9,896 research outputs found

    Minimum Enclosing Circle with Few Extra Variables

    Get PDF
    Asano et al. [JoCG 2011] proposed an open problem of computing the minimum enclosing circle of a set of n points in R^2 given in a read-only array in sub-quadratic time. We show that Megiddo\u27s prune and search algorithm for computing the minimum radius circle enclosing the given points can be tailored to work in a read-only environment in O(n^{1+epsilon}) time using O(log n) extra space, where epsilon is a positive constant less than 1. As a warm-up, we first solve the same problem in an in-place setup in linear time with O(1) extra space

    Quasiconvex Programming

    Full text link
    We define quasiconvex programming, a form of generalized linear programming in which one seeks the point minimizing the pointwise maximum of a collection of quasiconvex functions. We survey algorithms for solving quasiconvex programs either numerically or via generalizations of the dual simplex method from linear programming, and describe varied applications of this geometric optimization technique in meshing, scientific computation, information visualization, automated algorithm analysis, and robust statistics.Comment: 33 pages, 14 figure

    Double Bubbles Minimize

    Full text link
    The classical isoperimetric inequality in R^3 states that the surface of smallest area enclosing a given volume is a sphere. We show that the least area surface enclosing two equal volumes is a double bubble, a surface made of two pieces of round spheres separated by a flat disk, meeting along a single circle at an angle of 120 degrees.Comment: 57 pages, 32 figures. Includes the complete code for a C++ program as described in the article. You can obtain this code by viewing the source of this articl

    Hide-and-Seek with Directional Sensing

    Full text link
    We consider a game played between a hider, who hides a static object in one of several possible positions in a bounded planar region, and a searcher, who wishes to reach the object by querying sensors placed in the plane. The searcher is a mobile agent, and whenever it physically visits a sensor, the sensor returns a random direction, corresponding to a half-plane in which the hidden object is located. We first present a novel search heuristic and characterize bounds on the expected distance covered before reaching the object. Next, we model this game as a large-dimensional zero-sum dynamic game and we apply a recently introduced randomized sampling technique that provides a probabilistic level of security to the hider. We observe that, when the randomized sampling approach is only allowed to select a very small number of samples, the cost of the heuristic is comparable to the security level provided by the randomized procedure. However, as we allow the number of samples to increase, the randomized procedure provides a higher probabilistic security level.Comment: A short version of this paper (without proofs) will be presented at the 18th IFAC World Congress (IFAC 2011), Milan (Italy), August 28-September 2, 201

    Boosted Top Quark Signals for Heavy Vector Boson Excitations in a Universal Extra Dimension Model

    Full text link
    In view of the fact that the n=1n = 1 Kaluza-Klein (KK) modes in a model with a Universal Extra Dimension (UED), could mimic supersymmetry signatures at the LHC, it is necessary to look for the n=2n = 2 KK modes, which have no analogues in supersymmetry. We discuss the possibility of searching for heavy n=2n = 2 vector boson resonances -- especially the g2g_2 -- through their decays to a highly-boosted top quark-antiquark pair using recently-developed top-jet tagging techniques in the hadronic channel. It is shown that ttˉt\bar{t} signals from the n=2n = 2 gluon resonance are as efficient a discovery mode at the LHC as dilepton channels from the γ2\gamma_2 and Z2Z_2 resonances.Comment: 22 pages, 8 embedded figure
    • …
    corecore