Stony Brook University

Total Page:16

File Type:pdf, Size:1020Kb

Stony Brook University SSStttooonnnyyy BBBrrrooooookkk UUUnnniiivvveeerrrsssiiitttyyy The official electronic file of this thesis or dissertation is maintained by the University Libraries on behalf of The Graduate School at Stony Brook University. ©©© AAAllllll RRRiiiggghhhtttsss RRReeessseeerrrvvveeeddd bbbyyy AAAuuuttthhhooorrr... Some Path Planning Algorithms in Computational Geometry and Air Traffic Management A Dissertation Presented by Shang Yang to The Graduate School in Partial fulfillment of the Requirements for the Degree of Doctor of Philosophy in Computer Science Stony Brook University August 2012 Stony Brook University The Graduate School Shang Yang We, the dissertation committee for the above candidate for the Doctor of Philosophy degree, hereby recommend acceptance of this dissertation. Dissertation Adviser { Professor Joseph S. B. Mitchell Department of Applied Mathematics and Statistics Chairperson of Defense { Associate Professor Jie Gao Computer Science Department Professor Esther M. Arkin Department of Applied Mathematics and Statistics Assistant Professor Jiaqiao Hu Department of Applied Mathematics and Statistics This dissertation is accepted by the Graduate School. Charles Taber Interim Dean of the Graduate School ii Abstract of the Dissertation Some Path Planning Algorithms in Computational Geometry and Air Traffic Management by Shang Yang Doctor of Philosophy in Computer Science Stony Brook University 2012 Computing optimal routes subject to geometric constraints is a fundamental area of research in computational geometry. This thesis is devoted to the study of some specific geometric routing and optimization problems. The first main area of the thesis addresses a class of multicommodity flow problems in geometric domains: For a given planar domain P populated with obstacles of different types, we consider routing thick paths corresponding to motion of vehicles of different classes, from a source edge on the boundary of P to a sink edge on the boundary of P. Each class of vehicle has an associated path width required and a given set of types of obstacles it must avoid, while it can freely pass through other types of obstacles. The problem arises in air traffic management with different classes of aircraft that must avoid various types of weather disturbances. We show that the decision problem is NP-hard even when there are only two classes of vehicles and two types of obstacles. We present approximation algorithms for the multicriteria optimization problems that arise when trying to maximize the number of routable paths. We also give heuristics and provide an experimental analysis of their effectiveness. The second problem we address is that of computing a path or cycle that is constrained to be convex and to intersect a given set of connected, compact sets. In particular, we resolve an open problem posed more than two decades ago by Arik Tamir: Given a collection of compact sets, can one efficiently determine if there is a convex body whose boundary intersects every set in the collection? We prove that it is NP-hard, in general, to decide the existence of a convex traversal path, even if the input is a set of line segments in the plane. Further, we generalize our proof to show that deciding the existence of a convex surface stabbing a set of balls in three dimensions is NP-hard. On the positive side, we give a polynomial-time algorithm to find a convex transversal of a iii maximum number of pairwise-disjoint segments in 2D, assuming the vertices of the transversal are restricted to a given set of points. In the third part of the thesis, we investigate the problem of computing paths and trees within an uncertain geometric domain, in which the set of obstacles is not known deterministically, but is specified by a stochastic model. The problems arise in routing aircraft through uncertain weather systems, especially in the case of merging flows of aircraft arriving to a terminal airspace in the presence of uncertain events that impact the availability of airspace. We formalize the problem of computing a highly probably path in geometric settings and prove NP-hardness of the general problem. Further, we develop efficient algorithms for computing paths and trees in the presence of uncertain geometric obstacles. We apply our methods to the problem of computing routes and trees for flows of aircraft that are designed to be robust to off-nominal events that may impact the super-dense operations airspace through which they are routed. iv Contents List of Figures . ix Acknowledgements . .x 1 Introduction 1 2 Routing Multi-Class Traffic Flows in the Plane 3 2.1 Introduction . .4 2.1.1 Motivation . .4 2.1.2 Related Work . .6 2.1.3 Summary of Contributions . .6 2.2 Problem Formulation and Overview of the Results . .7 2.2.1 Type Sequence and Uppermost Paths . .7 2.3 Testing type sequence feasibility in the monochromatic case . 11 2.4 Hardness results . 13 2.4.1 Only blue obstacles . 17 2.4.2 Hardness of approximation . 17 2.4.3 Hardness of the Two Widths paths problem . 18 2.5 Approximation . 19 2.6 Small number of holes . 22 2.7 Practical Heuristics: Implementation and Experiments . 24 2.7.1 Data Sets . 26 2.7.2 Enumeration of Type Sequences . 26 2.7.3 A Heuristic for Short Paths . 28 2.7.4 Experimental Results . 29 2.8 Conclusion . 30 3 Flexible Air Lane Generation to Maximize Flow Under Hard and Soft Constraints 32 3.1 Introduction . 33 v 3.1.1 Related Work . 35 3.1.2 Chapter Organization . 36 3.2 Modeling . 36 3.2.1 Airspace Model . 37 3.2.2 Hard and Soft Constraints . 38 3.2.3 Objective . 39 3.3 Maximum Flow Rate Theory . 40 3.3.1 Flows in Discrete Networks . 40 3.3.2 Multi-Class Throughput Problem Formulation . 42 3.3.3 Class Sequences . 43 3.3.4 Bottommost Paths . 43 3.3.5 Theoretical Results . 43 3.4 Algorithmic Solution Approaches . 44 3.4.1 Bottommost Path Filling Algorithm . 44 3.4.2 Postprocessing: Tautening Bottommost Paths . 47 3.5 Experiments . 47 3.5.1 Real Weather Data . 47 3.5.2 Experimental Results . 48 3.5.3 Probabilistic Weather Maps . 49 3.6 Conclusion . 51 3.7 Future Research . 52 4 Convex Transversals 54 4.1 Introduction . 55 4.1.1 Contributions . 55 4.1.2 Closed stabbers vs. Terrains . 56 4.2 Hardness results . 56 4.2.1 Stabbing segments in the plane is NP-hard . 56 4.2.2 Stabbing squares and scaled copies of a convex polygon 59 4.2.3 Stabbing balls in 3D is NP-hard . 62 4.3 Stabbing disjoint segments . 70 4.4 Stabbing with vertices of a regular polygon . 77 4.4.1 The decision problem . 77 4.4.2 Optimization problem: Symmetry with imprecision . 78 4.5 Conclusion . 81 5 Robust Trees and Highly Probable Path Problem 83 5.1 Problem Formulation and Results . 84 5.1.1 Related Work . 85 vi 5.1.2 Hardness Results for the Segment Case . 86 5.1.3 Exploring the Disk Case . 89 5.2 Practical Heuristics: Implementation . 91 5.2.1 Grid Generation . 92 5.2.2 Search Graph Generation and Test Graph against Weather Constraints . 95 5.2.3 Phase 1 Tree Computation . 97 5.2.4 Phase 2 Tree Optimization . 99 5.2.5 Operational Flexibility . 100 5.2.6 Illustrations . 103 5.3 Practical Heuristics: Experiments . 103 5.3.1 Speed Tests . 104 5.3.2 Robustness Tests . 105 6 Open Problems and Future Research 109 Bibliography 111 vii List of Figures 2.1 An example of the multi-class routing problem . .5 2.2 An example of uppermost paths . .8 2.3 The critical graph of a polygonal domain . 13 2.4 Hardness gadgets illustration . 14 2.5 An example of the hardness reduction . 15 2.6 Correctness of vertex gadgets . 16 2.7 An example of the 2-width path routing problem hardness re- duction . 18 2.8 Approximation . 21 2.9 Pareto Frontier . 21 2.10 Transforming bundles into thick paths . 22 2.11 Creating a polygonal domain from a 3-PARTITION instance . 23 2.12 Reducing the number of color swaps . 24 2.13 Routing bottommost paths in the grid . 25 2.14 An example of a real weather test case . 27 2.15 Examples of routing and Pareto frontier . 27 2.16 Examples of routing in a randomly generated test case . 28 3.1 Mapping real weather obstacles into geometric constraints . 37 3.2 Airlane packing . 38 3.3 Min-Cut in geometric domains . 41 3.4 A thick path . 42 3.5 The underlying graph used in bottommost filling . 45 3.6 An example of bottommost filling . 46 3.7 Real weather experiments . 49 3.8 Probabilistic weather maps experiments . 51 3.9 Synthesized weather data experiments . 52 4.1 Transversals v.s. terrains . 57 4.2 Hardness proof for stabbing segments . 58 viii 4.3 Hardness proof for stabbing squares . 60 4.4 An example of the hardness gadgets construction . 61 4.5 Variable hardness gadgets for stabbing balls in 3D . 63 4.6 Clause gadgets for stabbing balls in 3D . 65 4.7 An overview of the hardness proof for stabbing balls in 3D . 66 4.8 Correctness of the hardness proof (1) . 69 4.9 Correctness of the hardness proof (2) . 71 4.10 Correctness of the hardness proof (3) . 72 4.11 Arcs, bridges and chords . 73 4.12 A segment-free triangle . 74 4.13 Finding the segment-free triangle . 76 4.14 The dynamic programming algorithm recursion . 77 4.15 Symmetry with imprecision . 80 5.1 Highly probable path problem . 85 5.2 Vertex gadgets construction . 86 5.3 Edge gadgets construction . 87 5.4 An example of the hardness construction .
Recommended publications
  • Multi-Armed Bandits with Applications to Markov Decision Processes and Scheduling Problems
    SSStttooonnnyyy BBBrrrooooookkk UUUnnniiivvveeerrrsssiiitttyyy The official electronic file of this thesis or dissertation is maintained by the University Libraries on behalf of The Graduate School at Stony Brook University. ©©© AAAllllll RRRiiiggghhhtttsss RRReeessseeerrrvvveeeddd bbbyyy AAAuuuttthhhooorrr... Multi-Armed Bandits with Applications to Markov Decision Processes and Scheduling Problems A Dissertation Presented by Isa M. Muqattash to The Graduate School in Partial Ful¯llment of the Requirements for the Degree of Doctor of Philosophy in Applied Mathematics and Statistics (Operations Research) Stony Brook University December 2014 Stony Brook University The Graduate School Isa M. Muqattash We, the dissertation committee for the above candidate for the Doctor of Philosophy degree, hereby recommend acceptance of this dissertation. Jiaqiao Hu { Dissertation Advisor Associate Professor, Department of Applied Mathematics and Statistics Esther Arkin { Chairperson of Defense Professor, Department of Applied Mathematics and Statistics Yuefan Deng Professor, Department of Applied Mathematics and Statistics Luis E. Ortiz Assistant Professor Department of Computer Science, Stony Brook University This dissertation is accepted by the Graduate School. Charles Taber Dean of the Graduate School ii Abstract of the Dissertation Multi-Armed Bandits with Applications to Markov Decision Processes and Scheduling Problems by Isa M. Muqattash Doctor of Philosophy in Applied Mathematics and Statistics (Operations Research) Stony Brook University 2014 The focus of this work is on practical applications of stochastic multi-armed bandits (MABs) in two distinctive settings. First, we develop and present REGA, a novel adaptive sampling- based algorithm for control of ¯nite-horizon Markov decision pro- cesses (MDPs) with very large state spaces and small action spaces. We apply a variant of the ²-greedy multi-armed bandit algorithm to each stage of the MDP in a recursive manner, thus comput- ing an estimation of the \reward-to-go" value at each stage of the MDP.
    [Show full text]
  • Stony Brook University
    SSStttooonnnyyy BBBrrrooooookkk UUUnnniiivvveeerrrsssiiitttyyy The official electronic file of this thesis or dissertation is maintained by the University Libraries on behalf of The Graduate School at Stony Brook University. ©©© AAAllllll RRRiiiggghhhtttsss RRReeessseeerrrvvveeeddd bbbyyy AAAuuuttthhhooorrr... Integrating Mobile Agents and Distributed Sensors in Wireless Sensor Networks A Dissertation presented by Jiemin Zeng to The Graduate School in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in Computer Science Stony Brook University May 2016 Copyright by Jiemin Zeng 2016 Stony Brook University The Graduate School Jiemin Zeng We, the dissertation committee for the above candidate for the Doctor of Philosophy degree, hereby recommend acceptance of this dissertation Jie Gao - Dissertation Advisor Professor, Computer Science Department Joseph Mitchell - Chairperson of Defense Professor, Department of Applied Mathematics and Statistics Esther Arkin Professor, Department of Applied Mathematics and Statistics Matthew P. Johnson - External Member Assistant Professor Department of Mathematics and Computer Science at Lehman College PhD Program in Computer Science at The CUNY Graduate Center This dissertation is accepted by the Graduate School Charles Taber Dean of the Graduate School ii Abstract of the Dissertation Integrating Mobile Agents and Distributed Sensors in Wireless Sensor Networks by Jiemin Zeng Doctor of Philosophy in Computer Science Stony Brook University 2016 As computers become more ubiquitous in the prominent phenomenon of the In- ternet of Things, we encounter many unique challenges in the field of wireless sensor networks. A wireless sensor network is a group of small, low powered sensors with wireless capability to communicate with each other. The goal of these sensors, also called nodes, generally is to collect some information about their environment and report it back to a base station.
    [Show full text]
  • 2Majors and Minors.Qxd.KA
    APPLIED MATHEMATICS AND STATISTICSSpring 2006: updates since Spring 2005 are in red Applied Mathematics and Statistics (AMS) Major and Minor in Applied Mathematics and Statistics Department of Applied Mathematics and Statistics, College of Engineering and Applied Sciences CHAIRPERSON: James Glimm UNDERGRADUATE PROGRAM DIRECTOR: Alan C. Tucker UNDERGRADUATE SECRETARY: Christine Rota OFFICE: P-139B Math Tower PHONE: (631) 632-8370 E-MAIL: [email protected] WEB ADDRESS: http://naples.cc.sunysb.edu/CEAS/amsweb.nsf Students majoring in Applied Mathematics and Statistics often double major in one of the following: Computer Science (CSE), Economics (ECO), Information Systems (ISE) Faculty Robert Rizzo, Assistant Professor, Ph.D., Yale he undergraduate program in University: Bioinformatics; drug design. Hongshik Ahn, Associate Professor, Ph.D., Applied Mathematics and Statistics University of Wisconsin: Biostatistics; survival David Sharp, Adjunct Professor, Ph.D., Taims to give mathematically ori- analysis. California Institute of Technology: Mathematical ented students a liberal education in quan- physics. Esther Arkin, Professor, Ph.D., Stanford titative problem solving. The courses in University: Computational geometry; combina- Ram P. Srivastav, Professor, D.Sc., University of this program survey a wide variety of torial optimization. Glasgow; Ph.D., University of Lucknow: Integral mathematical theories and techniques equations; numerical solutions. Edward J. Beltrami, Professor Emeritus, Ph.D., that are currently used by analysts and Adelphi University: Optimization; stochastic Michael Taksar, Professor Emeritus, Ph.D., researchers in government, industry, and models. Cornell University: Stochastic processes. science. Many of the applied mathematics Yung Ming Chen, Professor Emeritus, Ph.D., Reginald P. Tewarson, Professor Emeritus, courses give students the opportunity to New York University: Partial differential equa- Ph.D., Boston University: Numerical analysis; develop problem-solving techniques using biomathematics.
    [Show full text]
  • Algorithmica (2006) 46: 193–221 DOI: 10.1007/S00453-006-1206-1 Algorithmica © 2006 Springer Science+Business Media, Inc
    Algorithmica (2006) 46: 193–221 DOI: 10.1007/s00453-006-1206-1 Algorithmica © 2006 Springer Science+Business Media, Inc. The Freeze-Tag Problem: How to Wake Up a Swarm of Robots1 Esther M. Arkin,2 Michael A. Bender,3 Sandor´ P. Fekete,4 Joseph S. B. Mitchell,2 and Martin Skutella5 Abstract. An optimization problem that naturally arises in the study of swarm robotics is the Freeze-Tag Problem (FTP) of how to awaken a set of “asleep” robots, by having an awakened robot move to their locations. Once a robot is awake, it can assist in awakening other slumbering robots. The objective is to have all robots awake as early as possible. While the FTP bears some resemblance to problems from areas in combinato- rial optimization such as routing, broadcasting, scheduling, and covering, its algorithmic characteristics are surprisingly different. We consider both scenarios on graphs and in geometric environments. In graphs, robots sleep at vertices and there is a length function on the edges. Awake robots travel along edges, with time depending on edge length. For most scenarios, we consider the offline version of the problem, in which each awake robot knows the position of all other robots. We prove that the problem is NP-hard, even for the special case of star graphs. We also establish hardness of approximation, showing that it is NP-hard to obtain an approximation factor 5 better than 3 , even for graphs of bounded degree. These lower bounds are complemented with several positive algorithmic results, including: We show that the natural greedy strategy on star graphs has a tight worst-case performance of 7 and give • 3 a polynomial-time approximation scheme (PTAS) for star graphs.
    [Show full text]
  • The Freeze-Tag Problem: How to Wake up a Swarm of Robots
    The Freeze-Tag Problem: How to Wake Up a Swarm of Robots∗ Esther M. Arkin† Michael A. Bender‡ S´andor P. Fekete§ Joseph S. B. Mitchell† Martin Skutella¶ Abstract An optimization problem that naturally arises in the study of swarm robotics is the Freeze-Tag Problem (FTP) of how to awaken a set of “asleep” robots, by having an awakened robot move to their locations. Once a robot is awake, it can assist in awakening other slumbering robots. The objective is to have all robots awake as early as possible. While the FTP bears some resemblance to problems from areas in combinatorial optimization such as routing, broadcasting, scheduling, and covering, its algorithmic characteristics are surprisingly different. We consider both scenarios on graphs and in geometric environments. In graphs, robots sleep at vertices and there is a length function on the edges. Awake robots travel along edges, with time depending on edge length. For most scenarios, we consider the offline version of the problem, in which each awake robot knows the position of all other robots. We prove that the problem is NP-hard, even for the special case of star graphs. We also establish hardness of approximation, showing that it is NP-hard to obtain an approximation factor better than 5/3, even for graphs of bounded degree. These lower bounds are complemented with several positive algorithmic results, including: We show that the natural greedy strategy on star graphs has a tight worst-case performance of 7/3 • and give a polynomial-time approximation scheme (PTAS) for star graphs. We give a simple O(log ∆)-competitive online algorithm for graphs with maximum degree ∆ and • locally bounded edge weights.
    [Show full text]
  • Network Optimization on Partitioned Pairs of Points
    Network Optimization on Partitioned Pairs of Points Esther M. Arkin1, Aritra Banik2, Paz Carmi2, Gui Citovsky3, Su Jia1, Matthew J. Katz2, Tyler Mayer1, and Joseph S. B. Mitchell1 1Dept. of Applied Mathematics and Statistics, Stony Brook University, Stony Brook USA., esther.arkin, su.jia, tyler.mayer, joseph.mitchellf @stonybrook.edu 2Dept. of Computer Science, Ben-Guriong University, Beersheba Israel., aritrabanik,carmip @gmail.com, [email protected] f3Google, Manhattan USA.,g [email protected] Abstract Given n pairs of points, = p1; q1 ; p2; q2 ;:::; pn; qn , in some metric space, we studyS the problemff g off two-coloringg f the pointsgg within each pair, red and blue, to optimize the cost of a pair of node- disjoint networks, one over the red points and one over the blue points. In this paper we consider our network structures to be spanning trees, traveling salesman tours or matchings. We consider several different weight functions computed over the network structures induced, as well as several different objective functions. We show that some of these problems are NP-hard, and provide constant factor approximation al- gorithms in all cases. arXiv:1710.00876v1 [cs.CG] 2 Oct 2017 1 Introduction We study a class of network optimization problems on pairs of sites in a metric space. Our goal is to determine how to split each pair, into a \red" site and a \blue" site, in order to optimize both a network on the red sites and a network on the blue sites. In more detail, given n pairs of points, = p1; q1 ; p2; q2 ;:::; pn; qn , in the Euclidean plane or in a general S ff g f g f gg Sn metric space, we define a feasible coloring of the points in S = pi; qi i=1f g to be a coloring, S = R B, such that pi R if and only if qi B.
    [Show full text]
  • Curriculum Vitae
    Curriculum Vitae Omrit Filtser December 2020 Personal Details Address: Department of Applied Mathematics and Statistics, Stony Brook University, NY E-mail: [email protected] Website: omrit.filtser.com Date of Birth: 24.12.1987 Marital status: Married, two children. Education and Research Experience 2019-now: Postdoc at Stony Brook University, hosted by Prof. Joseph S.B. Mitchell. 2014-2019: PhD student in Computer Science, Ben-Gurion University of the Negev. Advisor: Matthew J. Katz. Title: The Discrete Fréchet Distance and Applications. 2012-2014: MSc in Computer Science, Ben-Gurion University of the Negev. Advisor: Matthew J. Katz. Title: The Discrete Fréchet Distance and Applications. Graduated Summa cum Laude (final score 97.9/100). 2009-2012: BSc in Computer Science, Ben-Gurion University of the Negev. Graduated Summa cum Laude (average 95.65/100). During Bachelor's: • 2009-2012: Participated in the excellence program of Microsoft Israel, which includes unique technological courses in the forefront of research in the R&D center. • 2012: Participated in “Dkalim” scholarship program for outstanding students applying to Master studies in computer science. As part of the program I participated in research seminars and worked in collaboration with researchers from the university. Honors and Awards • The Israeli Council for Higher Education fellowship for postdoctoral women fellows, 2019. • BGU scholarship for postdoctoral women fellows abroad, 2019. • Eric and Wendy Schmidt Postdoctoral Award for Women in Mathematical and Computing Sciences, 2019-2020. • Philippe Chaim Zabey Award for excellent Master Thesis, 2017. • The Israeli Ministry of Science & Technology Scholarship for women in science (PhD students), 2015. • Friedman Award for outstanding achievements in research, 2015.
    [Show full text]
  • Proceedings in a Single
    Schedule of Talks 27th Annual Fall Workshop on Computational Geometry November 3–4, 2017 Stony Brook University Stony Brook, NY Sponsored by the National Science Foundation and the Department of Applied Mathematics and Statistics and the Department of Computer Science, College of Engineering and Applied Sciences, Stony Brook University Program Committee: GregAloupis(Tufts) PeterBrass(CCNY) WilliamRandolphFranklin(RPI) JieGao(co-chair,StonyBrook) MayankGoswami(QueensCollege) MatthewP.Johnson(Lehman College) Joseph S. B. Mitchell (co-chair, Stony Brook) Don Sheehy (University of Connecticut) Jinhui Xu (University at Buffalo) Friday, November 3, 2017: Computer Science (NCS), Room 120 9:20 Opening remarks Contributed Session 1 Chair: Joe Mitchell 9:30–9:45 “Sampling Conditions for Clipping-free Voronoi Meshing by the VoroCrust Algorithm”, Scott Mitchell, Ahmed Abdelkader, Ahmad Rushdi, Mohamed Ebeida, Ahmed Mahmoud, John Owens and Chandrajit Bajaj 9:45–10:00 “Quasi-centroidal Simplicial Meshes for Optimal Variational Methods”, Xiangmin Jiao 10:00–10:15 “A Parallel Approach for Computing Discrete Gradients on Mulfiltrations”, Federico Iuricich, Sara Scaramuccia, Claudia Landi and Leila De Floriani 10:15–10:30 “Parallel Intersection Detection in Massive Sets of Cubes”, W. Randolph Franklin and Salles V.G. Magalh˜aes 10:30–11:00 Break. Contributed Session 2 Chair: Jie Gao 11:00–11:15 “Dynamic Orthogonal Range Searching on the RAM, Revisited”, Timothy M. Chan and Konstantinos Tsakalidis 11:15–11:30 “Faster Algorithm for Truth Discovery via Range
    [Show full text]
  • Network Optimization on Partitioned Pairs of Points∗†
    Network Optimization on Partitioned Pairs of Points∗† Esther M. Arkin‡1, Aritra Banik2, Paz Carmi3, Gui Citovsky4, Su Jia5, Matthew J. Katz§6, Tyler Mayer¶7, and Joseph S. B. Mitchell‖8 1 Dept. of Applied Mathematics and Statistics, Stony Brook University, Stony Brook, USA [email protected] 2 Dept. of Computer Science, Ben-Gurion University, Beersheba, Israel [email protected] 3 Dept. of Computer Science, Ben-Gurion University, Beersheba, Israel [email protected] 4 Google, Manhattan, USA [email protected] 5 Dept. of Applied Mathematics and Statistics, Stony Brook University, Stony Brook, USA [email protected] 6 Dept. of Computer Science, Ben-Gurion University, Beersheba, Israel. [email protected] 7 Dept. of Applied Mathematics and Statistics, Stony Brook University, Stony Brook, USA [email protected] 8 Dept. of Applied Mathematics and Statistics, Stony Brook University, Stony Brook, USA. [email protected] Abstract Given n pairs of points, S = {{p1, q1}, {p2, q2},..., {pn, qn}}, in some metric space, we study the problem of two-coloring the points within each pair, red and blue, to optimize the cost of a pair of node-disjoint networks, one over the red points and one over the blue points. In this paper we consider our network structures to be spanning trees, traveling salesman tours or matchings. We consider several different weight functions computed over the network structures induced, as well as several different objective functions. We show that some of these problems are NP-hard, and provide constant factor approximation algorithms in all cases. 1998 ACM Subject Classification F.2.2 Nonnumerical Algorithms and Problems Keywords and phrases Spanning Tree, Traveling Salesman Tour, Matching, Pairs, NP-hard Digital Object Identifier 10.4230/LIPIcs.ISAAC.2017.6 ∗ We acknowledge support from the US-Israel Binational Science Foundation (Projects 2010074, 2016116).
    [Show full text]
  • Shortest Paths Among Polygonal Obstacles in the Plane 1
    Algorithmica (1992) 8:55-88 Algorithmica 1992 Springer-VerlagNew York Inc. L1 Shortest Paths Among Polygonal Obstacles in the Plane 1 Joseph S. B. Mitchell 2 Abstract. We present an algorithm for computing L 1 shortest paths among polygonal obstacles in the plane. Our algorithm employs the "continuous Dijkstra" technique of propagating a "wavefront" and runs in time O(E log n) and space O(E), where n is the number of vertices of the obstacles and E is the number of "events." By using bounds on the density of certain sparse binary matrices, we show that E = O(n log n), implying that our algorithm is nearly optimal. We conjecture that E = O(n),which would imply our algorithm to be optimal. Previous bounds for our problem were quadratic in time and space. Our algorithm generalizes to the case of fixed orientation metrics, yielding an O(ne- 1/2 log2 n) time and O(ne-1/2) space approximation algorithm for finding Euclidean shortest paths among obstacles. The algorithm further generalizes to the case of many sources, allowing us to compute an L 1 Voronoi diagram for source points that lie among a collection of polygonal obstacles. Key Words. Shortest paths, Voronoi diagrams, Rectilinear paths, Wire routing, Fixed orientation metrics, Continuous Dijkstra algorithm, Computational geometry, Extremal graph theory. 1. Introduction. Recently, there has been much interest in the problem of finding shortest Euclidean (L2) paths for a point moving in a plane cluttered with polygonal obstacles. This problem can be solved by constructing the visibility 9raph of the set of obstacles and then searching this graph using Dijkstra's algorithm [Di] or an A* algorithm [Nil.
    [Show full text]
  • Cutting Polygons Into Small Pieces with Chords: Laser-Based Localization
    Cutting Polygons into Small Pieces with Chords: Laser-Based Localization Esther M. Arkin1 Rathish Das1 Jie Gao2 Mayank Goswami3 Joseph S. B. Mitchell1 Valentin Polishchuk4 Csaba D. Toth´ 5 Abstract Motivated by indoor localization by tripwire lasers, we study the problem of cutting a polygon into small-size pieces, using the chords of the polygon. Several versions are considered, depending on the definition of the “size” of a piece. In particular, we consider the area, the diameter, and the radius of the largest inscribed circle as a measure of the size of a piece. We also consider different objectives, either minimizing the maximum size of a piece for a given number of chords, or minimizing the number of chords that achieve a given size threshold for the pieces. We give hardness results for polygons with holes and approximation algorithms for multiple variants of the problem. arXiv:2006.15089v1 [cs.CG] 26 Jun 2020 1Stony Brook University, NY,USA. Email: festher.arkin,rathish.das,[email protected]. 2Rutgers University, NJ, USA. Email:[email protected]. 3Queens College of CUNY, NY, USA. Email:[email protected]. 4Linkoping¨ University, Norrkoping,¨ Sweden. Email: [email protected]. 5California State University Northridge, CA; and Tufts University, MA, USA. Email: [email protected]. 1 Introduction Indoor localization is a challenging and important problem. While GPS technology is very effective out- doors, it generally performs poorly inside buildings, since GPS depends on line-of-sight to satellites. Thus, other techniques are being considered for indoor settings. One of the options being investigated for localiza- tion and tracking is to use one-dimensional tripwire sensors [18] such as laser beams, video cameras with a narrow field of view [35], and pyroelectric or infrared sensors [14,16].
    [Show full text]
  • Data Inference from Encrypted Databases: a Multi-Dimensional Order-Preserving Matching Approach
    Data Inference from Encrypted Databases: A Multi-dimensional Order-Preserving Matching Approach Yanjun Pan Alon Efrat Ming Li Boyang Wang Hanyu Quan University of Arizona University of Arizona University of Arizona University of Cincinnati Huaqiao University Tucson, USA Tucson, USA Tucson, USA Cincinnati, USA Xiamen, China [email protected] [email protected] [email protected] [email protected] [email protected] Joseph Mitchell Jie Gao Esther Arkin Stony Brook University Stony Brook University Stony Brook University Stony Brook, USA Stony Brook, USA Stony Brook, USA [email protected] [email protected] [email protected] Abstract—Due to increasing concerns of data privacy, databases encrypted data (such as answering queries), many cryptographic are being encrypted before they are stored on an untrusted server. techniques called searchable encryption (SE) [3], [4], [5] have To enable search operations on the encrypted data, searchable en- been proposed. The main challenge for SE is to simultaneously cryption techniques have been proposed. Representative schemes use order-preserving encryption (OPE) for supporting efficient provide flexible search functionality, high security assurance, Boolean queries on encrypted databases. Yet, recent works showed and efficiency. Among existing SE schemes, Order-Preserving the possibility of inferring plaintext data from OPE-encrypted Encryption (OPE) [6], [7], [8], [9] has gained wide attention databases, merely using the order-preserving constraints, or com- in the literature due to its high efficiency and functionality. In bined with an auxiliary plaintext dataset with similar frequency particular, OPE uses symmetric key cryptography and preserves distribution. So far, the effectiveness of such attacks is limited to single-dimensional dense data (most values from the domain the numeric order of plaintext after encryption, which supports are encrypted), but it remains challenging to achieve it on high- most Boolean queries such as range query.
    [Show full text]