Pattern Masking for Dictionary Matching: Theory and Practice
Data masking is a common technique for sanitizing sensitive data maintained in database systems which is becoming increasingly important in various application areas, such as in record linkage of personal data. This work formalizes the Pattern Masking for Dictionary Matching ( PMDM ) problem: given...
Saved in:
| Published in: | Algorithmica Vol. 86; no. 6; pp. 1948 - 1978 |
|---|---|
| Main Authors: | , , , , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
New York
Springer US
01.06.2024
Springer Nature B.V Springer Verlag |
| Subjects: | |
| ISSN: | 0178-4617, 1432-0541 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Data masking is a common technique for sanitizing sensitive data maintained in database systems which is becoming increasingly important in various application areas, such as in record linkage of personal data. This work formalizes the Pattern Masking for Dictionary Matching (
PMDM
) problem: given a dictionary
D
of
d
strings, each of length
ℓ
, a query string
q
of length
ℓ
, and a positive integer
z
, we are asked to compute a smallest set
K
⊆
{
1
,
…
,
ℓ
}
, so that if
q
[
i
] is replaced by a wildcard for all
i
∈
K
, then
q
matches at least
z
strings from
D
. Solving
PMDM
allows providing data utility guarantees as opposed to existing approaches. We first show, through a reduction from the well-known
k
-Clique problem, that a decision version of the
PMDM
problem is NP-complete, even for binary strings. We thus approach the problem from a more practical perspective. We show a combinatorial
O
(
(
d
ℓ
)
|
K
|
/
3
+
d
ℓ
)
-time and
O
(
d
ℓ
)
-space algorithm for
PMDM
for
|
K
|
=
O
(
1
)
. In fact, we show that we cannot hope for a faster combinatorial algorithm, unless the combinatorial
k
-Clique hypothesis fails (Abboud et al. in SIAM J Comput 47:2527–2555, 2018; Lincoln et al., in: 29th ACM-SIAM Symposium on Discrete Algorithms (SODA), 2018). Our combinatorial algorithm, executed with small |
K
|, is the backbone of a greedy heuristic that we propose. Our experiments on real-world and synthetic datasets show that our heuristic finds nearly-optimal solutions in practice and is also very efficient. We also generalize this algorithm for the problem of masking multiple query strings simultaneously so that every string has at least
z
matches in
D
.
PMDM
can be viewed as a generalization of the decision version of the dictionary matching with mismatches problem: by querying a
PMDM
data structure with string
q
and
z
=
1
, one obtains the minimal number of mismatches of
q
with any string from
D
. The query time or space of all known data structures for the
more restricted
problem of dictionary matching with at most
k
mismatches incurs some exponential factor with respect to
k
. A simple exact algorithm for
PMDM
runs in time
O
(
2
ℓ
d
)
. We present a data structure for
PMDM
that answers queries over
D
in time
O
(
2
ℓ
/
2
(
2
ℓ
/
2
+
τ
)
ℓ
)
and requires space
O
(
2
ℓ
d
2
/
τ
2
+
2
ℓ
/
2
d
)
, for any parameter
τ
∈
[
1
,
d
]
. We complement our results by showing a two-way polynomial-time reduction between
PMDM
and the Minimum Union problem [Chlamtáč et al., ACM-SIAM Symposium on Discrete Algorithms (SODA) 2017]. This gives a polynomial-time
O
(
d
1
/
4
+
ϵ
)
-approximation algorithm for
PMDM
, which is tight under a plausible complexity conjecture. This is an extended version of a paper that was presented at International Symposium on Algorithms and Computation (ISAAC) 2021. |
|---|---|
| AbstractList | Data masking is a common technique for sanitizing sensitive data maintained in database systems which is becoming increasingly important in various application areas, such as in record linkage of personal data. This work formalizes the Pattern Masking for Dictionary Matching (PMDM) problem: given a dictionary D of d strings, each of length , a query string q of length , and a positive integer z, we are asked to compute a smallest set K ⊆ {1, . . . , }, so that if q[i] is replaced by a wildcard for all i ∈ K , then q matches at least z strings from D. Solving PMDM allows providing data utility guarantees as opposed to existing approaches. We first show, through a reduction from the well-known k-Clique problem, that a decision version of the PMDM problem is NP-complete, even for binary strings. We thus approach the problem from a more practical perspective. We show a combinatorial O((d ) |K |/3 + d )-time and O(d )-space algorithm for PMDM for |K | = O(1). In fact, we show that we cannot hope for a faster combinatorial algorithm, unless the combinatorial k-Clique hypothesis fails ( Data masking is a common technique for sanitizing sensitive data maintained in database systems which is becoming increasingly important in various application areas, such as in record linkage of personal data. This work formalizes the Pattern Masking for Dictionary Matching (PMDM) problem: given a dictionary D of d strings, each of length ℓ, a query string q of length ℓ, and a positive integer z, we are asked to compute a smallest set K⊆{1,…,ℓ}, so that if q[i] is replaced by a wildcard for all i∈K, then q matches at least z strings from D. Solving PMDM allows providing data utility guarantees as opposed to existing approaches. We first show, through a reduction from the well-known k-Clique problem, that a decision version of the PMDM problem is NP-complete, even for binary strings. We thus approach the problem from a more practical perspective. We show a combinatorial O((dℓ)|K|/3+dℓ)-time and O(dℓ)-space algorithm for PMDM for |K|=O(1). In fact, we show that we cannot hope for a faster combinatorial algorithm, unless the combinatorial k-Clique hypothesis fails (Abboud et al. in SIAM J Comput 47:2527–2555, 2018; Lincoln et al., in: 29th ACM-SIAM Symposium on Discrete Algorithms (SODA), 2018). Our combinatorial algorithm, executed with small |K|, is the backbone of a greedy heuristic that we propose. Our experiments on real-world and synthetic datasets show that our heuristic finds nearly-optimal solutions in practice and is also very efficient. We also generalize this algorithm for the problem of masking multiple query strings simultaneously so that every string has at least z matches in D. PMDM can be viewed as a generalization of the decision version of the dictionary matching with mismatches problem: by querying a PMDM data structure with string q and z=1, one obtains the minimal number of mismatches of q with any string from D. The query time or space of all known data structures for the more restricted problem of dictionary matching with at most k mismatches incurs some exponential factor with respect to k. A simple exact algorithm for PMDM runs in time O(2ℓd). We present a data structure for PMDM that answers queries over D in time O(2ℓ/2(2ℓ/2+τ)ℓ) and requires space O(2ℓd2/τ2+2ℓ/2d), for any parameter τ∈[1,d]. We complement our results by showing a two-way polynomial-time reduction between PMDM and the Minimum Union problem [Chlamtáč et al., ACM-SIAM Symposium on Discrete Algorithms (SODA) 2017]. This gives a polynomial-time O(d1/4+ϵ)-approximation algorithm for PMDM, which is tight under a plausible complexity conjecture. This is an extended version of a paper that was presented at International Symposium on Algorithms and Computation (ISAAC) 2021. Data masking is a common technique for sanitizing sensitive data maintained in database systems which is becoming increasingly important in various application areas, such as in record linkage of personal data. This work formalizes the Pattern Masking for Dictionary Matching ( PMDM ) problem: given a dictionary D of d strings, each of length ℓ , a query string q of length ℓ , and a positive integer z , we are asked to compute a smallest set K ⊆ { 1 , … , ℓ } , so that if q [ i ] is replaced by a wildcard for all i ∈ K , then q matches at least z strings from D . Solving PMDM allows providing data utility guarantees as opposed to existing approaches. We first show, through a reduction from the well-known k -Clique problem, that a decision version of the PMDM problem is NP-complete, even for binary strings. We thus approach the problem from a more practical perspective. We show a combinatorial O ( ( d ℓ ) | K | / 3 + d ℓ ) -time and O ( d ℓ ) -space algorithm for PMDM for | K | = O ( 1 ) . In fact, we show that we cannot hope for a faster combinatorial algorithm, unless the combinatorial k -Clique hypothesis fails (Abboud et al. in SIAM J Comput 47:2527–2555, 2018; Lincoln et al., in: 29th ACM-SIAM Symposium on Discrete Algorithms (SODA), 2018). Our combinatorial algorithm, executed with small | K |, is the backbone of a greedy heuristic that we propose. Our experiments on real-world and synthetic datasets show that our heuristic finds nearly-optimal solutions in practice and is also very efficient. We also generalize this algorithm for the problem of masking multiple query strings simultaneously so that every string has at least z matches in D . PMDM can be viewed as a generalization of the decision version of the dictionary matching with mismatches problem: by querying a PMDM data structure with string q and z = 1 , one obtains the minimal number of mismatches of q with any string from D . The query time or space of all known data structures for the more restricted problem of dictionary matching with at most k mismatches incurs some exponential factor with respect to k . A simple exact algorithm for PMDM runs in time O ( 2 ℓ d ) . We present a data structure for PMDM that answers queries over D in time O ( 2 ℓ / 2 ( 2 ℓ / 2 + τ ) ℓ ) and requires space O ( 2 ℓ d 2 / τ 2 + 2 ℓ / 2 d ) , for any parameter τ ∈ [ 1 , d ] . We complement our results by showing a two-way polynomial-time reduction between PMDM and the Minimum Union problem [Chlamtáč et al., ACM-SIAM Symposium on Discrete Algorithms (SODA) 2017]. This gives a polynomial-time O ( d 1 / 4 + ϵ ) -approximation algorithm for PMDM , which is tight under a plausible complexity conjecture. This is an extended version of a paper that was presented at International Symposium on Algorithms and Computation (ISAAC) 2021. Data masking is a common technique for sanitizing sensitive data maintained in database systems which is becoming increasingly important in various application areas, such as in record linkage of personal data. This work formalizes the Pattern Masking for Dictionary Matching ( PMDM ) problem: given a dictionary $$\mathscr {D}$$ D of d strings, each of length $$\ell $$ ℓ , a query string q of length $$\ell $$ ℓ , and a positive integer z , we are asked to compute a smallest set $$K\subseteq \{1,\ldots ,\ell \}$$ K ⊆ { 1 , … , ℓ } , so that if q [ i ] is replaced by a wildcard for all $$i\in K$$ i ∈ K , then q matches at least z strings from $$\mathscr {D}$$ D . Solving PMDM allows providing data utility guarantees as opposed to existing approaches. We first show, through a reduction from the well-known k -Clique problem, that a decision version of the PMDM problem is NP-complete, even for binary strings. We thus approach the problem from a more practical perspective. We show a combinatorial $$\mathscr {O}((d\ell )^{|K|/3}+d\ell )$$ O ( ( d ℓ ) | K | / 3 + d ℓ ) -time and $$\mathscr {O}(d\ell )$$ O ( d ℓ ) -space algorithm for PMDM for $$|K|=\mathscr {O}(1)$$ | K | = O ( 1 ) . In fact, we show that we cannot hope for a faster combinatorial algorithm, unless the combinatorial k -Clique hypothesis fails (Abboud et al. in SIAM J Comput 47:2527–2555, 2018; Lincoln et al., in: 29th ACM-SIAM Symposium on Discrete Algorithms (SODA), 2018). Our combinatorial algorithm, executed with small | K |, is the backbone of a greedy heuristic that we propose. Our experiments on real-world and synthetic datasets show that our heuristic finds nearly-optimal solutions in practice and is also very efficient. We also generalize this algorithm for the problem of masking multiple query strings simultaneously so that every string has at least z matches in $$\mathscr {D}$$ D . PMDM can be viewed as a generalization of the decision version of the dictionary matching with mismatches problem: by querying a PMDM data structure with string q and $$z=1$$ z = 1 , one obtains the minimal number of mismatches of q with any string from $$\mathscr {D}$$ D . The query time or space of all known data structures for the more restricted problem of dictionary matching with at most k mismatches incurs some exponential factor with respect to k . A simple exact algorithm for PMDM runs in time $$\mathscr {O}(2^\ell d)$$ O ( 2 ℓ d ) . We present a data structure for PMDM that answers queries over $$\mathscr {D}$$ D in time $$\mathscr {O}(2^{\ell /2}(2^{\ell /2}+\tau )\ell )$$ O ( 2 ℓ / 2 ( 2 ℓ / 2 + τ ) ℓ ) and requires space $$\mathscr {O}(2^{\ell }d^2/\tau ^2+2^{\ell /2}d)$$ O ( 2 ℓ d 2 / τ 2 + 2 ℓ / 2 d ) , for any parameter $$\tau \in [1,d]$$ τ ∈ [ 1 , d ] . We complement our results by showing a two-way polynomial-time reduction between PMDM and the Minimum Union problem [Chlamtáč et al., ACM-SIAM Symposium on Discrete Algorithms (SODA) 2017]. This gives a polynomial-time $$\mathscr {O}(d^{1/4+\epsilon })$$ O ( d 1 / 4 + ϵ ) -approximation algorithm for PMDM , which is tight under a plausible complexity conjecture. This is an extended version of a paper that was presented at International Symposium on Algorithms and Computation (ISAAC) 2021. |
| Author | Pissis, Solon P. Radoszewski, Jakub Chen, Huiping Christen, Peter Charalampopoulos, Panagiotis Loukides, Grigorios Pisanti, Nadia |
| Author_xml | – sequence: 1 givenname: Panagiotis surname: Charalampopoulos fullname: Charalampopoulos, Panagiotis organization: School of Computing and Mathematical Sciences, Birkbeck, University of London – sequence: 2 givenname: Huiping surname: Chen fullname: Chen, Huiping email: h.chen.13@bham.ac.uk organization: School of Computer Science, University of Birmingham – sequence: 3 givenname: Peter surname: Christen fullname: Christen, Peter organization: Australian National University – sequence: 4 givenname: Grigorios surname: Loukides fullname: Loukides, Grigorios organization: Department of Informatics, King’s College London – sequence: 5 givenname: Nadia surname: Pisanti fullname: Pisanti, Nadia organization: Università di Pisa – sequence: 6 givenname: Solon P. orcidid: 0000-0002-1445-1932 surname: Pissis fullname: Pissis, Solon P. email: solon.pissis@cwi.nl organization: CWI, Vrije Universiteit – sequence: 7 givenname: Jakub surname: Radoszewski fullname: Radoszewski, Jakub organization: Institute of Informatics, University of Warsaw |
| BackLink | https://inria.hal.science/hal-04747475$$DView record in HAL |
| BookMark | eNp9kE9LAzEUxINUsK1-AU8LnjxE39tkN7vipdS_ULGHeg7ZbLbdWpOabAW_vakrepM5PBh-MzxmRAbWWUPIKcIFAojLAMAzRiHlFDBFRosDMkTOUgoZxwEZAoqC8hzFERmFsIZIiTIfkuu56jrjbfKkwmtrl0njfHLT6q51VvnPaHd6Ff2rZLEyLhrK1sncqwhoc0wOG7UJ5uTnjsnL3e1i-kBnz_eP08mMasaLjqJmBTNYFhwVqxREmdJUKdRlrTJeCVY1aHjNsNRphjpnOmW6rlTOhS6hZmNy3veu1EZuffsWP5NOtfJhMpN7D7jYK_vAyJ717Na7950JnVy7nbfxPckgKwTnTJSRSntKexeCN81vLYLcLyr7RWVcVH4vKosYYn0oRNgujf-r_if1BQLbeK4 |
| Cites_doi | 10.1016/j.jcss.2006.04.007 10.1145/3377455 10.1007/s00224-013-9498-4 10.1016/J.TCS.2009.07.020 10.1016/j.tcs.2009.07.014 10.1145/1391729.1391730 10.1016/j.tcs.2014.09.003 10.1109/TKDE.2013.91 10.1109/TCBB.2005.5 10.1137/16M1061771 10.1137/070684859 10.1137/09075336X 10.1007/s10878-006-9029-1 10.1007/978-3-030-59706-1 10.1016/j.tcs.2017.04.012 10.1016/S0020-0190(00)00079-X 10.1137/16M1096402 10.1007/978-3-642-31164-2 10.1007/s00453-008-9263-2 10.1145/360825.360855 10.1007/BF02392825 10.1007/s10619-019-07263-0 10.1007/s00453-015-9990-0 10.1016/j.jcss.2004.04.006 10.1145/3277006.3277015 10.4086/toc.2007.v003a006 10.1006/jagm.1997.0875 10.1089/CMB.2010.0177 10.1007/978-3-319-21275-3 10.1007/978-3-540-24777-7_11 10.1145/1749603.1749605 10.1006/jcss.2000.1727 10.1137/120884857 10.1145/828.1884 10.1109/69.971193 10.1137/0205003 10.1145/2889311 10.1136/amiajnl-2013-002165 10.1006/jcss.1998.1577 10.1007/978-3-642-11269-0_6 10.1137/1.9781611975482.70 10.1109/SWAT.1973.13 10.4230/LIPIcs.ISAAC.2021.65. 10.1137/1.9781611974782.56 10.1007/978-3-540-45138-9_56 10.1145/301250.301330 10.1007/3-540-45465-9_39 10.1109/BigData.2017.8258486 10.1007/978-3-662-44777-2_38 10.1145/275487.275508 10.1145/3196959.3196984 10.1145/1007352.1007374 10.5555/3361476.3361489 10.1109/ICDE.2009.104 10.1145/2076623.2076632 10.1007/978-3-642-02441-2_14 10.1145/2661829.2661875 10.4230/LIPIcs.ICALP.2016.93 10.1145/2063576.2063981 10.1137/1.9781611976465.32 10.1007/978-3-540-68279-0_8 10.1142/9789813272880_0188 10.3386/w24019 10.1145/3173574.3173900 10.4230/LIPIcs.STACS.2014.506 10.1145/2608628.2608664 10.1137/1.9781611975031.80 10.1007/978-3-319-49340-4 10.1007/978-3-642-33486-3_28 |
| ContentType | Journal Article |
| Copyright | The Author(s) 2024 The Author(s) 2024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. Attribution |
| Copyright_xml | – notice: The Author(s) 2024 – notice: The Author(s) 2024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: Attribution |
| DBID | C6C AAYXX CITATION JQ2 1XC VOOES |
| DOI | 10.1007/s00453-024-01213-8 |
| DatabaseName | Springer Nature OA Free Journals CrossRef ProQuest Computer Science Collection Hyper Article en Ligne (HAL) Hyper Article en Ligne (HAL) (Open Access) |
| DatabaseTitle | CrossRef ProQuest Computer Science Collection |
| DatabaseTitleList | ProQuest Computer Science Collection CrossRef |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1432-0541 |
| EndPage | 1978 |
| ExternalDocumentID | oai:HAL:hal-04747475v1 10_1007_s00453_024_01213_8 |
| GroupedDBID | -4Z -59 -5G -BR -EM -Y2 -~C -~X .86 .DC .VR 06D 0R~ 0VY 199 1N0 1SB 203 23M 28- 2J2 2JN 2JY 2KG 2KM 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5GY 5QI 5VS 67Z 6NX 78A 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAOBN AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDPE ABDZT ABECU ABFSI ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABLJU ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTAH ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AI. AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BA0 BBWZM BDATZ BGNMA BSONS C6C CAG COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP E.L EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS H13 HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ H~9 I09 IHE IJ- IKXTQ ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ KDC KOV KOW LAS LLZTM M4Y MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM P19 P9O PF- PT4 PT5 QOK QOS R4E R89 R9I RHV RIG RNI RNS ROL RPX RSV RZK S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TN5 TSG TSK TSV TUC U2A UG4 UOJIU UQL UTJUX UZXMN VC2 VFIZW VH1 VXZ W23 W48 WK8 YLTOR Z45 Z7X Z83 Z88 Z8R Z8W Z92 ZMTXR ZY4 ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG AEZWR AFDZB AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION JQ2 1XC VOOES |
| ID | FETCH-LOGICAL-c348t-1c383e19841a3ba0a0ae9eb20d9da54b73bf1e4d319c251c63c23cdba647c90d3 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001176263800002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0178-4617 |
| IngestDate | Tue Oct 14 20:39:37 EDT 2025 Thu Oct 02 16:26:42 EDT 2025 Sat Nov 29 02:20:34 EST 2025 Fri Feb 21 02:40:16 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 6 |
| Keywords | String algorithms Dictionary matching Wildcards Record linkage Query term dropping String algorithms Dictionary matching Wildcards Record linkage |
| Language | English |
| License | Attribution: http://creativecommons.org/licenses/by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c348t-1c383e19841a3ba0a0ae9eb20d9da54b73bf1e4d319c251c63c23cdba647c90d3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-1445-1932 |
| OpenAccessLink | https://link.springer.com/10.1007/s00453-024-01213-8 |
| PQID | 3058744379 |
| PQPubID | 2043795 |
| PageCount | 31 |
| ParticipantIDs | hal_primary_oai_HAL_hal_04747475v1 proquest_journals_3058744379 crossref_primary_10_1007_s00453_024_01213_8 springer_journals_10_1007_s00453_024_01213_8 |
| PublicationCentury | 2000 |
| PublicationDate | 2024-06-01 |
| PublicationDateYYYYMMDD | 2024-06-01 |
| PublicationDate_xml | – month: 06 year: 2024 text: 2024-06-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | Algorithmica |
| PublicationTitleAbbrev | Algorithmica |
| PublicationYear | 2024 |
| Publisher | Springer US Springer Nature B.V Springer Verlag |
| Publisher_xml | – name: Springer US – name: Springer Nature B.V – name: Springer Verlag |
| References | Zuckerman (CR78) 2007; 3 Yao, Yao (CR77) 1997; 25 Kum, Krishnamurthy, Machanavajjhala, Reiter, Ahalt (CR50) 2014; 21 Ilyas, Beskales, Soliman (CR42) 2008 Rivest (CR64) 1976; 5 CR35 Papadakis, Skoutas, Thanos, Palpanas (CR58) 2020 CR34 CR76 Konda (CR48) 2018; 47 CR75 CR74 Chan, Lam, Sung, Tam, Wong (CR16) 2010; 58 CR73 CR72 CR71 CR70 Abboud, Backurs, Williams (CR1) 2018; 47 Arimura, Uno (CR6) 2007; 13 CR2 CR4 Hastad (CR38) 1999; 182 Kellerer, Pferschy, Pisinger (CR47) 2004 CR8 CR7 Grossi, Menconi, Pisanti, Trani, Vind (CR37) 2018; 710 CR49 CR46 Grossi, Pietracaprina, Pisanti, Pucci, Upfal, Vandin (CR36) 2011; 18 Fredman, Komlós, Szemerédi (CR32) 1984; 31 Pǎtraşcu, Thorup (CR60) 2009; 39 Samarati (CR67) 2001; 13 CR41 CR40 Battaglia, Cangelosi, Grossi, Pisanti (CR9) 2009; 410 Cygan, Fomin, Kowalik, Lokshtanov, Marx, Pilipczuk, Pilipczuk, Saurabh (CR28) 2015 Christen (CR22) 2012 Impagliazzo, Paturi (CR43) 2001; 62 Federico, Pisanti (CR31) 2009; 410 Belazzougui, Venturini (CR11) 2016; 74 Bille, Gørtz, Vildhøj, Vind (CR12) 2014; 55 Brodal, Venkatesh (CR14) 2000; 75 CR18 CR17 CR15 CR13 CR57 CR55 Pǎtraşcu (CR59) 2011; 40 CR10 CR53 CR52 Lewenstein, Munro, Raman, Thankachan (CR54) 2014; 557 Jayram, Khot, Kumar, Rabani (CR44) 2004; 69 CR51 Fung, Wang, Chen, Yu (CR33) 2010; 42 Pisanti, Crochemore, Grossi, Sagot (CR62) 2005; 2 Herzog, Scheuren, Winkler (CR39) 2007 Aho, Corasick (CR3) 1975; 18 Chlamtáč, Dinitz, Konrad, Kortsarz, Rabanca (CR21) 2018; 32 Miltersen, Nisan, Safra, Wigderson (CR56) 1998; 57 Christen, Ranbaduge, Schnell (CR24) 2020 CR29 CR27 CR26 CR25 CR69 CR68 CR66 Applebaum (CR5) 2013; 42 CR65 CR20 Christen, Gayler, Tran, Fisher, Vatsalan (CR23) 2016 Chen, Huang, Kanj, Xia (CR19) 2006; 72 CR63 Karapiperis, Gkoulalas-Divanis, Verykios (CR45) 2019 CR61 Durham, Kantarcioglu, Xue, Tóth, Malin (CR30) 2014; 26 1213_CR51 D Zuckerman (1213_CR78) 2007; 3 J Hastad (1213_CR38) 1999; 182 1213_CR15 1213_CR13 R Grossi (1213_CR37) 2018; 710 1213_CR57 1213_CR10 H Chan (1213_CR16) 2010; 58 1213_CR55 M Pǎtraşcu (1213_CR60) 2009; 39 1213_CR52 1213_CR53 1213_CR18 1213_CR17 M Cygan (1213_CR28) 2015 H Arimura (1213_CR6) 2007; 13 1213_CR61 TN Herzog (1213_CR39) 2007 P Christen (1213_CR24) 2020 1213_CR25 1213_CR69 1213_CR26 D Belazzougui (1213_CR11) 2016; 74 1213_CR68 GS Brodal (1213_CR14) 2000; 75 1213_CR65 1213_CR66 P Samarati (1213_CR67) 2001; 13 1213_CR63 1213_CR20 BCM Fung (1213_CR33) 2010; 42 1213_CR29 1213_CR27 PB Miltersen (1213_CR56) 1998; 57 G Papadakis (1213_CR58) 2020 M Pǎtraşcu (1213_CR59) 2011; 40 P Christen (1213_CR22) 2012 R Grossi (1213_CR36) 2011; 18 D Karapiperis (1213_CR45) 2019 1213_CR4 1213_CR72 1213_CR73 E Chlamtáč (1213_CR21) 2018; 32 1213_CR70 M Federico (1213_CR31) 2009; 410 1213_CR71 1213_CR8 1213_CR7 B Applebaum (1213_CR5) 2013; 42 AC Yao (1213_CR77) 1997; 25 1213_CR34 1213_CR35 M Lewenstein (1213_CR54) 2014; 557 1213_CR76 EA Durham (1213_CR30) 2014; 26 1213_CR2 1213_CR74 J Chen (1213_CR19) 2006; 72 1213_CR75 RL Rivest (1213_CR64) 1976; 5 H Kellerer (1213_CR47) 2004 P Konda (1213_CR48) 2018; 47 AV Aho (1213_CR3) 1975; 18 1213_CR40 ML Fredman (1213_CR32) 1984; 31 IF Ilyas (1213_CR42) 2008 TS Jayram (1213_CR44) 2004; 69 1213_CR46 P Christen (1213_CR23) 2016 R Impagliazzo (1213_CR43) 2001; 62 1213_CR41 P Bille (1213_CR12) 2014; 55 G Battaglia (1213_CR9) 2009; 410 A Abboud (1213_CR1) 2018; 47 1213_CR49 N Pisanti (1213_CR62) 2005; 2 HC Kum (1213_CR50) 2014; 21 |
| References_xml | – ident: CR70 – volume: 72 start-page: 1346 issue: 8 year: 2006 end-page: 1367 ident: CR19 article-title: Strong computational lower bounds via parameterized complexity publication-title: J. Comput. Syst. Sci. doi: 10.1016/j.jcss.2006.04.007 – year: 2020 ident: CR58 article-title: Blocking and filtering techniques for entity resolution: a survey publication-title: ACM Comput. Surv. doi: 10.1145/3377455 – ident: CR49 – ident: CR68 – ident: CR74 – volume: 55 start-page: 41 issue: 1 year: 2014 end-page: 60 ident: CR12 article-title: String indexing for patterns with wildcards publication-title: Theory Comput. Syst. doi: 10.1007/s00224-013-9498-4 – ident: CR4 – volume: 410 start-page: 4391 issue: 43 year: 2009 end-page: 4401 ident: CR31 article-title: Suffix tree characterization of maximal motifs in biological sequences publication-title: Theor. Comput. Sci. doi: 10.1016/J.TCS.2009.07.020 – volume: 410 start-page: 4327 issue: 43 year: 2009 end-page: 4340 ident: CR9 article-title: Masking patterns in sequences: a new class of motif discovery with don’t cares publication-title: Theor. Comput. Sci. doi: 10.1016/j.tcs.2009.07.014 – year: 2008 ident: CR42 article-title: A survey of top-k query processing techniques in relational database systems publication-title: ACM Comput. Surveys doi: 10.1145/1391729.1391730 – ident: CR51 – volume: 557 start-page: 120 year: 2014 end-page: 127 ident: CR54 article-title: Less space: Indexing for queries with wildcards publication-title: Theor. Comput. Sci. doi: 10.1016/j.tcs.2014.09.003 – ident: CR35 – ident: CR29 – ident: CR61 – volume: 26 start-page: 2956 issue: 12 year: 2014 end-page: 2968 ident: CR30 article-title: Composite bloom filters for secure record linkage publication-title: IEEE Trans. Knowl. Data Eng. doi: 10.1109/TKDE.2013.91 – volume: 2 start-page: 40 issue: 1 year: 2005 end-page: 50 ident: CR62 article-title: Bases of motifs for generating repeated patterns with wild cards publication-title: IEEE/ACM Trans. Comput. Biol. Bioinf. doi: 10.1109/TCBB.2005.5 – ident: CR8 – ident: CR25 – volume: 47 start-page: 2527 issue: 6 year: 2018 end-page: 2555 ident: CR1 article-title: If the current clique algorithms are optimal, so is Valiant’s parser publication-title: SIAM J. Comput. doi: 10.1137/16M1061771 – volume: 39 start-page: 730 issue: 2 year: 2009 end-page: 741 ident: CR60 article-title: Higher lower bounds for near-neighbor and further rich problems publication-title: SIAM J. Comput. doi: 10.1137/070684859 – volume: 40 start-page: 827 issue: 3 year: 2011 end-page: 847 ident: CR59 article-title: Unifying the landscape of cell-probe lower bounds publication-title: SIAM J. Comput. doi: 10.1137/09075336X – volume: 13 start-page: 243 issue: 3 year: 2007 end-page: 262 ident: CR6 article-title: An efficient polynomial space and polynomial delay algorithm for enumeration of maximal motifs in a sequence publication-title: J. Comb. Optim. doi: 10.1007/s10878-006-9029-1 – ident: CR46 – ident: CR71 – ident: CR75 – ident: CR15 – year: 2020 ident: CR24 publication-title: Linking Sensitive Data doi: 10.1007/978-3-030-59706-1 – volume: 710 start-page: 74 year: 2018 end-page: 87 ident: CR37 article-title: Motif trie: An efficient text index for pattern discovery with don’t cares publication-title: Theor. Comput. Sci. doi: 10.1016/j.tcs.2017.04.012 – ident: CR57 – volume: 75 start-page: 57 issue: 1–2 year: 2000 end-page: 59 ident: CR14 article-title: Improved bounds for dictionary look-up with one error publication-title: Inf. Process. Lett. doi: 10.1016/S0020-0190(00)00079-X – volume: 32 start-page: 1458 issue: 2 year: 2018 end-page: 1477 ident: CR21 article-title: The densest k-subhypergraph problem publication-title: SIAM J. Discrete Math. doi: 10.1137/16M1096402 – year: 2007 ident: CR39 publication-title: Data Quality and Record Linkage Techniques – ident: CR26 – year: 2012 ident: CR22 publication-title: Data Matching - Concepts and Techniques for Record Linkage, Entity Resolution, and Duplicate Detection. Data-Centric Systems and Applications doi: 10.1007/978-3-642-31164-2 – volume: 58 start-page: 263 issue: 2 year: 2010 end-page: 281 ident: CR16 article-title: Compressed indexes for approximate string matching publication-title: Algorithmica doi: 10.1007/s00453-008-9263-2 – volume: 18 start-page: 333 issue: 6 year: 1975 end-page: 340 ident: CR3 article-title: Efficient string matching: an aid to bibliographic search publication-title: Commun. ACM doi: 10.1145/360825.360855 – volume: 182 start-page: 105 year: 1999 end-page: 142 ident: CR38 article-title: Clique is hard to approximate within publication-title: Acta Math. doi: 10.1007/BF02392825 – ident: CR18 – year: 2019 ident: CR45 article-title: Summarizing and linking electronic health records publication-title: Distrib. Parallel Datab. doi: 10.1007/s10619-019-07263-0 – ident: CR66 – ident: CR72 – volume: 74 start-page: 1099 issue: 3 year: 2016 end-page: 1122 ident: CR11 article-title: Compressed string dictionary search with edit distance one publication-title: Algorithmica doi: 10.1007/s00453-015-9990-0 – volume: 69 start-page: 435 issue: 3 year: 2004 end-page: 447 ident: CR44 article-title: Cell-probe lower bounds for the partial match problem publication-title: J. Comput. Syst. Sci. doi: 10.1016/j.jcss.2004.04.006 – ident: CR2 – ident: CR53 – ident: CR10 – volume: 47 start-page: 33 issue: 1 year: 2018 end-page: 40 ident: CR48 article-title: Technical perspective: toward building entity matching management systems publication-title: SIGMOD Record doi: 10.1145/3277006.3277015 – volume: 3 start-page: 103 issue: 1 year: 2007 end-page: 128 ident: CR78 article-title: Linear degree extractors and the inapproximability of max clique and chromatic number publication-title: Theory Comput. doi: 10.4086/toc.2007.v003a006 – ident: CR40 – ident: CR63 – volume: 25 start-page: 194 issue: 1 year: 1997 end-page: 202 ident: CR77 article-title: Dictionary look-up with one error publication-title: J. Algorithms doi: 10.1006/jagm.1997.0875 – volume: 18 start-page: 535 issue: 4 year: 2011 end-page: 545 ident: CR36 article-title: MADMX: a strategy for maximal dense motif extraction publication-title: J. Comput. Biol. doi: 10.1089/CMB.2010.0177 – ident: CR27 – year: 2015 ident: CR28 publication-title: Parameterized Algorithms doi: 10.1007/978-3-319-21275-3 – start-page: 317 year: 2004 end-page: 347 ident: CR47 publication-title: The Multiple-Choice Knapsack Problem doi: 10.1007/978-3-540-24777-7_11 – ident: CR69 – volume: 42 start-page: 1 issue: 4 year: 2010 end-page: 53 ident: CR33 article-title: Privacy-preserving data publishing: a survey of recent developments publication-title: ACM Comput. Surv. doi: 10.1145/1749603.1749605 – ident: CR73 – ident: CR65 – volume: 62 start-page: 367 issue: 2 year: 2001 end-page: 375 ident: CR43 article-title: On the complexity of k-SAT publication-title: J. Comput. Syst. Sci. doi: 10.1006/jcss.2000.1727 – ident: CR52 – ident: CR17 – ident: CR13 – ident: CR34 – ident: CR55 – ident: CR7 – ident: CR76 – volume: 42 start-page: 2008 issue: 5 year: 2013 end-page: 2037 ident: CR5 article-title: Pseudorandom generators with long stretch and low locality from random local one-way functions publication-title: SIAM J. Comput. doi: 10.1137/120884857 – ident: CR41 – volume: 31 start-page: 538 issue: 3 year: 1984 end-page: 544 ident: CR32 article-title: Storing a sparse table with worst case access time publication-title: J. ACM doi: 10.1145/828.1884 – volume: 13 start-page: 1010 issue: 6 year: 2001 end-page: 1027 ident: CR67 article-title: Protecting respondents’ identities in microdata release publication-title: IEEE Trans. Knowl. Data Eng. doi: 10.1109/69.971193 – ident: CR20 – volume: 5 start-page: 19 issue: 1 year: 1976 end-page: 50 ident: CR64 article-title: Partial-match retrieval algorithms publication-title: SIAM J. Comput. doi: 10.1137/0205003 – year: 2016 ident: CR23 article-title: Automatic discovery of abnormal values in large textual databases publication-title: J. Data Inf. Qual. doi: 10.1145/2889311 – volume: 21 start-page: 212 issue: 2 year: 2014 end-page: 220 ident: CR50 article-title: Privacy preserving interactive record linkage (PPIRL) publication-title: J. Am. Med. Inform. Assoc. doi: 10.1136/amiajnl-2013-002165 – volume: 57 start-page: 37 issue: 1 year: 1998 end-page: 49 ident: CR56 article-title: On data structures and asymmetric communication complexity publication-title: J. Comput. Syst. Sci. doi: 10.1006/jcss.1998.1577 – ident: 1213_CR15 doi: 10.1007/978-3-642-11269-0_6 – year: 2019 ident: 1213_CR45 publication-title: Distrib. Parallel Datab. doi: 10.1007/s10619-019-07263-0 – ident: 1213_CR25 doi: 10.1137/1.9781611975482.70 – ident: 1213_CR75 doi: 10.1109/SWAT.1973.13 – ident: 1213_CR17 doi: 10.4230/LIPIcs.ISAAC.2021.65. – ident: 1213_CR70 – ident: 1213_CR20 doi: 10.1137/1.9781611974782.56 – ident: 1213_CR61 doi: 10.1007/978-3-540-45138-9_56 – volume: 13 start-page: 1010 issue: 6 year: 2001 ident: 1213_CR67 publication-title: IEEE Trans. Knowl. Data Eng. doi: 10.1109/69.971193 – volume: 62 start-page: 367 issue: 2 year: 2001 ident: 1213_CR43 publication-title: J. Comput. Syst. Sci. doi: 10.1006/jcss.2000.1727 – volume: 557 start-page: 120 year: 2014 ident: 1213_CR54 publication-title: Theor. Comput. Sci. doi: 10.1016/j.tcs.2014.09.003 – volume: 410 start-page: 4391 issue: 43 year: 2009 ident: 1213_CR31 publication-title: Theor. Comput. Sci. doi: 10.1016/J.TCS.2009.07.020 – ident: 1213_CR41 – volume: 3 start-page: 103 issue: 1 year: 2007 ident: 1213_CR78 publication-title: Theory Comput. doi: 10.4086/toc.2007.v003a006 – ident: 1213_CR13 doi: 10.1145/301250.301330 – ident: 1213_CR18 doi: 10.1007/3-540-45465-9_39 – volume: 26 start-page: 2956 issue: 12 year: 2014 ident: 1213_CR30 publication-title: IEEE Trans. Knowl. Data Eng. doi: 10.1109/TKDE.2013.91 – volume: 42 start-page: 2008 issue: 5 year: 2013 ident: 1213_CR5 publication-title: SIAM J. Comput. doi: 10.1137/120884857 – ident: 1213_CR27 doi: 10.1109/BigData.2017.8258486 – volume: 2 start-page: 40 issue: 1 year: 2005 ident: 1213_CR62 publication-title: IEEE/ACM Trans. Comput. Biol. Bioinf. doi: 10.1109/TCBB.2005.5 – volume: 410 start-page: 4327 issue: 43 year: 2009 ident: 1213_CR9 publication-title: Theor. Comput. Sci. doi: 10.1016/j.tcs.2009.07.014 – ident: 1213_CR34 doi: 10.1007/978-3-662-44777-2_38 – ident: 1213_CR65 doi: 10.1145/275487.275508 – volume: 58 start-page: 263 issue: 2 year: 2010 ident: 1213_CR16 publication-title: Algorithmica doi: 10.1007/s00453-008-9263-2 – ident: 1213_CR72 doi: 10.1145/3196959.3196984 – volume: 42 start-page: 1 issue: 4 year: 2010 ident: 1213_CR33 publication-title: ACM Comput. Surv. doi: 10.1145/1749603.1749605 – volume-title: Linking Sensitive Data year: 2020 ident: 1213_CR24 doi: 10.1007/978-3-030-59706-1 – ident: 1213_CR26 doi: 10.1145/1007352.1007374 – ident: 1213_CR71 – ident: 1213_CR49 doi: 10.5555/3361476.3361489 – ident: 1213_CR51 – volume: 55 start-page: 41 issue: 1 year: 2014 ident: 1213_CR12 publication-title: Theory Comput. Syst. doi: 10.1007/s00224-013-9498-4 – volume: 57 start-page: 37 issue: 1 year: 1998 ident: 1213_CR56 publication-title: J. Comput. Syst. Sci. doi: 10.1006/jcss.1998.1577 – volume: 40 start-page: 827 issue: 3 year: 2011 ident: 1213_CR59 publication-title: SIAM J. Comput. doi: 10.1137/09075336X – ident: 1213_CR29 doi: 10.1109/ICDE.2009.104 – ident: 1213_CR69 – volume: 5 start-page: 19 issue: 1 year: 1976 ident: 1213_CR64 publication-title: SIAM J. Comput. doi: 10.1137/0205003 – ident: 1213_CR68 doi: 10.1145/2076623.2076632 – ident: 1213_CR10 doi: 10.1007/978-3-642-02441-2_14 – ident: 1213_CR73 doi: 10.1145/2661829.2661875 – volume: 25 start-page: 194 issue: 1 year: 1997 ident: 1213_CR77 publication-title: J. Algorithms doi: 10.1006/jagm.1997.0875 – volume-title: Data Quality and Record Linkage Techniques year: 2007 ident: 1213_CR39 – ident: 1213_CR2 doi: 10.4230/LIPIcs.ICALP.2016.93 – volume: 47 start-page: 33 issue: 1 year: 2018 ident: 1213_CR48 publication-title: SIGMOD Record doi: 10.1145/3277006.3277015 – ident: 1213_CR35 doi: 10.1145/2063576.2063981 – volume: 47 start-page: 2527 issue: 6 year: 2018 ident: 1213_CR1 publication-title: SIAM J. Comput. doi: 10.1137/16M1061771 – ident: 1213_CR4 doi: 10.1137/1.9781611976465.32 – volume: 75 start-page: 57 issue: 1–2 year: 2000 ident: 1213_CR14 publication-title: Inf. Process. Lett. doi: 10.1016/S0020-0190(00)00079-X – volume: 18 start-page: 535 issue: 4 year: 2011 ident: 1213_CR36 publication-title: J. Comput. Biol. doi: 10.1089/CMB.2010.0177 – volume: 18 start-page: 333 issue: 6 year: 1975 ident: 1213_CR3 publication-title: Commun. ACM doi: 10.1145/360825.360855 – start-page: 317 volume-title: The Multiple-Choice Knapsack Problem year: 2004 ident: 1213_CR47 doi: 10.1007/978-3-540-24777-7_11 – ident: 1213_CR66 – volume: 31 start-page: 538 issue: 3 year: 1984 ident: 1213_CR32 publication-title: J. ACM doi: 10.1145/828.1884 – ident: 1213_CR46 doi: 10.1007/978-3-540-68279-0_8 – volume: 13 start-page: 243 issue: 3 year: 2007 ident: 1213_CR6 publication-title: J. Comb. Optim. doi: 10.1007/s10878-006-9029-1 – ident: 1213_CR76 doi: 10.1142/9789813272880_0188 – ident: 1213_CR8 doi: 10.3386/w24019 – volume: 39 start-page: 730 issue: 2 year: 2009 ident: 1213_CR60 publication-title: SIAM J. Comput. doi: 10.1137/070684859 – ident: 1213_CR63 doi: 10.1145/3173574.3173900 – ident: 1213_CR52 doi: 10.4230/LIPIcs.STACS.2014.506 – volume: 182 start-page: 105 year: 1999 ident: 1213_CR38 publication-title: Acta Math. doi: 10.1007/BF02392825 – ident: 1213_CR57 – year: 2020 ident: 1213_CR58 publication-title: ACM Comput. Surv. doi: 10.1145/3377455 – volume-title: Parameterized Algorithms year: 2015 ident: 1213_CR28 doi: 10.1007/978-3-319-21275-3 – volume-title: Data Matching - Concepts and Techniques for Record Linkage, Entity Resolution, and Duplicate Detection. Data-Centric Systems and Applications year: 2012 ident: 1213_CR22 doi: 10.1007/978-3-642-31164-2 – volume: 710 start-page: 74 year: 2018 ident: 1213_CR37 publication-title: Theor. Comput. Sci. doi: 10.1016/j.tcs.2017.04.012 – volume: 21 start-page: 212 issue: 2 year: 2014 ident: 1213_CR50 publication-title: J. Am. Med. Inform. Assoc. doi: 10.1136/amiajnl-2013-002165 – volume: 72 start-page: 1346 issue: 8 year: 2006 ident: 1213_CR19 publication-title: J. Comput. Syst. Sci. doi: 10.1016/j.jcss.2006.04.007 – year: 2008 ident: 1213_CR42 publication-title: ACM Comput. Surveys doi: 10.1145/1391729.1391730 – volume: 69 start-page: 435 issue: 3 year: 2004 ident: 1213_CR44 publication-title: J. Comput. Syst. Sci. doi: 10.1016/j.jcss.2004.04.006 – ident: 1213_CR53 doi: 10.1145/2608628.2608664 – year: 2016 ident: 1213_CR23 publication-title: J. Data Inf. Qual. doi: 10.1145/2889311 – ident: 1213_CR55 doi: 10.1137/1.9781611975031.80 – volume: 32 start-page: 1458 issue: 2 year: 2018 ident: 1213_CR21 publication-title: SIAM J. Discrete Math. doi: 10.1137/16M1096402 – ident: 1213_CR74 doi: 10.1007/978-3-319-49340-4 – ident: 1213_CR40 doi: 10.1007/978-3-642-33486-3_28 – ident: 1213_CR7 – volume: 74 start-page: 1099 issue: 3 year: 2016 ident: 1213_CR11 publication-title: Algorithmica doi: 10.1007/s00453-015-9990-0 |
| SSID | ssj0012796 |
| Score | 2.3770752 |
| Snippet | Data masking is a common technique for sanitizing sensitive data maintained in database systems which is becoming increasingly important in various application... |
| SourceID | hal proquest crossref springer |
| SourceType | Open Access Repository Aggregation Database Index Database Publisher |
| StartPage | 1948 |
| SubjectTerms | Algorithm Analysis and Problem Complexity Algorithms Bioinformatics Combinatorial analysis Computer Science Computer Systems Organization and Communication Networks Data structures Data Structures and Information Theory Dictionaries Greedy algorithms Heuristic Masking Mathematics of Computing Polynomials Queries Reduction String matching Synthetic data Theory of Computation |
| Title | Pattern Masking for Dictionary Matching: Theory and Practice |
| URI | https://link.springer.com/article/10.1007/s00453-024-01213-8 https://www.proquest.com/docview/3058744379 https://inria.hal.science/hal-04747475 |
| Volume | 86 |
| WOSCitedRecordID | wos001176263800002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 1432-0541 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0012796 issn: 0178-4617 databaseCode: RSV dateStart: 19970101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8MwDLbY4MCF8RSFgSLEDSq1TdqkiMvEQzuMaeKl3ao06cQuBa1lEv-eOGvLQ3AA5ZZGSeXEsWP7swGOWaR4KnXgSulTlwmmXIFgH83RCyN1qJgFCg_4cCjG43hUgcKKOtq9dknam7oBu6H2gT5HjJoIzMSiBctG3Alkx9u7x8Z3EHBblQvrzrvMCOgKKvPzHF_EUesJgyE_aZrfnKNW5lx3_ve367BW6ZiktzgUG7CU5ZvQqes3kIqdt-B8ZJNr5uRGFmgxJ0aBJZdTi3SQszfTXdpIyzOyQPATmWsyqmBV2_BwfXV_0XeragquokyUrq_MYzTzY8F8SVPpmZbF5l3t6VjLkKWcphM_Y9rwpDJKj4qoCqjSqYwYV7Gn6Q608-c82wVidCbmyRgNIIjjnQilZUT9UCssWq2kAyc1UZOXRdKMpEmPbAmTGMIkljCJcODI0L0ZiPmu-71Bgn0e49jCue9At96WpOKyIjF3FWbvpzx24LTeho_Pvy-597fh-7Aa2J1E40sX2uXsNTuAFTUvp8Xs0J6-d3-D0Ns |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS8MwED90Cvri_MTq1CC-aaFtsqUVX4Y6Jm5j6JS9hTTpcC9V1jnwvzeXtfUDfVDyloak3CW5y9397gBOWEPxWOrAldKnLguZckME-2iOXhip64pZoHCH93rhcBj1c1BYVkS7Fy5Je1OXYDfUPtDniFETgZk4XIQlZiQWBvLd3T-WvoOA26pcWHfeZUZA51CZn-f4Io4WnzAY8pOm-c05amVOq_q_v12HtVzHJM35ptiAhSTdhGpRv4Hkx3kLLvo2uWZKujJDizkxCiy5Glukg5y8me6pjbQ8J3MEP5GpJv0cVrUND63rwWXbzaspuIqycOr6yjxGEz8KmS9pLD3Tksi8qz0daVlnMafxyE-YNmdSGaVHNagKqNKxbDCuIk_THaikz2myC8ToTMyTERpAEMc7CpWWDerXtcKi1Uo6cFoQVbzMk2aIMj2yJYwwhBGWMCJ04NjQvRyI-a7bzY7APo9xbPWZ70CtYIvIT1kmzF2F2fspjxw4K9jw8fn3Jff-NvwIVtqDbkd0bnq3-7AaWK6iIaYGlenkNTmAZTWbjrPJod2J71Mq078 |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3dS8MwED_cFPHF-YnTqUF807K2SddWfBHnmDjHwA_2FtKkw73UsdWB_7259MMp-iCStzQ05S7Xu9zd7w7glLWkHwnlWkI41GIBk1aAYB_lYxRGKE8yAxTu-f1-MByGgwUUv8l2L0KSGaYBqzQlaXOiRs0S-IaWCMYfMYPC1ZsEFVhm2DQI7-sPz2UcwfVNhy7sQW8xraxz2MzP7_iimiovmBi5YHV-C5Qa_dOp_f_LN2A9tz3JVXZYNmEpTragVvR1ILmYb8PlwBTdTMi9mKEnnWjDlrTHBgEhpu96OjUZmBckQ_YTkSgyyOFWO_DUuXm87lp5lwVLUhakliP1JTV2woA5gkbC1iMO9X3bVqESHot8Go2cmCktq1IbQ7JFpUulikSL-TK0Fd2FavKaxHtAtC3FbBGiYwTxvaNAKtGijqckNrOWog5nBYH5JCumwcuyyYYwXBOGG8LwoA4nmgflQqyD3b3qcZyzmY_Dmzt1aBQs4rn0zbj-h2FVf-qHdTgvWPL5-Pct9_-2_BhWB-0O79327w5gzTVMRf9MA6rp9C0-hBU5T8ez6ZE5lB-04Nyj |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Pattern+Masking+for+Dictionary+Matching%3A+Theory+and+Practice&rft.jtitle=Algorithmica&rft.au=Charalampopoulos%2C+Panagiotis&rft.au=Chen%2C+Huiping&rft.au=Christen%2C+Peter&rft.au=Loukides%2C+Grigorios&rft.date=2024-06-01&rft.pub=Springer+US&rft.issn=0178-4617&rft.eissn=1432-0541&rft.volume=86&rft.issue=6&rft.spage=1948&rft.epage=1978&rft_id=info:doi/10.1007%2Fs00453-024-01213-8&rft.externalDocID=10_1007_s00453_024_01213_8 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0178-4617&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0178-4617&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0178-4617&client=summon |