On Boundary Recognition without Location Information in Wireless Sensor Networks

Size: px
Start display at page:

Download "On Boundary Recognition without Location Information in Wireless Sensor Networks"

Transcription

1 Rheinische Friedrich-Wilhelms-Universität Bonn Institute for Computer cience IV Römerstraße 164 D Bonn On Boundary Recognition without Location Information in Wireless ensor Networks Olga aukh 1, Robert auter 1, Matthias Gauger 1, Pedro José Marrón 1 and Kurt Rothermel 2 1 Universität Bonn and Fraunhofer IAI, 2 Universität tuttgart, Germany {saukh, sauter, gauger, pjmarron}@cs.uni-bonn.de, rothermel@ipvs.uni-stuttgart.de

2 Overview Motivation Related Work Boundary Definition Patterns Patterns for UDGs Patterns for d-qudgs Pattern properties Boundary Recognition Algorithm Evaluation Conclusions 2

3 Motivation Recognition of communication and coverage holes Routing, localization, topology control Events entering and leaving the region Role assignment Topological map of the region 3

4 Related Work Three groups based on assumptions on: Node distribution in non-hole region. P. Fekete, A. Kröller, D. Pfisterer,. Fischer, and C. Buschmann. Neighborhood-based topology recognition in sensor networks. In Proc. of the 1st Int. Workshop on Algorithmic Aspects of Wireless ensor Networks, Node density (the length of the shortest path between two nodes provides a reasonable approximation of the geometric distance between the nodes). Funke. Topological hole detection in wireless sensor networks and its applications. In Proc. of the Joint Workshop on Foundations of Mobile Computing, Funke and C. Klein. Hole detection or: How much geometry hides in connectivity?. In Proc. of the 22nd ymp. on Computational Geometry, Y. Wang, J. Gao, and J.. Mitchell. Boundary recognition in sensor networks by topological methods. In Proc. of the 12th Int. Conf. on Mobile Computing and Networking, Radio model (UDG and d-qudg) A. Kröller,. P. Fekete, D. Pfisterer, and. Fischer. Deterministic boundary recognition and topology extraction for large sensor networks. In Proc. of the 17th ymp. on Discrete Algorithms,

5 Boundary Definition (1) What is a boundary? Geometry: ingle 2D embedding (realization) is considered and known Coordinates are known Boundaries are defined with respect to the fixed embedding: Example: convex hull Graph Theory: No embedding No coordinates, only edges No embedding, so... no boundary can be defined! 5

6 Boundary Definition (2) WN: Embedding in 2D is assumed, but not given No coordinates, only edges (communication links) How to define a boundary? We are interested in vertex-based boundary definition due to the nature of wireless links Problem 1: Boundary is not unique even for a fixed embedding Problem 2: Boundary changes with embedding F a) 2 b) F 6

7 Boundary Definition (3) Problem 3: If the boundary is vertex-based defined it might contain no vertex Problem 4: Boundary is not continuous (nodes 1 and 2 always lie inside of the network, as highlighted graph is a pattern) 1 F F F Problem 5: It is generally impossible to distinguish different hole boundaries without additional location information hortest cycles that contain the holes C 0 C 1 F 0 F 1 C 0 C 1 F * 1 F * 0 F * inf F inf 7

8 Boundary Definition (4) Our Definition of Boundary: If there is a d-qude of G, such that the node v belongs to the geometric boundary of G v is called exterior node If there is NO d-qude of G, such that the node v belongs to the geometric boundary of G v is called interior node The set of all exterior nodes of a graph is called the boundary of G Properties: Every node is either exterior or interior The boundary is unique if d is fixed and minimal The boundary is not continuous [A. Kröller et al.]: Boundary = Chordless cycle that follows the perimeter of the region. There is always one cycle for outer perimeter 8

9 Patterns: Terminology, Assumptions (1) Geometric Properties: d-quasi Unit Disk Embedding (d-qude) p of G is a realization of G in 2D such that ( i, j) E p( i) p( j) 2 p( i) d p( j) ( i, 2 1 j) E 1 d If such embedding exist, G is called d-quasi Unit Disk Graph (d-qudg) 1-QUDG = Unit Disk Graph (UDG) The smaller d in a d-qudg the more realistic is the model Assumptions: 2D embedding d-qude, for d

10 Patterns: Terminology, Assumptions (2) Graph Properties: Graph G(V, E) Vertex-induced subgraph - is a subset of the vertices of G together with any edges whose endpoints are both in this subset. Chordless cycle - vertex-induced subgraph of G, which is a cycle of the length at least 4 with no cycle chord. Independent set - is a maximum subset of nodes such that there is no edge between any two of them Independent set property (IP): I ( D) fit ( V ( C) ) C > then D is outside of C N fit 1 (N) fit 1 (N) fit 2/2 (N) d 10

11 Patterns: Terminology, Assumptions (3) Vertex-induced subgraph Constructed from selected vertices Chordless Cycle With allowed and forbidden edges (chords) 11

12 Patterns: Terminology, Assumptions (4) C C: I C D: Independent set Constructed from the whole subgraph Independent set property I ( D) fit ( V ( C) ) C > d 12

13 Pattern Concept No coordinate knowledge required Reliable recognition of interior nodes Exterior nodes recognition requires consideration of all possible embeddings d-qudg model is used for Every node individually decides if it is an internal node d Pattern with respect to d is a vertex-induced subgraph which guarantees that for any d-qude a certain subset of vertices lies inside 13

14 Patterns for UDGs (Examples) d=1 UDE a) b) c) d) Insufficient constructions for UDG e) f) g) h) Patterns for UDG 14

15 Patterns for d-qudgs (Examples) d 2/2 d-qude a) b) c) d) Insufficient constructions for d-qudg, if d < 1 e) f) g) Patterns for d-qudg (f) and g) are taken from A. Kröller et al.) 15

16 Weak and trong Patterns Pattern(,d) n is a vertex-induced subgraph of G composed of chordless cycles C i such that i, j = 0.. n 1, i j the following conditions hold: (1) (2) V Ci V C C i j N1( ) = C..., 0 C 1 2 n 8 1, j = 2, j 3, j ( i ± 1) mod n = ( i ± 1) mod n n = ( i ± 1) mod n n > = (3) For Ci,(Pattern(, d) \ N1( Ci )) the extended independent set property holds (4) For Ci, j ic j there exists no critical intersection (5) For each conjunction Ji Ci, C i neither V ( + 1) mod J i \ 2 or V Ji \ = 1 and an edge exists between N ( J \ ) and N J \ i C i 1 ( i ) C( i + 1) mod n 16

17 Chordless Cycle Combinations Relations between the think cycle and other cycles of the pattern: (1) It may contain them (b) (2) It may intersect them (c,d,e) (3) It might lie on the different side of them (a,d,e) (4) It might be reflected (b,c) 17

18 Extended Independent et Property (eip) N fit 1 (N) fit 1 (N) fit 2/2 (N)

19 Critical Intersection (1) 1. elect one chordless cycle 2. Find independent nodes in 3. Find independent nodes in C i C i ( x) N1( Ci If a chordless cycles appears to be partitioned in at least 2 connected parts in ( x) N1( Ci ) fail(ip) 4. Enumerate the nodes of each chordless cycle in (x) with letters: same letter in C j from node to the first independent node. otherwise - different letters 5. Nodes and edges connecting forbidden letters combinations compose critical intersection ) 19

20 Critical Intersection (2) Types of critical intersection (1) Vertex-based critical intersection (2) Edge-based critical intersection (one of the dotted edges must exist) 20

21 upporting Lemmas (1) Lemma 4.1. Let x, y, w, v be four different nodes in V, where xy E and wv E. Assume the straight-line d-qude (for d 2/2 ) of xy and wv intersect. Then at least one of the edges in F = {xv, vy, yw,wx} is also in E. [A. Kröller et al.] Lemma 4.2. Let x, y, w, v be four different nodes in V, where xy E, wv E and xw E. Assume the straight-line UDE of xy and wv intersect. Then at least one of the edges in F = {xv, yw} is also in E. v v This edge might exist y y x x w w 21

22 upporting Lemmas (2) Lemma 4.3. If node VG is the seed of a weak pattern P(, 1) G, then is an inner node for any UDE of G. Lemma 4.4. If node VG is the seed of a strong pattern P (, d) G, then is an inner node for any d-qude of G with d 2/2. trong Pattern Found by a node in its neighborhood graph 22

23 Pattern Properties trong patterns provide distance guarantees: d 2 1 that can be accumulated into nesting levels 4 Inclusion property: if Pattern(,d) then Pattern(,q), q d Maximum pattern cardinality: π / arcsin( d / 2) Discreteness: for UDGs both weak and strong patterns can be used, but for d-qudgs only strong patterns make sense oundness Incompleteness Time: O( n h+ 3 3 max h ), space: O( n max, h ), message: O( n max h ) 23

24 Qualitative Evaluation (1) Topo.: UDG, 180 nodes grid, 4.12 avg. degree. Params: UDG, h=6. Inner nodes: 62 (L1:29, L2:33) 24

25 Qualitative Evaluation (2) Topo.: UDG, 400 nodes random, 6.74 avg. degree. Params: UDG, h=6. Inner nodes: 130 (L1:41, L2:88, L3:1) 25

26 Qualitative Evaluation (3) Topo.:UDG, 1600 nodes grid, avg. degree. Params:UDG, h=3, Inner nodes:936 (L1:322,L2:479,L3:111,L4:24) 26

27 Qualitative Evaluation (4) Topo.: 0.75-QUDG, 250 nodes grid, 5.11 avg. degree. Params: d-qudg, h=6. Inner nodes: 96 (L2:96) 27

28 Qualitative Evaluation (5) Topo.: 0.75-QUDG, 500 nodes grid, 6.89 avg. degree. Params: d-qudg, h=5. Inner nodes: 283 (L2:163, L4:113, L6:7) 28

29 Qualitative Evaluation (6) Topo.: 0.75-QUDG, 500 nodes grid, avg. degree. Params: d-qudg, h=3, Inner nodes: 276 (L2:165, L4:104, L6:4) 29

30 Quantitative Evaluation (1) Chordless cycles found in the neighborhood with and without ϻ-filtering imilarity metric reduces the number of chordless cycles to store by avoiding storing similar ones. ϻ-filtering: Center node c (C) relative to is the node in C that has the greatest hop distance to. Two cycles are similar, if they share the same anchors and the center node of one cycle is also part of the other. The longer of similar cycles is kept to increase the probability of constructing a strong pattern. 30

31 Quantitative Evaluation (2) Chordless cycles found in the neighborhood with and without ϻ-filtering over the cycle length 31

32 Quantitative Evaluation (3) Required Pattern Cardinality 32

33 Adaptation In random topologies there usually are areas with a very high average node degree and areas with a very low average node degree in the same network. In this example, the same value of h was selected for the complete network. Our algorithm finds nearly all inner nodes in the left part where the value of h is sufficient for the average node degree of this area. However, the sparser area in the right part of the figure requires a greater value of h. This motivates the need for adapting the value of h to the local density of the region, Topo.: 0.75-QUDG, 330 nodes rnd., 7.67 avg. degree. Params: which we plan to investigate as QUDG, h=5, Inner nodes: 87 (L2:87) part of future work. 33

Boundary Recognition in Sensor Networks. Ng Ying Tat and Ooi Wei Tsang

Boundary Recognition in Sensor Networks. Ng Ying Tat and Ooi Wei Tsang Boundary Recognition in Sensor Networks Ng Ying Tat and Ooi Wei Tsang School of Computing, National University of Singapore ABSTRACT Boundary recognition for wireless sensor networks has many applications,

More information

On Boundary Recognition without Location Information in Wireless Sensor Networks

On Boundary Recognition without Location Information in Wireless Sensor Networks 008 International Conference on Information Processing in Sensor Networks On Boundary Recognition without Location Information in Wireless Sensor Networks OlgaSaukh 1,RobertSauter 1,MatthiasGauger 1,PedroJoséMarrón

More information

Decentralized Boundary Detection without Location Information in Wireless Sensor Networks

Decentralized Boundary Detection without Location Information in Wireless Sensor Networks 2012 IEEE Wireless Communications and Networking Conference: Mobile and Wireless Networks Decentralized Boundary Detection without Location Information in Wireless Sensor Networks Wei-Cheng Chu Institute

More information

Hole Detection and Boundary Recognition in Wireless Sensor Networks

Hole Detection and Boundary Recognition in Wireless Sensor Networks Hole Detection and Boundary Recognition in Wireless Sensor Networks Kun-Ying Hsieh Dept. of Computer Science and Information Engineering National Central University Jhongli, 32054, Taiwan E-mail: rocky@axp1.csie.ncu.edu.tw

More information

MoteFinder: A Deployment Tool for Sensor Networks

MoteFinder: A Deployment Tool for Sensor Networks Rheinische Friedrich-Wilhelms-Universität Bonn Institute for Computer Science IV Römerstraße 164 D-53117 Bonn MoteFinder: A Deployment Tool for Sensor Networks Olga Saukh 1, Robert Sauter 1, Jonas Meyer

More information

Math 443/543 Graph Theory Notes 11: Graph minors and Kuratowski s Theorem

Math 443/543 Graph Theory Notes 11: Graph minors and Kuratowski s Theorem Math 443/543 Graph Theory Notes 11: Graph minors and Kuratowski s Theorem David Glickenstein November 26, 2008 1 Graph minors Let s revisit some de nitions. Let G = (V; E) be a graph. De nition 1 Removing

More information

Fine-Grained Boundary Recognition in Wireless Ad Hoc and Sensor Networks By Topological Methods

Fine-Grained Boundary Recognition in Wireless Ad Hoc and Sensor Networks By Topological Methods Fine-Grained Boundary Recognition in Wireless Ad Hoc and Sensor Networks By Topological Methods Dezun Dong Yunhao Liu Xiangke Liao School of Computer, National University of Defense Technology, Changsha,

More information

Simulations of the quadrilateral-based localization

Simulations of the quadrilateral-based localization Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution

More information

Deterministic boundary recognition and topology extraction for large sensor networks

Deterministic boundary recognition and topology extraction for large sensor networks Deterministic boundary recognition and topology extraction for large sensor networks Alexander Kröller Sándor P. Fekete Dennis Pfisterer Stefan Fischer Abstract We present a new framework for the crucial

More information

Light-weight Contour Tracking in Wireless Sensor Networks

Light-weight Contour Tracking in Wireless Sensor Networks Light-weight Contour Tracking in Wireless Sensor Networks Xianjin Zhu Rik Sarkar Jie Gao Joseph S. B. Mitchell INFOCOM 08 1 Motivation Sensor network: sense and monitor the physical world (temperature,

More information

FREE REGIONS OF SENSOR NODES. Howard R. Hughes College of Engineering. University of Nevada, Las Vegas, NV ABSTRACT

FREE REGIONS OF SENSOR NODES. Howard R. Hughes College of Engineering. University of Nevada, Las Vegas, NV ABSTRACT FREE REGIONS OF SENSOR NODES Laxmi Gewali 1, Navin Rongatana 2, Henry Selvaraj 3, Jan B. Pedersen 4 Howard R. Hughes College of Engineering University of Nevada, Las Vegas, NV 89154-4026 1 laxmi@cs.unlv.edu,

More information

New Holes and Boundary Detection Algorithm for Heterogeneous Wireless Sensor Networks

New Holes and Boundary Detection Algorithm for Heterogeneous Wireless Sensor Networks 163 New Holes Boundary Detection Algorithm for Heterogeneous Wireless Sensor Networks Ahmed M. Khedr 1 Arwa Attia 2 1 Computer Science Department, University of Sharjah, Sharjah 27272, UAE 1,2 Mathematics

More information

An Alpha-Shapes based Technique for Detecting Boundaries of a Wireless Sensor Network

An Alpha-Shapes based Technique for Detecting Boundaries of a Wireless Sensor Network An Alpha-Shapes based Technique for Detecting Boundaries of a Wireless Sensor Network Rajesh Sharma Lalit Kumar Awasthi Naveen Chauhan ABSTRACT Nodes along the boundaries of a Wireless Sensor Network (WSN)

More information

Simplicial Hyperbolic Surfaces

Simplicial Hyperbolic Surfaces Simplicial Hyperbolic Surfaces Talk by Ken Bromberg August 21, 2007 1-Lipschitz Surfaces- In this lecture we will discuss geometrically meaningful ways of mapping a surface S into a hyperbolic manifold

More information

Simultaneously flippable edges in triangulations

Simultaneously flippable edges in triangulations Simultaneously flippable edges in triangulations Diane L. Souvaine 1, Csaba D. Tóth 2, and Andrew Winslow 1 1 Tufts University, Medford MA 02155, USA, {dls,awinslow}@cs.tufts.edu 2 University of Calgary,

More information

A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY

A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY KARL L. STRATOS Abstract. The conventional method of describing a graph as a pair (V, E), where V and E repectively denote the sets of vertices and edges,

More information

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition. 18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have

More information

Boundary Recognition in Sensor Networks by Topological Methods

Boundary Recognition in Sensor Networks by Topological Methods Boundary Recognition in Sensor Networks by Topological Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B. Mitchell Dept. of Applied Math. and Statistics

More information

M. Andrea Rodríguez-Tastets. I Semester 2008

M. Andrea Rodríguez-Tastets. I Semester 2008 M. -Tastets Universidad de Concepción,Chile andrea@udec.cl I Semester 2008 Outline refers to data with a location on the Earth s surface. Examples Census data Administrative boundaries of a country, state

More information

An efficient implementation of the greedy forwarding strategy

An efficient implementation of the greedy forwarding strategy An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at

More information

Chapter 8. Voronoi Diagrams. 8.1 Post Oce Problem

Chapter 8. Voronoi Diagrams. 8.1 Post Oce Problem Chapter 8 Voronoi Diagrams 8.1 Post Oce Problem Suppose there are n post oces p 1,... p n in a city. Someone who is located at a position q within the city would like to know which post oce is closest

More information

The Geodesic Integral on Medial Graphs

The Geodesic Integral on Medial Graphs The Geodesic Integral on Medial Graphs Kolya Malkin August 013 We define the geodesic integral defined on paths in the duals of medial graphs on surfaces and use it to study lens elimination and connection

More information

Restricted-Orientation Convexity in Higher-Dimensional Spaces

Restricted-Orientation Convexity in Higher-Dimensional Spaces Restricted-Orientation Convexity in Higher-Dimensional Spaces ABSTRACT Eugene Fink Derick Wood University of Waterloo, Waterloo, Ont, Canada N2L3G1 {efink, dwood}@violetwaterlooedu A restricted-oriented

More information

Minimum-Link Watchman Tours

Minimum-Link Watchman Tours Minimum-Link Watchman Tours Esther M. Arkin Joseph S. B. Mitchell Christine D. Piatko Abstract We consider the problem of computing a watchman route in a polygon with holes. We show that the problem of

More information

Data Communication. Guaranteed Delivery Based on Memorization

Data Communication. Guaranteed Delivery Based on Memorization Data Communication Guaranteed Delivery Based on Memorization Motivation Many greedy routing schemes perform well in dense networks Greedy routing has a small communication overhead Desirable to run Greedy

More information

Walheer Barnabé. Topics in Mathematics Practical Session 2 - Topology & Convex

Walheer Barnabé. Topics in Mathematics Practical Session 2 - Topology & Convex Topics in Mathematics Practical Session 2 - Topology & Convex Sets Outline (i) Set membership and set operations (ii) Closed and open balls/sets (iii) Points (iv) Sets (v) Convex Sets Set Membership and

More information

Domination, Independence and Other Numbers Associated With the Intersection Graph of a Set of Half-planes

Domination, Independence and Other Numbers Associated With the Intersection Graph of a Set of Half-planes Domination, Independence and Other Numbers Associated With the Intersection Graph of a Set of Half-planes Leonor Aquino-Ruivivar Mathematics Department, De La Salle University Leonorruivivar@dlsueduph

More information

On Graphs Supported by Line Sets

On Graphs Supported by Line Sets On Graphs Supported by Line Sets Vida Dujmović, William Evans, Stephen Kobourov, Giuseppe Liotta, Christophe Weibel, and Stephen Wismath School of Computer Science Carleton University cgm.cs.mcgill.ca/

More information

Planar Graphs. 1 Graphs and maps. 1.1 Planarity and duality

Planar Graphs. 1 Graphs and maps. 1.1 Planarity and duality Planar Graphs In the first half of this book, we consider mostly planar graphs and their geometric representations, mostly in the plane. We start with a survey of basic results on planar graphs. This chapter

More information

Two trees which are self-intersecting when drawn simultaneously

Two trees which are self-intersecting when drawn simultaneously Discrete Mathematics 309 (2009) 1909 1916 www.elsevier.com/locate/disc Two trees which are self-intersecting when drawn simultaneously Markus Geyer a,, Michael Kaufmann a, Imrich Vrt o b a Universität

More information

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Ambreen Shahnaz and Thomas Erlebach Department of Computer Science University of Leicester University Road, Leicester LE1

More information

γ 2 γ 3 γ 1 R 2 (b) a bounded Yin set (a) an unbounded Yin set

γ 2 γ 3 γ 1 R 2 (b) a bounded Yin set (a) an unbounded Yin set γ 1 γ 3 γ γ 3 γ γ 1 R (a) an unbounded Yin set (b) a bounded Yin set Fig..1: Jordan curve representation of a connected Yin set M R. A shaded region represents M and the dashed curves its boundary M that

More information

Literature Review on Hole Detection and Healing in Wireless Sensor Network

Literature Review on Hole Detection and Healing in Wireless Sensor Network Review Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Samidha

More information

The Structure of Bull-Free Perfect Graphs

The Structure of Bull-Free Perfect Graphs The Structure of Bull-Free Perfect Graphs Maria Chudnovsky and Irena Penev Columbia University, New York, NY 10027 USA May 18, 2012 Abstract The bull is a graph consisting of a triangle and two vertex-disjoint

More information

Objective- the students will be able to use undefined terms and definitions to work with points, lines and planes. Undefined Terms

Objective- the students will be able to use undefined terms and definitions to work with points, lines and planes. Undefined Terms Unit 1 asics of Geometry Objective- the students will be able to use undefined terms and definitions to work with points, lines and planes. Undefined Terms 1. Point has no dimension, geometrically looks

More information

Parameterization with Manifolds

Parameterization with Manifolds Parameterization with Manifolds Manifold What they are Why they re difficult to use When a mesh isn t good enough Problem areas besides surface models A simple manifold Sphere, torus, plane, etc. Using

More information

Evgeny Maksakov Advantages and disadvantages: Advantages and disadvantages: Advantages and disadvantages: Advantages and disadvantages:

Evgeny Maksakov Advantages and disadvantages: Advantages and disadvantages: Advantages and disadvantages: Advantages and disadvantages: Today Problems with visualizing high dimensional data Problem Overview Direct Visualization Approaches High dimensionality Visual cluttering Clarity of representation Visualization is time consuming Dimensional

More information

THE RESTRAINED EDGE MONOPHONIC NUMBER OF A GRAPH

THE RESTRAINED EDGE MONOPHONIC NUMBER OF A GRAPH BULLETIN OF THE INTERNATIONAL MATHEMATICAL VIRTUAL INSTITUTE ISSN (p) 2303-4874, ISSN (o) 2303-4955 www.imvibl.org /JOURNALS / BULLETIN Vol. 7(1)(2017), 23-30 Former BULLETIN OF THE SOCIETY OF MATHEMATICIANS

More information

Henneberg construction

Henneberg construction Henneberg construction Seminar über Algorithmen FU-Berlin, WS 2007/08 Andrei Haralevich Abstract: In this work will be explained two different types of steps of Henneberg construction. And how Henneberg

More information

Networks: A Deterministic Approach with Constant Overhead

Networks: A Deterministic Approach with Constant Overhead Trace-Routing in 3D Wireless Sensor Networks: A Deterministic Approach with Constant Overhead Su Xia, Hongyi Wu, and Miao Jin! School of Computing and Informatics! University of Louisiana at Lafayette

More information

Tutte s Theorem: How to draw a graph

Tutte s Theorem: How to draw a graph Spectral Graph Theory Lecture 15 Tutte s Theorem: How to draw a graph Daniel A. Spielman October 22, 2018 15.1 Overview We prove Tutte s theorem [Tut63], which shows how to use spring embeddings to obtain

More information

Graph Drawing via Canonical Orders

Graph Drawing via Canonical Orders Algorithms for Graph Visualization Summer Semester 2016 Lecture # 3 Graph Drawing via Canonical Orders (Partly based on lecture slides by Philipp Kindermann & Alexander Wolff) 1 Outline Planar Graphs:

More information

Triangle Graphs and Simple Trapezoid Graphs

Triangle Graphs and Simple Trapezoid Graphs JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 18, 467-473 (2002) Short Paper Triangle Graphs and Simple Trapezoid Graphs Department of Computer Science and Information Management Providence University

More information

Lecture 5: Simplicial Complex

Lecture 5: Simplicial Complex Lecture 5: Simplicial Complex 2-Manifolds, Simplex and Simplicial Complex Scribed by: Lei Wang First part of this lecture finishes 2-Manifolds. Rest part of this lecture talks about simplicial complex.

More information

Approximate Algorithms for Touring a Sequence of Polygons

Approximate Algorithms for Touring a Sequence of Polygons Approximate Algorithms for Touring a Sequence of Polygons Fajie Li 1 and Reinhard Klette 2 1 Institute for Mathematics and Computing Science, University of Groningen P.O. Box 800, 9700 AV Groningen, The

More information

Basics of Geometry Unit 1 - Notes. Objective- the students will be able to use undefined terms and definitions to work with points, lines and planes.

Basics of Geometry Unit 1 - Notes. Objective- the students will be able to use undefined terms and definitions to work with points, lines and planes. asics of Geometry Unit 1 - Notes Objective- the students will be able to use undefined terms and definitions to work with points, lines and planes. Undefined Terms 1. Point has no dimension, geometrically

More information

Face Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks. Xiaoyang Guan

Face Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks. Xiaoyang Guan Face Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks by Xiaoyang Guan A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department

More information

9 About Intersection Graphs

9 About Intersection Graphs 9 About Intersection Graphs Since this lecture we focus on selected detailed topics in Graph theory that are close to your teacher s heart... The first selected topic is that of intersection graphs, i.e.

More information

POINT SET TOPOLOGY. Introduction

POINT SET TOPOLOGY. Introduction POINT SET TOPOLOGY Introduction In order to establish a foundation for topological evolution, an introduction to topological ideas and definitions is presented in terms of point set methods for which the

More information

Chordal deletion is fixed-parameter tractable

Chordal deletion is fixed-parameter tractable Chordal deletion is fixed-parameter tractable Dániel Marx Institut für Informatik, Humboldt-Universität zu Berlin, Unter den Linden 6, 10099 Berlin, Germany. dmarx@informatik.hu-berlin.de Abstract. It

More information

Face Width and Graph Embeddings of face-width 2 and 3

Face Width and Graph Embeddings of face-width 2 and 3 Face Width and Graph Embeddings of face-width 2 and 3 Instructor: Robin Thomas Scribe: Amanda Pascoe 3/12/07 and 3/14/07 1 Representativity Recall the following: Definition 2. Let Σ be a surface, G a graph,

More information

WINDING NUMBERS FOR NETWORKS WITH WEAK ANGULAR DATA

WINDING NUMBERS FOR NETWORKS WITH WEAK ANGULAR DATA Contemporary Mathematics WINDING NUMBERS FOR NETWORKS WITH WEAK ANGULAR DATA ROBERT GHRIST Abstract. We consider a network of nodes in the plane whose locations are unknown but for which the nodes establish

More information

Pebble Sets in Convex Polygons

Pebble Sets in Convex Polygons 2 1 Pebble Sets in Convex Polygons Kevin Iga, Randall Maddox June 15, 2005 Abstract Lukács and András posed the problem of showing the existence of a set of n 2 points in the interior of a convex n-gon

More information

HW Graph Theory Name (andrewid) - X. 1: Draw K 7 on a torus with no edge crossings.

HW Graph Theory Name (andrewid) - X. 1: Draw K 7 on a torus with no edge crossings. 1: Draw K 7 on a torus with no edge crossings. A quick calculation reveals that an embedding of K 7 on the torus is a -cell embedding. At that point, it is hard to go wrong if you start drawing C 3 faces,

More information

Packing Two Disks into a Polygonal Environment

Packing Two Disks into a Polygonal Environment Packing Two Disks into a Polygonal Environment Prosenjit Bose, School of Computer Science, Carleton University. E-mail: jit@cs.carleton.ca Pat Morin, School of Computer Science, Carleton University. E-mail:

More information

Geometric graphs which are 1-skeletons of unstacked triangulated polygons

Geometric graphs which are 1-skeletons of unstacked triangulated polygons Discrete Mathematics 308 (2008) 5485 5498 www.elsevier.com/locate/disc Geometric graphs which are 1-skeletons of unstacked triangulated polygons Yaakov S. Kupitz a, Horst Martini b,1 a Institute of Mathematics,

More information

Preferred directions for resolving the non-uniqueness of Delaunay triangulations

Preferred directions for resolving the non-uniqueness of Delaunay triangulations Preferred directions for resolving the non-uniqueness of Delaunay triangulations Christopher Dyken and Michael S. Floater Abstract: This note proposes a simple rule to determine a unique triangulation

More information

Chapter 12 Solid Modeling. Disadvantages of wireframe representations

Chapter 12 Solid Modeling. Disadvantages of wireframe representations Chapter 12 Solid Modeling Wireframe, surface, solid modeling Solid modeling gives a complete and unambiguous definition of an object, describing not only the shape of the boundaries but also the object

More information

Dominating Sets in Planar Graphs 1

Dominating Sets in Planar Graphs 1 Dominating Sets in Planar Graphs 1 Lesley R. Matheson 2 Robert E. Tarjan 2; May, 1994 Abstract Motivated by an application to unstructured multigrid calculations, we consider the problem of asymptotically

More information

Greedy Routing in Wireless Networks. Jie Gao Stony Brook University

Greedy Routing in Wireless Networks. Jie Gao Stony Brook University Greedy Routing in Wireless Networks Jie Gao Stony Brook University A generic sensor node CPU. On-board flash memory or external memory Sensors: thermometer, camera, motion, light sensor, etc. Wireless

More information

Definition 1 (Hand-shake model). A hand shake model is an incidence geometry for which every line has exactly two points.

Definition 1 (Hand-shake model). A hand shake model is an incidence geometry for which every line has exactly two points. Math 3181 Dr. Franz Rothe Name: All3181\3181_spr13t1.tex 1 Solution of Test I Definition 1 (Hand-shake model). A hand shake model is an incidence geometry for which every line has exactly two points. Definition

More information

Technische Universität Ilmenau Institut für Mathematik

Technische Universität Ilmenau Institut für Mathematik Technische Universität Ilmenau Institut für Mathematik Preprint No. M 07/26 Precoloring extension for K4-minorfree graphs Pruchnewski, Anja; Voigt, Margit November 2007 Impressum: Hrsg.: Leiter des Instituts

More information

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Brad Karp Berkeley, CA bkarp@icsi.berkeley.edu DIMACS Pervasive Networking Workshop 2 May, 2 Motivating Examples Vast

More information

Connectivity-based Localization of Large Scale Sensor Networks with Complex Shape

Connectivity-based Localization of Large Scale Sensor Networks with Complex Shape Connectivity-based Localization of Large Scale Sensor Networks with Complex Shape Sol Lederer and Yue Wang and Jie Gao We study the problem of localizing a large sensor network having a complex shape,

More information

Math 451: Euclidean and Non-Euclidean Geometry MWF 3pm, Gasson 204 Homework 8 Solutions

Math 451: Euclidean and Non-Euclidean Geometry MWF 3pm, Gasson 204 Homework 8 Solutions Math 451: Euclidean and Non-Euclidean Geometry MWF 3pm, Gasson 204 Homework 8 Solutions Exercises from Chapter 2: 5.5, 5.10, 5.13, 5.14 Exercises from Chapter 3: 1.2, 1.3, 1.5 Exercise 5.5. Give an example

More information

Computing the K-terminal Reliability of Circle Graphs

Computing the K-terminal Reliability of Circle Graphs Computing the K-terminal Reliability of Circle Graphs Min-Sheng Lin *, Chien-Min Chen Department of Electrical Engineering National Taipei University of Technology Taipei, Taiwan Abstract Let G denote

More information

Every DFS Tree of a 3-Connected Graph Contains a Contractible Edge

Every DFS Tree of a 3-Connected Graph Contains a Contractible Edge Every DFS Tree of a 3-Connected Graph Contains a Contractible Edge Amr Elmasry Kurt Mehlhorn Jens M. Schmidt Abstract Let G be a 3-connected graph on more than 4 vertices. We show that every depth-first-search

More information

Estimating the Free Region of a Sensor Node

Estimating the Free Region of a Sensor Node Estimating the Free Region of a Sensor Node Laxmi Gewali, Navin Rongratana, Jan B. Pedersen School of Computer Science, University of Nevada 4505 Maryland Parkway Las Vegas, NV, 89154, USA Abstract We

More information

Recognizing Interval Bigraphs by Forbidden Patterns

Recognizing Interval Bigraphs by Forbidden Patterns Recognizing Interval Bigraphs by Forbidden Patterns Arash Rafiey Simon Fraser University, Vancouver, Canada, and Indiana State University, IN, USA arashr@sfu.ca, arash.rafiey@indstate.edu Abstract Let

More information

arxiv: v1 [math.co] 13 Aug 2017

arxiv: v1 [math.co] 13 Aug 2017 Strong geodetic problem in grid like architectures arxiv:170803869v1 [mathco] 13 Aug 017 Sandi Klavžar a,b,c April 11, 018 Paul Manuel d a Faculty of Mathematics and Physics, University of Ljubljana, Slovenia

More information

1 Introduction and Review

1 Introduction and Review Figure 1: The torus. 1 Introduction and Review 1.1 Group Actions, Orbit Spaces and What Lies in Between Our story begins with the torus, which we will think of initially as the identification space pictured

More information

Yao Spanners for Wireless Ad Hoc Networks

Yao Spanners for Wireless Ad Hoc Networks Yao Spanners for Wireless Ad Hoc Networks A Thesis Presented to the Faculty of the Department of Computing Sciences Villanova University In Partial Fulfillment of the Requirements for the Degree of Master

More information

A taste of perfect graphs (continued)

A taste of perfect graphs (continued) A taste of perfect graphs (continued) Recall two theorems from last class characterizing perfect graphs (and that we observed that the α ω theorem implied the Perfect Graph Theorem). Perfect Graph Theorem.

More information

Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks

Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks Thomas Erlebach Department of Computer Science University of Leicester, UK te17@mcs.le.ac.uk Ambreen Shahnaz Department of Computer

More information

Dissections of polygons into convex polygons

Dissections of polygons into convex polygons Dissections of polygons into convex polygons Andrzej Żak Faculty of Applied Mathematics, AGH University of Science and Technology al. Mickiewicza 30, 30 059 Kraków, Poland e-mail: zakandrz@uci.agh.edu.pl

More information

Survey for Trapezoid Graphs

Survey for Trapezoid Graphs Survey for Trapezoid Graphs Haodong Hu May 12, 2004 Abstract Given the trapezoid diagram, the problem of finding the minimum cardinality connected dominating set in trapezoid graphs was solved in O(m +

More information

Edge-Based Beaconing Schedule in Duty- Cycled Multihop Wireless Networks

Edge-Based Beaconing Schedule in Duty- Cycled Multihop Wireless Networks Edge-Based Beaconing Schedule in Duty- Cycled Multihop Wireless Networks Quan Chen, Hong Gao, Yingshu Li, Siyao Cheng, and Jianzhong Li Harbin Institute of Technology, China Quan Chen@ Harbin Institute

More information

Linear Programming in Small Dimensions

Linear Programming in Small Dimensions Linear Programming in Small Dimensions Lekcija 7 sergio.cabello@fmf.uni-lj.si FMF Univerza v Ljubljani Edited from slides by Antoine Vigneron Outline linear programming, motivation and definition one dimensional

More information

Greedy Routing with Guaranteed Delivery Using Ricci Flow

Greedy Routing with Guaranteed Delivery Using Ricci Flow Greedy Routing with Guaranteed Delivery Using Ricci Flow Jie Gao Stony Brook University Joint work with Rik Sarkar, Xiaotian Yin, Wei Zeng, Feng Luo, Xianfeng David Gu Greedy Routing Assign coordinatesto

More information

arxiv: v1 [cs.ni] 28 Apr 2015

arxiv: v1 [cs.ni] 28 Apr 2015 Succint greedy routing without metric on planar triangulations Pierre Leone, Kasun Samarasinghe Computer Science Department, University of Geneva, Battelle A, route de Drize 7, 1227 Carouge, Switzerland

More information

arxiv:submit/ [math.co] 9 May 2011

arxiv:submit/ [math.co] 9 May 2011 arxiv:submit/0243374 [math.co] 9 May 2011 Connectivity and tree structure in finite graphs J. Carmesin R. Diestel F. Hundertmark M. Stein 6 May, 2011 Abstract We prove that, for every integer k 0, every

More information

Lecture 0: Reivew of some basic material

Lecture 0: Reivew of some basic material Lecture 0: Reivew of some basic material September 12, 2018 1 Background material on the homotopy category We begin with the topological category TOP, whose objects are topological spaces and whose morphisms

More information

Graphs associated to CAT(0) cube complexes

Graphs associated to CAT(0) cube complexes Graphs associated to CAT(0) cube complexes Mark Hagen McGill University Cornell Topology Seminar, 15 November 2011 Outline Background on CAT(0) cube complexes The contact graph: a combinatorial invariant

More information

Unfolding Rectangle-Faced Orthostacks

Unfolding Rectangle-Faced Orthostacks Unfolding Rectangle-Faced Orthostacks Erin W. Chambers Kyle A. Sykes Cynthia M. Traub Abstract We prove that rectangle-faced orthostacks, a restricted class of orthostacks, can be grid-edge unfolded without

More information

Simultaneous Graph Embedding with Bends and Circular Arcs

Simultaneous Graph Embedding with Bends and Circular Arcs Simultaneous Graph Embedding with Bends and Circular Arcs Justin Cappos, Alejandro Estrella-Balderrama, J. Joseph Fowler, and Stephen G. Kobourov Department of Computer Science, University of Arizona {justin,aestrell,jfowler,kobourov}@cs.arizona.edu

More information

arxiv:cs/ v1 [cs.cg] 13 Jun 2001

arxiv:cs/ v1 [cs.cg] 13 Jun 2001 Hinged Kite Mirror Dissection David Eppstein arxiv:cs/0106032v1 [cs.cg] 13 Jun 2001 Abstract Any two polygons of equal area can be partitioned into congruent sets of polygonal pieces, and in many cases

More information

Monotone Paths in Geometric Triangulations

Monotone Paths in Geometric Triangulations Monotone Paths in Geometric Triangulations Adrian Dumitrescu Ritankar Mandal Csaba D. Tóth November 19, 2017 Abstract (I) We prove that the (maximum) number of monotone paths in a geometric triangulation

More information

Orthogonal art galleries with holes: a coloring proof of Aggarwal s Theorem

Orthogonal art galleries with holes: a coloring proof of Aggarwal s Theorem Orthogonal art galleries with holes: a coloring proof of Aggarwal s Theorem Pawe l Żyliński Institute of Mathematics University of Gdańsk, 8095 Gdańsk, Poland pz@math.univ.gda.pl Submitted: Sep 9, 005;

More information

arxiv: v1 [math.co] 5 Nov 2010

arxiv: v1 [math.co] 5 Nov 2010 Segment representation of a subclass of co-planar graphs Mathew C. Francis, Jan Kratochvíl, and Tomáš Vyskočil arxiv:1011.1332v1 [math.co] 5 Nov 2010 Department of Applied Mathematics, Charles University,

More information

arxiv: v2 [cs.cg] 24 Jul 2011

arxiv: v2 [cs.cg] 24 Jul 2011 Ice-Creams and Wedge Graphs Eyal Ackerman Tsachik Gelander Rom Pinchasi Abstract arxiv:116.855v2 [cs.cg] 24 Jul 211 What is the minimum angle α > such that given any set of α-directional antennas (that

More information

Small Survey on Perfect Graphs

Small Survey on Perfect Graphs Small Survey on Perfect Graphs Michele Alberti ENS Lyon December 8, 2010 Abstract This is a small survey on the exciting world of Perfect Graphs. We will see when a graph is perfect and which are families

More information

Do Directional Antennas Facilitate In Reducing Interferences?

Do Directional Antennas Facilitate In Reducing Interferences? Do Directional Antennas Facilitate In Reducing Interferences? Presented by Ury Matarazzo Ben-Gurion University, Beer-Sheva, Israel November 25, 2012 1 Introduction The question 2 The converge cast 3 Asymmetric

More information

Rubber bands. Chapter Rubber band representation

Rubber bands. Chapter Rubber band representation Chapter 1 Rubber bands In the previous chapter, we already used the idea of looking at the graph geometrically, by placing its nodes on the line and replacing the edges by rubber bands. Since, however,

More information

Manifolds. Chapter X. 44. Locally Euclidean Spaces

Manifolds. Chapter X. 44. Locally Euclidean Spaces Chapter X Manifolds 44. Locally Euclidean Spaces 44 1. Definition of Locally Euclidean Space Let n be a non-negative integer. A topological space X is called a locally Euclidean space of dimension n if

More information

The geometry and combinatorics of closed geodesics on hyperbolic surfaces

The geometry and combinatorics of closed geodesics on hyperbolic surfaces The geometry and combinatorics of closed geodesics on hyperbolic surfaces CUNY Graduate Center September 8th, 2015 Motivating Question: How are the algebraic/combinatoric properties of closed geodesics

More information

On connected domination in unit ball graphs

On connected domination in unit ball graphs Noname manuscript No. (will be inserted by the editor) On connected domination in unit ball graphs Sergiy Butenko Sera Kahruman-Anderoglu Oleksii Ursulenko Received: date / Accepted: date Abstract Given

More information

Improved Results on Geometric Hitting Set Problems

Improved Results on Geometric Hitting Set Problems Improved Results on Geometric Hitting Set Problems Nabil H. Mustafa nabil@lums.edu.pk Saurabh Ray saurabh@cs.uni-sb.de Abstract We consider the problem of computing minimum geometric hitting sets in which,

More information

Course Introduction / Review of Fundamentals of Graph Theory

Course Introduction / Review of Fundamentals of Graph Theory Course Introduction / Review of Fundamentals of Graph Theory Hiroki Sayama sayama@binghamton.edu Rise of Network Science (From Barabasi 2010) 2 Network models Many discrete parts involved Classic mean-field

More information

Distributed Algorithm for Voronoi Partition of Wireless Sensor Networks with a Limited Sensing Range

Distributed Algorithm for Voronoi Partition of Wireless Sensor Networks with a Limited Sensing Range sensors Article Distributed Algorithm for Voronoi Partition of Wireless Sensor Networks with a Limited Sensing Range Chenlong He 1, * ID, Zuren Feng 1 and Zhigang Ren 2 1 State Key Laboratory for Manufacturing

More information

Line segment intersection. Family of intersection problems

Line segment intersection. Family of intersection problems CG Lecture 2 Line segment intersection Intersecting two line segments Line sweep algorithm Convex polygon intersection Boolean operations on polygons Subdivision overlay algorithm 1 Family of intersection

More information