#### Filter Results:

- Full text PDF available (71)

#### Publication Year

2000

2017

- This year (2)
- Last 5 years (30)
- Last 10 years (63)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

#### Organism

Learn More

- Stephen P. Boyd, Arpita Ghosh, Balaji Prabhakar, Devavrat Shah
- IEEE Transactions on Information Theory
- 2006

Motivated by applications to sensor, peer-to-peer, and ad hoc networks, we study distributed algorithms, also known as gossip algorithms, for exchanging information and for computing in an arbitrarily connected network of nodes. The topology of such networks changes continuously as new nodes join and old nodes leave the network. Algorithms for such networks… (More)

- Stephen P. Boyd, Arpita Ghosh, Balaji Prabhakar, Devavrat Shah
- Proceedings IEEE 24th Annual Joint Conference of…
- 2005

Motivated by applications to sensor, peer-to-peer and ad hoc networks, we study distributed asynchronous algorithms, also known as gossip algorithms, for computation and information exchange in an arbitrarily connected network of nodes. Nodes in such networks operate under limited computational, communication and energy resources. These constraints… (More)

- Arpita Ghosh, Stephen Boyd
- 2007

The algebraic connectivity of a graph is the second smallest eigenvalue of the graph Laplacian, and is a measure of how well-connected the graph is. We study the problem of adding edges (from a set of candidate edges) to a graph so as to maximize its algebraic connectivity. This is a difficult combinatorial optimization, so we seek a heuristic for… (More)

- Arpita Ghosh, Tim Roughgarden, Mukund Sundararajan
- SIAM J. Comput.
- 2009

A mechanism for releasing information about a statistical database with sensitive data must resolve a trade-off between utility and privacy. Publishing fully accurate information maximizes utility while minimizing privacy, while publishing random noise accomplishes the opposite. Privacy can be rigorously quantified using the framework of <i>differential… (More)

- Arpita Ghosh, Stephen P. Boyd, Amin Saberi
- SIAM Review
- 2008

The effective resistance between two nodes of a weighted graph is the electrical resistance seen between the nodes of a resistor network with branch conductances given by the edge weights. The effective resistance comes up in many applications and fields in addition to electrical network analysis, including, for example, Markov chains and continuous-time… (More)

- Anirban Dasgupta, Arpita Ghosh
- WWW
- 2013

Crowdsourcing is now widely used to replace judgement or evaluation by an expert authority with an aggregate evaluation from a number of non-experts, in applications ranging from rating and categorizing online content all the way to evaluation of student assignments in massively open online courses (MOOCs) via peer grading. A key issue in these settings,… (More)

- Arpita Ghosh, Aaron Roth
- EC
- 2011

We initiate the study of markets for private data, through the lens of differential privacy. Although the purchase and sale of private data has already begun on a large scale, a theory of privacy as a commodity is missing. In this paper, we propose to build such a theory. Specifically, we consider a setting in which a data analyst wishes to buy information… (More)

- Stephen Boyd, Arpita Ghosh, +4 authors Jun Sun
- 2006

We consider the problem of choosing the edge weights of an undirected graph so as to maximize or minimize some function of the eigenvalues of the associated Laplacian matrix, subject to some constraints on the weights, such as nonnegativity, or a given total value. In many interesting cases this problem is convex, i.e., it involves minimizing a convex… (More)

- Shaddin Dughmi, Arpita Ghosh
- EC
- 2010

We study the design of truthful mechanisms that do not use payments for the generalized assignment problem (GAP) and its variants. An instance of the GAP consists of a bipartite graph with jobs on one side and machines on the other. Machines have capacities and edges have values and sizes; the goal is to construct a welfare maximizing feasible assignment.… (More)

- Arpita Ghosh, Satyen Kale, R. Preston McAfee
- EC
- 2011

A large fraction of user-generated content on the Web, such as posts or comments on popular online forums, consists of abuse or spam. Due to the volume of contributions on popular sites, a few trusted moderators cannot identify all such abusive content, so viewer ratings of contributions must be used for moderation. But not all viewers who rate content are… (More)