A Distributed Triangulation Algorithm for Wireless Sensor Networks on 2D and 3D Surface

Size: px
Start display at page:

Download "A Distributed Triangulation Algorithm for Wireless Sensor Networks on 2D and 3D Surface"

Transcription

1 A Distributed Triangulation Algorithm for Wireless Sensor Networks on 2D and 3D Surface Hongyu Zhou, Hongyi Wu, Su Xia, Miao Jin, Ning Ding The Center for Advanced Computer Studies(CACS) University of Louisiana at Lafayette

2 OUTLINE Introduction Triangulation Algorithm Extension to 3D Surface Application and Simulation Results Conclusion

3 INTRODUCTION Wireless sensor network exhibits randomness Wireless sensor network topology is a graph Triangulation is a subgraph of the topology Triangulation mesh is very important for many applications of sensor networks: geometry-based routing, localization, coverage, segmentation, data segmentation

4 INTRODUCTION Related work # # # (a) (a) (a) A (a) 2D A A2D network 2D network network graph. graph. graph. (b) (b) (b) Triangulation (b) Triangulation under under under ideal ideal CDG. ideal CDG. CDG. (c) (c) (c) CDG CDG (c) CDG (k=1): not (k=1): not not planar. not planar. H. Zhou, S. Xia, M. Jin, and H. Wu, Localized Algorithm for Precise Boundary Detection in 3D Wireless Networks, in Proc. of ICDCS, # # # # ## # (d) (d) CDM (k=1): planar but butnot triangulated. (e) (e) Failed triangulation. (f) CDG (k=2): triangulated but coarse. (d) (d) CDM (d) CDM CDM (k=1): (k=1): (k=1): planar planar planar but but not but not triangulated. not triangulated. (e) (e) Failed (e) Failed triangulation. triangulation. (f) (f) CDG (f) CDG (k=2): (k=2): triangulated triangulated but coarse. but coarse. Fig Illustration of of challenges in in triangulation, where the circles indicate sensor nodes and the dashed lines are communication links. The solid black line Fig. [2] Fig. illustrate 2. R. Fig. Sarkar, 2. Illustration 2. virtual Illustration X. Yin, edges, ofj. challenges of Gao, which of challenges F. are Luo, are in realized triangulation, in and inx. triangulation, by D. by corresponding Gu, where Greedy where where the the Routing circles paths the circles circles shown indicate with Guaranteed indicate as as solid sensor grey sensor nodes Delivery lines. nodes and and In In the Using subfigure and the dashed the Ricci dashed (b), lines Flows, the are lines are red communication Proc. lines are depict of IPSN, Voronoi links links. cells. The solid In The subfigure black solid bl illustrate illustrate (c)-(f), virtual virtual the the nodes virtual edges, edges, with edges, which which the the same which are are realized color are realized realized belong by by corresponding toby the corresponding same paths Voronoi paths paths shown shown cell, shown as while as solid solid the as grey large solid grey lines. circles(i.e., grey lines. lines. In Insubfigure A-E) subfigure (b), stand (b), the the for (b), red red landmarks. thelines red depict lines depict Voronoi Voronoi cells. cells. In Insubfig s [3](c)-(f), H. (c)-(f), the Zhou, the nodes the S. nodes Xia, nodes with M. with the with Jin, the same and the same same H. color Wu, color color belong Localized belong belong to to thealgorithm tosame same same Voronoi Voronoi for Voronoi Precise cell, cell, while Boundary cell, while while the the large Detection the large large circles(i.e., in circles(i.e., 3D Wireless A-E) A-E) A-E) stand Networks, stand for forlandmarks. in Proc. landmarks. of ICDCS, subset of of nodes as as landmarks where any two landmarks Landmark j), it it sends a connection packet to the latter. The

5 INTRODUCTION We proposed a distributed triangulation algorithm works for any arbitrary 2D sensor networks without communication model constraint, and we prove the correctness of the algorithm in 2D sensor networks tolerates some measurement errors also works for 3D open or closed surfaces

6 TRIANGULATION ALGORITHM Basic idea Each triangulation mesh edge will associate with two triangles, except boundary edge If we add extra edges into triangulation mesh, they will change this association The association can be used to identify B these extra edges. C D B C D A E A E H G F H G F

7 TRIANGULATION ALGORITHM Definitions node neighbor set (NNS), Nv(i)={h,k,l,m} edge neighbor set (ENS), Ne(eij)=Nv(i) Nv(j)={k,l,m} refined edge neighbor set (RNS), Re(eij)={l,m} edge weight, W(eij)=2, W(ehk)=2 associated edge neighbor set # (AENS), A(eij)={eil, eim, ejl, ejm} ' equivalent edges, eij, elm critical edge, ekj

8 TRIANGULATION ALGORITHM Definitions node neighbor set (NNS), Nv(i)={h,k,l,m} edge neighbor set (ENS), Ne(eij)=Nv(i) Nv(j)={k,l,m} refined edge neighbor set (RNS), Re(eij)={l,m} edge weight, W(eij)=2, W(ehk)=2 associated edge neighbor set # (AENS), A(eij)={eil, eim, ejl, ejm} ' equivalent edges, eij, elm critical edge, ekj

9 TRIANGULATION ALGORITHM Definitions node neighbor set (NNS), Nv(i)={h,k,l,m} edge neighbor set (ENS), Ne(eij)=Nv(i) Nv(j)={k,l,m} refined edge neighbor set (RNS), Re(eij)={l,m} edge weight, W(eij)=2, W(ehk)=2 associated edge neighbor set # (AENS), A(eij)={eil, eim, ejl, ejm} ' equivalent edges, eij, elm critical edge, ekj

10 TRIANGULATION ALGORITHM Definitions node neighbor set (NNS), Nv(i)={h,k,l,m} edge neighbor set (ENS), Ne(eij)=Nv(i) Nv(j)={k,l,m} refined edge neighbor set (RNS), Re(eij)={l,m} edge weight, W(eij)=2, W(ehk)=2 associated edge neighbor set # (AENS), A(eij)={eil, eim, ejl, ejm} ' equivalent edges, eij, elm critical edge, ekj

11 TRIANGULATION ALGORITHM Definitions node neighbor set (NNS), Nv(i)={h,k,l,m} edge neighbor set (ENS), Ne(eij)=Nv(i) Nv(j)={k,l,m} refined edge neighbor set (RNS), Re(eij)={l,m} edge weight, W(eij)=2, W(ehk)=2 associated edge neighbor set (AENS), A(eij)={eil, eim, ejl, ejm} ' # equivalent edges, eij, elm critical edge, ekj

12 TRIANGULATION ALGORITHM Definitions node neighbor set (NNS), Nv(i)={h,k,l,m} edge neighbor set (ENS), Ne(eij)=Nv(i) Nv(j)={k,l,m} refined edge neighbor set (RNS), Re(eij)={l,m} edge weight, W(eij)=2, W(ehk)=2 associated edge neighbor set # (AENS), A(eij)={eil, eim, ejl, ejm} ' equivalent edges, eij, elm critical edge, ekj

13 TRIANGULATION ALGORITHM Definitions node neighbor set (NNS), Nv(i)={h,k,l,m} edge neighbor set (ENS), Ne(eij)=Nv(i) Nv(j)={k,l,m} refined edge neighbor set (RNS), Re(eij)={l,m} edge weight, W(eij)=2, W(ehk)=2 associated edge neighbor set # (AENS), A(eij)={eil, eim, ejl, ejm} ' equivalent edges, eij, elm critical edge, ekj

14 TRIANGULATION ALGORITHM Lemma 1: A subgraph of G is triangulated if and only if every edge of the subgraph has a weight of two. Given a graph G and a triangulation subgraph T, extra edges are G-T Objective: remove all extra edges There are three type of extra edges, e0, e1, e2 # # # (a) e 0 (b) e 1 (c) e 2

15 TRIANGULATION ALGORITHM Theorem 1: An edge with a weight less than two must be removed in order to produce a triangulated subgraph. # # (a) e 0 (b) e 1

16 TRIANGULATION ALGORITHM Theorem 2:An non-critical edge can be recognized as an e2 edge and safely removed if all edges in its AENS have their weight greater than two. # (c) e

17 TRIANGULATION ALGORITHM Lemma 2: An e0 extra edge can exist in G, only if it depends on at least two other extra edges. Lemma 3: An e1 extra edge can exist in G, only if it at least depends on another extra edge. # # # ' ' (a) Loop chain. (b) Non-loop chain. (c) Same head and tail.

18 TRIANGULATION ALGORITHM Step1: Initialization. each edge calculate NNS, ENS, RENS, AENS, and edge weight; Step2: Iterative edge removal according to Theorems 1 and 2; Step3: Removal of e0 and e1 chains.

19 EXTENSION TO 3D SURFACE Similar algorithm can be applied in a sensor network on 3D surface with minor modification in determining RNS and edge weight ' # l i k j l'

20 APPLICATION AND SIMULATION RESULTS 2D network (a) Sensor network topology (b) Finest triangulation by [2] (c) Proposed triangulation

21 APPLICATION AND SIMULATION RESULTS 3D network with open surface (a) Sensor network topology (b) Finest triangulation by [3] (c) Proposed triangulation

22 APPLICATION AND SIMULATION RESULTS 3D network with closed surface (a) Sensor network topology (b) Finest triangulation by [3] (c) Proposed triangulation

23 APPLICATION AND SIMULATION RESULTS 3D network with closed surface (a) Sensor network topology (b) Finest triangulation by [3] (c) Proposed triangulation

24 (b) Triangulation under 20 distance errors. (c) Triangulation under 30 distance errors. APPLICATION AND SIMULATION RESULTS 2D network with distance errors (a) Triangulation under 10 distance errors.

25 APPLICATION AND SIMULATION RESULTS Difference Communication Models (a) UDG (b) Triangulation under Quasi-UDG (α = 0.4). (c) Triangulation under Quasi-UDG (α = 0.6) (d) Triangulation under Log-normal.

26 APPLICATION AND SIMULATION RESULTS Greedy routing based on Ricci flow in 2D networks (a) Finest triangulation by [2] (b) Ricci embedding (c) Proposed triangulation (d) Ricci embedding

27 APPLICATION AND SIMULATION RESULTS Greedy routing based on Ricci flow in 3D networks (a) Finest triangulation by [3] (b) Ricci embedding (c) Proposed triangulation (d) Ricci embedding

28 APPLICATION AND SIMULATION RESULTS COMPARISON OF STRETCH FACTOR IN GREEDY ROUTING. 2D networks 3D networks Triangulation by [2], [3] Proposed Triangulation Distribution of stretch factor in greedy routing 9 9 UTING. tworks For gud in and 9. For ), its triangue depicted in onding Ricci 0 1.0~ ~ ~ ~ ~ ~1.4 Triangulation Triangulation by [2] by [2] Proposed Triangulation Proposed Triangulation ~1.6 2~3 1.6~1.8 3~4 Stretching Factor ~5 2~3 (a) 2D networks (a) 2D networks. 5~6 3~4 Stretching Factor 6~ 4~5 (a) 2D networks. Fig ~ ~ ~2 0 2~3 1~2 3~4 2~3 4~5 3~4 Triangulation Triangulation by [3] by [3] Proposed Proposed Triangulation Triangulation 5~6 4~5 6~7 7~8 8~9 9~10 (b) Stretching 3DFactor networks. (b) 3D networks (b) 3D networks. 5~6 6~7 7~8 Stretching Factor Distribution of stretch factor in greedy routing ~9 9~10 10~ 10~

29 CONCLUSION In summary, we have proposed a distributed algorithm that can triangulate an arbitrary sensor network without position information. The algorithm can achieve the finest triangulation and tolerate distance measurement errors. We have proven its correctness in 2D and extended it to 3D surface. A range of geometry-based network algorithms can benefit from the proposed triangulation.

3D Wireless Sensor Networks: Challenges and Solutions

3D Wireless Sensor Networks: Challenges and Solutions 3D Wireless Sensor Networks: Challenges and Solutions Hongyi Wu Old Dominion University Ph.D., CSE, UB, 2002 This work is partially supported by NSF CNS-1018306 and CNS-1320931. 2D PLANE, 3D VOLUME, AND

More information

IEEE/ACM TRANSACTIONS ON NETWORKING 1. Hongyu Zhou, Student Member, IEEE, SuXia, Member, IEEE, Miao Jin, and Hongyi Wu, Member, IEEE

IEEE/ACM TRANSACTIONS ON NETWORKING 1. Hongyu Zhou, Student Member, IEEE, SuXia, Member, IEEE, Miao Jin, and Hongyi Wu, Member, IEEE IEEE/ACM TRANSACTIONS ON NETWORKING 1 Localized and Precise Boundary Detection in 3-D Wireless Sensor Networks Hongyu Zhou, Student Member, IEEE, SuXia, Member, IEEE, Miao Jin, and Hongyi Wu, Member, IEEE

More information

Cut-And-Sew: A Distributed Autonomous Localization Algorithm for 3D Surface Sensor Networks

Cut-And-Sew: A Distributed Autonomous Localization Algorithm for 3D Surface Sensor Networks Cut-And-Sew: A Distributed Autonomous Localization Algorithm for 3D Surface Sensor Networks Yao Zhao, Hongyi Wu, Miao Jin, Yang Yang, Hongyu Zhou, and Su Xia Presenter: Hongyi Wu The Center for Advanced

More information

Networks: A Deterministic Approach with Constant Overhead

Networks: A Deterministic Approach with Constant Overhead Trace-Routing in 3D Wireless Sensor Networks: A Deterministic Approach with Constant Overhead Su Xia, Hongyi Wu, and Miao Jin! School of Computing and Informatics! University of Louisiana at Lafayette

More information

ARobustBoundaryDetectionAlgorithmBasedon Connectivity Only for 3D Wireless Sensor Networks

ARobustBoundaryDetectionAlgorithmBasedon Connectivity Only for 3D Wireless Sensor Networks ARobustBoundaryDetectionAlgorithmBasedon Connectivity Only for 3D Wireless Sensor Networks Hongyu Zhou, Hongyi Wu, and Miao Jin Abstract In this work we develop a distributed boundary detection algorithm,

More information

Cut Graph Based Information Storage and Retrieval in 3D Sensor Networks with General Topology

Cut Graph Based Information Storage and Retrieval in 3D Sensor Networks with General Topology 213 Proceedings IEEE INFOCOM Cut Graph Based Information Storage and Retrieval in 3D Sensor Networks with General Topology Yang Yang, Miao Jin, Yao Zhao, and Hongyi Wu Abstract We address the problem of

More information

Localized Algorithm for Precise Boundary Detection in 3D Wireless Networks

Localized Algorithm for Precise Boundary Detection in 3D Wireless Networks Localized lgorithm for Precise oundary etection in 3 Wireless Networks Hongyu Zhou, Su Xia, Miao Jin and Hongyi Wu integrated Wireless Information Network (iwin) Lab The enter for dvanced omputer Studies(S)

More information

Simulations of the quadrilateral-based localization

Simulations of the quadrilateral-based localization Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution

More information

Localization in 3D Surface Sensor Networks: Challenges and Solutions. Yao Zhao, Hongyi Wu, Miao Jin and Su Xia University of Louisiana at Lafayette

Localization in 3D Surface Sensor Networks: Challenges and Solutions. Yao Zhao, Hongyi Wu, Miao Jin and Su Xia University of Louisiana at Lafayette Localization in 3D Surface Sensor Networks: Challenges and Solutions Yao Zhao, Hongyi Wu, Miao Jin and Su Xia University of Louisiana at Lafayette Outline q Introduction Autonomous localization algorithms

More information

Greedy Routing with Guaranteed Delivery Using Ricci Flow

Greedy Routing with Guaranteed Delivery Using Ricci Flow Greedy Routing with Guaranteed Delivery Using Ricci Flow Jie Gao Stony Brook University Joint work with Rik Sarkar, Xiaotian Yin, Wei Zeng, Feng Luo, Xianfeng David Gu Greedy Routing Assign coordinatesto

More information

GPS-Free Greedy Routing with Delivery Guarantee and Low Stretch Factor on 2D and 3D Surfaces

GPS-Free Greedy Routing with Delivery Guarantee and Low Stretch Factor on 2D and 3D Surfaces GPS-Free Greedy Routing with Delivery Guarantee and Low Stretch Factor on 2D and 3D Surfaces Su Xia, Hongyi Wu, and Miao Jin Abstract This paper focuses on greedy routing in wireless networks deployed

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 4, AUGUST Yang Yang, Miao Jin, Yao Zhao, and Hongyi Wu

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 4, AUGUST Yang Yang, Miao Jin, Yao Zhao, and Hongyi Wu IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 4, AUGUST 2015 1149 Distributed Information Storage and Retrieval in 3-D Sensor Networks With General Topologies Yang Yang, Miao Jin, Yao Zhao, and Hongyi

More information

Greedy Routing in Wireless Networks. Jie Gao Stony Brook University

Greedy Routing in Wireless Networks. Jie Gao Stony Brook University Greedy Routing in Wireless Networks Jie Gao Stony Brook University A generic sensor node CPU. On-board flash memory or external memory Sensors: thermometer, camera, motion, light sensor, etc. Wireless

More information

GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks. Stanford University. HP Labs

GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks. Stanford University. HP Labs GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks Qing Fang Jie Gao Leonidas J. Guibas Vin de Silva Li Zhang Stanford University HP Labs Point-to-Point Routing in Sensornets Routing

More information

Localized Algorithm for Precise Boundary Detection in 3D Wireless Networks

Localized Algorithm for Precise Boundary Detection in 3D Wireless Networks Localized lgorithm for Precise Boundary Detection in 3D Wireless Networks Hongyu Zhou, Su Xia, Miao Jin, and Hongyi Wu The enter for dvanced omputer Studies University of Louisiana at Lafayette Lafayette,

More information

3D Surface Localization with Terrain Model

3D Surface Localization with Terrain Model 3D Surface Localization with Terrain Model Yang Yang, Miao Jin, and Hongyi Wu Abstract The majority of current research on sensor network localization focuses on wireless sensor networks deployed on two

More information

Geometric Modeling in Graphics

Geometric Modeling in Graphics Geometric Modeling in Graphics Part 10: Surface reconstruction Martin Samuelčík www.sccg.sk/~samuelcik samuelcik@sccg.sk Curve, surface reconstruction Finding compact connected orientable 2-manifold surface

More information

Midpoint Routing algorithms for Delaunay Triangulations

Midpoint Routing algorithms for Delaunay Triangulations Midpoint Routing algorithms for Delaunay Triangulations Weisheng Si and Albert Y. Zomaya Centre for Distributed and High Performance Computing School of Information Technologies Prologue The practical

More information

G 6i try. On the Number of Minimal 1-Steiner Trees* Discrete Comput Geom 12:29-34 (1994)

G 6i try. On the Number of Minimal 1-Steiner Trees* Discrete Comput Geom 12:29-34 (1994) Discrete Comput Geom 12:29-34 (1994) G 6i try 9 1994 Springer-Verlag New York Inc. On the Number of Minimal 1-Steiner Trees* B. Aronov, 1 M. Bern, 2 and D. Eppstein 3 Computer Science Department, Polytechnic

More information

An efficient implementation of the greedy forwarding strategy

An efficient implementation of the greedy forwarding strategy An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at

More information

Geometry in Wireless Sensor Networks

Geometry in Wireless Sensor Networks How cancomputational Geometry help Mobile Networks: Geometry in Wireless Sensor Networks Jie Gao Stony Brook University CG Week 2012 Algorithms in the Field Workshop 2013/6/21 1 A generic sensor node CPU.

More information

The Capacity of Wireless Networks

The Capacity of Wireless Networks The Capacity of Wireless Networks Piyush Gupta & P.R. Kumar Rahul Tandra --- EE228 Presentation Introduction We consider wireless networks without any centralized control. Try to analyze the capacity of

More information

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Ambreen Shahnaz and Thomas Erlebach Department of Computer Science University of Leicester University Road, Leicester LE1

More information

As a consequence of the operation, there are new incidences between edges and triangles that did not exist in K; see Figure II.9.

As a consequence of the operation, there are new incidences between edges and triangles that did not exist in K; see Figure II.9. II.4 Surface Simplification 37 II.4 Surface Simplification In applications it is often necessary to simplify the data or its representation. One reason is measurement noise, which we would like to eliminate,

More information

Chapter 7 TOPOLOGY CONTROL

Chapter 7 TOPOLOGY CONTROL Chapter 7 TOPOLOGY CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Topology Control Gabriel Graph et al. XTC Interference SINR & Scheduling Complexity Distributed Computing

More information

Edge-Based Beaconing Schedule in Duty- Cycled Multihop Wireless Networks

Edge-Based Beaconing Schedule in Duty- Cycled Multihop Wireless Networks Edge-Based Beaconing Schedule in Duty- Cycled Multihop Wireless Networks Quan Chen, Hong Gao, Yingshu Li, Siyao Cheng, and Jianzhong Li Harbin Institute of Technology, China Quan Chen@ Harbin Institute

More information

Voronoi Diagram. Xiao-Ming Fu

Voronoi Diagram. Xiao-Ming Fu Voronoi Diagram Xiao-Ming Fu Outlines Introduction Post Office Problem Voronoi Diagram Duality: Delaunay triangulation Centroidal Voronoi tessellations (CVT) Definition Applications Algorithms Outlines

More information

Decentralized Boundary Detection without Location Information in Wireless Sensor Networks

Decentralized Boundary Detection without Location Information in Wireless Sensor Networks 2012 IEEE Wireless Communications and Networking Conference: Mobile and Wireless Networks Decentralized Boundary Detection without Location Information in Wireless Sensor Networks Wei-Cheng Chu Institute

More information

Geo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer

Geo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer Geo-Routing Chapter 2 Ad Hoc and Sensor Networks Roger Wattenhofer 2/1 Application of the Week: Mesh Networking (Roofnet) Sharing Internet access Cheaper for everybody Several gateways fault-tolerance

More information

arxiv: v1 [cs.ni] 28 Apr 2015

arxiv: v1 [cs.ni] 28 Apr 2015 Succint greedy routing without metric on planar triangulations Pierre Leone, Kasun Samarasinghe Computer Science Department, University of Geneva, Battelle A, route de Drize 7, 1227 Carouge, Switzerland

More information

Notes in Computational Geometry Voronoi Diagrams

Notes in Computational Geometry Voronoi Diagrams Notes in Computational Geometry Voronoi Diagrams Prof. Sandeep Sen and Prof. Amit Kumar Indian Institute of Technology, Delhi Voronoi Diagrams In this lecture, we study Voronoi Diagrams, also known as

More information

Lifting Transform, Voronoi, Delaunay, Convex Hulls

Lifting Transform, Voronoi, Delaunay, Convex Hulls Lifting Transform, Voronoi, Delaunay, Convex Hulls Subhash Suri Department of Computer Science University of California Santa Barbara, CA 93106 1 Lifting Transform (A combination of Pless notes and my

More information

Resilient Routing for Sensor Networks Using Hyperbolic Embedding of Universal Covering Space

Resilient Routing for Sensor Networks Using Hyperbolic Embedding of Universal Covering Space Resilient Routing for Sensor Networks Using Hyperbolic Embedding of Universal Covering Space Wei Zeng Rik Sarkar Feng Luo Xianfeng Gu Jie Gao Department of Computer Science, State University of New York

More information

Optimal k-support Coverage Paths in Wireless Sensor Networks

Optimal k-support Coverage Paths in Wireless Sensor Networks Optimal k-support Coverage Paths in Wireless Sensor Networks ShaoJie Tang Department of Computer Science Illinois Institute of Technology Chicago, IL, 60616. Email: stang7@iit.edu XuFei Mao Department

More information

SINUS: A Scalable and Distributed Routing Algorithm with Guaranteed Delivery for WSNs on High Genus 3D Surfaces

SINUS: A Scalable and Distributed Routing Algorithm with Guaranteed Delivery for WSNs on High Genus 3D Surfaces 2013 Proceedings IEEE INFOCOM SINUS: A Scalable and Distributed Routing Algorithm with Guaranteed Delivery for WSNs on High Genus 3D Surfaces Tianlong Yu 1 Hongbo Jiang 1 Guang Tan 2 Chonggang Wang 3 Chen

More information

Jordan Curves. A curve is a subset of IR 2 of the form

Jordan Curves. A curve is a subset of IR 2 of the form Jordan Curves A curve is a subset of IR 2 of the form α = {γ(x) : x [0,1]}, where γ : [0,1] IR 2 is a continuous mapping from the closed interval [0,1] to the plane. γ(0) and γ(1) are called the endpoints

More information

Möbius Transformations in Scientific Computing. David Eppstein

Möbius Transformations in Scientific Computing. David Eppstein Möbius Transformations in Scientific Computing David Eppstein Univ. of California, Irvine School of Information and Computer Science (including joint work with Marshall Bern from WADS 01 and SODA 03) Outline

More information

Geometric Routing: Of Theory and Practice

Geometric Routing: Of Theory and Practice Geometric Routing: Of Theory and Practice PODC 03 F. Kuhn, R. Wattenhofer, Y. Zhang, A. Zollinger [KWZ 02] [KWZ 03] [KK 00] Asymptotically Optimal Geometric Mobile Ad-Hoc Routing Worst-Case Optimal and

More information

Differential Geometry: Circle Packings. [A Circle Packing Algorithm, Collins and Stephenson] [CirclePack, Ken Stephenson]

Differential Geometry: Circle Packings. [A Circle Packing Algorithm, Collins and Stephenson] [CirclePack, Ken Stephenson] Differential Geometry: Circle Packings [A Circle Packing Algorithm, Collins and Stephenson] [CirclePack, Ken Stephenson] Conformal Maps Recall: Given a domain Ω R 2, the map F:Ω R 2 is conformal if it

More information

Ma/CS 6b Class 11: Kuratowski and Coloring

Ma/CS 6b Class 11: Kuratowski and Coloring Ma/CS 6b Class 11: Kuratowski and Coloring By Adam Sheffer Kuratowski's Theorem Theorem. A graph is planar if and only if it does not have K 5 and K 3,3 as topological minors. We know that if a graph contains

More information

ROUTING is an important issue that affects wireless

ROUTING is an important issue that affects wireless 1 Virtual-Coordinate-Based Delivery-Guaranteed Routing Protocol in Wireless Sensor Networks Ming-Jer Tsai, Hong-Yen Yang, Bing-Hong Liu, and Wen-Qian Huang Abstract In this paper, we first propose a method,,

More information

Chapter 8. Voronoi Diagrams. 8.1 Post Oce Problem

Chapter 8. Voronoi Diagrams. 8.1 Post Oce Problem Chapter 8 Voronoi Diagrams 8.1 Post Oce Problem Suppose there are n post oces p 1,... p n in a city. Someone who is located at a position q within the city would like to know which post oce is closest

More information

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

More information

Localization in 3D Surface Sensor Networks: Challenges and Solutions

Localization in 3D Surface Sensor Networks: Challenges and Solutions Localization in 3D Surface Sensor Networks: Challenges and Solutions Yao Zhao, Hongyi Wu, Miao Jin and Su Xia Abstract This work aims to address the problem of localization in 3D surface wireless sensor

More information

CS133 Computational Geometry

CS133 Computational Geometry CS133 Computational Geometry Voronoi Diagram Delaunay Triangulation 5/17/2018 1 Nearest Neighbor Problem Given a set of points P and a query point q, find the closest point p P to q p, r P, dist p, q dist(r,

More information

Surface Mesh Generation

Surface Mesh Generation Surface Mesh Generation J.-F. Remacle Université catholique de Louvain September 22, 2011 0 3D Model For the description of the mesh generation process, let us consider the CAD model of a propeller presented

More information

[Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations

[Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations Landmark-based routing Landmark-based routing [Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations of Computer

More information

Scheduling, Map Coloring, and Graph Coloring

Scheduling, Map Coloring, and Graph Coloring Scheduling, Map Coloring, and Graph Coloring Scheduling via Graph Coloring: Final Exam Example Suppose want to schedule some ;inal exams for CS courses with following course numbers: 1007, 3137, 3157,

More information

Chapter 6 DOMINATING SETS

Chapter 6 DOMINATING SETS Chapter 6 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2003 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking

More information

Distributed Newest Vertex Bisection

Distributed Newest Vertex Bisection Distributed Newest Vertex Bisection in Dune-ALUGrid Martin Alkämper and Robert Klöfkorn Dune User Meeting 2015 Algorithm Some Analysis Experiments Problem In Dune-ALUGrid (among others) we provide an adaptive,

More information

Approximate Nearest Neighbor Problem: Improving Query Time CS468, 10/9/2006

Approximate Nearest Neighbor Problem: Improving Query Time CS468, 10/9/2006 Approximate Nearest Neighbor Problem: Improving Query Time CS468, 10/9/2006 Outline Reducing the constant from O ( ɛ d) to O ( ɛ (d 1)/2) in uery time Need to know ɛ ahead of time Preprocessing time and

More information

Fault-Tolerant Wormhole Routing Algorithms in Meshes in the Presence of Concave Faults

Fault-Tolerant Wormhole Routing Algorithms in Meshes in the Presence of Concave Faults Fault-Tolerant Wormhole Routing Algorithms in Meshes in the Presence of Concave Faults Seungjin Park Jong-Hoon Youn Bella Bose Dept. of Computer Science Dept. of Computer Science Dept. of Computer Science

More information

Extended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication

Extended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication Extended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication Jie Wu, Mihaela Cardei, Fei Dai, and Shuhui Yang Department of Computer Science and Engineering Florida Atlantic

More information

Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Co

Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Co Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Convergecast Amitabha Ghosh Yi Wang Ozlem D. Incel V.S. Anil Kumar Bhaskar Krishnamachari Dept. of Electrical Engineering,

More information

Exploration of Path Space using Sensor Network Geometry

Exploration of Path Space using Sensor Network Geometry Exploration of Path Space using Sensor Network Geometry Ruirui Jiang, Xiaomeng Ban Computer Science Stony Brook University {jiang,xban}@cs.sunysb.edu Mayank Goswami Applied Math & Statistics Stony Brook

More information

Lecture notes: Object modeling

Lecture notes: Object modeling Lecture notes: Object modeling One of the classic problems in computer vision is to construct a model of an object from an image of the object. An object model has the following general principles: Compact

More information

IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 22, NO. 1, JANUARY

IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 22, NO. 1, JANUARY IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 22, NO. 1, JANUARY 2014 113 ZoneDefense: A Fault-Tolerant Routing for 2-D Meshes Without Virtual Channels Binzhang Fu, Member, IEEE,

More information

Distributed Voronoi diagram computation in wireless sensor networks

Distributed Voronoi diagram computation in wireless sensor networks Distributed Voronoi diagram computation in wireless sensor networks Waleed Alsalih (1) Kamrul Islam (1) Yurai Núñez-Rodríguez (1) Henry Xiao (1) (1) Queen s University(waleed/islam/yurai/xiao@cs.queensu.ca)

More information

FOLLOWING their success in 2-D environments, sensor

FOLLOWING their success in 2-D environments, sensor IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 1, JANUARY 2015 57 OnionMap: A Scalable Geometric Addressing and Routing Scheme for 3D Sensor Networks Kechao Cai, Zhimeng Yin, Hongbo Jiang,

More information

Voronoi diagram and Delaunay triangulation

Voronoi diagram and Delaunay triangulation Voronoi diagram and Delaunay triangulation Ioannis Emiris & Vissarion Fisikopoulos Dept. of Informatics & Telecommunications, University of Athens Computational Geometry, spring 2015 Outline 1 Voronoi

More information

WE consider a wireless ad hoc network (or sensor

WE consider a wireless ad hoc network (or sensor IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 14, NO. 10, OCTOBER 2003 1035 Localized Delaunay Triangulation with Application in Ad Hoc Wireless Networks Xiang-Yang Li, Member, IEEE, Gruia

More information

On Greedy Geographic Routing Algorithms in Sensing-Covered Networks

On Greedy Geographic Routing Algorithms in Sensing-Covered Networks On Greedy Geographic Routing Algorithms in Sensing-Covered Networks Guoliang Xing; Chenyang Lu; Robert Pless Department of Computer Science and Engineering Washington University in St. Louis St. Louis,

More information

Distributed Algorithm for Voronoi Partition of Wireless Sensor Networks with a Limited Sensing Range

Distributed Algorithm for Voronoi Partition of Wireless Sensor Networks with a Limited Sensing Range sensors Article Distributed Algorithm for Voronoi Partition of Wireless Sensor Networks with a Limited Sensing Range Chenlong He 1, * ID, Zuren Feng 1 and Zhigang Ren 2 1 State Key Laboratory for Manufacturing

More information

Appendix B Submodeling Technique

Appendix B Submodeling Technique Appendix B Submodeling Technique 16.0 Release Introduction to ANSYS Mechanical 1 2015 ANSYS, Inc. February 27, 2015 Chapter Overview In this chapter controlling meshing operations is described. Topics:

More information

Protocol Design and Optimization for

Protocol Design and Optimization for Protocol Design and Optimization for Yu Wang, Hongyi Wu*, Feng Lin, and Nian-Feng Tzeng Center for Advanced Computer Studies University of Louisiana at Lafayette Mobile Sensor Networks Applications: Air

More information

Deterministic Greedy Routing with Guaranteed Delivery in 3D Wireless Sensor Networks

Deterministic Greedy Routing with Guaranteed Delivery in 3D Wireless Sensor Networks eterministic Greedy Routing with Guaranteed elivery in 3 Wireless Sensor Networks Su Xia Xiaotian Yin Center for Advanced Mathematics epartment Computer Studies Harvard University University of Louisiana

More information

Lecture 3 Mesh. Dr. Shuang LIANG. School of Software Engineering Tongji University Spring 2013

Lecture 3 Mesh. Dr. Shuang LIANG. School of Software Engineering Tongji University Spring 2013 Lecture 3 Mesh Dr. Shuang LIANG School of Software Engineering Tongji University Spring 2013 Today s Topics Overview Mesh Acquisition Mesh Data Structures Subdivision Surfaces Today s Topics Overview Mesh

More information

On a nested refinement of anisotropic tetrahedral grids under Hessian metrics

On a nested refinement of anisotropic tetrahedral grids under Hessian metrics On a nested refinement of anisotropic tetrahedral grids under Hessian metrics Shangyou Zhang Abstract Anisotropic grids, having drastically different grid sizes in different directions, are efficient and

More information

Lecture 2 Unstructured Mesh Generation

Lecture 2 Unstructured Mesh Generation Lecture 2 Unstructured Mesh Generation MIT 16.930 Advanced Topics in Numerical Methods for Partial Differential Equations Per-Olof Persson (persson@mit.edu) February 13, 2006 1 Mesh Generation Given a

More information

Information Processing Letters

Information Processing Letters Information Processing Letters 113 (2013) 132 136 Contents lists available at SciVerse ScienceDirect Information Processing Letters www.elsevier.com/locate/ipl The complexity of geodesic Voronoi diagrams

More information

Non-extendible finite polycycles

Non-extendible finite polycycles Izvestiya: Mathematics 70:3 1 18 Izvestiya RAN : Ser. Mat. 70:3 3 22 c 2006 RAS(DoM) and LMS DOI 10.1070/IM2006v170n01ABEH002301 Non-extendible finite polycycles M. Deza, S. V. Shpectorov, M. I. Shtogrin

More information

NODE LOCALIZATION IN WSN: USING EUCLIDEAN DISTANCE POWER GRAPHS

NODE LOCALIZATION IN WSN: USING EUCLIDEAN DISTANCE POWER GRAPHS CHAPTER 6 NODE LOCALIZATION IN WSN: USING EUCLIDEAN DISTANCE POWER GRAPHS Abstract Localization of sensor nodes in a wireless sensor network is needed for many practical purposes. If the nodes are considered

More information

Robustness improvement of polyhedral mesh method for airbag deployment simulations. TU Delft

Robustness improvement of polyhedral mesh method for airbag deployment simulations. TU Delft Robustness improvement of polyhedral mesh method for airbag deployment simulations. TU Delft Santiago Alagon Carrillo, Numerical Analysis Daily Supervisor: Prof. dr. ir. C. Vuik, Company Supervisors: Dr.

More information

Fountain Codes Based on Zigzag Decodable Coding

Fountain Codes Based on Zigzag Decodable Coding Fountain Codes Based on Zigzag Decodable Coding Takayuki Nozaki Kanagawa University, JAPAN Email: nozaki@kanagawa-u.ac.jp Abstract Fountain codes based on non-binary low-density parity-check (LDPC) codes

More information

Hole repair algorithm in hybrid sensor networks

Hole repair algorithm in hybrid sensor networks Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 2016) Hole repair algorithm in hybrid sensor networks Jian Liu1,

More information

Lecture 4: examples of topological spaces, coarser and finer topologies, bases and closed sets

Lecture 4: examples of topological spaces, coarser and finer topologies, bases and closed sets Lecture 4: examples of topological spaces, coarser and finer topologies, bases and closed sets Saul Glasman 14 September 2016 Let s give the definition of an open subset of R. Definition 1. Let U R. We

More information

PERFECT MATCHING THE CENTRALIZED DEPLOYMENT MOBILE SENSORS THE PROBLEM SECOND PART: WIRELESS NETWORKS 2.B. SENSOR NETWORKS OF MOBILE SENSORS

PERFECT MATCHING THE CENTRALIZED DEPLOYMENT MOBILE SENSORS THE PROBLEM SECOND PART: WIRELESS NETWORKS 2.B. SENSOR NETWORKS OF MOBILE SENSORS SECOND PART: WIRELESS NETWORKS 2.B. SENSOR NETWORKS THE CENTRALIZED DEPLOYMENT OF MOBILE SENSORS I.E. THE MINIMUM WEIGHT PERFECT MATCHING 1 2 ON BIPARTITE GRAPHS Prof. Tiziana Calamoneri Network Algorithms

More information

A Reduction of Conway s Thrackle Conjecture

A Reduction of Conway s Thrackle Conjecture A Reduction of Conway s Thrackle Conjecture Wei Li, Karen Daniels, and Konstantin Rybnikov Department of Computer Science and Department of Mathematical Sciences University of Massachusetts, Lowell 01854

More information

Simplicial Complexes: Second Lecture

Simplicial Complexes: Second Lecture Simplicial Complexes: Second Lecture 4 Nov, 2010 1 Overview Today we have two main goals: Prove that every continuous map between triangulable spaces can be approximated by a simplicial map. To do this,

More information

Estimating the Free Region of a Sensor Node

Estimating the Free Region of a Sensor Node Estimating the Free Region of a Sensor Node Laxmi Gewali, Navin Rongratana, Jan B. Pedersen School of Computer Science, University of Nevada 4505 Maryland Parkway Las Vegas, NV, 89154, USA Abstract We

More information

A Constant Factor Distributed Algorithm for Computing Connected Dominating Sets in Wireless Sensor Networks

A Constant Factor Distributed Algorithm for Computing Connected Dominating Sets in Wireless Sensor Networks A Constant Factor Distributed Algorithm for Computing Connected Dominating Sets in Wireless Sensor Networks Kamrul Islam, Selim G Akl, and Henk Meijer School of Computing, Queen s University Kingston,

More information

Increasing interconnection network connectivity for reducing operator complexity in asynchronous vision systems

Increasing interconnection network connectivity for reducing operator complexity in asynchronous vision systems Increasing interconnection network connectivity for reducing operator complexity in asynchronous vision systems Valentin Gies and Thierry M. Bernard ENSTA, 32 Bd Victor 75015, Paris, FRANCE, contact@vgies.com,

More information

On the Minimum k-connectivity Repair in Wireless Sensor Networks

On the Minimum k-connectivity Repair in Wireless Sensor Networks On the Minimum k-connectivity epair in Wireless Sensor Networks Hisham M. Almasaeid and Ahmed E. Kamal Dept. of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011 Email:{hisham,kamal}@iastate.edu

More information

Jordan Curves. A curve is a subset of IR 2 of the form

Jordan Curves. A curve is a subset of IR 2 of the form Jordan Curves A curve is a subset of IR 2 of the form α = {γ(x) : x [0, 1]}, where γ : [0, 1] IR 2 is a continuous mapping from the closed interval [0, 1] to the plane. γ(0) and γ(1) are called the endpoints

More information

EFFICIENT DISTRIBUTED ALGORITHMS FOR TOPOLOGY CONTROL PROBLEM WITH SHORTEST PATH CONSTRAINTS

EFFICIENT DISTRIBUTED ALGORITHMS FOR TOPOLOGY CONTROL PROBLEM WITH SHORTEST PATH CONSTRAINTS Discrete Mathematics, Algorithms and Applications Vol. 1, No. 4 (2009) 437 461 c World Scientific Publishing Company EFFICIENT DISTRIBUTED ALGORITHMS FOR TOPOLOGY CONTROL PROBLEM WITH SHORTEST PATH CONSTRAINTS

More information

Chapter 8 DOMINATING SETS

Chapter 8 DOMINATING SETS Chapter 8 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking

More information

Computational QC Geometry: A tool for Medical Morphometry, Computer Graphics & Vision

Computational QC Geometry: A tool for Medical Morphometry, Computer Graphics & Vision Computational QC Geometry: A tool for Medical Morphometry, Computer Graphics & Vision Part II of the sequel of 2 talks. Computation C/QC geometry was presented by Tony F. Chan Ronald Lok Ming Lui Department

More information

GEOGRAPHIC routing (also known as location-based or

GEOGRAPHIC routing (also known as location-based or IEEE/ACM TRANSACTIONS ON NETWORKING, VOL., NO., Geographic Routing in d-dimensional Spaces with Guaranteed Delivery and Low Stretch Simon S. Lam, Fellow, IEEE, and Chen Qian, Student Member, IEEE Abstract

More information

Problem Set 3. MATH 776, Fall 2009, Mohr. November 30, 2009

Problem Set 3. MATH 776, Fall 2009, Mohr. November 30, 2009 Problem Set 3 MATH 776, Fall 009, Mohr November 30, 009 1 Problem Proposition 1.1. Adding a new edge to a maximal planar graph of order at least 6 always produces both a T K 5 and a T K 3,3 subgraph. Proof.

More information

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper)

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) Ngo Duc Thuan 1,, Hiroki Nishiyama 1, Nirwan Ansari 2,andNeiKato 1 1 Graduate School of Information

More information

Graphs & Algorithms: Advanced Topics Planar Separators

Graphs & Algorithms: Advanced Topics Planar Separators Graphs & Algorithms: Advanced Topics Planar Separators Johannes Lengler, Uli Wagner ETH Zürich Separators Definition Let G = (V, E) be a graph on n vertices, f : N 0 R a function, α (0, 1) a parameter.

More information

Characterizing graphs with convex and connected configuration spaces

Characterizing graphs with convex and connected configuration spaces Characterizing graphs with convex and connected configuration spaces Meera Sitharam Heping Gao arxiv:0809.3935v3 [cs.cg] 11 Oct 2008 June 29, 2009 Abstract We define and study exact, efficient representations

More information

Strongly Connected Dominating Sets in Wireless Sensor Networks with Unidirectional Links

Strongly Connected Dominating Sets in Wireless Sensor Networks with Unidirectional Links Strongly Connected Dominating Sets in Wireless Sensor Networks with Unidirectional Links Ding-Zhu Du 1,MyT.Thai 1,YingshuLi 2,DanLiu 1, and Shiwei Zhu 1 1 Department of Computer Science and Engineering,

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

Tutte s Theorem: How to draw a graph

Tutte s Theorem: How to draw a graph Spectral Graph Theory Lecture 15 Tutte s Theorem: How to draw a graph Daniel A. Spielman October 22, 2018 15.1 Overview We prove Tutte s theorem [Tut63], which shows how to use spring embeddings to obtain

More information

Chapter 8 DOMINATING SETS

Chapter 8 DOMINATING SETS Distributed Computing Group Chapter 8 DOMINATING SETS Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking

More information

On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks

On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks ABSTRACT Hannes Frey IMADA, University of Southern Denmark DK-5230 Odense M, Denmark frey@imada.sdu.dk It was

More information

Covering Space for In-Network Sensor Data Storage

Covering Space for In-Network Sensor Data Storage Covering Space for In-Network Sensor Data Storage Rik Sarkar Wei Zeng Jie Gao Xianfeng David Gu Department of Computer Science Stony Brook University Stony Brook, NY 11794 {rik,jgao,gu}@cs.sunysb.edu Department

More information

GEOGRAPHIC routing (also known as location-based or

GEOGRAPHIC routing (also known as location-based or IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 2, APRIL 2013 663 Geographic Routing in -Dimensional Spaces With Guaranteed Delivery and Low Stretch Simon S. Lam, Fellow, IEEE, ACM, andchenqian, Student

More information

CLASSIFICATION OF SURFACES

CLASSIFICATION OF SURFACES CLASSIFICATION OF SURFACES JUSTIN HUANG Abstract. We will classify compact, connected surfaces into three classes: the sphere, the connected sum of tori, and the connected sum of projective planes. Contents

More information