APPROXIMATING POLYGONS AND SUBDIVISIONS WITH MINIMUM-LINK PATHS

1993 ◽  
Vol 03 (04) ◽  
pp. 383-415 ◽  
Author(s):  
LEONIDAS J. GUIBAS ◽  
JOHN E. HERSHBERGER ◽  
JOSEPH S.B. MITCHELL ◽  
JACK SCOTT SNOEYINK

We study several variations on one basic approach to the task of simplifying a plane polygon or subdivision: Fatten the given object and construct an approximation inside the fattened region. We investigate fattening by convolving the segments or vertices with disks and attempt to approximate objects with the minimum number of line segments, or with near the minimum, by using efficient greedy algorithms. We give some variants that have linear or O(n log n) algorithms approximating polygonal chains of n segments. We also show that approximating subdivisions and approximating with chains with. no self-intersections are NP-hard.

2012 ◽  
Vol 22 (03) ◽  
pp. 187-205 ◽  
Author(s):  
MARK DE BERG ◽  
AMIRALI KHOSRAVI

An optimal BSP for a set S of disjoint line segments in the plane is a BSP for S that produces the minimum number of cuts. We study optimal BSPs for three classes of BSPs, which differ in the splitting lines that can be used when partitioning a set of fragments in the recursive partitioning process: free BSPs can use any splitting line, restricted BSPs can only use splitting lines through pairs of fragment endpoints, and auto-partitions can only use splitting lines containing a fragment. We obtain the following two results: • It is NP-hard to decide whether a given set of segments admits an auto-partition that does not make any cuts. • An optimal restricted BSP makes at most 2 times as many cuts as an optimal free BSP for the same set of segments.


2014 ◽  
Vol 24 (03) ◽  
pp. 225-236 ◽  
Author(s):  
DAVID KIRKPATRICK ◽  
BOTING YANG ◽  
SANDRA ZILLES

Given an arrangement A of n sensors and two points s and t in the plane, the barrier resilience of A with respect to s and t is the minimum number of sensors whose removal permits a path from s to t such that the path does not intersect the coverage region of any sensor in A. When the surveillance domain is the entire plane and sensor coverage regions are unit line segments, even with restricted orientations, the problem of determining the barrier resilience is known to be NP-hard. On the other hand, if sensor coverage regions are arbitrary lines, the problem has a trivial linear time solution. In this paper, we study the case where each sensor coverage region is an arbitrary ray, and give an O(n2m) time algorithm for computing the barrier resilience when there are m ⩾ 1 sensor intersections.


Author(s):  
Minghui Jiang

We study the problem of finding a polygonal chain of line segments to cover a set of points in ℝd, d≥2, with the goal of minimizing the number of links or turns in the chain. A chain of line segments that covers all points in the given set is called a covering tour if the chain is closed, and is called a covering path if the chain is open. A covering tour or a covering path is rectilinear if all segments in the chain are axis-parallel. We prove that the two problems Minimum-Link Rectilinear Covering Tour and Minimum-Link Rectilinear Covering Path are both NP-hard in ℝ10.


2017 ◽  
Vol 27 (03) ◽  
pp. 159-176
Author(s):  
Helmut Alt ◽  
Sergio Cabello ◽  
Panos Giannopoulos ◽  
Christian Knauer

We study the complexity of the following cell connection problems in segment arrangements. Given a set of straight-line segments in the plane and two points [Formula: see text] and [Formula: see text] in different cells of the induced arrangement: [(i)] compute the minimum number of segments one needs to remove so that there is a path connecting [Formula: see text] to [Formula: see text] that does not intersect any of the remaining segments; [(ii)] compute the minimum number of segments one needs to remove so that the arrangement induced by the remaining segments has a single cell. We show that problems (i) and (ii) are NP-hard and discuss some special, tractable cases. Most notably, we provide a near-linear-time algorithm for a variant of problem (i) where the path connecting [Formula: see text] to [Formula: see text] must stay inside a given polygon [Formula: see text] with a constant number of holes, the segments are contained in [Formula: see text], and the endpoints of the segments are on the boundary of [Formula: see text]. The approach for this latter result uses homotopy of paths to group the segments into clusters with the property that either all segments in a cluster or none participate in an optimal solution.


2009 ◽  
Vol 19 (1) ◽  
pp. 121-131 ◽  
Author(s):  
OLEG PIKHURKO

Let c(G) be the smallest number of edges we have to test in order to determine an unknown acyclic orientation of the given graph G in the worst case. For example, if G is the complete graph on n vertices, then c(G) is the smallest number of comparisons needed to sort n numbers.We prove that c(G) ≤ (1/4 + o(1))n2 for any graph G on n vertices, answering in the affirmative a question of Aigner, Triesch and Tuza [Discrete Mathematics144 (1995) 3–10]. Also, we show that, for every ϵ > 0, it is NP-hard to approximate the parameter c(G) within a multiplicative factor 74/73 − ϵ.


Author(s):  
ATSUSHI KANEKO ◽  
M. KANO ◽  
KIYOSHI YOSHIMOTO

Let X and Y be two disjoint sets of points in the plane such that |X|=|Y| and no three points of X ∪ Y are on the same line. Then we can draw an alternating Hamilton cycle on X∪Y in the plane which passes through alternately points of X and those of Y, whose edges are straight-line segments, and which contains at most |X|-1 crossings. Our proof gives an O(n2 log n) time algorithm for finding such an alternating Hamilton cycle, where n =|X|. Moreover we show that the above upper bound |X|-1 on crossing number is best possible for some configurations.


2009 ◽  
Vol 20 (01) ◽  
pp. 135-149 ◽  
Author(s):  
JOACHIM GUDMUNDSSON ◽  
MICHIEL SMID

Given a connected geometric graph G, we consider the problem of constructing a t-spanner of G having the minimum number of edges. We prove that for every real number t with [Formula: see text], there exists a connected geometric graph G with n vertices, such that every t-spanner of G contains Ω(n1+1/t) edges. This bound almost matches the known upper bound, which states that every connected weighted graph with n vertices contains a t-spanner with O(n1+2/(t-1)) edges. We also prove that the problem of deciding whether a given geometric graph contains a t-spanner with at most K edges is NP-hard. Previously, this NP-hardness result was only known for non-geometric graphs.


2021 ◽  
Vol 22 (1) ◽  
pp. 16-22
Author(s):  
Yuriy S. Fedorenko

The relevance of the work is justified by the frequent occurrence of the need to solve the problems of choosing personalized offers in information systems and the many possible methods of machine learning, among which it is necessary to choose the most suitable one. The purpose of this study is to simulate a system for selecting personalized offers as a queuing system for estimating equipment costs when using each of the methods necessary to service the required part of requests for a given time limit. This solves the problem of assessing the minimum number of servicing devices (backend servers) required to ensure the operation of the system at a given level. The paper shows that the system can be described by a multichannel queuing system without losses. The distribution function of the spent time of the request in the system (the service time plus the waiting time in the queue) is calculated, since in the literature for such systems only the distribution function of the waiting time in the queue is described. Transformations of the expression for the probability of waiting are given, which solve the overflow problem in the software implementation. In the final part, as an example, the system was modeled according to the given parameters, and the minimum number of servicing devices was estimated to ensure a given system response time. Based on the data obtained, it is possible to make a decision on the advisability of using one or another method for predicting the frequency of user clicks or ranking.


2018 ◽  
Vol 13 (12) ◽  
pp. 290
Author(s):  
Luciano Quattrocchio ◽  
Luisa Tibiletti ◽  
Mariacristina Uberti

Terminating a leasing contract early may entail the payment of additional charges attributable to penalty and late payment costs. The occurrence of these extra charges push the lease effective Annual Percentage Rate (APR) up. The aim of this note is to discuss the contract early termination extra charge conditions which guarantee the no exceedance of a given APR threshold, whenever the contract expires. In the event the contract provides the lessee the option to terminate the lease prior to the first payment, extra charges shoot APR extraordinarily up and so the penalty costs should be set at zero. In the occurrence that the contract terminates upon the first payment date due to lessee’s exercise of the early termination option, the most severe compliance conditions are those if the termination occurs at the first payment date. If the early termination occurs for lessee’s insolvency, the most severe compliance condition is at correspondence of the first admissible date of the contract redemption for insolvency after a minimum number of unpaid payments. The late payment cost compliance condition requires only that the late payment interest rate not exceeds the given APR cap. Our findings hold whatever the payback amortization is set at the date of entering into the contract. If the French amortization (fixed installments) is used, the compliance constrains turn out looser than those valid for a general amortization.


2009 ◽  
Vol 35 ◽  
pp. 275-341 ◽  
Author(s):  
P. Faliszewski ◽  
E. Hemaspaandra ◽  
L. A. Hemaspaandra ◽  
J. Rothe

Control and bribery are settings in which an external agent seeks to influence the outcome of an election. Constructive control of elections refers to attempts by an agent to, via such actions as addition/deletion/partition of candidates or voters, ensure that a given candidate wins. Destructive control refers to attempts by an agent to, via the same actions, preclude a given candidate's victory. An election system in which an agent can sometimes affect the result and it can be determined in polynomial time on which inputs the agent can succeed is said to be vulnerable to the given type of control. An election system in which an agent can sometimes affect the result, yet in which it is NP-hard to recognize the inputs on which the agent can succeed, is said to be resistant to the given type of control. Aside from election systems with an NP-hard winner problem, the only systems previously known to be resistant to all the standard control types were highly artificial election systems created by hybridization. This paper studies a parameterized version of Copeland voting, denoted by Copeland^\alpha, where the parameter \alpha is a rational number between 0 and 1 that specifies how ties are valued in the pairwise comparisons of candidates. In every previously studied constructive or destructive control scenario, we determine which of resistance or vulnerability holds for Copeland^\alpha for each rational \alpha, 0 \leq \alpha \leq 1. In particular, we prove that Copeland^{0.5}, the system commonly referred to as ``Copeland voting,'' provides full resistance to constructive control, and we prove the same for Copeland^\alpha, for all rational \alpha, 0 < \alpha < 1. Among systems with a polynomial-time winner problem, Copeland voting is the first natural election system proven to have full resistance to constructive control. In addition, we prove that both Copeland^0 and Copeland^1 (interestingly, Copeland^1 is an election system developed by the thirteenth-century mystic Llull) are resistant to all standard types of constructive control other than one variant of addition of candidates. Moreover, we show that for each rational \alpha, 0 \leq \alpha \leq 1, Copeland^\alpha voting is fully resistant to bribery attacks, and we establish fixed-parameter tractability of bounded-case control for Copeland^\alpha. We also study Copeland^\alpha elections under more flexible models such as microbribery and extended control, we integrate the potential irrationality of voter preferences into many of our results, and we prove our results in both the unique-winner model and the nonunique-winner model. Our vulnerability results for microbribery are proven via a novel technique involving min-cost network flow.


Sign in / Sign up

Export Citation Format

Share Document