Andrew J. Blumberg

According to our database1, Andrew J. Blumberg authored at least 39 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Stability of 2-Parameter Persistent Homology.
Found. Comput. Math., April, 2024

Recovering Manifold Structure Using Ollivier-Ricci Curvature.
CoRR, 2024

Resampling and averaging coordinates on data.
CoRR, 2024

2023
Cellstitch: 3D cellular anisotropic image segmentation via optimal transport.
BMC Bioinform., December, 2023

An Intrinsic Approach to Scalar-Curvature Estimation for Point Clouds.
CoRR, 2023

A statistical framework for analyzing shape in a time series of random geometric objects.
CoRR, 2023

A Framework for Fast and Stable Representations of Multiparameter Persistent Homology Decompositions.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

2022
Efficient Approximation of Multiparameter Persistence Modules.
CoRR, 2022

2021
Efficient Representation of Numerical Optimization Problems for SNARKs.
IACR Cryptol. ePrint Arch., 2021

2020
A Random Matrix Theory Approach to Denoise Single-Cell Data.
Patterns, 2020

MREC: a fast and versatile framework for aligning and matching point clouds with applications to single cell molecular data.
CoRR, 2020

Multiparameter Persistence Image for Topological Machine Learning.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

2018
Testing to distinguish measures on metric spaces.
CoRR, 2018

2017
Full accounting for verifiable outsourcing.
IACR Cryptol. ePrint Arch., 2017

Universality of the Homotopy Interleaving Distance.
CoRR, 2017

2016
A polynomial-time relaxation of the Gromov-Hausdorff distance.
CoRR, 2016

Defending against Malicious Peripherals with Cinch.
Proceedings of the 25th USENIX Security Symposium, 2016

2015
Harmful devices considered harmless.
CoRR, 2015

Verifying computations without reexecuting them.
Commun. ACM, 2015

2014
Efficient RAM and control flow in verifiable outsourced computation.
IACR Cryptol. ePrint Arch., 2014

Verifiable computation using multiple provers.
IACR Cryptol. ePrint Arch., 2014

Robust Statistics, Hypothesis Testing, and Confidence Intervals for Persistent Homology on Metric Measure Spaces.
Found. Comput. Math., 2014

Moduli Spaces of Phylogenetic Trees Describing Tumor Evolutionary Patterns.
Proceedings of the Brain Informatics and Health - International Conference, 2014

2013
Verifying computations with state.
IACR Cryptol. ePrint Arch., 2013

Quantitative Homotopy Theory in Topological Data Analysis.
Found. Comput. Math., 2013

Verifying computations without reexecuting them: from theoretical possibility to near-practicality.
Electron. Colloquium Comput. Complex., 2013

A Hybrid Architecture for Interactive Verifiable Computation.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

2012
Taking proof-based verified computation a few steps closer to practicality (extended version).
IACR Cryptol. ePrint Arch., 2012

Resolving the conflict between generality and plausibility in verified computation.
IACR Cryptol. ePrint Arch., 2012

Persistent homology for metric measure spaces, and robust statistics for hypothesis testing and confidence intervals
CoRR, 2012

Taking Proof-Based Verified Computation a Few Steps Closer to Practicality.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Making argument systems for outsourced computation practical (sometimes).
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
Toward Practical and Unconditional Verification of Remote Computations.
Proceedings of the 13th Workshop on Hot Topics in Operating Systems, 2011

Privacy and accountability for location-based aggregate statistics.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2009
VPriv: Protecting Privacy in Location-Based Vehicular Services.
Proceedings of the 18th USENIX Security Symposium, 2009

2006
Congestion Pricing That Preserves Driver Privacy.
Proceedings of the IEEE Intelligent Transportation Systems Conference, 2006

2004
Searching for Stable Mechanisms: Automated Design for Imperfect Players.
Proceedings of the Nineteenth National Conference on Artificial Intelligence, 2004

1997
A Randomized Algorithm for Deciding the Functional Equivalence of Neural Networks.
Proceedings of the Progress in Connectionist-Based Information Systems: Proceedings of the 1997 International Conference on Neural Information Processing and Intelligent Information Systems, 1997

Parallel computation on a DNA substrate.
Proceedings of the DNA Based Computers, 1997


  Loading...