Geoindistinguishability: Differential privacy for location-based systems, Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2013. ,
Probabilistic relational reasoning for differential privacy, Proceedings of the 39th Annual ACM Symposium on Principles of Programming Languages (POPL), 2012. ,
The $\infty$-Wasserstein Distance: Local Solutions and Existence of Optimal Transport Maps, SIAM Journal on Mathematical Analysis, vol.40, issue.1, pp.1-20, 2008. ,
DOI : 10.1137/07069938X
URL : https://hal.archives-ouvertes.fr/hal-01288953
Proving programs robust, Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering, SIGSOFT/FSE '11, pp.102-112, 2011. ,
DOI : 10.1145/2025113.2025131
On the lambert w function, Advances in Computational Mathematics, pp.329-359, 1996. ,
Differential Privacy, 33rd International Colloquium on Automata, Languages and Programming, pp.1-12, 2006. ,
DOI : 10.1007/11787006_1
Calibrating Noise to Sensitivity in Private Data Analysis, Proceedings of the Third Theory of Cryptography Conference (TCC), pp.265-284, 2006. ,
DOI : 10.1007/11681878_14
Linear dependent types for differential privacy, The 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'13), pp.357-370, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00909340
A non-local method for robustness analysis of floating point programs, Proceedings of the 10th Workshop on Quantitative Aspects of Programming Languages and Systems, pp.63-76, 2012. ,
DOI : 10.4204/EPTCS.85.5
URL : https://hal.archives-ouvertes.fr/hal-00665995
Floating point Cordic, Proceedings of IEEE 11th Symposium on Computer Arithmetic, 1993. ,
DOI : 10.1109/ARITH.1993.378100
Differential privacy for location pattern mining, Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL '11, pp.17-24, 2011. ,
DOI : 10.1145/2071880.2071884
IEEE 754-2008, Standard for Floating-Point Arithmetic, IEEE, 2008. ,
Numerical accuracy and hardware tradeoffs for CORDIC arithmetic for special-purpose processors, IEEE Transactions on Computers, vol.42, issue.7, pp.769-779, 1993. ,
DOI : 10.1109/12.237718
Privacy: Theory meets Practice on the Map, 2008 IEEE 24th International Conference on Data Engineering, pp.277-286, 2008. ,
DOI : 10.1109/ICDE.2008.4497436
On significance of the least significant bits for differential privacy, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.650-661, 2012. ,
DOI : 10.1145/2382196.2382264
De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, pp.173-187, 2009. ,
DOI : 10.1109/SP.2009.22
Real and Complex Analysis, 1986. ,