Skip to main content

A Stab at Approximating Minimum Subadditive Join

  • Conference paper
Algorithms and Data Structures (WADS 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4619))

Included in the following conference series:

Abstract

Let (L,*) be a semilattice, and let c: L →[0, ∞ ) be monotone and increasing on L. We state the Minimum Join problem as: given size n sub-collection X of L and integer k with 1 ≤ k ≤ n, find a size k sub-collection (x1, x2, ..., x k ) of X that minimizes c(x1 * x2 * ⋯ * x k ). If c(a * b) ≤ c(a) + c(b) holds, we call this the Minimum Subadditive Join (MSJ) problem and present a greedy (k − p + 1)-approximation algorithm requiring O((k − p)n + n p) joins for constant integer 0 < p ≤ k. We show that the MSJ Minimum Coverage problem of selecting k out of n finite sets such that their union is minimal is essentially as hard to approximate as the Maximum Balanced Complete Bipartite Subgraph (MBCBS) problem. The motivating by-product of the above is that the privacy in databases related k-ambiguity problem over L with subadditive information loss can be approximated within k − p, and that the k-ambiguity problem is essentially at least as hard to approximate as MBCBS.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Melton, L.: The threat to medical-records research. N. Engl. J. Med. 337(20), 1466–1470 (1997)

    Article  Google Scholar 

  2. Dick, R.S., Steen, E.B., Detmer, D.E.: The Computer Based Patient Record: An Essential Technology for Health Care, Revised edn. Institute of Medicine (1997)

    Google Scholar 

  3. Hippocrates: The oath and law of hippocrates. The Harvard Classics, vol. 38. P.F. Collier & Son, New York (1909-1914)

    Google Scholar 

  4. United States Department of Health and Human Services: 45 CFR Parts 160 and 164 RIN 0991-AB14, Standards for Privacy of Individually Identifiable Health Information. Federal Register 67(157) (August 2002)

    Google Scholar 

  5. Walton, J., Doll, R., Asscher, W., Hurley, R., Langman, M., Gillon, R., Strachan, D., Wald, N., Fletcher, P.: Consequences for research if use of anonymised patient data breaches confidentiality. BMJ 319(7221) 1366 (November 1999)

    Google Scholar 

  6. Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 557–570 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  7. Hundepool, A.J., Willenborg, L.C.R.J.: Mu- and tau-argus: Software for statistical disclosure control. In: 3rd International Seminar on Statistical Confidentiality at Bled (1996)

    Google Scholar 

  8. Øhrn, A., Ohno-Machado, L.: Using boolean reasoning to anonymize databases. Artif. Intell. Med. 15(3), 235–254 (1999)

    Article  Google Scholar 

  9. Vinterbo, S.A.: Privacy: A machine learning view. IEEE Transactions on Knowledge and Data Engineering 16(8), 939–948 (2004)

    Article  Google Scholar 

  10. Meyerson, A., Williams, R.: On the complexity of optimal k-anonymity. In: PODS 2004. Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, pp. 223–228. ACM Press, New York (2004)

    Chapter  Google Scholar 

  11. Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Approximating algorithms for k-anonymity. Journal of Privacy Technology 1, 1–18 (2005)

    Google Scholar 

  12. Hochbaum, D., Pathria, A.: Analysis of the greedy approach in covering problems. Naval Research Quarterly 45, 615–627 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  13. Garey, M.R., Johnson, D.S.: Computers and Intractability, A Guide to the Theory of NP-Completeness. W.H. Freeman and Company, New York (1979)

    MATH  Google Scholar 

  14. Khot, S.: Ruling out ptas for graph min-bisection, densest subgraph and bipartite clique. In: FOCS 2004, pp. 136–145. IEEE Computer Society Press, Los Alamitos (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Frank Dehne Jörg-Rüdiger Sack Norbert Zeh

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Vinterbo, S.A. (2007). A Stab at Approximating Minimum Subadditive Join. In: Dehne, F., Sack, JR., Zeh, N. (eds) Algorithms and Data Structures. WADS 2007. Lecture Notes in Computer Science, vol 4619. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73951-7_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73951-7_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73948-7

  • Online ISBN: 978-3-540-73951-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics