Pattern Masking for Dictionary Matching: Theory and Practice

Data masking is a common technique for sanitizing sensitive data maintained in database systems which is becoming increasingly important in various application areas, such as in record linkage of personal data. This work formalizes the Pattern Masking for Dictionary Matching ( PMDM ) problem: given...

Full description

Saved in:
Bibliographic Details
Published in:Algorithmica Vol. 86; no. 6; pp. 1948 - 1978
Main Authors: Charalampopoulos, Panagiotis, Chen, Huiping, Christen, Peter, Loukides, Grigorios, Pisanti, Nadia, Pissis, Solon P., Radoszewski, Jakub
Format: Journal Article
Language:English
Published: New York Springer US 01.06.2024
Springer Nature B.V
Springer Verlag
Subjects:
ISSN:0178-4617, 1432-0541
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Data masking is a common technique for sanitizing sensitive data maintained in database systems which is becoming increasingly important in various application areas, such as in record linkage of personal data. This work formalizes the Pattern Masking for Dictionary Matching ( PMDM ) problem: given a dictionary D of d strings, each of length ℓ , a query string q of length ℓ , and a positive integer z , we are asked to compute a smallest set K ⊆ { 1 , … , ℓ } , so that if q [ i ] is replaced by a wildcard for all i ∈ K , then q matches at least z strings from D . Solving PMDM allows providing data utility guarantees as opposed to existing approaches. We first show, through a reduction from the well-known k -Clique problem, that a decision version of the PMDM problem is NP-complete, even for binary strings. We thus approach the problem from a more practical perspective. We show a combinatorial O ( ( d ℓ ) | K | / 3 + d ℓ ) -time and O ( d ℓ ) -space algorithm for PMDM for | K | = O ( 1 ) . In fact, we show that we cannot hope for a faster combinatorial algorithm, unless the combinatorial k -Clique hypothesis fails (Abboud et al. in SIAM J Comput 47:2527–2555, 2018; Lincoln et al., in: 29th ACM-SIAM Symposium on Discrete Algorithms (SODA), 2018). Our combinatorial algorithm, executed with small | K |, is the backbone of a greedy heuristic that we propose. Our experiments on real-world and synthetic datasets show that our heuristic finds nearly-optimal solutions in practice and is also very efficient. We also generalize this algorithm for the problem of masking multiple query strings simultaneously so that every string has at least z matches in D . PMDM can be viewed as a generalization of the decision version of the dictionary matching with mismatches problem: by querying a PMDM data structure with string q and z = 1 , one obtains the minimal number of mismatches of q with any string from D . The query time or space of all known data structures for the more restricted problem of dictionary matching with at most k mismatches incurs some exponential factor with respect to k . A simple exact algorithm for PMDM runs in time O ( 2 ℓ d ) . We present a data structure for PMDM that answers queries over D in time O ( 2 ℓ / 2 ( 2 ℓ / 2 + τ ) ℓ ) and requires space O ( 2 ℓ d 2 / τ 2 + 2 ℓ / 2 d ) , for any parameter τ ∈ [ 1 , d ] . We complement our results by showing a two-way polynomial-time reduction between PMDM and the Minimum Union problem [Chlamtáč et al., ACM-SIAM Symposium on Discrete Algorithms (SODA) 2017]. This gives a polynomial-time O ( d 1 / 4 + ϵ ) -approximation algorithm for PMDM , which is tight under a plausible complexity conjecture. This is an extended version of a paper that was presented at International Symposium on Algorithms and Computation (ISAAC) 2021.
AbstractList Data masking is a common technique for sanitizing sensitive data maintained in database systems which is becoming increasingly important in various application areas, such as in record linkage of personal data. This work formalizes the Pattern Masking for Dictionary Matching (PMDM) problem: given a dictionary D of d strings, each of length , a query string q of length , and a positive integer z, we are asked to compute a smallest set K ⊆ {1, . . . , }, so that if q[i] is replaced by a wildcard for all i ∈ K , then q matches at least z strings from D. Solving PMDM allows providing data utility guarantees as opposed to existing approaches. We first show, through a reduction from the well-known k-Clique problem, that a decision version of the PMDM problem is NP-complete, even for binary strings. We thus approach the problem from a more practical perspective. We show a combinatorial O((d ) |K |/3 + d )-time and O(d )-space algorithm for PMDM for |K | = O(1). In fact, we show that we cannot hope for a faster combinatorial algorithm, unless the combinatorial k-Clique hypothesis fails (
Data masking is a common technique for sanitizing sensitive data maintained in database systems which is becoming increasingly important in various application areas, such as in record linkage of personal data. This work formalizes the Pattern Masking for Dictionary Matching (PMDM) problem: given a dictionary D of d strings, each of length ℓ, a query string q of length ℓ, and a positive integer z, we are asked to compute a smallest set K⊆{1,…,ℓ}, so that if q[i] is replaced by a wildcard for all i∈K, then q matches at least z strings from D. Solving PMDM allows providing data utility guarantees as opposed to existing approaches. We first show, through a reduction from the well-known k-Clique problem, that a decision version of the PMDM problem is NP-complete, even for binary strings. We thus approach the problem from a more practical perspective. We show a combinatorial O((dℓ)|K|/3+dℓ)-time and O(dℓ)-space algorithm for PMDM for |K|=O(1). In fact, we show that we cannot hope for a faster combinatorial algorithm, unless the combinatorial k-Clique hypothesis fails (Abboud et al. in SIAM J Comput 47:2527–2555, 2018; Lincoln et al., in: 29th ACM-SIAM Symposium on Discrete Algorithms (SODA), 2018). Our combinatorial algorithm, executed with small |K|, is the backbone of a greedy heuristic that we propose. Our experiments on real-world and synthetic datasets show that our heuristic finds nearly-optimal solutions in practice and is also very efficient. We also generalize this algorithm for the problem of masking multiple query strings simultaneously so that every string has at least z matches in D. PMDM can be viewed as a generalization of the decision version of the dictionary matching with mismatches problem: by querying a PMDM data structure with string q and z=1, one obtains the minimal number of mismatches of q with any string from D. The query time or space of all known data structures for the more restricted problem of dictionary matching with at most k mismatches incurs some exponential factor with respect to k. A simple exact algorithm for PMDM runs in time O(2ℓd). We present a data structure for PMDM that answers queries over D in time O(2ℓ/2(2ℓ/2+τ)ℓ) and requires space O(2ℓd2/τ2+2ℓ/2d), for any parameter τ∈[1,d]. We complement our results by showing a two-way polynomial-time reduction between PMDM and the Minimum Union problem [Chlamtáč et al., ACM-SIAM Symposium on Discrete Algorithms (SODA) 2017]. This gives a polynomial-time O(d1/4+ϵ)-approximation algorithm for PMDM, which is tight under a plausible complexity conjecture. This is an extended version of a paper that was presented at International Symposium on Algorithms and Computation (ISAAC) 2021.
Data masking is a common technique for sanitizing sensitive data maintained in database systems which is becoming increasingly important in various application areas, such as in record linkage of personal data. This work formalizes the Pattern Masking for Dictionary Matching ( PMDM ) problem: given a dictionary D of d strings, each of length ℓ , a query string q of length ℓ , and a positive integer z , we are asked to compute a smallest set K ⊆ { 1 , … , ℓ } , so that if q [ i ] is replaced by a wildcard for all i ∈ K , then q matches at least z strings from D . Solving PMDM allows providing data utility guarantees as opposed to existing approaches. We first show, through a reduction from the well-known k -Clique problem, that a decision version of the PMDM problem is NP-complete, even for binary strings. We thus approach the problem from a more practical perspective. We show a combinatorial O ( ( d ℓ ) | K | / 3 + d ℓ ) -time and O ( d ℓ ) -space algorithm for PMDM for | K | = O ( 1 ) . In fact, we show that we cannot hope for a faster combinatorial algorithm, unless the combinatorial k -Clique hypothesis fails (Abboud et al. in SIAM J Comput 47:2527–2555, 2018; Lincoln et al., in: 29th ACM-SIAM Symposium on Discrete Algorithms (SODA), 2018). Our combinatorial algorithm, executed with small | K |, is the backbone of a greedy heuristic that we propose. Our experiments on real-world and synthetic datasets show that our heuristic finds nearly-optimal solutions in practice and is also very efficient. We also generalize this algorithm for the problem of masking multiple query strings simultaneously so that every string has at least z matches in D . PMDM can be viewed as a generalization of the decision version of the dictionary matching with mismatches problem: by querying a PMDM data structure with string q and z = 1 , one obtains the minimal number of mismatches of q with any string from D . The query time or space of all known data structures for the more restricted problem of dictionary matching with at most k mismatches incurs some exponential factor with respect to k . A simple exact algorithm for PMDM runs in time O ( 2 ℓ d ) . We present a data structure for PMDM that answers queries over D in time O ( 2 ℓ / 2 ( 2 ℓ / 2 + τ ) ℓ ) and requires space O ( 2 ℓ d 2 / τ 2 + 2 ℓ / 2 d ) , for any parameter τ ∈ [ 1 , d ] . We complement our results by showing a two-way polynomial-time reduction between PMDM and the Minimum Union problem [Chlamtáč et al., ACM-SIAM Symposium on Discrete Algorithms (SODA) 2017]. This gives a polynomial-time O ( d 1 / 4 + ϵ ) -approximation algorithm for PMDM , which is tight under a plausible complexity conjecture. This is an extended version of a paper that was presented at International Symposium on Algorithms and Computation (ISAAC) 2021.
Data masking is a common technique for sanitizing sensitive data maintained in database systems which is becoming increasingly important in various application areas, such as in record linkage of personal data. This work formalizes the Pattern Masking for Dictionary Matching ( PMDM ) problem: given a dictionary $$\mathscr {D}$$ D of d strings, each of length $$\ell $$ ℓ , a query string q of length $$\ell $$ ℓ , and a positive integer z , we are asked to compute a smallest set $$K\subseteq \{1,\ldots ,\ell \}$$ K ⊆ { 1 , … , ℓ } , so that if q [ i ] is replaced by a wildcard for all $$i\in K$$ i ∈ K , then q matches at least z strings from $$\mathscr {D}$$ D . Solving PMDM allows providing data utility guarantees as opposed to existing approaches. We first show, through a reduction from the well-known k -Clique problem, that a decision version of the PMDM problem is NP-complete, even for binary strings. We thus approach the problem from a more practical perspective. We show a combinatorial $$\mathscr {O}((d\ell )^{|K|/3}+d\ell )$$ O ( ( d ℓ ) | K | / 3 + d ℓ ) -time and $$\mathscr {O}(d\ell )$$ O ( d ℓ ) -space algorithm for PMDM for $$|K|=\mathscr {O}(1)$$ | K | = O ( 1 ) . In fact, we show that we cannot hope for a faster combinatorial algorithm, unless the combinatorial k -Clique hypothesis fails (Abboud et al. in SIAM J Comput 47:2527–2555, 2018; Lincoln et al., in: 29th ACM-SIAM Symposium on Discrete Algorithms (SODA), 2018). Our combinatorial algorithm, executed with small | K |, is the backbone of a greedy heuristic that we propose. Our experiments on real-world and synthetic datasets show that our heuristic finds nearly-optimal solutions in practice and is also very efficient. We also generalize this algorithm for the problem of masking multiple query strings simultaneously so that every string has at least z matches in $$\mathscr {D}$$ D . PMDM can be viewed as a generalization of the decision version of the dictionary matching with mismatches problem: by querying a PMDM data structure with string q and $$z=1$$ z = 1 , one obtains the minimal number of mismatches of q with any string from $$\mathscr {D}$$ D . The query time or space of all known data structures for the more restricted problem of dictionary matching with at most k mismatches incurs some exponential factor with respect to k . A simple exact algorithm for PMDM runs in time $$\mathscr {O}(2^\ell d)$$ O ( 2 ℓ d ) . We present a data structure for PMDM that answers queries over $$\mathscr {D}$$ D in time $$\mathscr {O}(2^{\ell /2}(2^{\ell /2}+\tau )\ell )$$ O ( 2 ℓ / 2 ( 2 ℓ / 2 + τ ) ℓ ) and requires space $$\mathscr {O}(2^{\ell }d^2/\tau ^2+2^{\ell /2}d)$$ O ( 2 ℓ d 2 / τ 2 + 2 ℓ / 2 d ) , for any parameter $$\tau \in [1,d]$$ τ ∈ [ 1 , d ] . We complement our results by showing a two-way polynomial-time reduction between PMDM and the Minimum Union problem [Chlamtáč et al., ACM-SIAM Symposium on Discrete Algorithms (SODA) 2017]. This gives a polynomial-time $$\mathscr {O}(d^{1/4+\epsilon })$$ O ( d 1 / 4 + ϵ ) -approximation algorithm for PMDM , which is tight under a plausible complexity conjecture. This is an extended version of a paper that was presented at International Symposium on Algorithms and Computation (ISAAC) 2021.
Author Pissis, Solon P.
Radoszewski, Jakub
Chen, Huiping
Christen, Peter
Charalampopoulos, Panagiotis
Loukides, Grigorios
Pisanti, Nadia
Author_xml – sequence: 1
  givenname: Panagiotis
  surname: Charalampopoulos
  fullname: Charalampopoulos, Panagiotis
  organization: School of Computing and Mathematical Sciences, Birkbeck, University of London
– sequence: 2
  givenname: Huiping
  surname: Chen
  fullname: Chen, Huiping
  email: h.chen.13@bham.ac.uk
  organization: School of Computer Science, University of Birmingham
– sequence: 3
  givenname: Peter
  surname: Christen
  fullname: Christen, Peter
  organization: Australian National University
– sequence: 4
  givenname: Grigorios
  surname: Loukides
  fullname: Loukides, Grigorios
  organization: Department of Informatics, King’s College London
– sequence: 5
  givenname: Nadia
  surname: Pisanti
  fullname: Pisanti, Nadia
  organization: Università di Pisa
– sequence: 6
  givenname: Solon P.
  orcidid: 0000-0002-1445-1932
  surname: Pissis
  fullname: Pissis, Solon P.
  email: solon.pissis@cwi.nl
  organization: CWI, Vrije Universiteit
– sequence: 7
  givenname: Jakub
  surname: Radoszewski
  fullname: Radoszewski, Jakub
  organization: Institute of Informatics, University of Warsaw
BackLink https://inria.hal.science/hal-04747475$$DView record in HAL
BookMark eNp9kE9LAzEUxINUsK1-AU8LnjxE39tkN7vipdS_ULGHeg7ZbLbdWpOabAW_vakrepM5PBh-MzxmRAbWWUPIKcIFAojLAMAzRiHlFDBFRosDMkTOUgoZxwEZAoqC8hzFERmFsIZIiTIfkuu56jrjbfKkwmtrl0njfHLT6q51VvnPaHd6Ff2rZLEyLhrK1sncqwhoc0wOG7UJ5uTnjsnL3e1i-kBnz_eP08mMasaLjqJmBTNYFhwVqxREmdJUKdRlrTJeCVY1aHjNsNRphjpnOmW6rlTOhS6hZmNy3veu1EZuffsWP5NOtfJhMpN7D7jYK_vAyJ717Na7950JnVy7nbfxPckgKwTnTJSRSntKexeCN81vLYLcLyr7RWVcVH4vKosYYn0oRNgujf-r_if1BQLbeK4
Cites_doi 10.1016/j.jcss.2006.04.007
10.1145/3377455
10.1007/s00224-013-9498-4
10.1016/J.TCS.2009.07.020
10.1016/j.tcs.2009.07.014
10.1145/1391729.1391730
10.1016/j.tcs.2014.09.003
10.1109/TKDE.2013.91
10.1109/TCBB.2005.5
10.1137/16M1061771
10.1137/070684859
10.1137/09075336X
10.1007/s10878-006-9029-1
10.1007/978-3-030-59706-1
10.1016/j.tcs.2017.04.012
10.1016/S0020-0190(00)00079-X
10.1137/16M1096402
10.1007/978-3-642-31164-2
10.1007/s00453-008-9263-2
10.1145/360825.360855
10.1007/BF02392825
10.1007/s10619-019-07263-0
10.1007/s00453-015-9990-0
10.1016/j.jcss.2004.04.006
10.1145/3277006.3277015
10.4086/toc.2007.v003a006
10.1006/jagm.1997.0875
10.1089/CMB.2010.0177
10.1007/978-3-319-21275-3
10.1007/978-3-540-24777-7_11
10.1145/1749603.1749605
10.1006/jcss.2000.1727
10.1137/120884857
10.1145/828.1884
10.1109/69.971193
10.1137/0205003
10.1145/2889311
10.1136/amiajnl-2013-002165
10.1006/jcss.1998.1577
10.1007/978-3-642-11269-0_6
10.1137/1.9781611975482.70
10.1109/SWAT.1973.13
10.4230/LIPIcs.ISAAC.2021.65.
10.1137/1.9781611974782.56
10.1007/978-3-540-45138-9_56
10.1145/301250.301330
10.1007/3-540-45465-9_39
10.1109/BigData.2017.8258486
10.1007/978-3-662-44777-2_38
10.1145/275487.275508
10.1145/3196959.3196984
10.1145/1007352.1007374
10.5555/3361476.3361489
10.1109/ICDE.2009.104
10.1145/2076623.2076632
10.1007/978-3-642-02441-2_14
10.1145/2661829.2661875
10.4230/LIPIcs.ICALP.2016.93
10.1145/2063576.2063981
10.1137/1.9781611976465.32
10.1007/978-3-540-68279-0_8
10.1142/9789813272880_0188
10.3386/w24019
10.1145/3173574.3173900
10.4230/LIPIcs.STACS.2014.506
10.1145/2608628.2608664
10.1137/1.9781611975031.80
10.1007/978-3-319-49340-4
10.1007/978-3-642-33486-3_28
ContentType Journal Article
Copyright The Author(s) 2024
The Author(s) 2024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Attribution
Copyright_xml – notice: The Author(s) 2024
– notice: The Author(s) 2024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: Attribution
DBID C6C
AAYXX
CITATION
JQ2
1XC
VOOES
DOI 10.1007/s00453-024-01213-8
DatabaseName Springer Nature OA Free Journals
CrossRef
ProQuest Computer Science Collection
Hyper Article en Ligne (HAL)
Hyper Article en Ligne (HAL) (Open Access)
DatabaseTitle CrossRef
ProQuest Computer Science Collection
DatabaseTitleList
ProQuest Computer Science Collection

CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1432-0541
EndPage 1978
ExternalDocumentID oai:HAL:hal-04747475v1
10_1007_s00453_024_01213_8
GroupedDBID -4Z
-59
-5G
-BR
-EM
-Y2
-~C
-~X
.86
.DC
.VR
06D
0R~
0VY
199
1N0
1SB
203
23M
28-
2J2
2JN
2JY
2KG
2KM
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5GY
5QI
5VS
67Z
6NX
78A
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAOBN
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDPE
ABDZT
ABECU
ABFSI
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABLJU
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTAH
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AI.
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BA0
BBWZM
BDATZ
BGNMA
BSONS
C6C
CAG
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
E.L
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
H13
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
H~9
I09
IHE
IJ-
IKXTQ
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
KOW
LAS
LLZTM
M4Y
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
P19
P9O
PF-
PT4
PT5
QOK
QOS
R4E
R89
R9I
RHV
RIG
RNI
RNS
ROL
RPX
RSV
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCJ
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TN5
TSG
TSK
TSV
TUC
U2A
UG4
UOJIU
UQL
UTJUX
UZXMN
VC2
VFIZW
VH1
VXZ
W23
W48
WK8
YLTOR
Z45
Z7X
Z83
Z88
Z8R
Z8W
Z92
ZMTXR
ZY4
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
AEZWR
AFDZB
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
JQ2
1XC
VOOES
ID FETCH-LOGICAL-c348t-1c383e19841a3ba0a0ae9eb20d9da54b73bf1e4d319c251c63c23cdba647c90d3
IEDL.DBID RSV
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001176263800002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0178-4617
IngestDate Tue Oct 14 20:39:37 EDT 2025
Thu Oct 02 16:26:42 EDT 2025
Sat Nov 29 02:20:34 EST 2025
Fri Feb 21 02:40:16 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 6
Keywords String algorithms
Dictionary matching
Wildcards
Record linkage
Query term dropping
String algorithms Dictionary matching Wildcards Record linkage
Language English
License Attribution: http://creativecommons.org/licenses/by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c348t-1c383e19841a3ba0a0ae9eb20d9da54b73bf1e4d319c251c63c23cdba647c90d3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-1445-1932
OpenAccessLink https://link.springer.com/10.1007/s00453-024-01213-8
PQID 3058744379
PQPubID 2043795
PageCount 31
ParticipantIDs hal_primary_oai_HAL_hal_04747475v1
proquest_journals_3058744379
crossref_primary_10_1007_s00453_024_01213_8
springer_journals_10_1007_s00453_024_01213_8
PublicationCentury 2000
PublicationDate 2024-06-01
PublicationDateYYYYMMDD 2024-06-01
PublicationDate_xml – month: 06
  year: 2024
  text: 2024-06-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle Algorithmica
PublicationTitleAbbrev Algorithmica
PublicationYear 2024
Publisher Springer US
Springer Nature B.V
Springer Verlag
Publisher_xml – name: Springer US
– name: Springer Nature B.V
– name: Springer Verlag
References Zuckerman (CR78) 2007; 3
Yao, Yao (CR77) 1997; 25
Kum, Krishnamurthy, Machanavajjhala, Reiter, Ahalt (CR50) 2014; 21
Ilyas, Beskales, Soliman (CR42) 2008
Rivest (CR64) 1976; 5
CR35
Papadakis, Skoutas, Thanos, Palpanas (CR58) 2020
CR34
CR76
Konda (CR48) 2018; 47
CR75
CR74
Chan, Lam, Sung, Tam, Wong (CR16) 2010; 58
CR73
CR72
CR71
CR70
Abboud, Backurs, Williams (CR1) 2018; 47
Arimura, Uno (CR6) 2007; 13
CR2
CR4
Hastad (CR38) 1999; 182
Kellerer, Pferschy, Pisinger (CR47) 2004
CR8
CR7
Grossi, Menconi, Pisanti, Trani, Vind (CR37) 2018; 710
CR49
CR46
Grossi, Pietracaprina, Pisanti, Pucci, Upfal, Vandin (CR36) 2011; 18
Fredman, Komlós, Szemerédi (CR32) 1984; 31
Pǎtraşcu, Thorup (CR60) 2009; 39
Samarati (CR67) 2001; 13
CR41
CR40
Battaglia, Cangelosi, Grossi, Pisanti (CR9) 2009; 410
Cygan, Fomin, Kowalik, Lokshtanov, Marx, Pilipczuk, Pilipczuk, Saurabh (CR28) 2015
Christen (CR22) 2012
Impagliazzo, Paturi (CR43) 2001; 62
Federico, Pisanti (CR31) 2009; 410
Belazzougui, Venturini (CR11) 2016; 74
Bille, Gørtz, Vildhøj, Vind (CR12) 2014; 55
Brodal, Venkatesh (CR14) 2000; 75
CR18
CR17
CR15
CR13
CR57
CR55
Pǎtraşcu (CR59) 2011; 40
CR10
CR53
CR52
Lewenstein, Munro, Raman, Thankachan (CR54) 2014; 557
Jayram, Khot, Kumar, Rabani (CR44) 2004; 69
CR51
Fung, Wang, Chen, Yu (CR33) 2010; 42
Pisanti, Crochemore, Grossi, Sagot (CR62) 2005; 2
Herzog, Scheuren, Winkler (CR39) 2007
Aho, Corasick (CR3) 1975; 18
Chlamtáč, Dinitz, Konrad, Kortsarz, Rabanca (CR21) 2018; 32
Miltersen, Nisan, Safra, Wigderson (CR56) 1998; 57
Christen, Ranbaduge, Schnell (CR24) 2020
CR29
CR27
CR26
CR25
CR69
CR68
CR66
Applebaum (CR5) 2013; 42
CR65
CR20
Christen, Gayler, Tran, Fisher, Vatsalan (CR23) 2016
Chen, Huang, Kanj, Xia (CR19) 2006; 72
CR63
Karapiperis, Gkoulalas-Divanis, Verykios (CR45) 2019
CR61
Durham, Kantarcioglu, Xue, Tóth, Malin (CR30) 2014; 26
1213_CR51
D Zuckerman (1213_CR78) 2007; 3
J Hastad (1213_CR38) 1999; 182
1213_CR15
1213_CR13
R Grossi (1213_CR37) 2018; 710
1213_CR57
1213_CR10
H Chan (1213_CR16) 2010; 58
1213_CR55
M Pǎtraşcu (1213_CR60) 2009; 39
1213_CR52
1213_CR53
1213_CR18
1213_CR17
M Cygan (1213_CR28) 2015
H Arimura (1213_CR6) 2007; 13
1213_CR61
TN Herzog (1213_CR39) 2007
P Christen (1213_CR24) 2020
1213_CR25
1213_CR69
1213_CR26
D Belazzougui (1213_CR11) 2016; 74
1213_CR68
GS Brodal (1213_CR14) 2000; 75
1213_CR65
1213_CR66
P Samarati (1213_CR67) 2001; 13
1213_CR63
1213_CR20
BCM Fung (1213_CR33) 2010; 42
1213_CR29
1213_CR27
PB Miltersen (1213_CR56) 1998; 57
G Papadakis (1213_CR58) 2020
M Pǎtraşcu (1213_CR59) 2011; 40
P Christen (1213_CR22) 2012
R Grossi (1213_CR36) 2011; 18
D Karapiperis (1213_CR45) 2019
1213_CR4
1213_CR72
1213_CR73
E Chlamtáč (1213_CR21) 2018; 32
1213_CR70
M Federico (1213_CR31) 2009; 410
1213_CR71
1213_CR8
1213_CR7
B Applebaum (1213_CR5) 2013; 42
AC Yao (1213_CR77) 1997; 25
1213_CR34
1213_CR35
M Lewenstein (1213_CR54) 2014; 557
1213_CR76
EA Durham (1213_CR30) 2014; 26
1213_CR2
1213_CR74
J Chen (1213_CR19) 2006; 72
1213_CR75
RL Rivest (1213_CR64) 1976; 5
H Kellerer (1213_CR47) 2004
P Konda (1213_CR48) 2018; 47
AV Aho (1213_CR3) 1975; 18
1213_CR40
ML Fredman (1213_CR32) 1984; 31
IF Ilyas (1213_CR42) 2008
TS Jayram (1213_CR44) 2004; 69
1213_CR46
P Christen (1213_CR23) 2016
R Impagliazzo (1213_CR43) 2001; 62
1213_CR41
P Bille (1213_CR12) 2014; 55
G Battaglia (1213_CR9) 2009; 410
A Abboud (1213_CR1) 2018; 47
1213_CR49
N Pisanti (1213_CR62) 2005; 2
HC Kum (1213_CR50) 2014; 21
References_xml – ident: CR70
– volume: 72
  start-page: 1346
  issue: 8
  year: 2006
  end-page: 1367
  ident: CR19
  article-title: Strong computational lower bounds via parameterized complexity
  publication-title: J. Comput. Syst. Sci.
  doi: 10.1016/j.jcss.2006.04.007
– year: 2020
  ident: CR58
  article-title: Blocking and filtering techniques for entity resolution: a survey
  publication-title: ACM Comput. Surv.
  doi: 10.1145/3377455
– ident: CR49
– ident: CR68
– ident: CR74
– volume: 55
  start-page: 41
  issue: 1
  year: 2014
  end-page: 60
  ident: CR12
  article-title: String indexing for patterns with wildcards
  publication-title: Theory Comput. Syst.
  doi: 10.1007/s00224-013-9498-4
– ident: CR4
– volume: 410
  start-page: 4391
  issue: 43
  year: 2009
  end-page: 4401
  ident: CR31
  article-title: Suffix tree characterization of maximal motifs in biological sequences
  publication-title: Theor. Comput. Sci.
  doi: 10.1016/J.TCS.2009.07.020
– volume: 410
  start-page: 4327
  issue: 43
  year: 2009
  end-page: 4340
  ident: CR9
  article-title: Masking patterns in sequences: a new class of motif discovery with don’t cares
  publication-title: Theor. Comput. Sci.
  doi: 10.1016/j.tcs.2009.07.014
– year: 2008
  ident: CR42
  article-title: A survey of top-k query processing techniques in relational database systems
  publication-title: ACM Comput. Surveys
  doi: 10.1145/1391729.1391730
– ident: CR51
– volume: 557
  start-page: 120
  year: 2014
  end-page: 127
  ident: CR54
  article-title: Less space: Indexing for queries with wildcards
  publication-title: Theor. Comput. Sci.
  doi: 10.1016/j.tcs.2014.09.003
– ident: CR35
– ident: CR29
– ident: CR61
– volume: 26
  start-page: 2956
  issue: 12
  year: 2014
  end-page: 2968
  ident: CR30
  article-title: Composite bloom filters for secure record linkage
  publication-title: IEEE Trans. Knowl. Data Eng.
  doi: 10.1109/TKDE.2013.91
– volume: 2
  start-page: 40
  issue: 1
  year: 2005
  end-page: 50
  ident: CR62
  article-title: Bases of motifs for generating repeated patterns with wild cards
  publication-title: IEEE/ACM Trans. Comput. Biol. Bioinf.
  doi: 10.1109/TCBB.2005.5
– ident: CR8
– ident: CR25
– volume: 47
  start-page: 2527
  issue: 6
  year: 2018
  end-page: 2555
  ident: CR1
  article-title: If the current clique algorithms are optimal, so is Valiant’s parser
  publication-title: SIAM J. Comput.
  doi: 10.1137/16M1061771
– volume: 39
  start-page: 730
  issue: 2
  year: 2009
  end-page: 741
  ident: CR60
  article-title: Higher lower bounds for near-neighbor and further rich problems
  publication-title: SIAM J. Comput.
  doi: 10.1137/070684859
– volume: 40
  start-page: 827
  issue: 3
  year: 2011
  end-page: 847
  ident: CR59
  article-title: Unifying the landscape of cell-probe lower bounds
  publication-title: SIAM J. Comput.
  doi: 10.1137/09075336X
– volume: 13
  start-page: 243
  issue: 3
  year: 2007
  end-page: 262
  ident: CR6
  article-title: An efficient polynomial space and polynomial delay algorithm for enumeration of maximal motifs in a sequence
  publication-title: J. Comb. Optim.
  doi: 10.1007/s10878-006-9029-1
– ident: CR46
– ident: CR71
– ident: CR75
– ident: CR15
– year: 2020
  ident: CR24
  publication-title: Linking Sensitive Data
  doi: 10.1007/978-3-030-59706-1
– volume: 710
  start-page: 74
  year: 2018
  end-page: 87
  ident: CR37
  article-title: Motif trie: An efficient text index for pattern discovery with don’t cares
  publication-title: Theor. Comput. Sci.
  doi: 10.1016/j.tcs.2017.04.012
– ident: CR57
– volume: 75
  start-page: 57
  issue: 1–2
  year: 2000
  end-page: 59
  ident: CR14
  article-title: Improved bounds for dictionary look-up with one error
  publication-title: Inf. Process. Lett.
  doi: 10.1016/S0020-0190(00)00079-X
– volume: 32
  start-page: 1458
  issue: 2
  year: 2018
  end-page: 1477
  ident: CR21
  article-title: The densest k-subhypergraph problem
  publication-title: SIAM J. Discrete Math.
  doi: 10.1137/16M1096402
– year: 2007
  ident: CR39
  publication-title: Data Quality and Record Linkage Techniques
– ident: CR26
– year: 2012
  ident: CR22
  publication-title: Data Matching - Concepts and Techniques for Record Linkage, Entity Resolution, and Duplicate Detection. Data-Centric Systems and Applications
  doi: 10.1007/978-3-642-31164-2
– volume: 58
  start-page: 263
  issue: 2
  year: 2010
  end-page: 281
  ident: CR16
  article-title: Compressed indexes for approximate string matching
  publication-title: Algorithmica
  doi: 10.1007/s00453-008-9263-2
– volume: 18
  start-page: 333
  issue: 6
  year: 1975
  end-page: 340
  ident: CR3
  article-title: Efficient string matching: an aid to bibliographic search
  publication-title: Commun. ACM
  doi: 10.1145/360825.360855
– volume: 182
  start-page: 105
  year: 1999
  end-page: 142
  ident: CR38
  article-title: Clique is hard to approximate within
  publication-title: Acta Math.
  doi: 10.1007/BF02392825
– ident: CR18
– year: 2019
  ident: CR45
  article-title: Summarizing and linking electronic health records
  publication-title: Distrib. Parallel Datab.
  doi: 10.1007/s10619-019-07263-0
– ident: CR66
– ident: CR72
– volume: 74
  start-page: 1099
  issue: 3
  year: 2016
  end-page: 1122
  ident: CR11
  article-title: Compressed string dictionary search with edit distance one
  publication-title: Algorithmica
  doi: 10.1007/s00453-015-9990-0
– volume: 69
  start-page: 435
  issue: 3
  year: 2004
  end-page: 447
  ident: CR44
  article-title: Cell-probe lower bounds for the partial match problem
  publication-title: J. Comput. Syst. Sci.
  doi: 10.1016/j.jcss.2004.04.006
– ident: CR2
– ident: CR53
– ident: CR10
– volume: 47
  start-page: 33
  issue: 1
  year: 2018
  end-page: 40
  ident: CR48
  article-title: Technical perspective: toward building entity matching management systems
  publication-title: SIGMOD Record
  doi: 10.1145/3277006.3277015
– volume: 3
  start-page: 103
  issue: 1
  year: 2007
  end-page: 128
  ident: CR78
  article-title: Linear degree extractors and the inapproximability of max clique and chromatic number
  publication-title: Theory Comput.
  doi: 10.4086/toc.2007.v003a006
– ident: CR40
– ident: CR63
– volume: 25
  start-page: 194
  issue: 1
  year: 1997
  end-page: 202
  ident: CR77
  article-title: Dictionary look-up with one error
  publication-title: J. Algorithms
  doi: 10.1006/jagm.1997.0875
– volume: 18
  start-page: 535
  issue: 4
  year: 2011
  end-page: 545
  ident: CR36
  article-title: MADMX: a strategy for maximal dense motif extraction
  publication-title: J. Comput. Biol.
  doi: 10.1089/CMB.2010.0177
– ident: CR27
– year: 2015
  ident: CR28
  publication-title: Parameterized Algorithms
  doi: 10.1007/978-3-319-21275-3
– start-page: 317
  year: 2004
  end-page: 347
  ident: CR47
  publication-title: The Multiple-Choice Knapsack Problem
  doi: 10.1007/978-3-540-24777-7_11
– ident: CR69
– volume: 42
  start-page: 1
  issue: 4
  year: 2010
  end-page: 53
  ident: CR33
  article-title: Privacy-preserving data publishing: a survey of recent developments
  publication-title: ACM Comput. Surv.
  doi: 10.1145/1749603.1749605
– ident: CR73
– ident: CR65
– volume: 62
  start-page: 367
  issue: 2
  year: 2001
  end-page: 375
  ident: CR43
  article-title: On the complexity of k-SAT
  publication-title: J. Comput. Syst. Sci.
  doi: 10.1006/jcss.2000.1727
– ident: CR52
– ident: CR17
– ident: CR13
– ident: CR34
– ident: CR55
– ident: CR7
– ident: CR76
– volume: 42
  start-page: 2008
  issue: 5
  year: 2013
  end-page: 2037
  ident: CR5
  article-title: Pseudorandom generators with long stretch and low locality from random local one-way functions
  publication-title: SIAM J. Comput.
  doi: 10.1137/120884857
– ident: CR41
– volume: 31
  start-page: 538
  issue: 3
  year: 1984
  end-page: 544
  ident: CR32
  article-title: Storing a sparse table with worst case access time
  publication-title: J. ACM
  doi: 10.1145/828.1884
– volume: 13
  start-page: 1010
  issue: 6
  year: 2001
  end-page: 1027
  ident: CR67
  article-title: Protecting respondents’ identities in microdata release
  publication-title: IEEE Trans. Knowl. Data Eng.
  doi: 10.1109/69.971193
– ident: CR20
– volume: 5
  start-page: 19
  issue: 1
  year: 1976
  end-page: 50
  ident: CR64
  article-title: Partial-match retrieval algorithms
  publication-title: SIAM J. Comput.
  doi: 10.1137/0205003
– year: 2016
  ident: CR23
  article-title: Automatic discovery of abnormal values in large textual databases
  publication-title: J. Data Inf. Qual.
  doi: 10.1145/2889311
– volume: 21
  start-page: 212
  issue: 2
  year: 2014
  end-page: 220
  ident: CR50
  article-title: Privacy preserving interactive record linkage (PPIRL)
  publication-title: J. Am. Med. Inform. Assoc.
  doi: 10.1136/amiajnl-2013-002165
– volume: 57
  start-page: 37
  issue: 1
  year: 1998
  end-page: 49
  ident: CR56
  article-title: On data structures and asymmetric communication complexity
  publication-title: J. Comput. Syst. Sci.
  doi: 10.1006/jcss.1998.1577
– ident: 1213_CR15
  doi: 10.1007/978-3-642-11269-0_6
– year: 2019
  ident: 1213_CR45
  publication-title: Distrib. Parallel Datab.
  doi: 10.1007/s10619-019-07263-0
– ident: 1213_CR25
  doi: 10.1137/1.9781611975482.70
– ident: 1213_CR75
  doi: 10.1109/SWAT.1973.13
– ident: 1213_CR17
  doi: 10.4230/LIPIcs.ISAAC.2021.65.
– ident: 1213_CR70
– ident: 1213_CR20
  doi: 10.1137/1.9781611974782.56
– ident: 1213_CR61
  doi: 10.1007/978-3-540-45138-9_56
– volume: 13
  start-page: 1010
  issue: 6
  year: 2001
  ident: 1213_CR67
  publication-title: IEEE Trans. Knowl. Data Eng.
  doi: 10.1109/69.971193
– volume: 62
  start-page: 367
  issue: 2
  year: 2001
  ident: 1213_CR43
  publication-title: J. Comput. Syst. Sci.
  doi: 10.1006/jcss.2000.1727
– volume: 557
  start-page: 120
  year: 2014
  ident: 1213_CR54
  publication-title: Theor. Comput. Sci.
  doi: 10.1016/j.tcs.2014.09.003
– volume: 410
  start-page: 4391
  issue: 43
  year: 2009
  ident: 1213_CR31
  publication-title: Theor. Comput. Sci.
  doi: 10.1016/J.TCS.2009.07.020
– ident: 1213_CR41
– volume: 3
  start-page: 103
  issue: 1
  year: 2007
  ident: 1213_CR78
  publication-title: Theory Comput.
  doi: 10.4086/toc.2007.v003a006
– ident: 1213_CR13
  doi: 10.1145/301250.301330
– ident: 1213_CR18
  doi: 10.1007/3-540-45465-9_39
– volume: 26
  start-page: 2956
  issue: 12
  year: 2014
  ident: 1213_CR30
  publication-title: IEEE Trans. Knowl. Data Eng.
  doi: 10.1109/TKDE.2013.91
– volume: 42
  start-page: 2008
  issue: 5
  year: 2013
  ident: 1213_CR5
  publication-title: SIAM J. Comput.
  doi: 10.1137/120884857
– ident: 1213_CR27
  doi: 10.1109/BigData.2017.8258486
– volume: 2
  start-page: 40
  issue: 1
  year: 2005
  ident: 1213_CR62
  publication-title: IEEE/ACM Trans. Comput. Biol. Bioinf.
  doi: 10.1109/TCBB.2005.5
– volume: 410
  start-page: 4327
  issue: 43
  year: 2009
  ident: 1213_CR9
  publication-title: Theor. Comput. Sci.
  doi: 10.1016/j.tcs.2009.07.014
– ident: 1213_CR34
  doi: 10.1007/978-3-662-44777-2_38
– ident: 1213_CR65
  doi: 10.1145/275487.275508
– volume: 58
  start-page: 263
  issue: 2
  year: 2010
  ident: 1213_CR16
  publication-title: Algorithmica
  doi: 10.1007/s00453-008-9263-2
– ident: 1213_CR72
  doi: 10.1145/3196959.3196984
– volume: 42
  start-page: 1
  issue: 4
  year: 2010
  ident: 1213_CR33
  publication-title: ACM Comput. Surv.
  doi: 10.1145/1749603.1749605
– volume-title: Linking Sensitive Data
  year: 2020
  ident: 1213_CR24
  doi: 10.1007/978-3-030-59706-1
– ident: 1213_CR26
  doi: 10.1145/1007352.1007374
– ident: 1213_CR71
– ident: 1213_CR49
  doi: 10.5555/3361476.3361489
– ident: 1213_CR51
– volume: 55
  start-page: 41
  issue: 1
  year: 2014
  ident: 1213_CR12
  publication-title: Theory Comput. Syst.
  doi: 10.1007/s00224-013-9498-4
– volume: 57
  start-page: 37
  issue: 1
  year: 1998
  ident: 1213_CR56
  publication-title: J. Comput. Syst. Sci.
  doi: 10.1006/jcss.1998.1577
– volume: 40
  start-page: 827
  issue: 3
  year: 2011
  ident: 1213_CR59
  publication-title: SIAM J. Comput.
  doi: 10.1137/09075336X
– ident: 1213_CR29
  doi: 10.1109/ICDE.2009.104
– ident: 1213_CR69
– volume: 5
  start-page: 19
  issue: 1
  year: 1976
  ident: 1213_CR64
  publication-title: SIAM J. Comput.
  doi: 10.1137/0205003
– ident: 1213_CR68
  doi: 10.1145/2076623.2076632
– ident: 1213_CR10
  doi: 10.1007/978-3-642-02441-2_14
– ident: 1213_CR73
  doi: 10.1145/2661829.2661875
– volume: 25
  start-page: 194
  issue: 1
  year: 1997
  ident: 1213_CR77
  publication-title: J. Algorithms
  doi: 10.1006/jagm.1997.0875
– volume-title: Data Quality and Record Linkage Techniques
  year: 2007
  ident: 1213_CR39
– ident: 1213_CR2
  doi: 10.4230/LIPIcs.ICALP.2016.93
– volume: 47
  start-page: 33
  issue: 1
  year: 2018
  ident: 1213_CR48
  publication-title: SIGMOD Record
  doi: 10.1145/3277006.3277015
– ident: 1213_CR35
  doi: 10.1145/2063576.2063981
– volume: 47
  start-page: 2527
  issue: 6
  year: 2018
  ident: 1213_CR1
  publication-title: SIAM J. Comput.
  doi: 10.1137/16M1061771
– ident: 1213_CR4
  doi: 10.1137/1.9781611976465.32
– volume: 75
  start-page: 57
  issue: 1–2
  year: 2000
  ident: 1213_CR14
  publication-title: Inf. Process. Lett.
  doi: 10.1016/S0020-0190(00)00079-X
– volume: 18
  start-page: 535
  issue: 4
  year: 2011
  ident: 1213_CR36
  publication-title: J. Comput. Biol.
  doi: 10.1089/CMB.2010.0177
– volume: 18
  start-page: 333
  issue: 6
  year: 1975
  ident: 1213_CR3
  publication-title: Commun. ACM
  doi: 10.1145/360825.360855
– start-page: 317
  volume-title: The Multiple-Choice Knapsack Problem
  year: 2004
  ident: 1213_CR47
  doi: 10.1007/978-3-540-24777-7_11
– ident: 1213_CR66
– volume: 31
  start-page: 538
  issue: 3
  year: 1984
  ident: 1213_CR32
  publication-title: J. ACM
  doi: 10.1145/828.1884
– ident: 1213_CR46
  doi: 10.1007/978-3-540-68279-0_8
– volume: 13
  start-page: 243
  issue: 3
  year: 2007
  ident: 1213_CR6
  publication-title: J. Comb. Optim.
  doi: 10.1007/s10878-006-9029-1
– ident: 1213_CR76
  doi: 10.1142/9789813272880_0188
– ident: 1213_CR8
  doi: 10.3386/w24019
– volume: 39
  start-page: 730
  issue: 2
  year: 2009
  ident: 1213_CR60
  publication-title: SIAM J. Comput.
  doi: 10.1137/070684859
– ident: 1213_CR63
  doi: 10.1145/3173574.3173900
– ident: 1213_CR52
  doi: 10.4230/LIPIcs.STACS.2014.506
– volume: 182
  start-page: 105
  year: 1999
  ident: 1213_CR38
  publication-title: Acta Math.
  doi: 10.1007/BF02392825
– ident: 1213_CR57
– year: 2020
  ident: 1213_CR58
  publication-title: ACM Comput. Surv.
  doi: 10.1145/3377455
– volume-title: Parameterized Algorithms
  year: 2015
  ident: 1213_CR28
  doi: 10.1007/978-3-319-21275-3
– volume-title: Data Matching - Concepts and Techniques for Record Linkage, Entity Resolution, and Duplicate Detection. Data-Centric Systems and Applications
  year: 2012
  ident: 1213_CR22
  doi: 10.1007/978-3-642-31164-2
– volume: 710
  start-page: 74
  year: 2018
  ident: 1213_CR37
  publication-title: Theor. Comput. Sci.
  doi: 10.1016/j.tcs.2017.04.012
– volume: 21
  start-page: 212
  issue: 2
  year: 2014
  ident: 1213_CR50
  publication-title: J. Am. Med. Inform. Assoc.
  doi: 10.1136/amiajnl-2013-002165
– volume: 72
  start-page: 1346
  issue: 8
  year: 2006
  ident: 1213_CR19
  publication-title: J. Comput. Syst. Sci.
  doi: 10.1016/j.jcss.2006.04.007
– year: 2008
  ident: 1213_CR42
  publication-title: ACM Comput. Surveys
  doi: 10.1145/1391729.1391730
– volume: 69
  start-page: 435
  issue: 3
  year: 2004
  ident: 1213_CR44
  publication-title: J. Comput. Syst. Sci.
  doi: 10.1016/j.jcss.2004.04.006
– ident: 1213_CR53
  doi: 10.1145/2608628.2608664
– year: 2016
  ident: 1213_CR23
  publication-title: J. Data Inf. Qual.
  doi: 10.1145/2889311
– ident: 1213_CR55
  doi: 10.1137/1.9781611975031.80
– volume: 32
  start-page: 1458
  issue: 2
  year: 2018
  ident: 1213_CR21
  publication-title: SIAM J. Discrete Math.
  doi: 10.1137/16M1096402
– ident: 1213_CR74
  doi: 10.1007/978-3-319-49340-4
– ident: 1213_CR40
  doi: 10.1007/978-3-642-33486-3_28
– ident: 1213_CR7
– volume: 74
  start-page: 1099
  issue: 3
  year: 2016
  ident: 1213_CR11
  publication-title: Algorithmica
  doi: 10.1007/s00453-015-9990-0
SSID ssj0012796
Score 2.3770752
Snippet Data masking is a common technique for sanitizing sensitive data maintained in database systems which is becoming increasingly important in various application...
SourceID hal
proquest
crossref
springer
SourceType Open Access Repository
Aggregation Database
Index Database
Publisher
StartPage 1948
SubjectTerms Algorithm Analysis and Problem Complexity
Algorithms
Bioinformatics
Combinatorial analysis
Computer Science
Computer Systems Organization and Communication Networks
Data structures
Data Structures and Information Theory
Dictionaries
Greedy algorithms
Heuristic
Masking
Mathematics of Computing
Polynomials
Queries
Reduction
String matching
Synthetic data
Theory of Computation
Title Pattern Masking for Dictionary Matching: Theory and Practice
URI https://link.springer.com/article/10.1007/s00453-024-01213-8
https://www.proquest.com/docview/3058744379
https://inria.hal.science/hal-04747475
Volume 86
WOSCitedRecordID wos001176263800002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 1432-0541
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0012796
  issn: 0178-4617
  databaseCode: RSV
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8MwDLbY4MCF8RSFgSLEDSq1TdqkiMvEQzuMaeKl3ao06cQuBa1lEv-eOGvLQ3AA5ZZGSeXEsWP7swGOWaR4KnXgSulTlwmmXIFgH83RCyN1qJgFCg_4cCjG43hUgcKKOtq9dknam7oBu6H2gT5HjJoIzMSiBctG3Alkx9u7x8Z3EHBblQvrzrvMCOgKKvPzHF_EUesJgyE_aZrfnKNW5lx3_ve367BW6ZiktzgUG7CU5ZvQqes3kIqdt-B8ZJNr5uRGFmgxJ0aBJZdTi3SQszfTXdpIyzOyQPATmWsyqmBV2_BwfXV_0XeragquokyUrq_MYzTzY8F8SVPpmZbF5l3t6VjLkKWcphM_Y9rwpDJKj4qoCqjSqYwYV7Gn6Q608-c82wVidCbmyRgNIIjjnQilZUT9UCssWq2kAyc1UZOXRdKMpEmPbAmTGMIkljCJcODI0L0ZiPmu-71Bgn0e49jCue9At96WpOKyIjF3FWbvpzx24LTeho_Pvy-597fh-7Aa2J1E40sX2uXsNTuAFTUvp8Xs0J6-d3-D0Ns
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS8MwED90Cvri_MTq1CC-aaFtsqUVX4Y6Jm5j6JS9hTTpcC9V1jnwvzeXtfUDfVDyloak3CW5y9397gBOWEPxWOrAldKnLguZckME-2iOXhip64pZoHCH93rhcBj1c1BYVkS7Fy5Je1OXYDfUPtDniFETgZk4XIQlZiQWBvLd3T-WvoOA26pcWHfeZUZA51CZn-f4Io4WnzAY8pOm-c05amVOq_q_v12HtVzHJM35ptiAhSTdhGpRv4Hkx3kLLvo2uWZKujJDizkxCiy5Glukg5y8me6pjbQ8J3MEP5GpJv0cVrUND63rwWXbzaspuIqycOr6yjxGEz8KmS9pLD3Tksi8qz0daVlnMafxyE-YNmdSGaVHNagKqNKxbDCuIk_THaikz2myC8ToTMyTERpAEMc7CpWWDerXtcKi1Uo6cFoQVbzMk2aIMj2yJYwwhBGWMCJ04NjQvRyI-a7bzY7APo9xbPWZ70CtYIvIT1kmzF2F2fspjxw4K9jw8fn3Jff-NvwIVtqDbkd0bnq3-7AaWK6iIaYGlenkNTmAZTWbjrPJod2J71Mq078
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3dS8MwED_cFPHF-YnTqUF807K2SddWfBHnmDjHwA_2FtKkw73UsdWB_7259MMp-iCStzQ05S7Xu9zd7w7glLWkHwnlWkI41GIBk1aAYB_lYxRGKE8yAxTu-f1-MByGgwUUv8l2L0KSGaYBqzQlaXOiRs0S-IaWCMYfMYPC1ZsEFVhm2DQI7-sPz2UcwfVNhy7sQW8xraxz2MzP7_iimiovmBi5YHV-C5Qa_dOp_f_LN2A9tz3JVXZYNmEpTragVvR1ILmYb8PlwBTdTMi9mKEnnWjDlrTHBgEhpu96OjUZmBckQ_YTkSgyyOFWO_DUuXm87lp5lwVLUhakliP1JTV2woA5gkbC1iMO9X3bVqESHot8Go2cmCktq1IbQ7JFpUulikSL-TK0Fd2FavKaxHtAtC3FbBGiYwTxvaNAKtGijqckNrOWog5nBYH5JCumwcuyyYYwXBOGG8LwoA4nmgflQqyD3b3qcZyzmY_Dmzt1aBQs4rn0zbj-h2FVf-qHdTgvWPL5-Pct9_-2_BhWB-0O79327w5gzTVMRf9MA6rp9C0-hBU5T8ez6ZE5lB-04Nyj
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Pattern+Masking+for+Dictionary+Matching%3A+Theory+and+Practice&rft.jtitle=Algorithmica&rft.au=Charalampopoulos%2C+Panagiotis&rft.au=Chen%2C+Huiping&rft.au=Christen%2C+Peter&rft.au=Loukides%2C+Grigorios&rft.date=2024-06-01&rft.pub=Springer+US&rft.issn=0178-4617&rft.eissn=1432-0541&rft.volume=86&rft.issue=6&rft.spage=1948&rft.epage=1978&rft_id=info:doi/10.1007%2Fs00453-024-01213-8&rft.externalDocID=10_1007_s00453_024_01213_8
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0178-4617&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0178-4617&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0178-4617&client=summon