User profiles for S. Yekhanin
Sergey YekhaninMicrosoft Verified email at microsoft.com Cited by 8005 |
Erasure coding in windows azure storage
… Next, we determine the values of α’s and β’s so that the LRC can … α’s and β’s the elements
from a finite field GF(24) [12], where every element in the field is represented by 4 bits. α’s are …
from a finite field GF(24) [12], where every element in the field is represented by 4 bits. α’s are …
Random access in large-scale DNA data storage
… 2) 98 C for 20 s, (3) 62 C for 20 s, (4) 72 C for 15 s, (5) go to step 2 a varying number of times
depending on the proportion of the pool being amplified, (6) 72 C for 30 s. The reaction was …
depending on the proportion of the pool being amplified, (6) 72 C for 30 s. The reaction was …
On the locality of codeword symbols
… We say that such a set of erasures satisfies Hall’s condition. … of sets of coordinates that can
be eliminated by combination of certain s. … is of full rank since the s are in general position. …
be eliminated by combination of certain s. … is of full rank since the s are in general position. …
Collecting telemetry data privately
… may occur if we collect user’s data repeatedly (say, daily) and user’s private value xi does not
… We suggest setting s rather large compared to m, say s = m/20 or even s = m depending on …
… We suggest setting s rather large compared to m, say s = m/20 or even s = m depending on …
Differentially private fine-tuning of language models
… Specifically, they reparametrize each layer’s weight matrix W … -dimensional projection of W’s
gradient by taking gradients only of … some of the signal in W’s gradient, it turns out to contain …
gradient by taking gradients only of … some of the signal in W’s gradient, it turns out to contain …
Locally decodable codes
S Yekhanin - … and Trends® in Theoretical Computer Science, 2012 - nowpublishers.com
… S in [k] uniformly at random and outputs the XOR of the two coordinates of y corresponding
to sets S and S … with probability 1 − 2δ both decoder’s queries go to uncorrupted locations. In …
to sets S and S … with probability 1 − 2δ both decoder’s queries go to uncorrupted locations. In …
[PDF][PDF] Pan-Private Streaming Algorithms.
… S that is close to the input stream S: the numbers of appearances of every item in S and S …
We say that streams S and S are (1 + ρ)-close if, for accuracy parameter ρ ∈ (0,1], and ∀x …
We say that streams S and S are (1 + ρ)-close if, for accuracy parameter ρ ∈ (0,1], and ∀x …
[PDF][PDF] Private information retrieval
S Yekhanin - Communications of the ACM, 2010 - dl.acm.org
… Given an index i Є [n] and y, the Hadamard decoder picks a set S in [n] uniformly at
random and outputs the XOR of the two coordinates of y corresponding to sets S and S ∆ {i} …
random and outputs the XOR of the two coordinates of y corresponding to sets S and S ∆ {i} …
High-rate codes with sublinear-time decoding
… With probability at least 0.9 over the choice of B, the elements of B will form an interpolating
set4 for polynomials of degree < s (this holds as long as q is large enough in terms of m and s…
set4 for polynomials of degree < s (this holds as long as q is large enough in terms of m and s…
Non-adaptive fault diagnosis for all-optical networks via combinatorial group testing on graphs
… In this paper, we generally allow s to be arbitrary, although the case of 1 s = is often central.
… Note that with a linear lower bound, s becomes irrelevant (we can handle any s with …
… Note that with a linear lower bound, s becomes irrelevant (we can handle any s with …