Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,180,275 papers from all fields of science
Search
Sign In
Create Free Account
Cynthia Dwork
Known as:
Dwork
Cynthia Dwork (born 1958) is an American computer scientist and a Distinguished Scientist at Microsoft Research. Beginning in January 2017 she will…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
26 relations
Bitcoin
Communications of the ACM
Computer scientist
Computer security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2019
Highly Cited
2019
Summary for policymakers of the global assessment report on biodiversity and ecosystem services – unedited advance version
Sandra Díaz Co-Chair
,
H. T. N. Ipbes
,
+24 authors
H. Mooney
2019
Corpus ID: 157065536
Hien T. Ngo (IPBES), Maximilien Guèze (IPBES); John Agard (Trinidad and Tobago), Almut Arneth (Germany), Patricia Balvanera…
Expand
Highly Cited
2016
Highly Cited
2016
Deep Learning Computed Tomography
Tobias Würfl
,
Florin C. Ghesu
,
Vincent Christlein
,
A. Maier
International Conference on Medical Image…
2016
Corpus ID: 2920686
In this paper, we demonstrate that image reconstruction can be expressed in terms of neural networks. We show that filtered back…
Expand
Highly Cited
2016
Highly Cited
2016
Deep Residual Learning for Compressed Sensing CT Reconstruction via Persistent Homology Analysis
Yoseob Han
,
J. Yoo
,
J. C. Ye
arXiv.org
2016
Corpus ID: 14454389
Recently, compressed sensing (CS) computed tomography (CT) using sparse projection views has been extensively investigated to…
Expand
Highly Cited
2008
Highly Cited
2008
On the 'Semantics' of Differential Privacy: A Bayesian Formulation
S. Kasiviswanathan
,
Adam D. Smith
Journal of Privacy and Confidentiality
2008
Corpus ID: 11954048
Differential privacy is a definition of "privacy'" for algorithms that analyze and publish information about statistical…
Expand
Highly Cited
2005
Highly Cited
2005
Culture, gender, organizational role, and styles of conflict resolution: A meta-analysis
J. Holt
,
C. J. DeVore
2005
Corpus ID: 6379867
Highly Cited
2002
Highly Cited
2002
Perfectly Secure Message Transmission Revisited
Yongge Wang
,
Y. Desmedt
IEEE Transactions on Information Theory
2002
Corpus ID: 3124135
Secure communications guaranteeing reliability and privacy (without unproven assumptions) in networks with active adversaries has…
Expand
Highly Cited
2000
Highly Cited
2000
Effects of climate change and elevated CO2 on cropping systems: model predictions at two Italian locations
F. Tubiello
,
M. Donatelli
,
C. Rosenzweig
,
C. Stöckle
2000
Corpus ID: 12233393
Highly Cited
1993
Highly Cited
1993
Working relations of technology production and use
L. Suchman
Computer Supported Cooperative Work
1993
Corpus ID: 7274957
This paper explores the relevance of recent feminist reconstructions of objectivity for the development of alternative visions of…
Expand
Highly Cited
1988
Highly Cited
1988
Fault Tolerance in Networks of Bounded Degree
C. Dwork
,
D. Peleg
,
N. Pippenger
,
E. Upfal
SIAM journal on computing (Print)
1988
Corpus ID: 560197
Achieving processor cooperation in the presence of faults is a major problem in distributed systems. Popular paradigms such as…
Expand
Highly Cited
1961
Highly Cited
1961
On the factorization of rational matrices
D. Youla
IRE Transactions on Information Theory
1961
Corpus ID: 206727869
Many problems in electrical engineering, such as the synthesis of linear n ports and the detection and filtration of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE