Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Cynthia Dwork

Known as: Dwork 
Cynthia Dwork (born 1958) is an American computer scientist and a Distinguished Scientist at Microsoft Research. Beginning in January 2017 she will… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
Operators of online social networks are increasingly sharing potentially sensitive information about users and their… Expand
  • figure 1
  • figure 4
  • figure 2
  • figure 3
Highly Cited
2008
Highly Cited
2008
We present a new class of statistical de- anonymization attacks against high-dimensional micro-data, such as individual… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2005
Highly Cited
2005
Our main result is a reduction from worst-case lattice problems such as SVP and SIVP to a certain learning problem. This learning… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2005
Highly Cited
2005
We consider a statistical database in which a trusted administrator introduces noise to the query responses with the goal of… Expand
Highly Cited
2002
Highly Cited
2002
From the Publisher: Cynthia Breazeal here presents her vision of the sociable robot of the future, a synthetic creature and not… Expand
  • figure 1.1
  • figure 1.2
  • figure 1.3
  • figure 1.4
  • figure 2.1
Highly Cited
2001
Highly Cited
2001
Abstract In the 25th anniversary issue of the Brookings Papers on Economic Activity, Paul Krugman [Krugman, P., 1995. Growing… Expand
  • table 1
  • table 2
  • table 3
Highly Cited
2000
Highly Cited
2000
Seeks to present a better understanding of dynamic capabilities and the resource-based view of the firm. Dynamic capabilities are… Expand
  • table 1
  • table 2
Highly Cited
1998
Highly Cited
1998
Three studies evaluated the reliability and validity of the Investment Model Scale, an instrument designed to measure four… Expand
Highly Cited
1991
Highly Cited
1991
We describe a theory of authentication and a system that implements it. Our theory is based on the notion of principal and a… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
  • table 3
Highly Cited
1984
Highly Cited
1984
We argue that the right way to understand distributed protocols is by considering how messages change the state of knowledge of a… Expand