","volume-title":"Proceedings of the 38th International Conference on Machine Learning","author":"Liu T.","year":"2021","unstructured":"T. Liu , G. Vietri , T. Steinke , J. Ullman , and S. Wu . Leveraging public data for practical private query release . In M. Meila and T. Zhang, editors, Proceedings of the 38th International Conference on Machine Learning , volume 139 of Proceedings of Machine Learning Research , pages 6968 -- 6977 . PMLR , 18--24 Jul 2021 . T. Liu, G. Vietri, T. Steinke, J. Ullman, and S. Wu. Leveraging public data for practical private query release. In M. Meila and T. Zhang, editors, Proceedings of the 38th International Conference on Machine Learning, volume 139 of Proceedings of Machine Learning Research, pages 6968--6977. PMLR, 18--24 Jul 2021."},{"key":"e_1_3_2_2_45_1","first-page":"55","volume-title":"15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21)","author":"Luo T.","year":"2021","unstructured":"T. Luo , M. Pan , P. Tholoniat , A. Cidon , R. Geambasu , and M. L\u00e9cuyer . Privacy budget scheduling . In 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21) , pages 55 -- 74 . USENIX Association , July 2021 . T. Luo, M. Pan, P. Tholoniat, A. Cidon, R. Geambasu, and M. L\u00e9cuyer. Privacy budget scheduling. In 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21), pages 55--74. USENIX Association, July 2021."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.14778\/3055330.3055331"},{"key":"e_1_3_2_2_47_1","volume-title":"abs\/2207.09397","author":"Lyu X.","year":"2022","unstructured":"X. Lyu . Composition theorems for interactive differential privacy. CoRR , abs\/2207.09397 , 2022 . X. Lyu. Composition theorems for interactive differential privacy. CoRR, abs\/2207.09397, 2022."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.14778\/3574245.3574246"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.14778\/3231751.3231769"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"e_1_3_2_2_51_1","volume-title":"R\u00e9nyi Differential Privacy. In Computer Security Foundations Symposium (CSF)","author":"Mironov I.","year":"2017","unstructured":"I. Mironov . R\u00e9nyi Differential Privacy. In Computer Security Foundations Symposium (CSF) , 2017 . I. Mironov. R\u00e9nyi Differential Privacy. In Computer Security Foundations Symposium (CSF), 2017."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_3_2_2_53_1","volume-title":"Linkedin's audience engagements api: A privacy preserving data analytics system at scale. arXiv preprint arXiv:2002.05839","author":"Rogers R.","year":"2020","unstructured":"R. Rogers , S. Subramaniam , S. Peng , D. Durfee , S. Lee , S. K. Kancha , S. Sahay , and P. Ahammad . Linkedin's audience engagements api: A privacy preserving data analytics system at scale. arXiv preprint arXiv:2002.05839 , 2020 . R. Rogers, S. Subramaniam, S. Peng, D. Durfee, S. Lee, S. K. Kancha, S. Sahay, and P. Ahammad. Linkedin's audience engagements api: A privacy preserving data analytics system at scale. arXiv preprint arXiv:2002.05839, 2020."},{"key":"e_1_3_2_2_54_1","volume-title":"Privacy odometers and filters: Pay-as-you-go composition","author":"Rogers R. M.","year":"2016","unstructured":"R. M. Rogers , A. Roth , J. Ullman , and S. Vadhan . Privacy odometers and filters: Pay-as-you-go composition . 2016 . R. M. Rogers, A. Roth, J. Ullman, and S. Vadhan. Privacy odometers and filters: Pay-as-you-go composition. 2016."},{"key":"e_1_3_2_2_55_1","first-page":"1065","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2020","author":"Roth E.","year":"2020","unstructured":"E. Roth , H. Zhang , A. Haeberlen , and B. C. Pierce . Orchard: Differentially private analytics at scale . In 14th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2020 , Virtual Event, November 4--6 , 2020 , pages 1065 -- 1081 . USENIX Association, 2020. E. Roth, H. Zhang, A. Haeberlen, and B. C. Pierce. Orchard: Differentially private analytics at scale. In 14th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2020, Virtual Event, November 4--6, 2020, pages 1065--1081. USENIX Association, 2020."},{"key":"e_1_3_2_2_56_1","volume-title":"Proc. of the USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Roy I.","year":"2010","unstructured":"I. Roy , S. T. Setty , A. Kilzer , V. Shmatikov , and E. Witchel . Airavat: Security and privacy for MapReduce . In Proc. of the USENIX Symposium on Networked Systems Design and Implementation (NSDI) , 2010 . I. Roy, S. T. Setty, A. Kilzer, V. Shmatikov, and E. Witchel. Airavat: Security and privacy for MapReduce. In Proc. of the USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2010."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0013"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57048-8_7"},{"key":"e_1_3_2_2_59_1","volume-title":"Concurrent composition theorems for all standard variants of differential privacy. CoRR, abs\/2207.08335","author":"Vadhan S. P.","year":"2022","unstructured":"S. P. Vadhan and W. Zhang . Concurrent composition theorems for all standard variants of differential privacy. CoRR, abs\/2207.08335 , 2022 . S. P. Vadhan and W. Zhang. Concurrent composition theorems for all standard variants of differential privacy. CoRR, abs\/2207.08335, 2022."},{"key":"e_1_3_2_2_60_1","first-page":"9765","volume-title":"Proceedings of the 37th International Conference on Machine Learning, ICML 2020, 13--18 July 2020, Virtual Event, volume 119 of Proceedings of Machine Learning Research","author":"Vietri G.","year":"2020","unstructured":"G. Vietri , G. Tian , M. Bun , T. Steinke , and Z. S. Wu . New oracle-efficient algorithms for private synthetic data release . In Proceedings of the 37th International Conference on Machine Learning, ICML 2020, 13--18 July 2020, Virtual Event, volume 119 of Proceedings of Machine Learning Research , pages 9765 -- 9774 . PMLR, 2020 . G. Vietri, G. Tian, M. Bun, T. Steinke, and Z. S. Wu. New oracle-efficient algorithms for private synthetic data release. In Proceedings of the 37th International Conference on Machine Learning, ICML 2020, 13--18 July 2020, Virtual Event, volume 119 of Proceedings of Machine Learning Research, pages 9765--9774. PMLR, 2020."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1198\/jasa.2009.tm08651"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0025"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.5555\/3488766.3488777"},{"key":"e_1_3_2_2_64_1","volume-title":"A large-scale analysis of hundreds of in-memory key-value cache clusters at twitter. ACM Trans. Storage, 17(3), aug","author":"Yang J.","year":"2021","unstructured":"J. Yang , Y. Yue , and K. V. Rashmi . A large-scale analysis of hundreds of in-memory key-value cache clusters at twitter. ACM Trans. Storage, 17(3), aug 2021 . J. Yang, Y. Yue, and K. V. Rashmi. A large-scale analysis of hundreds of in-memory key-value cache clusters at twitter. ACM Trans. Storage, 17(3), aug 2021."},{"key":"e_1_3_2_2_65_1","first-page":"20249","article-title":"Improving Sparse Vector Technique with Renyi Differential Privacy","volume":"33","author":"Zhu Y.","year":"2020","unstructured":"Y. Zhu and Y.-X. Wang . Improving Sparse Vector Technique with Renyi Differential Privacy . Advances in Neural Information Processing Systems , 33 : 20249 -- 20258 , 2020 . Y. Zhu and Y.-X. Wang. Improving Sparse Vector Technique with Renyi Differential Privacy. Advances in Neural Information Processing Systems, 33:20249--20258, 2020.","journal-title":"Advances in Neural Information Processing Systems"}],"event":{"name":"SOSP '23: 29th Symposium on Operating Systems Principles","location":"Koblenz Germany","acronym":"SOSP '23","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","USENIX"]},"container-title":["Proceedings of the 29th Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600006.3613174","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3600006.3613174","content-type":"text\/html","content-version":"vor","intended-application":"syndication"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:49Z","timestamp":1750178209000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600006.3613174"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,23]]},"references-count":65,"alternative-id":["10.1145\/3600006.3613174","10.1145\/3600006"],"URL":"https:\/\/doi.org\/10.1145\/3600006.3613174","relation":{},"subject":[],"published":{"date-parts":[[2023,10,23]]},"assertion":[{"value":"2023-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}