9,896 research outputs found
Minimum Enclosing Circle with Few Extra Variables
Asano et al. [JoCG 2011] proposed an open problem of computing the minimum enclosing circle of a set of n points in R^2 given in a read-only array in sub-quadratic time. We show that Megiddo\u27s prune and search algorithm for computing the minimum radius circle enclosing the given points can be tailored to work in a read-only environment in O(n^{1+epsilon}) time using O(log n) extra space, where epsilon is a positive constant less than 1. As a warm-up, we first solve the same problem in an in-place setup in linear time with O(1) extra space
Quasiconvex Programming
We define quasiconvex programming, a form of generalized linear programming
in which one seeks the point minimizing the pointwise maximum of a collection
of quasiconvex functions. We survey algorithms for solving quasiconvex programs
either numerically or via generalizations of the dual simplex method from
linear programming, and describe varied applications of this geometric
optimization technique in meshing, scientific computation, information
visualization, automated algorithm analysis, and robust statistics.Comment: 33 pages, 14 figure
Double Bubbles Minimize
The classical isoperimetric inequality in R^3 states that the surface of
smallest area enclosing a given volume is a sphere. We show that the least area
surface enclosing two equal volumes is a double bubble, a surface made of two
pieces of round spheres separated by a flat disk, meeting along a single circle
at an angle of 120 degrees.Comment: 57 pages, 32 figures. Includes the complete code for a C++ program as
described in the article. You can obtain this code by viewing the source of
this articl
Hide-and-Seek with Directional Sensing
We consider a game played between a hider, who hides a static object in one
of several possible positions in a bounded planar region, and a searcher, who
wishes to reach the object by querying sensors placed in the plane. The
searcher is a mobile agent, and whenever it physically visits a sensor, the
sensor returns a random direction, corresponding to a half-plane in which the
hidden object is located. We first present a novel search heuristic and
characterize bounds on the expected distance covered before reaching the
object. Next, we model this game as a large-dimensional zero-sum dynamic game
and we apply a recently introduced randomized sampling technique that provides
a probabilistic level of security to the hider. We observe that, when the
randomized sampling approach is only allowed to select a very small number of
samples, the cost of the heuristic is comparable to the security level provided
by the randomized procedure. However, as we allow the number of samples to
increase, the randomized procedure provides a higher probabilistic security
level.Comment: A short version of this paper (without proofs) will be presented at
the 18th IFAC World Congress (IFAC 2011), Milan (Italy), August 28-September
2, 201
Boosted Top Quark Signals for Heavy Vector Boson Excitations in a Universal Extra Dimension Model
In view of the fact that the Kaluza-Klein (KK) modes in a model with
a Universal Extra Dimension (UED), could mimic supersymmetry signatures at the
LHC, it is necessary to look for the KK modes, which have no analogues
in supersymmetry. We discuss the possibility of searching for heavy
vector boson resonances -- especially the -- through their decays to a
highly-boosted top quark-antiquark pair using recently-developed top-jet
tagging techniques in the hadronic channel. It is shown that signals
from the gluon resonance are as efficient a discovery mode at the LHC
as dilepton channels from the and resonances.Comment: 22 pages, 8 embedded figure
- …