2005
DOI: 10.1007/s10107-005-0693-1
|View full text |Cite
|
Sign up to set email alerts
|

A 2 + ɛ approximation algorithm for the k-MST problem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
68
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 47 publications
(68 citation statements)
references
References 13 publications
0
68
0
Order By: Relevance
“…Partial cover problems have been investigated extensively and are well understood in the context of polynomial time approximation [2,4,3,5,16,18] and parameterized complexity [1,4,24,25,23,27]. In this paper we study partial cover problems defined on graphs namely Partial Vertex Cover and Partial r-Dominating Set from the view point of parameterized algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…Partial cover problems have been investigated extensively and are well understood in the context of polynomial time approximation [2,4,3,5,16,18] and parameterized complexity [1,4,24,25,23,27]. In this paper we study partial cover problems defined on graphs namely Partial Vertex Cover and Partial r-Dominating Set from the view point of parameterized algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…The problem also received a lot of attention in the * Technical University of Dortmund; {markus.chimani, maria.kandyba, petra.mutzel}@cs.uni-dortmund.de † Supported by the German Research Foundation (DFG) through the Collaborative Research Center "Computational Intelligence" (SFB 531) ‡ University of Vienna; ivana.ljubic@univie.ac.at § Supported by the Hertha-Firnberg Fellowship of the Austrian Science Foundation (FWF) approximation algorithm community [1,3,17,18]: a central idea thereby is the primal-dual scheme, based on integer linear programs (ILPs), which was proposed by Goemans and Williamson [19] for the prizecollecting Steiner tree problem. An exact approach was presented by Fischetti et al [15], by formulating an ILP based on general subtour elimination constraints (Gsec).…”
Section: Introductionmentioning
confidence: 99%
“…However, in practice, w i , the weight of primary vertex i in WAG, is a continuous value, so even a large scaling factor Δ cannot guarantee Δ * w i is an integer for all i. Furthermore, the time complexity of state-of-the-art k-MST approximation algorithms [11], [6], [1] are polynomial to the number of vertices in G , which is proportional to Δ. So it is advisable to use a medium Δ and let the number of subsidiaries p i rounded as Δ * w i -1.…”
Section: Theorem 33mentioning
confidence: 99%
“…2PASS works under the granularity metric, which is the predominant privacy definition in clientserver environments, for its simplicity and user-friendliness. 1 If a single cell still does not meet the privacy requirement, that is, the area of this cell is smaller than the threshold, then the cloaked region must span more cells, which means the user must request more objects. To minimize the number of non-result objects, we reduce this problem to the k-minimum spanning tree (k-MST) problem and provide an efficient and yet close-to-optimal algorithm to select objects to request.…”
Section: Introductionmentioning
confidence: 99%