93 research outputs found

    On Minimizing Crossings in Storyline Visualizations

    Get PDF
    In a storyline visualization, we visualize a collection of interacting characters (e.g., in a movie, play, etc.) by xx-monotone curves that converge for each interaction, and diverge otherwise. Given a storyline with nn characters, we show tight lower and upper bounds on the number of crossings required in any storyline visualization for a restricted case. In particular, we show that if (1) each meeting consists of exactly two characters and (2) the meetings can be modeled as a tree, then we can always find a storyline visualization with O(nlogn)O(n\log n) crossings. Furthermore, we show that there exist storylines in this restricted case that require Ω(nlogn)\Omega(n\log n) crossings. Lastly, we show that, in the general case, minimizing the number of crossings in a storyline visualization is fixed-parameter tractable, when parameterized on the number of characters kk. Our algorithm runs in time O(k!2klogk+k!2m)O(k!^2k\log k + k!^2m), where mm is the number of meetings.Comment: 6 pages, 4 figures. To appear at the 23rd International Symposium on Graph Drawing and Network Visualization (GD 2015

    Low Ply Drawings of Trees

    Full text link
    We consider the recently introduced model of \emph{low ply graph drawing}, in which the ply-disks of the vertices do not have many common overlaps, which results in a good distribution of the vertices in the plane. The \emph{ply-disk} of a vertex in a straight-line drawing is the disk centered at it whose radius is half the length of its longest incident edge. The largest number of ply-disks having a common overlap is called the \emph{ply-number} of the drawing. We focus on trees. We first consider drawings of trees with constant ply-number, proving that they may require exponential area, even for stars, and that they may not even exist for bounded-degree trees. Then, we turn our attention to drawings with logarithmic ply-number and show that trees with maximum degree 66 always admit such drawings in polynomial area.Comment: This is a complete access version of a paper that will appear in the proceedings of GD201

    Adding Isolated Vertices Makes some Online Algorithms Optimal

    Full text link
    An unexpected difference between online and offline algorithms is observed. The natural greedy algorithms are shown to be worst case online optimal for Online Independent Set and Online Vertex Cover on graphs with 'enough' isolated vertices, Freckle Graphs. For Online Dominating Set, the greedy algorithm is shown to be worst case online optimal on graphs with at least one isolated vertex. These algorithms are not online optimal in general. The online optimality results for these greedy algorithms imply optimality according to various worst case performance measures, such as the competitive ratio. It is also shown that, despite this worst case optimality, there are Freckle graphs where the greedy independent set algorithm is objectively less good than another algorithm. It is shown that it is NP-hard to determine any of the following for a given graph: the online independence number, the online vertex cover number, and the online domination number.Comment: A footnote in the .tex file didn't show up in the last version. This was fixe

    Truthful Facility Assignment with Resource Augmentation: An Exact Analysis of Serial Dictatorship

    Full text link
    We study the truthful facility assignment problem, where a set of agents with private most-preferred points on a metric space are assigned to facilities that lie on the metric space, under capacity constraints on the facilities. The goal is to produce such an assignment that minimizes the social cost, i.e., the total distance between the most-preferred points of the agents and their corresponding facilities in the assignment, under the constraint of truthfulness, which ensures that agents do not misreport their most-preferred points. We propose a resource augmentation framework, where a truthful mechanism is evaluated by its worst-case performance on an instance with enhanced facility capacities against the optimal mechanism on the same instance with the original capacities. We study a very well-known mechanism, Serial Dictatorship, and provide an exact analysis of its performance. Although Serial Dictatorship is a purely combinatorial mechanism, our analysis uses linear programming; a linear program expresses its greedy nature as well as the structure of the input, and finds the input instance that enforces the mechanism have its worst-case performance. Bounding the objective of the linear program using duality arguments allows us to compute tight bounds on the approximation ratio. Among other results, we prove that Serial Dictatorship has approximation ratio g/(g2)g/(g-2) when the capacities are multiplied by any integer g3g \geq 3. Our results suggest that even a limited augmentation of the resources can have wondrous effects on the performance of the mechanism and in particular, the approximation ratio goes to 1 as the augmentation factor becomes large. We complement our results with bounds on the approximation ratio of Random Serial Dictatorship, the randomized version of Serial Dictatorship, when there is no resource augmentation

    On a Subposet of the Tamari Lattice

    Get PDF
    We explore some of the properties of a subposet of the Tamari lattice introduced by Pallo, which we call the comb poset. We show that three binary functions that are not well-behaved in the Tamari lattice are remarkably well-behaved within an interval of the comb poset: rotation distance, meets and joins, and the common parse words function for a pair of trees. We relate this poset to a partial order on the symmetric group studied by Edelman.Comment: 21 page

    Belga B-trees

    Full text link
    We revisit self-adjusting external memory tree data structures, which combine the optimal (and practical) worst-case I/O performances of B-trees, while adapting to the online distribution of queries. Our approach is analogous to undergoing efforts in the BST model, where Tango Trees (Demaine et al. 2007) were shown to be O(loglogN)O(\log\log N)-competitive with the runtime of the best offline binary search tree on every sequence of searches. Here we formalize the B-Tree model as a natural generalization of the BST model. We prove lower bounds for the B-Tree model, and introduce a B-Tree model data structure, the Belga B-tree, that executes any sequence of searches within a O(loglogN)O(\log \log N) factor of the best offline B-tree model algorithm, provided B=logO(1)NB=\log^{O(1)}N. We also show how to transform any static BST into a static B-tree which is faster by a Θ(logB)\Theta(\log B) factor; the transformation is randomized and we show that randomization is necessary to obtain any significant speedup

    Relaxing the Irrevocability Requirement for Online Graph Algorithms

    Get PDF
    Online graph problems are considered in models where the irrevocability requirement is relaxed. Motivated by practical examples where, for example, there is a cost associated with building a facility and no extra cost associated with doing it later, we consider the Late Accept model, where a request can be accepted at a later point, but any acceptance is irrevocable. Similarly, we also consider a Late Reject model, where an accepted request can later be rejected, but any rejection is irrevocable (this is sometimes called preemption). Finally, we consider the Late Accept/Reject model, where late accepts and rejects are both allowed, but any late reject is irrevocable. For Independent Set, the Late Accept/Reject model is necessary to obtain a constant competitive ratio, but for Vertex Cover the Late Accept model is sufficient and for Minimum Spanning Forest the Late Reject model is sufficient. The Matching problem has a competitive ratio of 2, but in the Late Accept/Reject model, its competitive ratio is 3/2

    Flip Graphs of Degree-Bounded (Pseudo-)Triangulations

    Full text link
    We study flip graphs of triangulations whose maximum vertex degree is bounded by a constant kk. In particular, we consider triangulations of sets of nn points in convex position in the plane and prove that their flip graph is connected if and only if k>6k > 6; the diameter of the flip graph is O(n2)O(n^2). We also show that, for general point sets, flip graphs of pointed pseudo-triangulations can be disconnected for k9k \leq 9, and flip graphs of triangulations can be disconnected for any kk. Additionally, we consider a relaxed version of the original problem. We allow the violation of the degree bound kk by a small constant. Any two triangulations with maximum degree at most kk of a convex point set are connected in the flip graph by a path of length O(nlogn)O(n \log n), where every intermediate triangulation has maximum degree at most k+4k+4.Comment: 13 pages, 12 figures, acknowledgments update

    Complexity and Inapproximability Results for Parallel Task Scheduling and Strip Packing

    Full text link
    We study the Parallel Task Scheduling problem PmsizejCmaxPm|size_j|C_{\max} with a constant number of machines. This problem is known to be strongly NP-complete for each m5m \geq 5, while it is solvable in pseudo-polynomial time for each m3m \leq 3. We give a positive answer to the long-standing open question whether this problem is strongly NPNP-complete for m=4m=4. As a second result, we improve the lower bound of 1211\frac{12}{11} for approximating pseudo-polynomial Strip Packing to 54\frac{5}{4}. Since the best known approximation algorithm for this problem has a ratio of 43+ε\frac{4}{3} + \varepsilon, this result narrows the gap between approximation ratio and inapproximability result by a significant step. Both results are proven by a reduction from the strongly NPNP-complete problem 3-Partition
    corecore