Databases Reference
In-Depth Information
the same number of users. Unfortunately, the high computational complexity
of optimalUnsafe makes it impossible to evaluate this algorithm for values of k
larger than 14. For this reason, in the remaining of this section, this algorithm
is ignored.
Figures 7(a) and 7(b) show the average area of the region returned by C I -
unsafe and C I -safe algorithms, respectively, with values of k higher than in
the previous test (up to k = 180). Similar results have been obtained consid-
ering the average perimeter. It can be noticed that dichotomicPoints returns
smaller regions with respect to hilbASR , dichotomicArea and intervalCloak-
ing . Figure 7(b) shows that the curve referring to dichotomicPoints does not
grow regularly but has some “steps”. This is due to the fact that the algo-
rithm partitions the number of points until it finds a set containing less than
k users. The number of iterations is given by: log( k ) . Therefore, there are
executions of the algorithm with different values of k that iterate the same
number of times, hence computing, at the last iteration, the same number of
users. Consequently, these executions return regions with similar area. Pre-
dictably, the C I -unsafe algorithms generally return smaller regions than the
C I -safe ones as, intuitively, the C I -safe algorithms have more constraints on
the output regions.
100
intervalCloaking
casper
nnASR
80
60
40
20
0
20
60
100
140
180
k
(a) C I -unsafe algorithms.
100
hilbASR
dichotomicArea
dichotomicPoints
80
60
40
20
0
20
60
100
140
180
k
(b) C I -safe algorithms.
Fig. 7. Average area with p = 100 , 000 and k ≤ 180.
Search WWH ::




Custom Search