| 12307499 |
Item recommendation method and device for protecting user privacy and learning system |
Jingren Zhou, Zitao Li |
2025-05-20 |
| 12223407 |
Efficient configuration selection for automated machine learning |
Chi Wang, Silu Huang, Surajit Chaudhuri |
2025-02-11 |
| 10977384 |
Hardware protection for differential privacy |
Josh Benaloh, Harsha Prasad Nori, Janardhan Dattatreya KULKARNI, Joshua Stanley Allen, Jacob R. Lorch +4 more |
2021-04-13 |
| 10949438 |
Database query for histograms |
Chi Wang, Danyel A. Fisher, Robyn Dominik Moritz |
2021-03-16 |
| 10902149 |
Remote testing analysis for software optimization based on client-side local differential privacy-based data |
Harsha Prasad Nori, Paul Li, Joshua Stanley Allen |
2021-01-26 |
| 10824592 |
Database management using hyperloglog sketches |
Azade Nazi, Vivek Narasayya, Surajit Chaudhuri |
2020-11-03 |
| 10776242 |
Collection of sensitive data—such as software usage data or other telemetry data—over repeated collection cycles in satisfaction of privacy guarantees |
Janardhan Dattatreya KULKARNI, Sergey Yekhanin, Joshua Stanley Allen, Alexander Meade |
2020-09-15 |
| 10769123 |
Workload-driven recommendations for Columnstore and Rowstore indexes in relational databases |
Sudipto Das, Vivek Narasayya, Manoj Syamala, Jingjing Wang, Gaoxiang Xu |
2020-09-08 |
| 10740328 |
Aggregate-query database system and processing |
Silu Huang, Chi Wang, Kaushik Chakrabarti, Surajit Chaudhuri |
2020-08-11 |
| 10552435 |
Fast approximate results and slow precise results |
Chi Wang, Danyel A. Fisher, Robyn Dominik Moritz |
2020-02-04 |
| 10496643 |
Controlling approximations of queries |
Srikanth Kandula, Surajit Chaudhuri, Anil Atmanand Shanbhag, Aleksandar Vitorović, Matthaios Olma +1 more |
2019-12-03 |
| 10453228 |
Difference visualization between data sets |
Chi Wang, Danyel A. Fisher, Robyn Dominik Moritz |
2019-10-22 |