Analysis of half-space range search using the k-d search skip list. Here we analyse the expected time for half-space
|
|
- Kelly Dennis
- 5 years ago
- Views:
Transcription
1 Analysis of half-space range search using the k- search skip list Mario A. Lopez Brafor G. Nickerson y 1 Abstract We analyse the average cost of half-space range reporting for the k- search skip list. The k- search skip list is a ynamic ata structure requiring (kn) space for a set of n k-imensional points. Uner the assumption of uniform ranom istribution of points in k- space, an a ranom query hyperplane, our results show that for the - case, the average running time for half-space range reporting using the k- search skip list is O( p n + t), where t is the number of reporte points. Keywors: multiimensional ata, algorithms, half-space range reporting, ranom hyperplane Introuction Algorithms for orthogonal range search an half space range search are extensively covere in the literature (e.g. [1, 3, 5, 11, 13]). For a survey of extensive literature on the subject the reaer may want to consult [6] or []. As mentione in [1], algorithms for range search traitionally fall into two categories: best worst case search time achievable by a linear space ata structure, an minimum storage space to enable polylog (worst case) search time. The algorithm we analyse here falls into the former category. The istribution of multiimensional ata is unlikely to occur in patterns leaing to worst case range search cases. Expecte case analysis of range search algorithms is often a goo preictor of their performance (e.g. [, 7, 1]). The k- search skip list [9] is a linear space ata structure (base on the 1-3 eterministic skip list of [8]) supporting k- range search in O(kn) time, with ynamic upate time of O(k log n). Figure 1 illustrates the eight rectangles of the internal noes of a - search skip list containing 1 points. Figure shows a simpli- e version of the - search skip list arising from inserting the 1 points of Figure 1. Notice that each interior noe contains the bouning box of all noes in its own sublist. Department of Computer Science, University of Denver, Denver, Colorao, U.S.A., mlopez@cs.u.eu y Faculty of Computer Science, University of New Brunswick, Freericton, N.B. Canaa, bgn@unb.ca Research supporte by the Natural Sciences an Engineering Research Council (NSERC) of Canaa. Here we analyse the expecte time for half-space k- range reporting uner the assumption that both the input points an the query hyperplane are ranomly an uniformly istribute. In aition, we change the structure of the k- skip list in two ways, as follows: (1) we use a ranomize skip list instea of the eterministic one use in [9], an () points are inserte into the list, not by x-coorinate, but by their position along a space-lling curve. These changes result in a simpler analysis an a better average performance. Other than these two changes, the ata structure analyse here is ientical to that of [9]. 3 Ranom Hyperplane In < k, a hyperplane h is ene as the set of points satisfying : a x = c where a = (a 1 ; a ; : : : ; a k ) are the hyperplane coef- cients, x, an c < is a constant. We say x = (x 1 ; x ; : : : ; x k ) belongs to positive half-space h, i.e. x h, if a x c >. A ranom hyperplane is equally likely to be in any orientation or position. Assume, without loss of generality, that a ranom hyperplane intersects the unit hypercube [; 1] k. Vector a is a unit normal to the hyperplance, an a = (a 1 ; a ; : : : ; a k ) are irection cosines, each in [1; 1]. the irection cosines of the unit vector perpenicular to the hyperplane, an c [; 1] is a ranom variable that xes the hyperplane such that it intersects the unit hypercube, then we have ene a ranom hyperplane. Consiering k 1 of the angles ening the irection cosines as inepenent ranom variables, then along with c, we have k ranom variables ening a ranom hyperplane. Rectangle Intersection Internal noes of the k- search skip list store the k- bouning box of all points in the own sublist. In -, the bouning box is a rectangle, an we have the situation as shown in Figure 3. Coorinates of the lower left an upper right corners of a rectangle are (L, B) an (R, T ), respectively. We consier
2 8 6 a v f g h r j l m c p q k s o e i u n 6 b t Figure 1: Rectangles inuce by 1 points (labelle a through n) store in a - search skip list. v t u o p q r s a b c e f g 5 5 h i j k 1 1 l m n Figure : Simplie representation of a - search skip list for the points shown in Figure 1.
3 (1, 1) (R,T) c =a 1 +a (L,B) c =a 1 R +a T (, ) c =a 1 L +a B c = Figure 3: A rectangle with ranom half-space in orientation I. four possible orientations of a query plane epening on the sign of a 1 an a. Orientation I refers to the unit normal irection cosines a i [; 1], as shown in Figure 3. Theorem 1 In -, the probability P of a ranom half-space intersecting a rectangle in the unit square [; 1] is 1 (T B)+(RL) +. (, 1) c =a c =a 1 L +a T c =a 1 R +a B c =a 1 (1, ) Orientation II (, ) (1, 1) c =a 1 +a c =a 1 R +a T c =a 1 L +a B c = Orientation III Proof Halfspace h, in orientation I, intersects the rectangle i (R; T ) is above line h. Since c is istribute uniformly in the range [; a 1 +a ], the probability that h intersects the rectangle is c =a c =a 1 L +a T c =a 1 R +a B Ra 1 + T a a 1 + a = R cos + T sin c =a 1 Accoringly, the probability of the positive half space h in orientation I intersecting the rectangle is P I = R cos + T sin (1) for all possible orientations ; of the unit normal to the ranom line ening h, as well as the fraction of the unit square where h intersects the rectangle. Evaluating equation 1 gives P I = R+T. The three other possible orientations of the line ening h are now consiere. They are Orientation II: a 1 [1; ], a [; 1], Orientation III: (a 1 ; a ) [1; ], an Orientation IV: a 1 [; 1], a [1; ]. These three orientations are shown in Figure. The Orientation IV Figure : A rectangle with ranom half-space in the three other orientations. probability of the positive half space h intersecting the rectangle in orientations II, III an IV are P II = P III = = 1 + T L = 1 L + B L cos + T sin cos sin cos () (1 L) cos + (1 B) sin sin + cos (3)
4 P IV = = 1 + R B R cos + B sin sin cos sin () Equations, 3 an account for all possible orien- tations ;, ;, an ;, respectively, of the unit normal to the ranom line ening h, as well as the fraction of the unit square where h intersects the rectangle. Aing all four components of the probability together, an iviing by four to account for the fact that each component contributes 1 P = P I + P II + P III + P IV of the probability gives = 1 + R L + T B : Thus, the probability of a ranom half-space intersecting a rectangle in the unit square is 1. Note, in particular, that this probability epens exclusively on the size of the rectangle an not on its location. For k-, we oer the following conjecture: Conjecture 1 For k-, P = k Pk i=1 x i In conjecture 1, x i is the sie length of the rectangle in imension i. 5 - Search Skip List For Q n = time complexity of half-space range search in a ata structure containing n points, we have EfQ n g = no:ofinteriornoes i=1 P fr i \ h 6= g; (5) where E is the expecte value, P is the probability, an R i refers to a rectangle representing the bouning box of one internal noe of the search skip list. The algorithm for half-space range search in a k- search skip list [9] prunes a noe an it's own sublist if all points in R i are not in h ; i.e. R i 's own sublist is prune if x = h, 8x R i. Symmetrically, the algorithm reports all points within a noe's own sublist as in range if all points in R i are in h ; i.e. report all points in noe R i 's own sublist if x h, 8x R i. Without counting the cost of noes traverse solely for reporting purposes (similar to Willar's [1] worst-case locate runtime), the cost of half-space range search arises from those noes whose bouning box intersects the hyperplane h. Lemma In -, the probability P of a ranom half-plane h intersecting a rectangle in the unit square [; 1] is (T B)+(RL).. Proof The proof follows the same technique use for proving Theorem 1, but accounting for the probability of a ranom half-plane rather than a halfspace intersecting a rectangle. Equations (1), (), (3) an () become P I = P II = P III = P IV = (R L) cos + (T B) sin (6) (L R) cos + (T B) sin (7) sin cos (L R) cos + (B T ) sin sin cos (8) (R L) cos + (B T ) sin (9) cos sin Evaluating these equations gives (T B) + (R L) P I = P II = P III = P IV = (1) Aing all four components of the probability together, an iviing by four to account for the fact that each component contributes 1 of the probability gives the result. With Lemma in place, we can now procee to the main result. Theorem 3 Consier a - search skip list S of n points rawn at ranom from a uniform istribution an inserte into S by Hilbert orer. The expecte time EfQ n g of half-space range searching with a ranom query plane is O( p n + t), where t is the number of reporte points. Proof Let w + 1 be the number of levels of S, labele ; : : : ; w, an S, the set of internal noes of S, i.e., the set of noes at levels : : : ; w 1. With each noe v of S we ene an inicator variable I v associate with the event h \ R 6= ;, where R is the bouning rectangle store at v. Thus, v is further explore by going into its own sublist i I v = 1. Let v be an arbitrary noe of S with bouning rectangle R of size w h. Let v i be the chilren of v with bouning rectangles R i. By Lemma, EfI v g = (w + h)=. Since the expecte length of a sie of R i is no more than 1= the length of the corresponing sie of R, we have EfI vi g (w + h)=. Couple with the fact that EfI r g 1 for the root r, we have that EfI v g 1 (1j ) = j, where j is the level of noe v (an j = at the root). Since Efwg = log ne an the expecte number of noes of S at level j is j then the expecte number of noes explore in S is at most vl EfI v g w1 j= j j = w1 j= j = w 1 = O( p n)
5 Other noes visite correspon to points insie h an a O(t) to the complexity, establishing the claim. The above proof assumes a ranomize skip list is use, where the expecte number of noes in each own sublist is four. 6 Conclusions We have shown that the expecte cost of half-space range search using the k- search skip list containing n points is O( p n+t) in the - case. This result is competitive with the best known algorithms for half-space range search requiring linear space. It remains to expan the analysis to 3- an to k-. If our conjecture is correct, we anticipate goo upper bouns for the expecte case of half-space range search in higher imensions. The approach we have chosen for ening a ranom hyperplane will be useful in other expecte case analyses involving halfspace range search. Can our approach be use to analyse the expecte orthogonal range search time in an R-tree an other ata structures whose internal noes contain bouning boxes encompassing their chilren's bouning boxes References [1] P.K. Agarwal an J. Matousek. Dynamic halfspace range reporting an its applications. Algorithmica, 13:35{35, [8] J. Ian Munro, T. Papaakis, an R. Segewick. Deterministic skip lists. In Proc. of the Thir Annual Symposium on Discrete Algorithms, pages 367{375, Orlano, Floria, January [9] B.G. Nickerson an Y. Pan. On ynamic k- halfspace range reporting. In Proc. of the 1th Canaian Conference on Computational Geometry, pages 187{19, Freericton, N.B., Canaa, Aug Faculty of Computer Science. [1] R. Seiel an C.R. Aragon. Ranomize search trees. Algorithmica, 16:6{97, [11] P.M. Vaiya. Space-time trae-os for orthogonal range queries. SIAM Journal of Computing, 18():78{758, [1] D.E. Willar. Polygon retrieval. SIAM Journal of Computing, 11(1):19{165, 198. [13] A.C. Yao. Space-time traeo for answering range queries. In Proc. of the 1th Annual ACM Symposium on the Theory of Computing, pages 18{136, San Francisco, CA, May [1] F.F. Yao. Hanbook of Theoretical Computer Science, volume A: Algorithms an Complexity, chapter 7, pages 37{37. Elsevier, Amsteram, 199. [] M. J. Atallah, eitor. Algorithms an Theory of Computation Hanbook, chapter. CRC Press, Boca Raton, [3] J.L. Bentley an H.A. Maurer. Ecient worstcase ata structures for range searching. Acta Informatica, 13():155{168, 198. [] P. Chanzy, L. Devroye, an C. amora-cura. Analysis of range search for ranom k- trees. Acta Informatica, 37(Fasc./5):355{383, 1. [5] B. Chazelle. Lower bouns for orthogonal range searching: I. The reporting case. Journal of the Association for Computing Machinery, 37():{1, 199. [6] J.E. Gooman an J. O'Rourke, eitors. Hanbook of Discrete an Computational Geometry, chapter 31. CRC Press, Boca Raton, [7] S.T. Leutenegger an M.A. Lopez. The eect of buering on the performance of r-trees. IEEE Trans. on Knowlege an Data Engineering, 1(1):33{, Jan/Feb.
Learning convex bodies is hard
Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples
More informationarxiv: v1 [math.co] 15 Dec 2017
Rectilinear Crossings in Complete Balance -Partite -Uniform Hypergraphs Rahul Gangopahyay Saswata Shannigrahi arxiv:171.05539v1 [math.co] 15 Dec 017 December 18, 017 Abstract In this paper, we stuy the
More informationOptimal Oblivious Path Selection on the Mesh
Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract
More informationLoop Scheduling and Partitions for Hiding Memory Latencies
Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:
More informationAdditional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication
Aitional Divie an Conquer Algorithms Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Divie an Conquer Closest Pair Let s revisit the closest pair problem. Last
More informationPolygon Simplification by Minimizing Convex Corners
Polygon Simplification by Minimizing Convex Corners Yeganeh Bahoo 1, Stephane Durocher 1, J. Mark Keil 2, Saee Mehrabi 3, Sahar Mehrpour 1, an Debajyoti Monal 1 1 Department of Computer Science, University
More information4.2 Implicit Differentiation
6 Chapter 4 More Derivatives 4. Implicit Differentiation What ou will learn about... Implicitl Define Functions Lenses, Tangents, an Normal Lines Derivatives of Higher Orer Rational Powers of Differentiable
More informationDesign of Policy-Aware Differentially Private Algorithms
Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft
More informationBIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES
BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations
More informationCharacterizing Decoding Robustness under Parametric Channel Uncertainty
Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html
More informationComputer Graphics Chapter 7 Three-Dimensional Viewing Viewing
Computer Graphics Chapter 7 Three-Dimensional Viewing Outline Overview of Three-Dimensional Viewing Concepts The Three-Dimensional Viewing Pipeline Three-Dimensional Viewing-Coorinate Parameters Transformation
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationA technique for adding range restrictions to. August 30, Abstract. In a generalized searching problem, a set S of n colored geometric objects
A technique for adding range restrictions to generalized searching problems Prosenjit Gupta Ravi Janardan y Michiel Smid z August 30, 1996 Abstract In a generalized searching problem, a set S of n colored
More informationIndexing the Edges A simple and yet efficient approach to high-dimensional indexing
Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science
More informationLecture 1 September 4, 2013
CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the
More informationKinematic Analysis of a Family of 3R Manipulators
Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,
More informationI can position figures in the coordinate plane for use in coordinate proofs. I can prove geometric concepts by using coordinate proof.
Page 1 of 14 Attendance Problems. 1. Find the midpoint between (0, x) and (y, z).. One leg of a right triangle has length 1, and the hypotenuse has length 13. What is the length of the other leg? 3. Find
More informationRandom Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation
DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,
More informationHere are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.
Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus
More informationOn Secret Sharing Schemes based on Regenerating Codes
On Secret Sharing Schemes base on Regenerating Coes Masazumi Kurihara (University of Electro-Communications) 0 IEICE General Conference Okayama Japan 0- March 0. (Proc. of 0 IEICE General Conference AS--
More informationOn a Method of Finding Homoclinic and Heteroclinic Orbits in. Multidimensional Dynamical Systems
Applie Mathematics & Information Sciences 4(3) (), 383 394 An International Journal c Diie W Publishing Corporation, U. S. A. On a Metho of Fining Homoclinic an Heteroclinic Orbits in Multiimensional Dynamical
More informationA Classification of 3R Orthogonal Manipulators by the Topology of their Workspace
A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.
More informationd 3 d 4 d d d d d d d d d d d 1 d d d d d d
Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching
More informationLearning Subproblem Complexities in Distributed Branch and Bound
Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University
More informationShort-term prediction of photovoltaic power based on GWPA - BP neural network model
Short-term preiction of photovoltaic power base on GWPA - BP neural networ moel Jian Di an Shanshan Meng School of orth China Electric Power University, Baoing. China Abstract In recent years, ue to China's
More informationQuestions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!
EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an
More informationClassical Mechanics Examples (Lagrange Multipliers)
Classical Mechanics Examples (Lagrange Multipliers) Dipan Kumar Ghosh Physics Department, Inian Institute of Technology Bombay Powai, Mumbai 400076 September 3, 015 1 Introuction We have seen that the
More informationOn the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems
On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,
More informationOn Some Proximity Problems of Colored Sets
Chenglin Fan, Jun Luo, Wencheng Wang, Farong Zhong an Binhai Zhu. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY : 1 Mon. Year On Some Proximity Problems of Colore Sets Chenglin Fan 1, Jun Luo 1,2, Wencheng
More informationNon-homogeneous Generalization in Privacy Preserving Data Publishing
Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h
More informationSpace Preprocessing Query Time Source O(n d = log d n) O(n d = log d-" n) O(log n) [10, 25] O(n) O(n 1+" ) O(n 1-1=d ) [25] O(n) O(n log n) O(n 1-1=d
Space-Time Tradeos for Emptiness Queries (Extended abstract) Je Erickson Center for Geometric Computing Computer Science Department Duke University Durham, NC 27708{0129 jee@cs.duke.edu http://www.cs.duke.edu/
More informationA Cost Model For Nearest Neighbor Search. High-Dimensional Data Space
A Cost Moel For Nearest Neighbor Search in High-Dimensional Data Space Stefan Berchtol University of Munich Germany berchtol@informatikuni-muenchene Daniel A Keim University of Munich Germany keim@informatikuni-muenchene
More informationClassifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means
Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu
More informationAd-Hoc Networks Beyond Unit Disk Graphs
A-Hoc Networks Beyon Unit Disk Graphs Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerlan {kuhn, wattenhofer, zollinger}@inf.ethz.ch ABSTRACT
More informationDeterministic Rectangle Enclosure and Offline Dominance Reporting on the RAM
Deterministic Rectangle Enclosure and Offline Dominance Reporting on the RAM Peyman Afshani 1, Timothy M. Chan 2, and Konstantinos Tsakalidis 3 1 MADALGO, Department of Computer Science, Aarhus University,
More informationOn Computing the Centroid of the Vertices of an Arrangement and Related Problems
On Computing the Centroid of the Vertices of an Arrangement and Related Problems Deepak Ajwani, Saurabh Ray, Raimund Seidel, and Hans Raj Tiwary Max-Planck-Institut für Informatik, Saarbrücken, Germany
More informationAn Optimal Algorithm for the Euclidean Bottleneck Full Steiner Tree Problem
An Optimal Algorithm for the Euclidean Bottleneck Full Steiner Tree Problem Ahmad Biniaz Anil Maheshwari Michiel Smid September 30, 2013 Abstract Let P and S be two disjoint sets of n and m points in the
More informationAverage case analysis of dynamic geometric optimization
Average case analysis of dynamic geometric optimization David Eppstein Department of Information and Computer Science University of California, Irvine, CA 92717 May 19, 1995 Abstract We maintain the maximum
More informationMORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks
: a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications
More informationSecure Network Coding for Distributed Secret Sharing with Low Communication Cost
Secure Network Coing for Distribute Secret Sharing with Low Communication Cost Nihar B. Shah, K. V. Rashmi an Kannan Ramchanran, Fellow, IEEE Abstract Shamir s (n,k) threshol secret sharing is an important
More informationThe NP-Completeness of Some Edge-Partition Problems
The NP-Completeness of Some Edge-Partition Problems Ian Holyer y SIAM J. COMPUT, Vol. 10, No. 4, November 1981 (pp. 713-717) c1981 Society for Industrial and Applied Mathematics 0097-5397/81/1004-0006
More information1 The range query problem
CS268: Geometric Algorithms Handout #12 Design and Analysis Original Handout #12 Stanford University Thursday, 19 May 1994 Original Lecture #12: Thursday, May 19, 1994 Topics: Range Searching with Partition
More informationThroughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem
Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple
More informationTransient analysis of wave propagation in 3D soil by using the scaled boundary finite element method
Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite
More information2-connected graphs with small 2-connected dominating sets
2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A
More informationPairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11:
airwise alignment using shortest path algorithms, Gunnar Klau, November 9,, : 3 3 airwise alignment using shortest path algorithms e will iscuss: it graph Dijkstra s algorithm algorithm (GDU) 3. References
More informationAPPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly
International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -
More informationBIASED RANGE TREES. Vida Dujmović John Howat Pat Morin
BIASED RANGE TREES Vida Dujmović John Howat Pat Morin ABSTRACT. A data structure, called a biased range tree, is presented that preprocesses a set S of n points in R 2 and a query distribution D for 2-sided
More informationAn Improved Output-size Sensitive Parallel Algorithm for Hidden-Surface Removal for Terrains
An Improve Output-size Sensitive arallel Algorithm for Hien-Surface Removal for Terrains Neelima Gupta an Saneep Sen Department of Computer Science an Engineering Inian Institute of Technology New Delhi
More information6. Concluding Remarks
[8] K. J. Supowit, The relative neighborhood graph with an application to minimum spanning trees, Tech. Rept., Department of Computer Science, University of Illinois, Urbana-Champaign, August 1980, also
More informationDesign Principles for Practical Self-Routing Nonblocking Switching Networks with O(N log N) Bit-Complexity
IEEE TRANSACTIONS ON COMPUTERS, VOL. 46, NO. 10, OCTOBER 1997 1 Design Principles for Practical Self-Routing Nonblocking Switching Networks with O(N log N) Bit-Complexity Te H. Szymanski, Member, IEEE
More informationSupporting Fully Adaptive Routing in InfiniBand Networks
XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar
More informationAN INVESTIGATION OF FOCUSING AND ANGULAR TECHNIQUES FOR VOLUMETRIC IMAGES BY USING THE 2D CIRCULAR ULTRASONIC PHASED ARRAY
AN INVESTIGATION OF FOCUSING AND ANGULAR TECHNIQUES FOR VOLUMETRIC IMAGES BY USING THE D CIRCULAR ULTRASONIC PHASED ARRAY S. Monal Lonon South Bank University; Engineering an Design 103 Borough Roa, Lonon
More informationAggregate-Max Nearest Neighbor Searching in the Plane
CCCG 2013, Waterloo, Ontario, August 8 10, 2013 Aggregate-Max Nearest Neighbor Searching in the Plane Haitao Wang Abstract We study the aggregate nearest neighbor searching for the Max operator in the
More information1 Surprises in high dimensions
1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic
More informationCalculation on diffraction aperture of cube corner retroreflector
November 10, 008 / Vol., No. 11 / CHINESE OPTICS LETTERS 8 Calculation on iffraction aperture of cube corner retroreflector Song Li (Ó Ø, Bei Tang (», an Hui Zhou ( ï School of Electronic Information,
More informationBinary Space Partitions for Orthogonal Segments and Hyperrectangles Adrian Dumitrescu Joe Mitchell Micha Sharir
Binary Space Partitions for Orthogonal Segments and Hyperrectangles Adrian Dumitrescu Joe Mitchell Micha Sharir State University of New York Stony Brook, NY 11794 3600 Binary Space Partitions (BSP): l5
More informationA COMPARISON OF MESHES WITH STATIC BUSES AND HALF-DUPLEX WRAP-AROUNDS. and. and
Parallel Processing Letters c World Scientific Publishing Company A COMPARISON OF MESHES WITH STATIC BUSES AND HALF-DUPLEX WRAP-AROUNDS DANNY KRIZANC Department of Computer Science, University of Rochester
More informationSimple and Semi-Dynamic Structures for Cache-Oblivious Planar Orthogonal Range Searching
Simple and Semi-Dynamic Structures for Cache-Oblivious Planar Orthogonal Range Searching ABSTRACT Lars Arge Department of Computer Science University of Aarhus IT-Parken, Aabogade 34 DK-8200 Aarhus N Denmark
More informationOrthogonal Ham-Sandwich Theorem in R 3
Orthogonal Ham-Sandwich Theorem in R 3 Downloaded 11/24/17 to 37.44.201.8. Redistribution subject to SIAM license or copyright; see http://www.siam.org/journals/ojsa.php Abstract The ham-sandwich theorem
More informationLarge Monochromatic Components in Two-colored Grids
Large Monochromatic Components in Two-colore Gris Jiří Matoušek 1 Aleš Přívětivý 2 Department of Applie Mathematics 1,2 an Institute of Theoretical Computer Science (ITI) 1 Charles University Malostranské
More informationA Point in Non-Convex Polygon Location Problem Using the Polar Space Subdivision in E 2
A Point in Non-Convex Polygon Location Problem Using the Polar Space Subdivision in E 2 Vaclav Skala 1, Michal Smolik 1 1 Faculty of Applied Sciences, University of West Bohemia, Univerzitni 8, CZ 30614
More informationNon-Uniform Sensor Deployment in Mobile Wireless Sensor Networks
01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University
More informationON THE DISCRETE UNIT DISK COVER PROBLEM
ON THE DISCRETE UNIT DISK COVER PROBLEM GAUTAM K. DAS,1, ROBERT FRASER,2, ALEJANDRO LÓPEZ-ORTIZ,2, and BRADFORD G. NICKERSON,3 1 Department of Mathematics, Indian Institute of Technology Guwahati, Guwahati
More informationCellular Ants: Combining Ant-Based Clustering with Cellular Automata
Cellular Ants: Combining Ant-Base Clustering with Cellular Automata Anrew Vane Moere & Justin James Clayen Key Centre of Design Computing & Cognition, University of Syney, Australia {anrew,justin}@arch.usy.eu.au
More informationImproved Results on Geometric Hitting Set Problems
Improved Results on Geometric Hitting Set Problems Nabil H. Mustafa nabil@lums.edu.pk Saurabh Ray saurabh@cs.uni-sb.de Abstract We consider the problem of computing minimum geometric hitting sets in which,
More informationAdvanced method of NC programming for 5-axis machining
Available online at www.scienceirect.com Proceia CIRP (0 ) 0 07 5 th CIRP Conference on High Performance Cutting 0 Avance metho of NC programming for 5-axis machining Sergej N. Grigoriev a, A.A. Kutin
More informationA Stochastic Process on the Hypercube with Applications to Peer to Peer Networks
A Stochastic Process on the Hypercube with Applications to Peer to Peer Networs [Extene Abstract] Micah Aler Department of Computer Science, University of Massachusetts, Amherst, MA 0003 460, USA micah@cs.umass.eu
More informationAnalytical approximation of transient joint queue-length distributions of a finite capacity queueing network
Analytical approximation of transient joint queue-length istributions of a finite capacity queueing network Gunnar Flötterö Carolina Osorio March 29, 2013 Problem statements This work contributes to the
More informationBlind Data Classification using Hyper-Dimensional Convex Polytopes
Blin Data Classification using Hyper-Dimensional Convex Polytopes Brent T. McBrie an Gilbert L. Peterson Department of Electrical an Computer Engineering Air Force Institute of Technology 9 Hobson Way
More informationSolution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation
Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University
More informationGeometric Data Structures Multi-dimensional queries Nearest neighbour problem References. Notes on Computational Geometry and Data Structures
Notes on Computational Geometry and Data Structures 2008 Geometric Data Structures and CGAL Geometric Data Structures and CGAL Data Structure Interval Tree Priority Search Tree Segment Tree Range tree
More informationParticle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base
More informationDistributed Decomposition Over Hyperspherical Domains
Distribute Decomposition Over Hyperspherical Domains Aron Ahmaia 1, Davi Keyes 1, Davi Melville 2, Alan Rosenbluth 2, Kehan Tian 2 1 Department of Applie Physics an Applie Mathematics, Columbia University,
More informationBichromatic Line Segment Intersection Counting in O(n log n) Time
Bichromatic Line Segment Intersection Counting in O(n log n) Time Timothy M. Chan Bryan T. Wilkinson Abstract We give an algorithm for bichromatic line segment intersection counting that runs in O(n log
More informationNew Version of Davies-Bouldin Index for Clustering Validation Based on Cylindrical Distance
New Version of Davies-Boulin Inex for lustering Valiation Base on ylinrical Distance Juan arlos Roas Thomas Faculta e Informática Universia omplutense e Mari Mari, España correoroas@gmail.com Abstract
More informationA Cost Model for Query Processing in High-Dimensional Data Spaces
A Cost Moel for Query Processing in High-Dimensional Data Spaces Christian Böhm Luwig Maximilians Universität München This is a preliminary release of an article accepte by ACM Transactions on Database
More informationThe Unified Segment Tree and its Application to the Rectangle Intersection Problem
CCCG 2013, Waterloo, Ontario, August 10, 2013 The Unified Segment Tree and its Application to the Rectangle Intersection Problem David P. Wagner Abstract In this paper we introduce a variation on the multidimensional
More informationOnline Appendix to: Generalizing Database Forensics
Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that
More informationVesa Halava Tero Harju. Walks on Borders of Polygons
Vesa Halava Tero Harju Walks on Borders of Polygons TUCS Technical Report No 698, June 2005 Walks on Borders of Polygons Vesa Halava Tero Harju Department of Mathematics and TUCS - Turku Centre for Computer
More informationSURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH
SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway
More informationProblem Paper Atoms Tree. atoms.pas. atoms.cpp. atoms.c. atoms.java. Time limit per test 1 second 1 second 2 seconds. Number of tests
! " # %$ & Overview Problem Paper Atoms Tree Shen Tian Harry Wiggins Carl Hultquist Program name paper.exe atoms.exe tree.exe Source name paper.pas atoms.pas tree.pas paper.cpp atoms.cpp tree.cpp paper.c
More informationUpdating Widths and Maximum Spanning Trees using the Rotating Caliper Graph
Updating Widths and Maximum Spanning Trees using the Rotating Caliper Graph David Eppstein Department of Information and Computer Science University of California, Irvine, CA 92717 Tech. Report 93-18 April
More informationLecture 3 February 9, 2010
6.851: Advanced Data Structures Spring 2010 Dr. André Schulz Lecture 3 February 9, 2010 Scribe: Jacob Steinhardt and Greg Brockman 1 Overview In the last lecture we continued to study binary search trees
More informationWaleed K. Al-Assadi. Anura P. Jayasumana. Yashwant K. Malaiya y. February Colorado State University
Dierential I DDQ Testable Static RAM Architecture Walee K. Al-Assai Anura P. Jayasumana Yashwant K. Malaiya y Technical Report CS-96-102 February 1996 Department of Electrical Engineering/ y Department
More informationEvolutionary Optimisation Methods for Template Based Image Registration
Evolutionary Optimisation Methos for Template Base Image Registration Lukasz A Machowski, Tshilizi Marwala School of Electrical an Information Engineering University of Witwatersran, Johannesburg, South
More informationUninformed search methods
CS 1571 Introuction to AI Lecture 4 Uninforme search methos Milos Hauskrecht milos@cs.pitt.eu 539 Sennott Square Announcements Homework assignment 1 is out Due on Thursay, September 11, 014 before the
More informationAuthenticated indexing for outsourced spatial databases
The VLDB Journal (2009) 8:63 648 DOI 0.007/s00778-008-03-2 REGULAR PAPER Authenticate inexing for outsource spatial atabases Yin Yang Stavros Papaopoulos Dimitris Papaias George Kollios Receive: February
More informationBends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways
Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis
More informationState Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway
State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle
More informationCoupling the User Interfaces of a Multiuser Program
Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces
More informationCluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters
Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets
More informationUsing Ray Tracing for Site-Specific Indoor Radio Signal Strength Analysis 1
Using Ray Tracing for Site-Specific Inoor Raio Signal Strength Analysis 1 Michael Ni, Stephen Mann, an Jay Black Computer Science Department, University of Waterloo, Waterloo, Ontario, NL G1, Canaa Abstract
More informationLecture 3 February 23, 2012
6.851: Advanced Data Structures Spring 2012 Prof. Erik Demaine Lecture 3 February 23, 2012 1 Overview In the last lecture we saw the concepts of persistence and retroactivity as well as several data structures
More information3.4 Warm Up. Substitute the given values of m, x, and y into the equation y = mx + b and solve for b. 2. m = 2, x = 3, and y = 0
3.4 Warm Up 1. Find the values of x and y. Substitute the given values of m, x, and y into the equation y = mx + b and solve for b. 2. m = 2, x = 3, and y = 0 3. m = -1, x = 5, and y = -4 3.3 Proofs with
More informationConvex Hull of the Union of Convex Objects in the Plane: an Adaptive Analysis
CCCG 2008, Montréal, Québec, August 13 15, 2008 Convex Hull of the Union of Convex Objects in the Plane: an Adaptive Analysis Jérémy Barbay Eric Y. Chen Abstract We prove a tight asymptotic bound of Θ(δ
More informationThe Geometry of Carpentry and Joinery
The Geometry of Carpentry and Joinery Pat Morin and Jason Morrison School of Computer Science, Carleton University, 115 Colonel By Drive Ottawa, Ontario, CANADA K1S 5B6 Abstract In this paper we propose
More informationLine segment intersection. Family of intersection problems
CG Lecture 2 Line segment intersection Intersecting two line segments Line sweep algorithm Convex polygon intersection Boolean operations on polygons Subdivision overlay algorithm 1 Family of intersection
More informationWilliam S. Law. Erik K. Antonsson. Engineering Design Research Laboratory. California Institute of Technology. Abstract
Optimization Methos for Calculating Design Imprecision y William S. Law Eri K. Antonsson Engineering Design Research Laboratory Division of Engineering an Applie Science California Institute of Technology
More information