{"title":"加快间隙贪婪扳手施工的一种简便有效的方法","authors":"Hosein Salami, Mostafa Nouri-Baygi","doi":"10.1142/s0129054123500119","DOIUrl":null,"url":null,"abstract":"Let [Formula: see text] be the complete Euclidean graph on a set of points embedded in the plane. Given a constant [Formula: see text], a spanning subgraph [Formula: see text] of [Formula: see text] is said to be a [Formula: see text]-spanner, or simply a spanner, if for any pair of nodes [Formula: see text], [Formula: see text] in [Formula: see text] there exists a [Formula: see text]-path in [Formula: see text], i.e., a path between [Formula: see text] and [Formula: see text] whose length is at most [Formula: see text] times their distance in [Formula: see text]. Gap-greedy spanner, proposed by Arya and Smid, is a light weight and bounded degree spanner in which a pair of points [Formula: see text] is guaranteed to have a [Formula: see text]-path, if there exists at least one edge with some special criteria in the spanner. Existing algorithms for computing the gap-greedy spanner determine the existence of such an edge for each pair of points by examining the edges of the spanner, which takes [Formula: see text] time, however in this paper, we have presented a method by which this task can be done in [Formula: see text] time. Using the proposed method and well-separated pair decomposition, we have proposed a linear-space algorithm that can compute the gap-greedy spanner in [Formula: see text] time. How to use the well-separated pair decomposition to compute this spanner was proposed by Bakhshesh and Farshi, however using an example, we have shown that one of the algorithms they have proposed for this purpose is incorrect. We have performed various experiments to measure the duration and amount of memory used by the algorithms for computing this spanner. The results of these experiments showed that the proposed method, without a significant effect on the amount of memory consumed compared to previous algorithms, leads to a significant acceleration in the construction time of this spanner.","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.6000,"publicationDate":"2023-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Simple and Efficient Method for Accelerating Construction of the Gap-Greedy Spanner\",\"authors\":\"Hosein Salami, Mostafa Nouri-Baygi\",\"doi\":\"10.1142/s0129054123500119\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Let [Formula: see text] be the complete Euclidean graph on a set of points embedded in the plane. Given a constant [Formula: see text], a spanning subgraph [Formula: see text] of [Formula: see text] is said to be a [Formula: see text]-spanner, or simply a spanner, if for any pair of nodes [Formula: see text], [Formula: see text] in [Formula: see text] there exists a [Formula: see text]-path in [Formula: see text], i.e., a path between [Formula: see text] and [Formula: see text] whose length is at most [Formula: see text] times their distance in [Formula: see text]. Gap-greedy spanner, proposed by Arya and Smid, is a light weight and bounded degree spanner in which a pair of points [Formula: see text] is guaranteed to have a [Formula: see text]-path, if there exists at least one edge with some special criteria in the spanner. Existing algorithms for computing the gap-greedy spanner determine the existence of such an edge for each pair of points by examining the edges of the spanner, which takes [Formula: see text] time, however in this paper, we have presented a method by which this task can be done in [Formula: see text] time. Using the proposed method and well-separated pair decomposition, we have proposed a linear-space algorithm that can compute the gap-greedy spanner in [Formula: see text] time. How to use the well-separated pair decomposition to compute this spanner was proposed by Bakhshesh and Farshi, however using an example, we have shown that one of the algorithms they have proposed for this purpose is incorrect. We have performed various experiments to measure the duration and amount of memory used by the algorithms for computing this spanner. The results of these experiments showed that the proposed method, without a significant effect on the amount of memory consumed compared to previous algorithms, leads to a significant acceleration in the construction time of this spanner.\",\"PeriodicalId\":50323,\"journal\":{\"name\":\"International Journal of Foundations of Computer Science\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.6000,\"publicationDate\":\"2023-06-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Foundations of Computer Science\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1142/s0129054123500119\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Foundations of Computer Science","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1142/s0129054123500119","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
A Simple and Efficient Method for Accelerating Construction of the Gap-Greedy Spanner
Let [Formula: see text] be the complete Euclidean graph on a set of points embedded in the plane. Given a constant [Formula: see text], a spanning subgraph [Formula: see text] of [Formula: see text] is said to be a [Formula: see text]-spanner, or simply a spanner, if for any pair of nodes [Formula: see text], [Formula: see text] in [Formula: see text] there exists a [Formula: see text]-path in [Formula: see text], i.e., a path between [Formula: see text] and [Formula: see text] whose length is at most [Formula: see text] times their distance in [Formula: see text]. Gap-greedy spanner, proposed by Arya and Smid, is a light weight and bounded degree spanner in which a pair of points [Formula: see text] is guaranteed to have a [Formula: see text]-path, if there exists at least one edge with some special criteria in the spanner. Existing algorithms for computing the gap-greedy spanner determine the existence of such an edge for each pair of points by examining the edges of the spanner, which takes [Formula: see text] time, however in this paper, we have presented a method by which this task can be done in [Formula: see text] time. Using the proposed method and well-separated pair decomposition, we have proposed a linear-space algorithm that can compute the gap-greedy spanner in [Formula: see text] time. How to use the well-separated pair decomposition to compute this spanner was proposed by Bakhshesh and Farshi, however using an example, we have shown that one of the algorithms they have proposed for this purpose is incorrect. We have performed various experiments to measure the duration and amount of memory used by the algorithms for computing this spanner. The results of these experiments showed that the proposed method, without a significant effect on the amount of memory consumed compared to previous algorithms, leads to a significant acceleration in the construction time of this spanner.
期刊介绍:
The International Journal of Foundations of Computer Science is a bimonthly journal that publishes articles which contribute new theoretical results in all areas of the foundations of computer science. The theoretical and mathematical aspects covered include:
- Algebraic theory of computing and formal systems
- Algorithm and system implementation issues
- Approximation, probabilistic, and randomized algorithms
- Automata and formal languages
- Automated deduction
- Combinatorics and graph theory
- Complexity theory
- Computational biology and bioinformatics
- Cryptography
- Database theory
- Data structures
- Design and analysis of algorithms
- DNA computing
- Foundations of computer security
- Foundations of high-performance computing