scispace - formally typeset
Open AccessBook ChapterDOI

Cloning Voronoi diagrams via retroactive data structures

Reads0
Chats0
TLDR
This work addresses the problem of replicating a Voronoi diagram V(S) of a planar point set S by making proximity queries and provides one of the first natural algorithmic applications of retroactive data structures.
Abstract
We address the problem of replicating a Voronoi diagram V(S) of a planar point set S by making proximity queries: 1. the exact location of the nearest site(s) in S 2. the distance to and label(s) of the nearest site(s) in S 3. a unique label for every nearest site in S. In addition to showing the limits of nearest-neighbor database security, our methods also provide one of the first natural algorithmic applications of retroactive data structures.

read more

Citations
More filters
Proceedings ArticleDOI

Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners

TL;DR: This work presents the first framing and exploration of privacy preservation in an outsourced k-NN system with multiple data owners, and proposes a privacy-preserving alternative system supporting kernel density estimation using a Gaussian kernel, a classification algorithm from the same family as k-nn.
Book ChapterDOI

Fully retroactive approximate range and nearest neighbor searching

TL;DR: In this paper, the authors describe fully retroactive dynamic data structures for approximate range reporting and approximate nearest neighbor reporting, and show how to maintain, for any positive constant d, a set of n points in ℝd indexed by time such that we can perform insertions or deletions at any point in the timeline in O(logn) amortized time.
Posted Content

Upper and Lower Bounds for Fully Retroactive Graph Problems.

TL;DR: It is shown that under the OMv conjecture (proposed by Henzinger et al. (STOC 2015)), there does not exist fully retroactive data structures maintaining connectivity or MSF, or incremental fully Retroactive data structure maintaining the maximum degree with $O(n^{1-\epsilon})$ time per operation, for any constant $\epsilons > 0$.
Journal ArticleDOI

Fully Retroactive Priority Queues using Persistent Binary Search Trees

TL;DR: This work presents how to implement a data structure to a fully retroactive version of a priority queue through persistent self-balanced binary search trees in polylogarithmic time and shows that the average performance of the proposed algorithm is better in terms of processing times than the other algorithms, despite the high constants in its complexity.
Book ChapterDOI

Upper and Lower Bounds for Fully Retroactive Graph Problems

TL;DR: In this article, a fully retroactive data structure (FRS) was proposed to handle operations that change the sequence S of updates, which can handle queries at any time t: a query at time t is answered using only the updates of S up to time t.
References
More filters
Book

Computational Geometry: Algorithms and Applications

TL;DR: In this article, an introduction to computational geometry focusing on algorithms is presented, which is related to particular applications in robotics, graphics, CAD/CAM, and geographic information systems.
Journal ArticleDOI

Protecting respondents identities in microdata release

TL;DR: This paper addresses the problem of releasing microdata while safeguarding the anonymity of respondents to which the data refer and introduces the concept of minimal generalization that captures the property of the release process not distorting the data more than needed to achieve k-anonymity.

Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression

TL;DR: The concept of minimal generalization is introduced, which captures the property of the release process not to distort the data more than needed to achieve k-anonymity, and possible preference policies to choose among diierent minimal generalizations are illustrated.
Proceedings ArticleDOI

Data privacy through optimal k-anonymization

TL;DR: This paper proposes and evaluates an optimization algorithm for the powerful de-identification procedure known as k-anonymization, and presents a new approach to exploring the space of possible anonymizations that tames the combinatorics of the problem, and develops data-management strategies to reduce reliance on expensive operations such as sorting.
Journal ArticleDOI

A sweepline algorithm for Voronoi diagrams

TL;DR: A geometric transformation is introduced that allows Voronoi diagrams to be computed using a sweepline technique and is used to obtain simple algorithms for computing the Vor onoi diagram of point sites, of line segment sites, and of weighted point sites.
Related Papers (5)