Efficient algorithms for geometric optimization

PK Agarwal, M Sharir - ACM Computing Surveys (CSUR), 1998 - dl.acm.org
We review the recent progress in the design of efficient algorithms for various problems in
geometric optimization. We present several techniques used to attack these problems, such …

Arrangements and their applications

PK Agarwal, M Sharir - Handbook of computational geometry, 2000 - Elsevier
The arrangement of a finite collection of geometric objects is the decomposition of the space
into connected cells induced by them. We survey combinatorial and algorithmic properties of …

Geometric applications of a randomized optimization technique

TM Chan - Proceedings of the fourteenth annual symposium on …, 1998 - dl.acm.org
We describe general randomized reductions of certain geometric optimization problems to
their corresponding decision problems. These reductions increase the expected time …

[PDF][PDF] Efficient randomized algorithms for some geometric optimization problems

PK Agarwal, M Sharir - Proceedings of the eleventh annual symposium …, 1995 - dl.acm.org
In this paper we first prove the following combinatorial bound, concerning the complexity of
the vertical decomposition of the minimization diagram of trivariate functions: Let> be a …

An expander-based approach to geometric optimization

MJ Katz, M Sharir - SIAM Journal on Computing, 1997 - SIAM
We present a new approach to problems in geometric optimization that are traditionally
solved using the parametric-searching technique of Megiddo J. ACM, 30 (1983), pp. 852 …

Continuous location of dimensional structures

JM Dıaz-Bánez, JA Mesa, A Schöbel - European Journal of Operational …, 2004 - Elsevier
A natural extension of point facility location problems are those problems in which facilities
are extensive, ie those that cannot be represented by isolated points but as some …

[HTML][HTML] Evidence gathering for network security and forensics

DM Divakaran, KW Fok, I Nevat, VLL Thing - Digital Investigation, 2017 - Elsevier
Any machine exposed to the Internet today is at the risk of being attacked and compromised.
Detecting attack attempts, be they successful or not, is important for securing networks …

[BUCH][B] Combinatorial geometry and its algorithmic applications: The Alcalá lectures

J Pach, M Sharir - 2009 - books.google.com
" Based on a lecture series given by the authors at a satellite meeting of the 2006
International Congress of Mathematicians and on many articles written by them and their …

An optimal algorithm for the maximum-density segment problem

KM Chung, HI Lu - SIAM Journal on Computing, 2005 - SIAM
We address a fundamental problem arising from analysis of biomolecular sequences. The
input consists of two numbers w min and w max and a sequence S of n number pairs (ai, wi) …

Approximation algorithms for projective clustering

PK Agarwal, CM Procopiuc - Journal of Algorithms, 2003 - Elsevier
We consider the following two instances of the projective clustering problem: Given a set S
of n points in R d and an integer k> 0, cover S by k slabs (respectively d-cylinders) so that …