Results 1 
6 of
6
Greedy Facility Location Algorithms analyzed using Dual Fitting with FactorRevealing LP
 Journal of the ACM
, 2001
"... We present a natural greedy algorithm for the metric uncapacitated facility location problem and use the method of dual fitting to analyze its approximation ratio, which turns out to be 1.861. The running time of our algorithm is O(m log m), where m is the total number of edges in the underlying c ..."
Abstract

Cited by 104 (13 self)
 Add to MetaCart
(Show Context)
We present a natural greedy algorithm for the metric uncapacitated facility location problem and use the method of dual fitting to analyze its approximation ratio, which turns out to be 1.861. The running time of our algorithm is O(m log m), where m is the total number of edges in the underlying complete bipartite graph between cities and facilities. We use our algorithm to improve recent results for some variants of the problem, such as the fault tolerant and outlier versions. In addition, we introduce a new variant which can be seen as a special case of the concave cost version of this problem.
SIGMA: A SETCOVERBASED INEXACT GRAPH MATCHING ALGORITHM
, 2010
"... Network querying is a growing domain with vast applications ranging from screening compounds against a database of known molecules to matching subnetworks across species. Graph indexing is a powerful method for searching a large database of graphs. Most graph indexing methods to date tackle the exa ..."
Abstract

Cited by 6 (3 self)
 Add to MetaCart
Network querying is a growing domain with vast applications ranging from screening compounds against a database of known molecules to matching subnetworks across species. Graph indexing is a powerful method for searching a large database of graphs. Most graph indexing methods to date tackle the exact matching (isomorphism) problem, limiting their applicability to specific instances in which such matches exist. Here we provide a novel graph indexing method to cope with the more general, inexact matching problem. Our method, SIGMA, builds on approximating a variant of the setcover problem that concerns overlapping multisets. We extensively test our method and compare it to a baseline method and to the stateoftheart Grafil. We show that SIGMA outperforms both, providing higher pruning power in all the tested scenarios.
Exact Algorithms for Set Multicover and Multiset Multicover Problems
"... Abstract. Given a universe N containing n elements and a collection of multisets or sets over N, the multiset multicover (MSMC) or the set multicover (SMC) problem is to cover all elements at least a number of times as specified in their coverage requirements with the minimum number of multisets or ..."
Abstract

Cited by 1 (1 self)
 Add to MetaCart
Abstract. Given a universe N containing n elements and a collection of multisets or sets over N, the multiset multicover (MSMC) or the set multicover (SMC) problem is to cover all elements at least a number of times as specified in their coverage requirements with the minimum number of multisets or sets. In this paper, we give various exact algorithms for these two problems, with or without constraints on the number of times a multiset or set may be picked. First, we can exactly solve the MSMC without multiplicity constraints problem in O(((b +1)(c +1)) n) time where b and c (c ≤ b and b ≥ 2) respectively are the maximum coverage requirement and the maximum number of times that each element can appear in a multiset. To our knowledge, this is the first known exact algorithm for the MSMC without multiplicity constraints problem. Second, we can solve the SMC without multiplicity constraints problem in O((b +2) n) time. Compared with the two recent results in [Hua et al., Set Multicovering via inclusionexclusion, Theoretical Computer Science, 410(3840):38823892 (2009)] and [Nederlof, J.: Inclusion Exclusion
Protecting Individual Information Against Inference Attacks in Data Publishing
"... Abstract. In many datapublishing applications, the data owner needs to protect sensitive information pertaining to individuals. Meanwhile, certain information is required to be published. The sensitive information could be considered as leaked, if an adversary can infer the real value of a sensitiv ..."
Abstract
 Add to MetaCart
Abstract. In many datapublishing applications, the data owner needs to protect sensitive information pertaining to individuals. Meanwhile, certain information is required to be published. The sensitive information could be considered as leaked, if an adversary can infer the real value of a sensitive entry with a high confidence. In this paper we study how to protect sensitive data when an adversary can do inference attacks using association rules derived from the data. We formulate the inference attack model, and develop complexity results on computing a safe partial table. We classify the general problem into subcases based on the requirements of publishing information, and propose the corresponding algorithms for finding a safe partial table to publish. We have conducted an empirical study to evaluate these algorithms on real data. 1
Distributed Sleep Scheduling in Wireless Sensor Networks via Fractional Domatic Partitioning
"... Abstract. We consider setting up sleep scheduling in sensor networks. We formulate the problem as an instance of the fractional domatic partition problem and obtain a distributed approximation algorithm by applying linear programming approximation techniques. Our algorithm is an application of the G ..."
Abstract
 Add to MetaCart
(Show Context)
Abstract. We consider setting up sleep scheduling in sensor networks. We formulate the problem as an instance of the fractional domatic partition problem and obtain a distributed approximation algorithm by applying linear programming approximation techniques. Our algorithm is an application of the GargKönemann (GK) scheme that requires solving an instance of the minimum weight dominating set (MWDS) problem as a subroutine. Our two main contributions are a distributed implementation of the GK scheme for the sleepscheduling problem and a novel asynchronous distributed algorithm for approximating MWDS based on a primaldual analysis of Chvátal’s setcover algorithm. We evaluate our algorithm with ns2 simulations. 1
On the Approximability of Positive Influence Dominating Set in Social Networks
"... In social networks, there is a tendency for connected users to match each other’s behaviors. Moreover, a user likely adopts a behavior, if a certain fraction of his family and friends follows that behavior. Identifying people who have the most influential effect to the others is of great advantages, ..."
Abstract
 Add to MetaCart
In social networks, there is a tendency for connected users to match each other’s behaviors. Moreover, a user likely adopts a behavior, if a certain fraction of his family and friends follows that behavior. Identifying people who have the most influential effect to the others is of great advantages, especially in politics, marketing, behavior correction, and so on. Under a graphtheoretical framework, we study the positive influence dominating set (PIDS) problem that seeks for a minimal set of nodes P such that all other nodes in the network have at least a fraction ρ> 0 of their neighbors in P. We also study a different formulation, called total positive influence dominating set (TPIDS), in which even nodes in P are required to have a fraction ρ of neighbors inside P. We show that neither of these problems can be approximated within a factor of (1−ɛ) ln max{∆, V  1/2}, where ∆ is the maximum degree. Moreover, we provide a simple proof that both problems can be approximated within a factor ln ∆ + O(1). In powerlaw networks, where the degree sequence follows a powerlaw distribution, both problems admit constant factor approximation algorithms. Finally, we present a lineartime exact algorithms for trees.