Maximal Cliques in Unit Disk Graphs: Polynomial Approximation

Size: px
Start display at page:

Download "Maximal Cliques in Unit Disk Graphs: Polynomial Approximation"

Transcription

1 Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley, CA 94720, USA {gptar, wlr}@eecs.berkeley.ed 2 OPNET Technologies Inc, 2006 Delaware Street Berkeley, CA 94709, USA ogoldschmidt@opnet.com Abstract We consider the problem of generating all maximal cliqes in an nit disk graph. General algorithms to find all maximal cliqes are exponential, so we rely on a polynomial approximation. Or algorithm makes se of certain key geographic strctres of these graphs. For each edge, we limit the set of ertices that may form cliqes with this as the longest edge. We then consider seeral characteristic shapes determined by that edge, and proe that all cliqes haing this as the longest edge, are inclded in one of the sets of ertices contained in these shapes. Or algorithm works in O(m 2 ) time and generates O(m ) cliqes, where m is the nmber of edges in the graph and is its maximm degree. We also proide a modified ersion of the algorithm which improes the performance in many cases, albeit withot affecting the worst case rnning time. Keywords: Cliqes, Unit Disk Graphs, Ad-Hoc Networks. Introdction We address the problem of finding all maximal cliqes in an Unit Disk Graph (UDG) []. An nit disk graph G = (V, E) is defined on a finite set of points V in the plane. Two ertices, V are connected by an edge E if and only if their Eclidean distance is less than or eqal to. An indced sbgraph in G that is a complete graph is called a cliqe. A maximal cliqe of G is one that it is not contained in any other cliqe. UDGs hae recently attracted a lot of importance de to the adent of wireless ad-hoc networks. Modelling of ad-hoc networks reqires the nderstanding of interference between neighboring nodes and links. Two nodes/links are often modelled as interfering when they lie within an interference range of each other, making the nderlying graph a UDG [2]. UDGs also appear in channel assignment problems in broadcast and celllar networks (e.g. []). Cliqes in sch networks are of importance since only a single ertex in a cliqe may be actie at once leading to considerations of capacity and qality of serice. In this paper, we attempt to find all maximal cliqes in a UDG, in polynomial time. We begin by describing in Sec. 2 the backgrond of the problem, and the related work in the field. Or approximation algorithm and its rationale is presented in Sec. 3. We complete the paper with a discssion of simlation reslts in Sec. 4, and a conclsion in Sec Backgrond and Related Work We cite a sampling of papers in the ad-hoc networking arena that tilize the concept of cliqes for schedling, roting and QoS prposes. In [3], the athor ses these ideas for optimizing traffic flows, while the athors of [2] and [4] se cliqes to derie necessary and sfficient bonds on the maximm capacity of an ad-hoc network. In [5], the athors propose a cliqe-based pricing approach to optimize resorce allocation in an ad-hoc network. All these ideas reqire the comptation of maximal cliqes, preferably in a distribted manner. Cliqes hae been stdied in great detail in the area of graph theory. Algorithms to generate maximal cliqes from a graph were first introdced by Harary and Ross [6] in 957. Dring the 960s and 970s, the Bierstone Algorithm was deeloped [7, 8], and was frther refined in [9]. All of these algorithms work on a general graph and otpt maximal cliqes. The nmber of maximal cliqes in a graph is typically exponential, as sch algorithms are conseqently (e.g. [0]). While the aboe algorithms also work for UDGs, or specific applications often reqire a qicker approximation approach.

2 It is tempting to hope that the special strctre of UDG s caps the nmber of maximal cliqes in a UDG. In fact, the nmber of cliqes cold be exponential in n, the nmber of ertices in the graph, as we hae shown. Theorem [] The total nmber of cliqes in a UDG grows exponentially with n in the worst case. Proof We illstrate this by the following example. Assme n = 2p. Draw a circle of diameter + ɛ, where 0 < ɛ <<. Place the 2p nodes niformly on the edge of the circle and label them clockwise from to 2p. If ɛ is small enogh, we hae edges from any ertex i to all other ertices except the diametrically opposite ertex (i + p) mod 2p. Ths we hae constrcted a complete p-partite graph with its ertex set being a pair of diametrically opposite nodes i.e. {i, i + p}, i =,... p. The selection of one ertex from each of the p sets will form a maximal cliqe. Clearly we hae a total of 2 p = 2 n/2 maximal cliqes. This pessimistic reslt led s to look at sitable approximations, that wold enable a polynomial-time algorithm. The essence of the approximation is to se slightly sper-maximal cliqes. When the nmber of cliqes grows large, the approximation algorithm generates the nion of seeral nearby cliqes as a single sper-maximal cliqe. In [2], we hae earlier presented an approximation algorithm to find all maximal cliqes in ad-hoc networks. We recognized two key featres abot the geographic natre of ad-hoc networks. First, two nodes that are part of a cliqe mst be within an interference range ω = of each other. Second, if a grop of nodes form a cliqe, then the maximm distance between any pair of them mst be. The heristic approximation ses a small disk of diameter (i.e. radis = /2) to scan a larger disk of radis arond a node. Alternatiely, the scanning disk is sed to scan the entire region in which the nodes are placed. Each position of the scanning disk generates a cliqe. The generated set of cliqes is then shrnk to reslt in the approximate set of maximal cliqes arond the node. There are howeer a few problems with the scanning disk approach presented in [2]. The foremost of which is that the rnning time of the algorithm depends on the step size and the size of the field. Frther, the scanning disk of diameter fails to catch all cliqes, e.g., three nodes located at the corners of an eqilateral triangle of side. We wold like to address these isses as we moe beyond the realm of ad-hoc networks, to more generic UDGs. 3 Algorithm We order the edges in G in decreasing order of length. Then, for each edge, we find all maximal cliqes with as the longest edge. This method will generate all maximal cliqes in G, together with some extra cliqes that may be sbsets of other larger maximal cliqes. The set of cliqes generated may be processed at a later stage to prne the non-maximal cliqes. 3. Important Shapes in UDG We begin by obsering seeral important geometric strctres determined by an edge, and their characteristics w.r.t. maximal cliqes in UDGs. We consider three shapes in particlar we call these the football, the disk and the cred triangle. 3.. Football Gien an edge, let d be the Eclidean distance between and. Obiosly, d, since or graph is an UDG. We draw two circles of radis d centered at and. Denote the set of ertices in the football-shaped (American Football, not Soccer) intersection of the two circles as F, shown in Fig. (a). Then we proe the following. Theorem 2 [] A cliqe whose maximm edge is mst be contained in F. Proof 2 Sppose the cliqe with as the longest edge contains a ertex w V \ F. Then, either d w > d or d w > d. In either case, is not the longest edge. (Contradiction) Howeer, F in itself is not a maximal cliqe as defined. An example is shown in Fig. (a), where nodes i, j F. Yet d ij > d and hence not part of a maximal cliqe with as the longest edge. In fact, we cold een hae d ij >, in which case, ij / E. Ths F is a sperset of the reqisite maximal cliqes. By simple geometry, the height of the football F is d 3. A special sitation occrs when / 3. In this case, the height of the football is ; so eery ertex in F is connected to each other. Then there is in fact a single cliqe F, which incldes all maximal cliqes with as the longest edge.

3 t T F y k i Figre (b) x > <= <= j D Figre (c) Figre (a) Figre (d) Figre : Characteristic Shapes in UDG: (a) Football F (b) Cred Top Triangle T (c) Proof that T is a cliqe (d) Conter-example showing T and T 2 not enogh to coer all cliqes 3..2 Disk The next shape of interest is the disk D which is the set of all ertices in the circle with as its diameter, also shown in Fig. (a). Clearly, the maximm distance between any two nodes in D is d. Ths D is a cliqe with as its longest edge. Note howeer that D may not always be maximal, e.g., in Fig. (a), D = {,, k}, yet the cliqe {,, k, i} contains D Cred Triangle Finally, we look at the cred triangle formed by,, and t the pper intersection point of the two circles of radis d centered at and, as denoted in Fig. (b). The three points form an eqilateral triangle. We expand this area by drawing cres with radis d from to centered at t and so on. All ertices in the reslting top cred triangle is denoted by T. A similar bottom cred triangle T 2 may also be drawn. The ertices in these form cliqes, as we proe below. Theorem 3 The ertices in T or T 2 form a cliqe with as the longest edge. Proof 3 We show that any two ertices in T are separated by a distance d. Then, T forms a cliqe with as the longest edge. Sppose x, y T and d xy > d. We choose two points ot of the eqidistant points,, t sch that both x and y lie on the same side as the edge connecting these two points. W alog, we choose and. The reslting qadrilateral formed by joining them to x and y is shown in Fig. (c). Note that all edges except xy are d. Ths we hae a contradiction. In x, x, x. Then x x xy. () Bt in xy, xy > x, y. Then xy > xy x. (2) Howeer, the cred triangle also does not necessarily coer all cliqes. For instance, the for ertices in a cross shown in Fig. (d) form a cliqe, bt can not be coered by any cred triangle as defined. To smmarize, we hae otlined three characteristic shapes determined by the edge : Football F is a sperset of all maximal cliqes with as the longest edge. Disk D is a cliqe with as the longest edge, bt may not be maximal. Cred Triangles T and T 2 are cliqes with as the longest edge. Bt these too may not be maximal. If eery node in F is contained in any of D, T or T 2, then we hae fond the single maximal cliqe with as the longest edge. Since that may not always happen, we need an alternatie method.

4 k i j F Band B y > B2 z y l x Figre (a) B Figre (b) x B Figre (c) Figre 2: Moing band in football: (a) Band B in Football (b) B may inclde some extra ertices (c) Positioning bands with bondaries on ertices in F 3.2 Moing Band in Football Consider the football shaped area as before, and look at a band of height d within this, as shown in Fig. 2(a). Let B be the set of nodes within the band. Since the height of the band is greater than half of the height d 3 of the football, any sch band always contains and. As we know from Theorem 2, all maximal cliqes with as the longest edge mst lie in F. Then we hae the following theorem. Theorem 4 Any cliqe with as the longest edge mst lie in some band B within football F. Proof 4 Any ertex x F is d from both and. So the only way we cold iolate the theorem is by haing two ertices x, y F that form a cliqe with and, bt do not lie in any band. Bt then d xy > d since the height of the band itself is d. (Contradiction) Ths we will coer eery possible maximal cliqe with as the longest edge, if we select all sch bands B. Note that the band B may inclde some extra ertices that are not part of the maximal cliqe as defined. As shown in Fig. 2(b), ertices x and y are inclded in the band, yet their distance is greater than d. When the ertices in F are not all inclded in either of D, T or T 2, we need to se the bands to generate the maximal cliqes. The ertices in F can be diided into two disjoint grops those to the north of and those to the soth (assign bondary nodes to any one). For each ertex x F, depending on whether it is to the north (or soth) of, we position a band sch that its north (or soth) bondary lies on x. If the distance of x from is less than 3 2, we simply position a band at its sothernmost (or northernmost) position. There are at most sch bands, since or has no more than neighbors. Fig. 2(c) shows two sch bands B and B2. In this case we hae the following theorem: Theorem 5 Choose a set of bands B i, i =,..., corresponding to each ertex in F, as described aboe. Then, eery maximal cliqe with as the longest edge, is contained in some B i in this set. Proof 5 Consider any maximal cliqe q F. Amongst all its ertices, let x be the ertex farthest from the line. Then, some band B j is positioned with x on one of its bondaries, and also contains and. Since x is the farthest ertex in the cliqe, all other ertices mst lie on the same side of x as. Bt they are all at a distance d from x. So all the other members mst lie within the band, whose width is d. Hence q B j. 3.3 Basic Algorithm findallmaximalcliqesinudg:. order edges in decreasing order of length; 2. for each edge 3. if d / 3 4. otpt maximal cliqe F ; 5. else 6. otpt three maximal cliqes: D, T, and T 2 ;

5 7. if F = D or F = T or F = T 2 8. we are done; 9. else 0. for each ertex x F. Position band B with bondary on x; 2. Vertices in band form cliqe; 3.4 Complexity We assme that the description of V also contains the geometric locations of the ertices. Let m be the nmber of edges, and be the maximm degree of the graph. Then, step 2 is ealated m times. There may be at most ertices in F, so step 0 is ealated times. Finally, in order to generate a cliqe, we need to look at eery neighbor of and, and check if they lie within the prescribed region. This may be achieed in at most 2 operations. Ths the oerall algorithm is O(m..2 ) = O(m 2 ). For each link, the algorithm generates p to cliqes. Ths, the nmber of cliqes generated is O(m ). 3.5 Modified Algorithm Each cliqe fond in Sec. 3.3 is maximal with as its longest edge. Howeer, recall that or motiation is in finding maximal cliqes in the entire graph; so any generated cliqe that is a sbset of some other cliqe is redndant. Sppose that instead of taking the disk D with diameter d, we consider a potentially larger disk of diameter, lying on (both disks hae the same center). Let D be the set of ertices in this larger disk, as shown in Fig. 3(a). D may inclde edges longer than, bt these edges are. So D is a maximal cliqe in G, and D D. Ths we in fact do better by looking at D instead of D. Similarly, ertices in the pper cred triangle T as shown in Fig. 3(b) (as also the lower cred triangle T 2 ), with sides, also forms a maximal cliqe. T shares the same ppermost point with T, and so T T. We then hae the following theorem. Theorem 6 If d 3, eery band B is contained in either F T or F T 2. Proof 6 We note that T and T 2 oerlap, as shown in Fig. 3(c). For a small enogh d, the oerlap is sch that any band B is wholly contained in either T or T 2. This happens when d d 3 2 ( 3 + ) d = 3 (3) Also, B F. Hence for d 3, eery possible B is contained in either F T or F T 2. Bt T and T 2 are both maximal cliqes. Hence it is enogh to consider only T and T 2 instead of looking at all the bands. We se this knowledge to modify the algorithm. findallmaximalcliqesinudgmodified:. order edges in decreasing order of length; 2. for each edge 3. if d / 3 4. otpt maximal cliqe F ; 5. else 6. otpt three maximal cliqes: 7. if d 3 F D, F T, and F T 2 ; 8. we are done; 9. else if no ertex in F \ D or F \ T or F \ T 2 0. we are done;. else 2. for each ertex x F 3. Position band B with bondary on x; 4. Vertices in band form cliqe;

6 D T T D oerlap T2 Figre (a) Figre (b) Figre (c) Figre 3: Modified algorithm coering more nodes in maximal cliqe: (a) Larger band D (b) Larger cred triangle T (c) Oerlapping T and T 2 when d is small The modified algorithm has the same rnning time O(m 2 ) in the worst case as the basic algorithm (Sec. 3.4), and generates the same order of cliqes. Howeer, we are more likely to aoid the scanning band in steps 2-4 by checking in steps 7-0 if we hae in fact already generated all the maximal cliqes we need. 3.6 Analyzing Extra Nodes Coered by Band In a general graph, it is difficlt to assess how many extra nodes the band captres in its cliqes. Howeer, it is interesting to analyze the effect in a niform random graph. In sch a case, the nmber of ertices captred by each coering shape is proportional to its area. We hae calclated the areas coered by each of the shapes that we hae sed. Note that the band has ariable area it is largest when at the middle of the football, and smallest when it is at the extremities. Shape Football Disk Cred Triangle Band (max) Band (min) Area [ 2π ]d2 =.228d Handling Changes in the Network π 4 d2 = 0.785d 2 [ π ]d2 = 0.705d 2.008d d 2 It is important to analyze the ealation of the algorithm when changes occr in the network. We wold like the reaction to these changes to be limited to the locality of the change. We identify fie types of changes New Vertex When a new ertex is added to the network, we need to ealate cliqes at all the new edges. This takes O(. 2 ) = O( 3 ), since there may be p to edges. The new ertex may add to any of the cliqes inoling its neighbors; so we need to re-ealate cliqes in the neighborhood of the new ertex. With nodes in the neighborhood, there may be p to 2 edges hence the oerall algorithm is O( 2. 2 ) = O( 4 ) Delete Vertex Let the maximal cliqes generated be stored in a q n cliqe-node incidence matrix, where q is the nmber of cliqes. From Sec. 3.4, we know that q is O(m ). To delete a ertex i, it sffices to delete the i th colmn from the matrix. This may be done in O(m ) New Edge We need to re-ealate cliqes in the neighborhood of both ertices forming the new edge. There may be p to 2 2 edges in the neighborhood, so the oerall algorithm is O( ) = O( 4 ).

7 2 Bands Aerage nmber of Cliqes Cliqes/Edge Cliqes/Edge(Modified) maxdegree/ Node Density (a) Nmber of cliqes generated by the approximation algorithms Fraction of edges for each cliqe generation method D, T and T2 d < /sqrt(3) Bands D, T and T2 d < sqrt(3) d < /sqrt(3) Node Density (b) Comparing the two ersions of the algorithm. Left bar = Basic Algorithm. Right bar = Modified Algorithm Figre 4: Approximating Maximal Cliqes in a Random UDG Delete Edge Again, we need to re-ealate cliqes at both affected ertices. As aboe, it takes O( 4 ) Moe Vertex If no new edges are formed or lost, we need not take any steps. Howeer, a change in the network needs to be handled as a Delete Vertex (Sec ), followed by a New Vertex (Sec. 3.7.). The cmlatie algorithm is O( 4 ). For all of the modification operations described aboe, note that O( 2 ) is no greater than O(m), so O( 4 ) is at least as good as O(m 2 ). Typically << m, so O( 4 ) presents a sbstantial gain oer O(m 2 ). 3.8 Distribted Algorithm The maximal cliqe algorithms presented in Sec. 3.3, 3.5, and 3.7 rely only on localized information. For instance, in an ad-hoc network, we wold only reqire each node to know abot location and topology in its 2-hop neighborhood. In a practical scenario, the algorithms may ths be implemented in a distribted fashion with each node compting all maximal cliqes arond it. This wold take O( 2 ) time. 4 Simlation Reslts We ealate the performance of or algorithms in a UDG formed by nodes distribted randomly in the plane. We consider a field of dimension 0 0 and niformly distribte between 00 to 2000 nodes on it, yielding a node density ranging from to 20 per nit sqare. We then execte the algorithms (both basic and modified) on the generated topologies, the reslts of which are presented in Fig. 4. Note that each data point on the plot is an aerage oer 0 separate randomly generated topologies, haing the same node density. Fig. 4(a) shows the nmber of cliqes per edge, as the node density increases. We also plot the ale of the maximm degree on the same graph, sing the dotted line (note that this ale is scaled down by a factor of 0, to improe isibility). In a random UDG, increases linearly with node density. Recall that the nmber of cliqes generated by or approximation algorithm is O(m ), ths the nmber of cliqes per edge is O( ). As expected, cliqes/edge shows the same shape as. Howeer, the optimizations achieed by sing the disks and the cred triangles ensre that the actal nmber of cliqes is significantly less. In fact, the actal cliqes/edge generated by the basic algorithm is only arond /8. The modified algorithm presented in Sec. 3.5 proides a frther redction in the nmber of cliqes, as shown in the figre. Fig. 4(b) compares the detailed workings of the two flaors of the algorithm. Using a bar graph, we look at the fraction of edges that are ealated sing each block in the logic of the algorithms, as gien in sections 3.3 and 3.5. We distingish

8 these as d < / 3, d < 3, D, T, T 2, and Bands. For each ale of node density, the left bar denotes the basic algorithm and the right bar denotes the modified algorithm. Consider the left bar for each node density, docmenting the fnctioning of the basic algorithm. In all the simlations, /3 of the edges (lowest bar, colored cyan) directly yield a single maximal cliqe F, when d < / 3. This is to be expected, since the probability of this is gien by ( / 3 ) 2 = /3. Seeral more edges are handled by one of the special cliqes D, T or T 2, as indicated by the red bar in the middle. The fraction of edges where we hae to resort to the Bands, is shown by the black bar at the ery top. As seen from the figre, ery few edges reqire this method when the node density is small, bt the fraction of edges increases with node density. At the maximm node density of 20, nearly 65% of the edges reqire the comptation of the Bands. The modified ersion of the algorithm introdces another case, whereby the sets T and T 2 sffice when d < 3. This is denoted by the second bar from the bottom (colored green) for the modified algorithm. This cases a redction in the fraction of edges reqiring the ealation of Bands (down to abot 40% when the node density is 20), and therefore a redction in the total nmber of cliqes. 5 Conclsions Wireless and ad-hoc networks are often modelled as nit disk graphs, and cliqe strctres in them are sed in seeral applications. We consider the problem of generating all maximal cliqes in a UDG. General algorithms to find cliqes in a graph are exponential, so we rely on a polynomial approximation. We consider each edge, and find all maximal cliqes with this as the longest edge. Or algorithm works by making certain key obserations abot the geometric strctre of these graphs. We first limit the possible cliqe-forming ertices into an area shaped like a football. Then we se two other shapes the disk and the cred triangle which we proe to generate cliqes. If all cliqes hae not yet been fond, we se a band shape to scan the football to generate all cliqes. Or algorithm works in O(m 2 ) time and generates O(m ) cliqes. References [] A. Graf, M. Stmpf, and G. Weisenfels, On Coloring Unit Disk Graphs, Algorithmica, ol. 20 (998), pp [2] R. Gpta, J. Msacchio, and J. Walrand, Sfficient Rate Constraints for QoS Flows in Ad-Hoc Networks, UCB/ERL Technical Menorandm M04/42, Fall [3] A. Pri, Optimizing Traffic Flow in Fixed Wireless Networks, Proc. WCNC [4] K. Jain, J. Padhye, V. N. Padmanabhan, and L. Qi, Impact of Interference on Mlti-hop Wireless Network Performance, ACM Mobicom 2003, San Diego, CA, USA, September [5] Y. Xe, B. Li, and K. Nahrstedt, Price-based Resorce Allocation in Wireless Ad-Hoc Networks, in Proc. IWQoS 2003, Monterey, California, Jne [6] F. Harary, and I. C. Ross, A Procedre for Cliqe Detection Using the Grop Matrix, Sociometry, ol. 20, pp , 957. [7] E. Bierstone, Cliqes and Generalized Cliqes in a Finite Linear Graph, Unpblished Report, 960s. [8] J. G. Agstson, and J. Minker, An Analysis of Some Graph Theoretical Clster Techniqes, Jornal of the ACM (JACM), ol. 7, no. 4, pp , October 970. [9] C. Bron and J. Kerbosch, Finding All Cliqes in an Undirected Graph, Commnications of the ACM, ol. 6, pp , 973. [0] S. Tskiyama, M. Ide, H. Ariyoshi, and I. Shirakawa, A New Algorithm for Generating all the Maximal Independent Sets, SIAM Jornal of Compting, ol. 6, pp , 977. [] G. Y, O. Goldschmidt, and H. Chen, Cliqe, Independent Set, and Vertex Coer in Geometric Graphs, npblished report, 992. [2] R. Gpta and J. Walrand, Approximating Maximal Cliqes in Ad-Hoc Networks, Proc. PIMRC 2004, Barcelona, Spain, September 2004.

Improving Network Connectivity Using Trusted Nodes and Edges

Improving Network Connectivity Using Trusted Nodes and Edges Improing Network Connectiity Using Trsted Nodes and Edges Waseem Abbas, Aron Laszka, Yegeniy Vorobeychik, and Xenofon Kotsokos Abstract Network connectiity is a primary attribte and a characteristic phenomenon

More information

Chapter 7 TOPOLOGY CONTROL

Chapter 7 TOPOLOGY CONTROL Chapter TOPOLOGY CONTROL Oeriew Topology Control Gabriel Graph et al. XTC Interference SINR & Schedling Complexity Distribted Compting Grop Mobile Compting Winter 00 / 00 Distribted Compting Grop MOBILE

More information

Reconstructing Generalized Staircase Polygons with Uniform Step Length

Reconstructing Generalized Staircase Polygons with Uniform Step Length Jornal of Graph Algorithms and Applications http://jgaa.info/ ol. 22, no. 3, pp. 431 459 (2018) DOI: 10.7155/jgaa.00466 Reconstrcting Generalized Staircase Polygons with Uniform Step Length Nodari Sitchinaa

More information

On Plane Constrained Bounded-Degree Spanners

On Plane Constrained Bounded-Degree Spanners Algorithmica manscript No. (ill be inserted by the editor) 1 On Plane Constrained Bonded-Degree Spanners 2 3 Prosenjit Bose Rolf Fagerberg André an Renssen Sander Verdonschot 4 5 Receied: date / Accepted:

More information

COMPOSITION OF STABLE SET POLYHEDRA

COMPOSITION OF STABLE SET POLYHEDRA COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining

More information

[1] Hopcroft, J., D. Joseph and S. Whitesides, Movement problems for twodimensional

[1] Hopcroft, J., D. Joseph and S. Whitesides, Movement problems for twodimensional Acknoledgement. The athors thank Bill Lenhart for interesting discssions on the recongration of rlers. References [1] Hopcroft, J., D. Joseph and S. Whitesides, Moement problems for todimensional linkages,

More information

Vertex Guarding in Weak Visibility Polygons

Vertex Guarding in Weak Visibility Polygons Vertex Garding in Weak Visibility Polygons Pritam Bhattacharya, Sbir Kmar Ghosh*, Bodhayan Roy School of Technology and Compter Science Tata Institte of Fndamental Research Mmbai 400005, India arxi:1409.46212

More information

Pushing squares around

Pushing squares around Pshing sqares arond Adrian Dmitresc János Pach Ý Abstract We stdy dynamic self-reconfigration of modlar metamorphic systems. We garantee the feasibility of motion planning in a rectanglar model consisting

More information

Planarity-Preserving Clustering and Embedding for Large Planar Graphs

Planarity-Preserving Clustering and Embedding for Large Planar Graphs Planarity-Presering Clstering and Embedding for Large Planar Graphs Christian A. Dncan, Michael T. Goodrich, and Stephen G. Koboro Center for Geometric Compting The Johns Hopkins Uniersity Baltimore, MD

More information

On Plane Constrained Bounded-Degree Spanners

On Plane Constrained Bounded-Degree Spanners On Plane Constrained Bonded-Degree Spanners Prosenjit Bose 1, Rolf Fagerberg 2, André an Renssen 1, Sander Verdonschot 1 1 School of Compter Science, Carleton Uniersity, Ottaa, Canada. Email: jit@scs.carleton.ca,

More information

Localized Delaunay Triangulation with Application in Ad Hoc Wireless Networks

Localized Delaunay Triangulation with Application in Ad Hoc Wireless Networks 1 Localized Delanay Trianglation with Application in Ad Hoc Wireless Networks Xiang-Yang Li Gria Călinesc Peng-Jn Wan Y Wang Department of Compter Science, Illinois Institte of Technology, Chicago, IL

More information

Mobility Control and Its Applications in Mobile Ad Hoc Networks

Mobility Control and Its Applications in Mobile Ad Hoc Networks Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai Department of Compter Science and Engineering Florida Atlantic Uniersity Boca Raton, FL 3331 Abstract Most existing localized

More information

The Disciplined Flood Protocol in Sensor Networks

The Disciplined Flood Protocol in Sensor Networks The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab

More information

Friend of My Friend: Network Formation with Two-Hop Benefit

Friend of My Friend: Network Formation with Two-Hop Benefit Friend of My Friend: Network Formation with Two-Hop Benefit Elliot Ansheleich, Onkar Bhardwaj, and Michael Usher Rensselaer Polytechnic Institte, Troy NY, USA Abstract. How and why people form ties is

More information

Faster Random Walks By Rewiring Online Social Networks On-The-Fly

Faster Random Walks By Rewiring Online Social Networks On-The-Fly 1 Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed

More information

A Unified Energy-Efficient Topology for Unicast and Broadcast

A Unified Energy-Efficient Topology for Unicast and Broadcast A Unified Energy-Efficient Topology for Unicast and Broadcast Xiang-Yang Li Dept. of Compter Science Illinois Institte of Technology, Chicago, IL, USA xli@cs.iit.ed Wen-Zhan Song School of Eng. & Comp.

More information

Image Restoration Image Degradation and Restoration

Image Restoration Image Degradation and Restoration Image Degradation and Restoration hxy Image Degradation Model: Spatial domain representation can be modeled by: g x y h x y f x y x y Freqency domain representation can be modeled by: G F N Prepared By:

More information

A sufficient condition for spiral cone beam long object imaging via backprojection

A sufficient condition for spiral cone beam long object imaging via backprojection A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral

More information

Constrained Routing Between Non-Visible Vertices

Constrained Routing Between Non-Visible Vertices Constrained Roting Between Non-Visible Vertices Prosenjit Bose 1, Matias Korman 2, André van Renssen 3,4, and Sander Verdonschot 1 1 School of Compter Science, Carleton University, Ottawa, Canada. jit@scs.carleton.ca,

More information

Faster Random Walks By Rewiring Online Social Networks On-The-Fly

Faster Random Walks By Rewiring Online Social Networks On-The-Fly Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed

More information

CS 557 Lecture IX. Drexel University Dept. of Computer Science

CS 557 Lecture IX. Drexel University Dept. of Computer Science CS 7 Lectre IX Dreel Uniersity Dept. of Compter Science Fall 00 Shortest Paths Finding the Shortest Paths in a graph arises in many different application: Transportation Problems: Finding the cheapest

More information

Fixed-Parameter Algorithms for Cluster Vertex Deletion

Fixed-Parameter Algorithms for Cluster Vertex Deletion Fixed-Parameter Algorithms for Clster Vertex Deletion Falk Hüffner Christian Komsieicz Hannes Moser Rolf Niedermeier Institt für Informatik, Friedrich-Schiller-Uniersität Jena, Ernst-Abbe-Platz 2, D-07743

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

h-vectors of PS ear-decomposable graphs

h-vectors of PS ear-decomposable graphs h-vectors of PS ear-decomposable graphs Nima Imani 2, Lee Johnson 1, Mckenzie Keeling-Garcia 1, Steven Klee 1 and Casey Pinckney 1 1 Seattle University Department of Mathematics, 901 12th Avene, Seattle,

More information

Visibility-Graph-based Shortest-Path Geographic Routing in Sensor Networks

Visibility-Graph-based Shortest-Path Geographic Routing in Sensor Networks Athor manscript, pblished in "INFOCOM 2009 (2009)" Visibility-Graph-based Shortest-Path Geographic Roting in Sensor Networks Gang Tan Marin Bertier Anne-Marie Kermarrec INRIA/IRISA, Rennes, France. Email:

More information

Alliances and Bisection Width for Planar Graphs

Alliances and Bisection Width for Planar Graphs Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.

More information

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

arxiv: v1 [cs.cg] 27 Nov 2015

arxiv: v1 [cs.cg] 27 Nov 2015 On Visibility Representations of Non-planar Graphs Therese Biedl 1, Giseppe Liotta 2, Fabrizio Montecchiani 2 David R. Cheriton School of Compter Science, University of Waterloo, Canada biedl@waterloo.ca

More information

Representing a Cubic Graph as the Intersection Graph of Axis-parallel Boxes in Three Dimensions

Representing a Cubic Graph as the Intersection Graph of Axis-parallel Boxes in Three Dimensions Representing a Cbic Graph as the Intersection Graph of Axis-parallel Boxes in Three Dimensions ABSTRACT Abhijin Adiga Network Dynamics and Simlation Science Laboratory Virginia Bioinformatics Institte,

More information

Towards applications based on measuring the orbital angular momentum of light

Towards applications based on measuring the orbital angular momentum of light CHAPTER 8 Towards applications based on measring the orbital anglar momentm of light Efficient measrement of the orbital anglar momentm (OAM) of light has been a longstanding problem in both classical

More information

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS Proceedings th FIG Symposim on Deformation Measrements Santorini Greece 00. ABSOUTE DEFORMATION PROFIE MEASUREMENT IN TUNNES USING REATIVE CONVERGENCE MEASUREMENTS Mahdi Moosai and Saeid Khazaei Mining

More information

Chapter 5. Plane Graphs and the DCEL

Chapter 5. Plane Graphs and the DCEL Chapter 5 Plane Graphs and the DCEL So far we hae been talking abot geometric strctres sch as trianglations of polygons and arrangements of line segments withot paying mch attention to how to represent

More information

Today. B-splines. B-splines. B-splines. Computergrafik. Curves NURBS Surfaces. Bilinear patch Bicubic Bézier patch Advanced surface modeling

Today. B-splines. B-splines. B-splines. Computergrafik. Curves NURBS Surfaces. Bilinear patch Bicubic Bézier patch Advanced surface modeling Comptergrafik Matthias Zwicker Uniersität Bern Herbst 29 Cres Srfaces Parametric srfaces Bicbic Bézier patch Adanced srface modeling Piecewise Bézier cres Each segment spans for control points Each segment

More information

v e v 1 C 2 b) Completely assigned T v a) Partially assigned Tv e T v 2 p k

v e v 1 C 2 b) Completely assigned T v a) Partially assigned Tv e T v 2 p k Approximation Algorithms for a Capacitated Network Design Problem R. Hassin 1? and R. Rai 2?? and F. S. Salman 3??? 1 Department of Statistics and Operations Research, Tel-Ai Uniersity, Tel Ai 69978, Israel.

More information

Fault Tolerance in Hypercubes

Fault Tolerance in Hypercubes Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different

More information

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna

More information

Mathematical model for storing and effective processing of directed graphs in semistructured data management systems

Mathematical model for storing and effective processing of directed graphs in semistructured data management systems Mathematical model for storing and effectie processing of directed graphs in semistrctred data management MALIKOV A, GULEVSKIY Y, PARKHOMENKO D Information Systems and Technologies Department North Cacass

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

On shortest-path all-optical networks without wavelength conversion requirements

On shortest-path all-optical networks without wavelength conversion requirements Research Collection Working Paper On shortest-path all-optical networks withot waelength conersion reqirements Athor(s): Erlebach, Thomas; Stefanakos, Stamatis Pblication Date: 2002 Permanent Link: https://doi.org/10.3929/ethz-a-004446054

More information

Real-Time Robot Path Planning via a Distance-Propagating Dynamic System with Obstacle Clearance

Real-Time Robot Path Planning via a Distance-Propagating Dynamic System with Obstacle Clearance POSTPRINT OF: IEEE TRANS. SYST., MAN, CYBERN., B, 383), 28, 884 893. 1 Real-Time Robot Path Planning ia a Distance-Propagating Dynamic System with Obstacle Clearance Allan R. Willms, Simon X. Yang Member,

More information

Lemma 1 Let the components of, Suppose. Trees. A tree is a graph which is. (a) Connected and. (b) has no cycles (acyclic). (b)

Lemma 1 Let the components of, Suppose. Trees. A tree is a graph which is. (a) Connected and. (b) has no cycles (acyclic). (b) Trees Lemma Let the components of ppose "! be (a) $&%('*)+ - )+ / A tree is a graph which is (b) 0 %(')+ - 3)+ / 6 (a) (a) Connected and (b) has no cycles (acyclic) (b) roof Eery path 8 in which is not

More information

Augmenting the edge connectivity of planar straight line graphs to three

Augmenting the edge connectivity of planar straight line graphs to three Agmenting the edge connectivity of planar straight line graphs to three Marwan Al-Jbeh Mashhood Ishaqe Kristóf Rédei Diane L. Sovaine Csaba D. Tóth Pavel Valtr Abstract We characterize the planar straight

More information

Finite Domain Cuts for Minimum Bandwidth

Finite Domain Cuts for Minimum Bandwidth Finite Domain Cts for Minimm Bandwidth J. N. Hooker Carnegie Mellon University, USA Joint work with Alexandre Friere, Cid de Soza State University of Campinas, Brazil INFORMS 2013 Two Related Problems

More information

Object Pose from a Single Image

Object Pose from a Single Image Object Pose from a Single Image How Do We See Objects in Depth? Stereo Use differences between images in or left and right eye How mch is this difference for a car at 00 m? Moe or head sideways Or, the

More information

Stereopsis Raul Queiroz Feitosa

Stereopsis Raul Queiroz Feitosa Stereopsis Ral Qeiroz Feitosa 5/24/2017 Stereopsis 1 Objetie This chapter introdces the basic techniqes for a 3 dimensional scene reconstrction based on a set of projections of indiidal points on two calibrated

More information

arxiv: v1 [cs.cg] 12 Dec 2013

arxiv: v1 [cs.cg] 12 Dec 2013 Smooth Orthogonal Drawings of Planar Graphs Md. Jawaherl Alam, Michael A. Bekos, Michael Kafmann, Philipp Kindermann, Stephen G. Koboro, and Alexander Wolff arxi:.58 [cs.cg] Dec 0 Department of Compter

More information

Real-time mean-shift based tracker for thermal vision systems

Real-time mean-shift based tracker for thermal vision systems 9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University

More information

Complete Information Pursuit Evasion in Polygonal Environments

Complete Information Pursuit Evasion in Polygonal Environments Complete Information Prsit Easion in Polygonal Enironments Kyle Klein and Sbhash Sri Department of Compter Science Uniersity of California Santa Barbara, CA 9306 Abstract Sppose an npredictable eader is

More information

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands

More information

Date: December 5, 1999 Dist'n: T1E1.4

Date: December 5, 1999 Dist'n: T1E1.4 12/4/99 1 T1E14/99-559 Project: T1E14: VDSL Title: Vectored VDSL (99-559) Contact: J Cioffi, G Ginis, W Y Dept of EE, Stanford U, Stanford, CA 945 Cioffi@stanforded, 1-65-723-215, F: 1-65-724-3652 Date:

More information

FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES

FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES RICARDO G. DURÁN AND ARIEL L. LOMBARDI Abstract. We consider the nmerical approximation of a model convection-diffsion

More information

Rectangle-of-influence triangulations

Rectangle-of-influence triangulations CCCG 2016, Vancoer, British Colmbia, Ag 3 5, 2016 Rectangle-of-inflence trianglations Therese Biedl Anna Lbi Saeed Mehrabi Sander Verdonschot 1 Backgrond The concept of rectangle-of-inflence (RI) draings

More information

arxiv: v1 [cs.cg] 31 Aug 2017

arxiv: v1 [cs.cg] 31 Aug 2017 Lombardi Drawings of Knots and Links Philipp Kindermann 1, Stephen Koboro 2, Maarten Löffler 3, Martin Nöllenbrg 4, André Schlz 1, and Birgit Vogtenhber 5 arxi:1708.098191 [cs.cg] 31 Ag 2017 1 FernUniersität

More information

Tri-Edge-Connectivity Augmentation for Planar Straight Line Graphs

Tri-Edge-Connectivity Augmentation for Planar Straight Line Graphs Tri-Edge-Connectivity Agmentation for Planar Straight Line Graphs Marwan Al-Jbeh 1, Mashhood Ishaqe 1, Kristóf Rédei 1, Diane L. Sovaine 1, and Csaba D. Tóth 1,2 1 Department of Compter Science, Tfts University,

More information

Minimal Edge Addition for Network Controllability

Minimal Edge Addition for Network Controllability This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,

More information

Adaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model

Adaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model International Jornal of Knowledge Engineering, Vol. 1, No. 2, September 215 Adaptie Inflence Maximization in Microblog nder the Competitie Independent Cascade Model Zheng Ding, Kai Ni, and Zhiqiang He

More information

Multiple Source Shortest Paths in a Genus g Graph

Multiple Source Shortest Paths in a Genus g Graph Mltiple Sorce Shortest Paths in a Gens g Graph Sergio Cabello Erin W. Chambers Abstract We gie an O(g n log n) algorithm to represent the shortest path tree from all the ertices on a single specified face

More information

Multi-lingual Multi-media Information Retrieval System

Multi-lingual Multi-media Information Retrieval System Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,

More information

USING MAPLE FOR VISUALIZATION OF TOPOLOGICAL SUBGROUPOIDS OF X Z X

USING MAPLE FOR VISUALIZATION OF TOPOLOGICAL SUBGROUPOIDS OF X Z X USING MAPLE FOR VISUALIZATION OF TOPOLOGICAL SUBGROUPOIDS OF X Z X Mădălina Roxana BUNECI, Uniersity Constantin Brâncşi of Târg-Ji Abstract. The prpose of this paper is to present arios ways to isalize

More information

Introduction to Computational Manifolds and Applications

Introduction to Computational Manifolds and Applications IMPA - Institto de Matemática Pra e Aplicada, Rio de Janeiro, RJ, Brazil Introdction to Comptational Manifolds and Applications Part 1 - Constrctions Prof. Marcelo Ferreira Siqeira mfsiqeira@dimap.frn.br

More information

Motivation: Art gallery problem. Polygon decomposition. Art gallery problem: upper bound. Art gallery problem: lower bound

Motivation: Art gallery problem. Polygon decomposition. Art gallery problem: upper bound. Art gallery problem: lower bound CG Lecture 3 Polygon decomposition 1. Polygon triangulation Triangulation theory Monotone polygon triangulation 2. Polygon decomposition into monotone pieces 3. Trapezoidal decomposition 4. Conex decomposition

More information

An Extended Fault-Tolerant Link-State Routing Protocol in the Internet

An Extended Fault-Tolerant Link-State Routing Protocol in the Internet An Extended Falt-Tolerant Link-State Roting Protocol in the Internet Jie W, Xiaola Lin, Jiannong Cao z, and Weijia Jia x Department of Compter Science and Engineering Florida Atlantic Uniersit Boca Raton,

More information

Assigning AS Relationships to Satisfy the Gao-Rexford Conditions

Assigning AS Relationships to Satisfy the Gao-Rexford Conditions Assigning AS Relationships to Satisfy the Gao-Rexford Conditions Lca Cittadini, Giseppe Di Battista, Thomas Erlebach, Marizio Patrignani, and Massimo Rimondini Dept. of Compter Science and Atomation, Roma

More information

Triangle-Free Planar Graphs as Segments Intersection Graphs

Triangle-Free Planar Graphs as Segments Intersection Graphs Triangle-ree Planar Graphs as Segments Intersection Graphs N. de Castro 1,.J.Cobos 1, J.C. Dana 1,A.Márqez 1, and M. Noy 2 1 Departamento de Matemática Aplicada I Universidad de Sevilla, Spain {natalia,cobos,dana,almar}@cica.es

More information

Chapter 5 Network Layer

Chapter 5 Network Layer Chapter Network Layer Network layer Physical layer: moe bit seqence between two adjacent nodes Data link: reliable transmission between two adjacent nodes Network: gides packets from the sorce to destination,

More information

Mobility Control and Its Applications in Mobile Ad Hoc Networks

Mobility Control and Its Applications in Mobile Ad Hoc Networks Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai, Florida Atlantic Uniersity Abstract Most eisting localized protocols in mobile ad hoc netorks, sch as data commnication

More information

Triangle Contact Representations

Triangle Contact Representations Triangle Contact Representations Stean Felsner elsner@math.t-berlin.de Technische Uniersität Berlin, Institt ür Mathematik Strasse des 7. Jni 36, 0623 Berlin, Germany Abstract. It is conjectred that eery

More information

Optimal Sampling in Compressed Sensing

Optimal Sampling in Compressed Sensing Optimal Sampling in Compressed Sensing Joyita Dtta Introdction Compressed sensing allows s to recover objects reasonably well from highly ndersampled data, in spite of violating the Nyqist criterion. In

More information

Tdb: A Source-level Debugger for Dynamically Translated Programs

Tdb: A Source-level Debugger for Dynamically Translated Programs Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,

More information

Design and Optimization of Multi-Faceted Reflectarrays for Satellite Applications

Design and Optimization of Multi-Faceted Reflectarrays for Satellite Applications Design and Optimization of Mlti-Faceted Reflectarrays for Satellite Applications Min Zho, Stig B. Sørensen, Peter Meincke, and Erik Jørgensen TICRA, Copenhagen, Denmark ticra@ticra.com Abstract The design

More information

Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks

Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks 1 Efficient Schedling for Periodic Aggregation Qeries in Mltihop Sensor Networks XiaoHa X, Shaojie Tang, Member, IEEE, XiangYang Li, Senior Member, IEEE Abstract In this work, we stdy periodic qery schedling

More information

Cohesive Subgraph Mining on Attributed Graph

Cohesive Subgraph Mining on Attributed Graph Cohesive Sbgraph Mining on Attribted Graph Fan Zhang, Ying Zhang, L Qin, Wenjie Zhang, Xemin Lin QCIS, University of Technology, Sydney, University of New Soth Wales fanzhang.cs@gmail.com, {Ying.Zhang,

More information

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies

More information

5.0 Curve and Surface Theory

5.0 Curve and Surface Theory 5. Cre and Srface Theor 5.1 arametric Representation of Cres Consider the parametric representation of a cre as a ector t: t [t t t] 5.1 The deriatie of sch a ector ealated at t t is gien b t [ t t t ]

More information

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,

More information

Digital Image Processing Chapter 5: Image Restoration

Digital Image Processing Chapter 5: Image Restoration Digital Image Processing Chapter 5: Image Restoration Concept of Image Restoration Image restoration is to restore a degraded image back to the original image while image enhancement is to maniplate the

More information

Subgraph Matching with Set Similarity in a Large Graph Database

Subgraph Matching with Set Similarity in a Large Graph Database 1 Sbgraph Matching with Set Similarity in a Large Graph Database Liang Hong, Lei Zo, Xiang Lian, Philip S. Y Abstract In real-world graphs sch as social networks, Semantic Web and biological networks,

More information

Topological Drawings of Complete Bipartite Graphs

Topological Drawings of Complete Bipartite Graphs Topological Drawings of Complete Bipartite Graphs Jean Cardinal Stefan Felsner y Febrary 017 Abstract Topological drawings are natral representations of graphs in the plane, where vertices are represented

More information

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,

More information

ARRAY ANTENNA DIAGNOSTICS WITH THE 3D RECONSTRUCTION ALGORITHM

ARRAY ANTENNA DIAGNOSTICS WITH THE 3D RECONSTRUCTION ALGORITHM ARRAY ANTENNA DIAGNOSTICS WITH THE 3D RECONSTRUCTION ALGORITHM Cecilia Cappellin 1, Peter Meincke 1, Sergey Pinenko 2, Erik Jørgensen 1 1 TICRA, Læderstræde 34, DK-1201 Copenhagen, Denmark 2 DTU Elektro,

More information

METAPOST and the FIIT Logo

METAPOST and the FIIT Logo METAPOST and the FIIT Logo Matej KOŠÍK Slovak University of Technology Faclty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovakia kosik@fiit.stba.sk 1 The Tools Abstract.

More information

Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN:

Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: 1137-3601 revista@aepia.org Asociación Española para la Inteligencia Artificial España Zaballos, Lis J.; Henning, Gabriela

More information

Blended Deformable Models

Blended Deformable Models Blended Deformable Models (In IEEE Trans. Pattern Analysis and Machine Intelligence, April 996, 8:4, pp. 443-448) Doglas DeCarlo and Dimitri Metaxas Department of Compter & Information Science University

More information

circuit simulation NP-complete? backward retiming forward retiming f(x)

circuit simulation NP-complete? backward retiming forward retiming f(x) Optimal FPGA Mapping and Retiming with Ecient Initial State Comptation Jason Cong and Chang W Department of Compter Science Uniersity of California, Los Angeles, CA 995 Abstract For seqential circits with

More information

Point Location. The Slab Method. Optimal Schemes. The Slab Method. Preprocess a planar, polygonal subdivision for point location queries.

Point Location. The Slab Method. Optimal Schemes. The Slab Method. Preprocess a planar, polygonal subdivision for point location queries. Point Location The Slab Method Prerocess a lanar, olygonal sbdiision for oint location qeries. = (18, 11) raw a ertical line throgh each ertex. This decomoses the lane into slabs. In each slab, the ertical

More information

UPWARD PLANAR DRAWING OF SINGLE SOURCE ACYCLIC DIGRAPHS. MICHAEL D. HUTTON y AND ANNA LUBIW z

UPWARD PLANAR DRAWING OF SINGLE SOURCE ACYCLIC DIGRAPHS. MICHAEL D. HUTTON y AND ANNA LUBIW z UPWARD PLANAR DRAWING OF SINGLE SOURCE ACYCLIC DIGRAPHS MICHAEL D. HUTTON y AND ANNA LUBIW z Abstract. An pward plane drawing of a directed acyclic graph is a plane drawing of the digraph in which each

More information

Constraint-Driven Communication Synthesis

Constraint-Driven Communication Synthesis Constraint-Drien Commnication Synthesis Alessandro Pinto Goqiang Wang Lca P. Carloni Abstract Constraint-drien Commnication Synthesis enables the atomatic design of the commnication architectre of a complex

More information

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks Cost Based Local Forwarding Transmission Schemes for Two-hop Celllar Networks Zhenggang Zhao, Xming Fang, Yan Long, Xiaopeng H, Ye Zhao Key Lab of Information Coding & Transmission Sothwest Jiaotong University,

More information

Primary and Derived Variables with the Same Accuracy in Interval Finite Elements

Primary and Derived Variables with the Same Accuracy in Interval Finite Elements Primary and Deried Variables with the Same Accracy in Interal inite Elements M. V. Rama Rao R. L. Mllen 2 and R. L. Mhanna 3 Vasai College of Engineering Hyderabad - 5 3 INDIA dr.mrr@gmail.com 2 Case Western

More information

On Bichromatic Triangle Game

On Bichromatic Triangle Game On Bichromatic Triangle Game Gordana Manić Daniel M. Martin Miloš Stojakoić Agst 16, 2012 Abstract We stdy a combinatorial game called Bichromatic Triangle Game, defined as follows. Two players R and B

More information

Data/Metadata Data and Data Transformations

Data/Metadata Data and Data Transformations A Framework for Classifying Scientic Metadata Helena Galhardas, Eric Simon and Anthony Tomasic INRIA Domaine de Volcea - Rocqencort 7853 Le Chesnay France email: First-Name.Last-Name@inria.fr Abstract

More information

IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION

IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION ICAS 2 CONGRESS IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION Christophe Le Garrec, Marc Hmbert, Michel Lacabanne Aérospatiale Matra

More information

Maximum Weight Independent Sets in an Infinite Plane

Maximum Weight Independent Sets in an Infinite Plane Maximm Weight Independent Sets in an Infinite Plane Jarno Nosiainen, Jorma Virtamo, Pasi Lassila jarno.nosiainen@tkk.fi, jorma.virtamo@tkk.fi, pasi.lassila@tkk.fi Department of Commnications and Networking

More information

Assessment of synthetic winds through spectral modeling and validation using FAST

Assessment of synthetic winds through spectral modeling and validation using FAST Jornal of Physics: Conference Series PAPER OPEN ACCESS Assessment of synthetic winds throgh spectral modeling and alidation sing FAST To cite this article: A Chogle et al 2016 J. Phys.: Conf. Ser. 753

More information

Computer-Aided Mechanical Design Using Configuration Spaces

Computer-Aided Mechanical Design Using Configuration Spaces Compter-Aided Mechanical Design Using Configration Spaces Leo Joskowicz Institte of Compter Science The Hebrew University Jersalem 91904, Israel E-mail: josko@cs.hji.ac.il Elisha Sacks (corresponding athor)

More information

Combinatorial and Geometric Properties of Planar Laman Graphs

Combinatorial and Geometric Properties of Planar Laman Graphs Combinatorial and Geometric Properties of Planar Laman Graphs Stephen Koboro 1, Torsten Ueckerdt 2, and Kein Verbeek 3 1 Department of Compter Science, Uniersity of Arizona 2 Department of Applied Mathematics,

More information

3D SURFACE RECONSTRUCTION BASED ON COMBINED ANALYSIS OF REFLECTANCE AND POLARISATION PROPERTIES: A LOCAL APPROACH

3D SURFACE RECONSTRUCTION BASED ON COMBINED ANALYSIS OF REFLECTANCE AND POLARISATION PROPERTIES: A LOCAL APPROACH 3D SURFACE RECONSTRUCTION BASED ON COMBINED ANALYSIS OF REFLECTANCE AND POLARISATION PROPERTIES: A LOCAL APPROACH Pablo d Angelo and Christian Wöhler DaimlerChrysler Research and Technology, Machine Perception

More information

ECE250: Algorithms and Data Structures Single Source Shortest Paths Dijkstra s Algorithm

ECE250: Algorithms and Data Structures Single Source Shortest Paths Dijkstra s Algorithm ECE0: Algorithms and Data Strctres Single Sorce Shortest Paths Dijkstra s Algorithm Ladan Tahildari, PEng, SMIEEE Associate Professor Software Technologies Applied Research (STAR) Grop Dept. of Elect.

More information

Neighbourhood Searches for the Bounded Diameter Minimum Spanning Tree Problem Embedded in a VNS, EA, and ACO

Neighbourhood Searches for the Bounded Diameter Minimum Spanning Tree Problem Embedded in a VNS, EA, and ACO Neighborhood Searches for the Bonded Diameter Minimm Spanning Tree Problem Embedded in a VNS, EA, and ACO Martin Grber Institte for Compter Graphics and Algorithms, Vienna University of Technology, Favoritenstraße

More information

arxiv: v3 [math.co] 7 Sep 2018

arxiv: v3 [math.co] 7 Sep 2018 Cts in matchings of 3-connected cbic graphs Kolja Knaer Petr Valicov arxiv:1712.06143v3 [math.co] 7 Sep 2018 September 10, 2018 Abstract We discss conjectres on Hamiltonicity in cbic graphs (Tait, Barnette,

More information