Catálogo de publicaciones - libros
Algorithms and Computation: 17th International Symposium, ISAAC 2006, Kolkata, India, December 18-20, 2006, Proceedings
Tetsuo Asano (eds.)
En conferencia: 17º International Symposium on Algorithms and Computation (ISAAC) . Kolkata, India . December 18, 2006 - December 20, 2006
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Programming Techniques; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science; Numeric Computing; Computer Communication Networks; Computer Graphics
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2006 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-49694-6
ISBN electrónico
978-3-540-49696-0
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2006
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2006
Cobertura temática
Tabla de contenidos
doi: 10.1007/11940128_71
A New Approximation Algorithm for Multidimensional Rectangle Tiling
Katarzyna Paluch
We consider the following tiling problem: Given a dimensional array of size in each dimension, containing non-negative numbers and a positive integer , partition the array into at most disjoint rectangular subarrays called so as to minimise the maximum weight of any rectangle. The weight of a subarray is the sum of its elements.
In the paper we give a -approximation algorithm that is tight with regard to the only known and used lower bound so far.
- Session 9A: Computational Geometry | Pp. 712-721
doi: 10.1007/11940128_72
Tessellation of Quadratic Elements
Scott E. Dillard; Vijay Natarajan; Gunther H. Weber; Valerio Pascucci; Bernd Hamann
Topology-based methods have been successfully used for the analysis and visualization of piecewise-linear functions defined on triangle meshes. This paper describes a mechanism for extending these methods to piecewise-quadratic functions defined on triangulations of surfaces. Each triangular patch is tessellated into monotone regions, so that existing algorithms for computing topological representations of piecewise-linear functions may be applied directly to piecewise-quadratic functions. In particular, the tessellation is used for computing the Reeb graph, which provides a succinct representation of level sets of the function.
- Session 9A: Computational Geometry | Pp. 722-731
doi: 10.1007/11940128_73
Effective Elections for Anonymous Mobile Agents
Shantanu Das; Paola Flocchini; Amiya Nayak; Nicola Santoro
We present distributed protocols for electing a leader among mobile agents that are dispersed among the nodes of a graph. While previous solutions for the agent election problem were restricted to specific topologies or under specific conditions, the protocols presented in this paper face the problem in the most general case, i.e. for an arbitrary topology where the nodes of the graph may not be distinctly labelled and the agents might be all identical (and thus indistinguishable from each other). In such cases, the agent election problem is often difficult, and sometimes impossible to solve using deterministic means. We have designed protocols for solving the problem that—unlike previous solutions—are , meaning that they always succeed in electing a leader under any given setting if at all it is possible, and otherwise detect the fact that election is impossible in that setting. We present several election protocols, all effective. Starting with the straightforward solution, that requires an exponential amount of edge-traversals by the agents, we describe significantly more efficient algorithms; in the latter the total number of edge-traversals made by the agents is always polynomial, their difference is in the amount of bits of storage they required at the nodes.
- Session 9B: Distributed Computing and Cryptography | Pp. 732-743
doi: 10.1007/11940128_74
Gathering Asynchronous Oblivious Mobile Robots in a Ring
Ralf Klasing; Euripides Markou; Andrzej Pelc
We consider the problem of gathering identical, memoryless, mobile robots in one node of an anonymous unoriented ring. Robots start from different nodes of the ring. They operate in Look-Compute-Move cycles and have to end up in the same node. In one cycle, a robot takes a snapshot of the current configuration (Look), makes a decision to stay idle or to move to one of its adjacent nodes (Compute), and in the latter case makes an instantaneous move to this neighbor (Move). Cycles are performed asynchronously for each robot. For an odd number of robots we prove that gathering is feasible if and only if the initial configuration is not periodic, and we provide a gathering algorithm for any such configuration. For an even number of robots we decide feasibility of gathering except for one type of symmetric initial configurations, and provide gathering algorithms for initial configurations proved to be gatherable.
- Session 9B: Distributed Computing and Cryptography | Pp. 744-753
doi: 10.1007/11940128_75
Provably Secure Steganography and the Complexity of Sampling
Christian Hundt; Maciej Liśkiewicz; Ulrich Wölfel
Recent work on theoretical aspects of steganography resulted in the construction of oracle-based stegosystems. It has been shown that these can be made secure against the steganography equivalents of common cryptographic attacks. In this paper we use methods from complexity theory to investigate the efficiency of sampling from practically relevant types of channels. We show that there are channels that cannot be efficiently used in oracle-based stegosystems. By classifying channels based on their usability for stegosystems, we provide a means to select suitable channels for their practical implementation.
- Session 9B: Distributed Computing and Cryptography | Pp. 754-763