93 research outputs found
On Minimizing Crossings in Storyline Visualizations
In a storyline visualization, we visualize a collection of interacting
characters (e.g., in a movie, play, etc.) by -monotone curves that converge
for each interaction, and diverge otherwise. Given a storyline with
characters, we show tight lower and upper bounds on the number of crossings
required in any storyline visualization for a restricted case. In particular,
we show that if (1) each meeting consists of exactly two characters and (2) the
meetings can be modeled as a tree, then we can always find a storyline
visualization with crossings. Furthermore, we show that there
exist storylines in this restricted case that require
crossings. Lastly, we show that, in the general case, minimizing the number of
crossings in a storyline visualization is fixed-parameter tractable, when
parameterized on the number of characters . Our algorithm runs in time
, where is the number of meetings.Comment: 6 pages, 4 figures. To appear at the 23rd International Symposium on
Graph Drawing and Network Visualization (GD 2015
Low Ply Drawings of Trees
We consider the recently introduced model of \emph{low ply graph drawing}, in
which the ply-disks of the vertices do not have many common overlaps, which
results in a good distribution of the vertices in the plane. The
\emph{ply-disk} of a vertex in a straight-line drawing is the disk centered at
it whose radius is half the length of its longest incident edge. The largest
number of ply-disks having a common overlap is called the \emph{ply-number} of
the drawing.
We focus on trees. We first consider drawings of trees with constant
ply-number, proving that they may require exponential area, even for stars, and
that they may not even exist for bounded-degree trees. Then, we turn our
attention to drawings with logarithmic ply-number and show that trees with
maximum degree always admit such drawings in polynomial area.Comment: This is a complete access version of a paper that will appear in the
proceedings of GD201
Adding Isolated Vertices Makes some Online Algorithms Optimal
An unexpected difference between online and offline algorithms is observed.
The natural greedy algorithms are shown to be worst case online optimal for
Online Independent Set and Online Vertex Cover on graphs with 'enough' isolated
vertices, Freckle Graphs. For Online Dominating Set, the greedy algorithm is
shown to be worst case online optimal on graphs with at least one isolated
vertex. These algorithms are not online optimal in general. The online
optimality results for these greedy algorithms imply optimality according to
various worst case performance measures, such as the competitive ratio. It is
also shown that, despite this worst case optimality, there are Freckle graphs
where the greedy independent set algorithm is objectively less good than
another algorithm. It is shown that it is NP-hard to determine any of the
following for a given graph: the online independence number, the online vertex
cover number, and the online domination number.Comment: A footnote in the .tex file didn't show up in the last version. This
was fixe
Truthful Facility Assignment with Resource Augmentation: An Exact Analysis of Serial Dictatorship
We study the truthful facility assignment problem, where a set of agents with
private most-preferred points on a metric space are assigned to facilities that
lie on the metric space, under capacity constraints on the facilities. The goal
is to produce such an assignment that minimizes the social cost, i.e., the
total distance between the most-preferred points of the agents and their
corresponding facilities in the assignment, under the constraint of
truthfulness, which ensures that agents do not misreport their most-preferred
points.
We propose a resource augmentation framework, where a truthful mechanism is
evaluated by its worst-case performance on an instance with enhanced facility
capacities against the optimal mechanism on the same instance with the original
capacities. We study a very well-known mechanism, Serial Dictatorship, and
provide an exact analysis of its performance. Although Serial Dictatorship is a
purely combinatorial mechanism, our analysis uses linear programming; a linear
program expresses its greedy nature as well as the structure of the input, and
finds the input instance that enforces the mechanism have its worst-case
performance. Bounding the objective of the linear program using duality
arguments allows us to compute tight bounds on the approximation ratio. Among
other results, we prove that Serial Dictatorship has approximation ratio
when the capacities are multiplied by any integer . Our
results suggest that even a limited augmentation of the resources can have
wondrous effects on the performance of the mechanism and in particular, the
approximation ratio goes to 1 as the augmentation factor becomes large. We
complement our results with bounds on the approximation ratio of Random Serial
Dictatorship, the randomized version of Serial Dictatorship, when there is no
resource augmentation
On a Subposet of the Tamari Lattice
We explore some of the properties of a subposet of the Tamari lattice
introduced by Pallo, which we call the comb poset. We show that three binary
functions that are not well-behaved in the Tamari lattice are remarkably
well-behaved within an interval of the comb poset: rotation distance, meets and
joins, and the common parse words function for a pair of trees. We relate this
poset to a partial order on the symmetric group studied by Edelman.Comment: 21 page
Belga B-trees
We revisit self-adjusting external memory tree data structures, which combine
the optimal (and practical) worst-case I/O performances of B-trees, while
adapting to the online distribution of queries. Our approach is analogous to
undergoing efforts in the BST model, where Tango Trees (Demaine et al. 2007)
were shown to be -competitive with the runtime of the best
offline binary search tree on every sequence of searches. Here we formalize the
B-Tree model as a natural generalization of the BST model. We prove lower
bounds for the B-Tree model, and introduce a B-Tree model data structure, the
Belga B-tree, that executes any sequence of searches within a
factor of the best offline B-tree model algorithm, provided .
We also show how to transform any static BST into a static B-tree which is
faster by a factor; the transformation is randomized and we
show that randomization is necessary to obtain any significant speedup
Relaxing the Irrevocability Requirement for Online Graph Algorithms
Online graph problems are considered in models where the irrevocability
requirement is relaxed. Motivated by practical examples where, for example,
there is a cost associated with building a facility and no extra cost
associated with doing it later, we consider the Late Accept model, where a
request can be accepted at a later point, but any acceptance is irrevocable.
Similarly, we also consider a Late Reject model, where an accepted request can
later be rejected, but any rejection is irrevocable (this is sometimes called
preemption). Finally, we consider the Late Accept/Reject model, where late
accepts and rejects are both allowed, but any late reject is irrevocable. For
Independent Set, the Late Accept/Reject model is necessary to obtain a constant
competitive ratio, but for Vertex Cover the Late Accept model is sufficient and
for Minimum Spanning Forest the Late Reject model is sufficient. The Matching
problem has a competitive ratio of 2, but in the Late Accept/Reject model, its
competitive ratio is 3/2
Flip Graphs of Degree-Bounded (Pseudo-)Triangulations
We study flip graphs of triangulations whose maximum vertex degree is bounded
by a constant . In particular, we consider triangulations of sets of
points in convex position in the plane and prove that their flip graph is
connected if and only if ; the diameter of the flip graph is .
We also show that, for general point sets, flip graphs of pointed
pseudo-triangulations can be disconnected for , and flip graphs of
triangulations can be disconnected for any . Additionally, we consider a
relaxed version of the original problem. We allow the violation of the degree
bound by a small constant. Any two triangulations with maximum degree at
most of a convex point set are connected in the flip graph by a path of
length , where every intermediate triangulation has maximum degree
at most .Comment: 13 pages, 12 figures, acknowledgments update
Complexity and Inapproximability Results for Parallel Task Scheduling and Strip Packing
We study the Parallel Task Scheduling problem with a
constant number of machines. This problem is known to be strongly NP-complete
for each , while it is solvable in pseudo-polynomial time for each . We give a positive answer to the long-standing open question whether
this problem is strongly -complete for . As a second result, we
improve the lower bound of for approximating pseudo-polynomial
Strip Packing to . Since the best known approximation algorithm
for this problem has a ratio of , this result
narrows the gap between approximation ratio and inapproximability result by a
significant step. Both results are proven by a reduction from the strongly
-complete problem 3-Partition
- …