Skip to main content

Showing 1–50 of 117 results for author: Goodrich, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.08105  [pdf, other

    cs.DS

    Highway Preferential Attachment Models for Geographic Routing

    Authors: Ofek Gila, Evrim Ozel, Michael T. Goodrich

    Abstract: In the 1960s, the world-renowned social psychologist Stanley Milgram conducted experiments that showed that not only do there exist ``short chains'' of acquaintances between any two arbitrary people, but that these arbitrary strangers are able to find these short chains. This phenomenon, known as the \emph{small-world phenomenon}, is explained in part by any model that has a low diameter, such as… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

    Comments: v1 appeared in the 16th Annual International Conference on Combinatorial Optimization and Applications (COCOA'23) in 2023, 25 pages, 6 figures

    ACM Class: E.1

  2. arXiv:2312.10247  [pdf, other

    cs.CR cs.DS

    Secure and Accurate Summation of Many Floating-Point Numbers

    Authors: Marina Blanton, Michael T. Goodrich, Chen Yuan

    Abstract: Motivated by the importance of floating-point computations, we study the problem of securely and accurately summing many floating-point numbers. Prior work has focused on security absent accuracy or accuracy absent security, whereas our approach achieves both of them. Specifically, we show how to implement floating-point superaccumulators using secure multi-party computation techniques, so that a… ▽ More

    Submitted 15 December, 2023; originally announced December 2023.

    Comments: Corrected version of the paper published at PETS 2023

    Journal ref: Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2023, No. 3, pp. 432-445, 2023

  3. arXiv:2311.10316  [pdf, other

    cs.LG

    Graph Sparsifications using Neural Network Assisted Monte Carlo Tree Search

    Authors: Alvin Chiu, Mithun Ghosh, Reyan Ahmed, Kwang-Sung Jun, Stephen Kobourov, Michael T. Goodrich

    Abstract: Graph neural networks have been successful for machine learning, as well as for combinatorial and graph problems such as the Subgraph Isomorphism Problem and the Traveling Salesman Problem. We describe an approach for computing graph sparsifiers by combining a graph neural network and Monte Carlo Tree Search. We first train a graph neural network that takes as input a partial solution and proposes… ▽ More

    Submitted 16 November, 2023; originally announced November 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2305.00535

  4. arXiv:2310.12491  [pdf, other

    cs.DB cs.CR

    Hiding Access-pattern is Not Enough! Veil: A Storage and Communication Efficient Volume-Hiding Algorithm

    Authors: Shanshan Han, Vishal Chakraborty, Michael Goodrich, Sharad Mehrotra, Shantanu Sharma

    Abstract: This paper addresses volume leakage (i.e., leakage of the number of records in the answer set) when processing keyword queries in encrypted key-value (KV) datasets. Volume leakage, coupled with prior knowledge about data distribution and/or previously executed queries, can reveal both ciphertexts and current user queries. We develop a solution to prevent volume leakage, entitled Veil, that partiti… ▽ More

    Submitted 25 February, 2024; v1 submitted 19 October, 2023; originally announced October 2023.

  5. arXiv:2307.10527  [pdf, other

    cs.CG cs.DS

    Manipulating Weights to Improve Stress-Graph Drawings of 3-Connected Planar Graphs

    Authors: Alvin Chiu, David Eppstein, Michael T. Goodrich

    Abstract: We study methods to manipulate weights in stress-graph embeddings to improve convex straight-line planar drawings of 3-connected planar graphs. Stress-graph embeddings are weighted versions of Tutte embeddings, where solving a linear system places vertices at a minimum-energy configuration for a system of springs. A major drawback of the unweighted Tutte embedding is that it often results in drawi… ▽ More

    Submitted 30 August, 2023; v1 submitted 19 July, 2023; originally announced July 2023.

    Comments: Appears in the Proceedings of the 31st International Symposium on Graph Drawing and Network Visualization (GD 2023)

  6. arXiv:2307.08851  [pdf, other

    cs.DS quant-ph

    Quantum Tutte Embeddings

    Authors: Shion Fukuzawa, Michael T. Goodrich, Sandy Irani

    Abstract: Using the framework of Tutte embeddings, we begin an exploration of \emph{quantum graph drawing}, which uses quantum computers to visualize graphs. The main contributions of this paper include formulating a model for quantum graph drawing, describing how to create a graph-drawing quantum circuit from a given graph, and showing how a Tutte embedding can be calculated as a quantum state in this circ… ▽ More

    Submitted 25 July, 2023; v1 submitted 17 July, 2023; originally announced July 2023.

    Comments: 19 pages, 6 figures

  7. arXiv:2307.07660  [pdf, other

    cs.DS

    Zip-zip Trees: Making Zip Trees More Balanced, Biased, Compact, or Persistent

    Authors: Ofek Gila, Michael T. Goodrich, Robert E. Tarjan

    Abstract: We define simple variants of zip trees, called zip-zip trees, which provide several advantages over zip trees, including overcoming a bias that favors smaller keys over larger ones. We analyze zip-zip trees theoretically and empirically, showing, e.g., that the expected depth of a node in an $n$-node zip-zip tree is at most $1.3863\log n-1+o(1)$, which matches the expected depth of treaps and bina… ▽ More

    Submitted 2 May, 2024; v1 submitted 14 July, 2023; originally announced July 2023.

    Comments: v2 to appear in the journal Algorithmica, 24 pages, 9 figures

    ACM Class: E.1

  8. arXiv:2307.06399  [pdf, other

    cs.AI

    Designing Behavior Trees from Goal-Oriented LTLf Formulas

    Authors: Aadesh Neupane, Eric G Mercer, Michael A. Goodrich

    Abstract: Temporal logic can be used to formally specify autonomous agent goals, but synthesizing planners that guarantee goal satisfaction can be computationally prohibitive. This paper shows how to turn goals specified using a subset of finite trace Linear Temporal Logic (LTL) into a behavior tree (BT) that guarantees that successful traces satisfy the LTL goal. Useful LTL formulas for achievement goals c… ▽ More

    Submitted 19 December, 2023; v1 submitted 12 July, 2023; originally announced July 2023.

    Comments: Accepted as "Most Visionary Paper" in Autonomous Robots and Multirobot Systems (ARMS) 2023 workshop affiliated with the 22nd International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2023)

  9. arXiv:2303.16351  [pdf, ps, other

    cs.NI

    EJ-FAT Joint ESnet JLab FPGA Accelerated Transport Load Balancer

    Authors: Stacey Sheldon, Yatish Kumar, Michael Goodrich, Graham Heyes

    Abstract: To increase the science rate for high data rates/volumes, Thomas Jefferson National Accelerator Facility (JLab) has partnered with Energy Sciences Network (ESnet) to define an edge to data center traffic sha** / steering transport capability featuring data event-aware network sha** and forwarding. The keystone of this ESnet JLab FPGA Accelerated Transport (EJFAT) is the joint development of a… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

    Comments: Published at INDIS workshop at Supercomm 2022

  10. Modeling the Small-World Phenomenon with Road Networks

    Authors: Michael T. Goodrich, Evrim Ozel

    Abstract: Dating back to two famous experiments by the social-psychologist, Stanley Milgram, in the 1960s, the small-world phenomenon is the idea that all people are connected through a short chain of acquaintances that can be used to route messages. Many subsequent papers have attempted to model this phenomenon, with most concentrating on the "short chain" of acquaintances rather than their ability to effi… ▽ More

    Submitted 20 September, 2022; originally announced September 2022.

  11. arXiv:2208.05597  [pdf, other

    cs.CG

    Diamonds are Forever in the Blockchain: Geometric Polyhedral Point-Set Pattern Matching

    Authors: Gill Barequet, Shion Fukuzawa, Michael T. Goodrich, David M. Mount, Martha C. Osegueda, Evrim Ozel

    Abstract: Motivated by blockchain technology for supply-chain tracing of ethically sourced diamonds, we study geometric polyhedral point-set pattern matching as minimum-width polyhedral annulus problems under translations and rotations. We provide two $(1 + \varepsilon)$-approximation schemes under translations with $O(\varepsilon^{-d} n)$-time for $d$ dimensions and… ▽ More

    Submitted 10 August, 2022; originally announced August 2022.

    Comments: 8 pages, 5 figures, To appear in 34th Canadian Conference on Computational Geometry

  12. arXiv:2208.04216  [pdf, other

    cs.DS

    Exact Learning of Multitrees and Almost-Trees Using Path Queries

    Authors: Ramtin Afshar, Michael T. Goodrich

    Abstract: Given a directed graph, G=(V,E), a path query, path(u,v), returns whether there is a directed path from u to v in G, for u,v vertices in V. Given only V, exactly learning all the edges in G using path queries is often impossible, since path queries cannot detect transitive edges. In this paper, we study the query complexity of exact learning for cases when learning G is possible using path queries… ▽ More

    Submitted 8 August, 2022; originally announced August 2022.

    ACM Class: F.2.0; E.2

  13. arXiv:2204.02437   

    cs.AI cs.RO

    AAAI SSS-22 Symposium on Closing the Assessment Loop: Communicating Proficiency and Intent in Human-Robot Teaming

    Authors: Michael Goodrich, Jacob Crandall, Aaron Steinfeld, Holly Yanco

    Abstract: The proposed symposium focuses understanding, modeling, and improving the efficacy of (a) communicating proficiency from human to robot and (b) communicating intent from a human to a robot. For example, how should a robot convey predicted ability on a new task? How should it report performance on a task that was just completed? How should a robot adapt its proficiency criteria based on human inten… ▽ More

    Submitted 5 April, 2022; originally announced April 2022.

  14. arXiv:2203.15776  [pdf, other

    cs.NE cs.MA

    Efficiently Evolving Swarm Behaviors Using Grammatical Evolution With PPA-style Behavior Trees

    Authors: Aadesh Neupane, Michael A. Goodrich

    Abstract: Evolving swarm behaviors with artificial agents is computationally expensive and challenging. Because reward structures are often sparse in swarm problems, only a few simulations among hundreds evolve successful swarm behaviors. Additionally, swarm evolutionary algorithms typically rely on ad hoc fitness structures, and novel fitness functions need to be designed for each swarm task. This paper ev… ▽ More

    Submitted 29 March, 2022; originally announced March 2022.

    Comments: To be published in ICLR Cells2Societies Workshop 2022

  15. arXiv:2104.12337  [pdf, other

    cs.DS cs.DM

    How to Catch Marathon Cheaters: New Approximation Algorithms for Tracking Paths

    Authors: Michael T. Goodrich, Siddharth Gupta, Hadi Khodabandeh, Pedro Matias

    Abstract: Given an undirected graph, $G$, and vertices, $s$ and $t$ in $G$, the tracking paths problem is that of finding the smallest subset of vertices in $G$ whose intersection with any $s$-$t$ path results in a unique sequence. This problem is known to be NP-complete and has applications to animal migration tracking and detecting marathon course-cutting, but its approximability is largely unknown. In th… ▽ More

    Submitted 26 April, 2021; originally announced April 2021.

    Comments: Full version of WADS 2021 conference proceedings paper

  16. arXiv:2007.08787  [pdf, ps, other

    cs.DS cs.DM

    Adaptive Exact Learning in a Mixed-Up World: Dealing with Periodicity, Errors and Jumbled-Index Queries in String Reconstruction

    Authors: Ramtin Afshar, Amihood Amir, Michael T. Goodrich, Pedro Matias

    Abstract: We study the query complexity of exactly reconstructing a string from adaptive queries, such as substring, subsequence, and jumbled-index queries. Such problems have applications, e.g., in computational biology. We provide a number of new and improved bounds for exact string reconstruction for settings where either the string or the queries are "mixed-up". For example, we show that a periodic (i.e… ▽ More

    Submitted 24 November, 2020; v1 submitted 17 July, 2020; originally announced July 2020.

    Comments: Full version of SPIRE 2020 conference proceedings paper

  17. Reconstructing Biological and Digital Phylogenetic Trees in Parallel

    Authors: Ramtin Afshar, Michael T. Goodrich, Pedro Matias, Martha C. Osegueda

    Abstract: In this paper, we study the parallel query complexity of reconstructing biological and digital phylogenetic trees from simple queries involving their nodes. This is motivated from computational biology, data protection, and computer security settings, which can be abstracted in terms of two parties, a responder, Alice, who must correctly answer queries of a given type regarding a degree-d tree, T,… ▽ More

    Submitted 9 September, 2020; v1 submitted 26 June, 2020; originally announced June 2020.

    ACM Class: F.2.2

    Journal ref: Leibniz International Proceedings in Informatics (LIPICS) 173 (2020) 3:1-3:24

  18. arXiv:2005.01527   

    cs.RO cs.HC

    Proceedings of the 2020 Workshop on Assessing, Explaining, and Conveying Robot Proficiency for Human-Robot Teaming

    Authors: Aaron Steinfeld, Michael Goodrich

    Abstract: This record contains the proceedings of the 2020 Workshop on Assessing, Explaining, and Conveying Robot Proficiency for Human-Robot Teaming, which was held in conjunction with the 2020 ACM/IEEE International Conference on Human-Robot Interaction (HRI). This workshop was originally scheduled to occur in Cambridge, UK on March 23, but was moved to a set of online talks due to the COVID-19 pandemic.

    Submitted 12 May, 2020; v1 submitted 4 May, 2020; originally announced May 2020.

  19. arXiv:2004.12480  [pdf, other

    cs.AI cs.GT cs.HC cs.MA

    Predicting Plans and Actions in Two-Player Repeated Games

    Authors: Najma Mathema, Michael A. Goodrich, Jacob W. Crandall

    Abstract: Artificial intelligence (AI) agents will need to interact with both other AI agents and humans. Creating models of associates help to predict the modeled agents' actions, plans, and intentions. This work introduces algorithms that predict actions, plans and intentions in repeated play games, with providing an exploration of algorithms. We form a generative Bayesian approach to model S#. S# is desi… ▽ More

    Submitted 26 April, 2020; originally announced April 2020.

    Comments: Accepted in The AAAI 2020 Workshop on Plan, Activity, and Intent Recognition

  20. arXiv:1912.03416  [pdf, other

    cs.GR

    On the Optical Accuracy of the Salvator Mundi

    Authors: Marco, Liang, Michael T. Goodrich, Shuang Zhao

    Abstract: A debate in the scientific literature has arisen regarding whether the orb depicted in Salvator Mundi, which has been attributed by some experts to Leonardo da Vinci, was rendered in a optically faithful manner or not. Some hypothesize that it was solid crystal while others hypothesize that it was hollow, with competing explanations for its apparent lack of background distortion and its three whit… ▽ More

    Submitted 6 December, 2019; originally announced December 2019.

    Comments: 16 pages, 8 figures, technical article

  21. C-Planarity Testing of Embedded Clustered Graphs with Bounded Dual Carving-Width

    Authors: Giordano Da Lozzo, David Eppstein, Michael T. Goodrich, Siddharth Gupta

    Abstract: For a clustered graph, i.e, a graph whose vertex set is recursively partitioned into clusters, the C-Planarity Testing problem asks whether it is possible to find a planar embedding of the graph and a representation of each cluster as a region homeomorphic to a closed disk such that 1. the subgraph induced by each cluster is drawn in the interior of the corresponding disk, 2. each edge intersects… ▽ More

    Submitted 4 October, 2019; originally announced October 2019.

    Comments: Extended version of the paper "C-Planarity Testing of Embedded Clustered Graphs with Bounded Dual Carving-Width" to appear in the Proceedings of the 14th International Symposium on Parameterized and Exact Computation (IPEC 2019)

    Journal ref: Algorithmica 83 (8): 2471-2502, 2021

  22. arXiv:1908.05445  [pdf, other

    cs.DM cs.DS

    Tracking Paths in Planar Graphs

    Authors: David Eppstein, Michael T. Goodrich, James A. Liu, Pedro Matias

    Abstract: We consider the NP-complete problem of tracking paths in a graph, first introduced by Banik et. al. [3]. Given an undirected graph with a source $s$ and a destination $t$, find the smallest subset of vertices whose intersection with any $s-t$ path results in a unique sequence. In this paper, we show that this problem remains NP-complete when the graph is planar and we give a 4-approximation algori… ▽ More

    Submitted 28 September, 2019; v1 submitted 15 August, 2019; originally announced August 2019.

  23. arXiv:1907.01630  [pdf, other

    cs.DS cs.CG

    Computing k-Modal Embeddings of Planar Digraphs

    Authors: Juan Jose Besa, Giordano Da Lozzo, Michael T. Goodrich

    Abstract: Given a planar digraph $G$ and a positive even integer $k$, an embedding of $G$ in the plane is k-modal, if every vertex of $G$ is incident to at most $k$ pairs of consecutive edges with opposite orientations, i.e., the incoming and the outgoing edges at each vertex are grouped by the embedding into at most k sets of consecutive edges with the same orientation. In this paper, we study the $k$-Moda… ▽ More

    Submitted 2 July, 2019; originally announced July 2019.

    Comments: Extended version of a paper to appear in the Proceedings of the 27th Annual European Symposium on Algorithms (ESA 2019)

  24. arXiv:1902.06875  [pdf, other

    cs.CG

    Euclidean TSP, Motorcycle Graphs, and Other New Applications of Nearest-Neighbor Chains

    Authors: Nil Mamano, Alon Efrat, David Eppstein, Daniel Frishberg, Michael Goodrich, Stephen Kobourov, Pedro Matias, Valentin Polishchuk

    Abstract: We show new applications of the nearest-neighbor chain algorithm, a technique that originated in agglomerative hierarchical clustering. We apply it to a diverse class of geometric problems: we construct the greedy multi-fragment tour for Euclidean TSP in $O(n\log n)$ time in any fixed dimension and for Steiner TSP in planar graphs in $O(n\sqrt{n}\log n)$ time; we compute motorcycle graphs (which a… ▽ More

    Submitted 2 December, 2019; v1 submitted 18 February, 2019; originally announced February 2019.

    Comments: 35 pages, 10 figures; v2: minor improvements, added Figure 1, and author order as in paper. v3: added funding acknowledgement

    MSC Class: I.3.5 ACM Class: I.3.5

  25. arXiv:1808.03139  [pdf, other

    cs.CG

    Low Ply Drawings of Trees and 2-Trees

    Authors: Michael T. Goodrich, Timothy Johnson

    Abstract: Ply number is a recently developed graph drawing metric inspired by studying road networks. Informally, for each vertex v, which is associated with a point in the plane, a disk is drawn centered on v with a radius that is alpha times the length of the longest edge incident to v, for some constant alpha in (0, 0.5]. The ply number is the maximum number of disks that overlap at a single point. We sh… ▽ More

    Submitted 10 August, 2018; v1 submitted 9 August, 2018; originally announced August 2018.

  26. arXiv:1808.00561  [pdf, other

    cs.CG

    Geometric Fingerprint Recognition via Oriented Point-Set Pattern Matching

    Authors: David Eppstein, Michael T. Goodrich, Jordan Jorgensen, Manuel R. Torres

    Abstract: Motivated by the problem of fingerprint matching, we present geometric approximation algorithms for matching a pattern point set against a background point set, where the points have angular orientations in addition to their positions.

    Submitted 1 August, 2018; originally announced August 2018.

    Comments: 15 pages, 12 figures, to be presented at CCCG18

  27. arXiv:1805.05443  [pdf, other

    cs.DS

    Quadratic Time Algorithms Appear to be Optimal for Sorting Evolving Data

    Authors: Juan Jose Besa, William E. Devanny, David Eppstein, Michael Goodrich, Timothy Johnson

    Abstract: We empirically study sorting in the evolving data model. In this model, a sorting algorithm maintains an approximation to the sorted order of a list of data items while simultaneously, with each comparison made by the algorithm, an adversary randomly swaps the order of adjacent items in the true sorted order. Previous work studies only two versions of quicksort, and has a gap between the lower bou… ▽ More

    Submitted 14 May, 2018; originally announced May 2018.

    Journal ref: 2018 Proceedings of the Twentieth Workshop on Algorithm Engineering and Experiments (ALENEX) 87-96

  28. arXiv:1805.03350  [pdf, other

    cs.DS

    Optimally Sorting Evolving Data

    Authors: Juan Jose Besa, William E. Devanny, David Eppstein, Michael T. Goodrich, Timothy Johnson

    Abstract: We give optimal sorting algorithms in the evolving data framework, where an algorithm's input data is changing while the algorithm is executing. In this framework, instead of producing a final output, an algorithm attempts to maintain an output close to the correct output for the current state of the data, repeatedly updating its best estimate of a correct output over time. We show that a simple r… ▽ More

    Submitted 8 May, 2018; originally announced May 2018.

  29. Stable-Matching Voronoi Diagrams: Combinatorial Complexity and Algorithms

    Authors: Gill Barequet, David Eppstein, Michael T. Goodrich, Nil Mamano

    Abstract: We study algorithms and combinatorial complexity bounds for \emph{stable-matching Voronoi diagrams}, where a set, $S$, of $n$ point sites in the plane determines a stable matching between the points in $\mathbb{R}^2$ and the sites in $S$ such that (i) the points prefer sites closer to them and sites prefer points closer to them, and (ii) each site has a quota or "appetite" indicating the area of t… ▽ More

    Submitted 10 February, 2020; v1 submitted 25 April, 2018; originally announced April 2018.

    Comments: 34 pages, 21 figures, This is a full version of an extended abstract presented in ICALP'18. To appear in JoCG. v2: upgraded version for JoCG

    ACM Class: I.3.5; F.2.2

    Journal ref: J. Computational Geometry 11 (1): 26-59, 2020

  30. arXiv:1803.05465  [pdf, other

    cs.DS cs.CG

    Subexponential-Time and FPT Algorithms for Embedded Flat Clustered Planarity

    Authors: Giordano Da Lozzo, David Eppstein, Michael T. Goodrich, Siddharth Gupta

    Abstract: The C-Planarity problem asks for a drawing of a $\textit{clustered graph}$, i.e., a graph whose vertices belong to properly nested clusters, in which each cluster is represented by a simple closed region with no edge-edge crossings, no region-region crossings, and no unnecessary edge-region crossings. We study C-Planarity for $\textit{embedded flat clustered graphs}$, graphs with a fixed combinato… ▽ More

    Submitted 14 March, 2018; originally announced March 2018.

    Comments: 14 pages, 6 figures

  31. arXiv:1803.04555  [pdf, other

    cs.DS

    Reactive Proximity Data Structures for Graphs

    Authors: David Eppstein, Michael T. Goodrich, Nil Mamano

    Abstract: We consider data structures for graphs where we maintain a subset of the nodes called sites, and allow proximity queries, such as asking for the closest site to a query node, and update operations that enable or disable nodes as sites. We refer to a data structure that can efficiently react to such updates as reactive. We present novel reactive proximity data structures for graphs of polynomial ex… ▽ More

    Submitted 6 January, 2020; v1 submitted 12 March, 2018; originally announced March 2018.

    Comments: Full version of the paper in 13th Latin American Theoretical INformatics Symposium (LATIN 2018), April 16-10, 2018, Buenos Aires, Argentina. 2nd version: improved writeup and slight improvements in the runtimes via a more detailed analysis

  32. arXiv:1709.06534  [pdf, other

    cs.CR cs.DS

    BIOS ORAM: Improved Privacy-Preserving Data Access for Parameterized Outsourced Storage

    Authors: Michael T. Goodrich

    Abstract: Algorithms for oblivious random access machine (ORAM) simulation allow a client, Alice, to obfuscate a pattern of data accesses with a server, Bob, who is maintaining Alice's outsourced data while trying to learn information about her data. We present a novel ORAM scheme that improves the asymptotic I/O overhead of previous schemes for a wide range of size parameters for client-side private memory… ▽ More

    Submitted 19 September, 2017; originally announced September 2017.

    Comments: Full version of paper appearing in WPES 2017

  33. arXiv:1708.09059  [pdf, other

    cs.DS

    Answering Spatial Multiple-Set Intersection Queries Using 2-3 Cuckoo Hash-Filters

    Authors: Michael T. Goodrich

    Abstract: We show how to answer spatial multiple-set intersection queries in O(n(log w)/w + kt) expected time, where n is the total size of the t sets involved in the query, w is the number of bits in a memory word, k is the output size, and c is any fixed constant. This improves the asymptotic performance over previous solutions and is based on an interesting data structure, known as 2-3 cuckoo hash-filter… ▽ More

    Submitted 29 August, 2017; originally announced August 2017.

    Comments: Full version of paper from 2017 ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems

  34. arXiv:1706.09593  [pdf, other

    cs.DS

    Defining Equitable Geographic Districts in Road Networks via Stable Matching

    Authors: David Eppstein, Michael Goodrich, Doruk Korkmaz, Nil Mamano

    Abstract: We introduce a novel method for defining geographic districts in road networks using stable matching. In this approach, each geographic district is defined in terms of a center, which identifies a location of interest, such as a post office or polling place, and all other network vertices must be labeled with the center to which they are associated. We focus on defining geographic districts that a… ▽ More

    Submitted 20 September, 2017; v1 submitted 29 June, 2017; originally announced June 2017.

    Comments: 9 pages, 4 figures, to appear in 25th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL 2017) November 7-10, 2017, Redondo Beach, California, USA

  35. arXiv:1704.02303  [pdf, other

    cs.DS

    Algorithms for Stable Matching and Clustering in a Grid

    Authors: David Eppstein, Michael T. Goodrich, Nil Mamano

    Abstract: We study a discrete version of a geometric stable marriage problem originally proposed in a continuous setting by Hoffman, Holroyd, and Peres, in which points in the plane are stably matched to cluster centers, as prioritized by their distances, so that each cluster center is apportioned a set of points of equal area. We show that, for a discretization of the problem to an $n\times n$ grid of pixe… ▽ More

    Submitted 7 April, 2017; originally announced April 2017.

    Comments: 23 pages, 12 figures. To appear (without the appendices) at the 18th International Workshop on Combinatorial Image Analysis, June 19-21, 2017, Plovdiv, Bulgaria

  36. Cooperating with Machines

    Authors: Jacob W. Crandall, Mayada Oudah, Tennom, Fatimah Ishowo-Oloko, Sherief Abdallah, Jean-François Bonnefon, Manuel Cebrian, Azim Shariff, Michael A. Goodrich, Iyad Rahwan

    Abstract: Since Alan Turing envisioned Artificial Intelligence (AI) [1], a major driving force behind technical progress has been competition with human cognition. Historical milestones have been frequently associated with computers matching or outperforming humans in difficult cognitive tasks (e.g. face recognition [2], personality classification [3], driving cars [4], or playing video games [5]), or defea… ▽ More

    Submitted 21 February, 2018; v1 submitted 17 March, 2017; originally announced March 2017.

    Comments: An updated version of this paper was published in Nature Communications

    Journal ref: Nature Communications, Vol. 9, Article No. 233, 2018

  37. arXiv:1702.03379  [pdf, other

    cs.CR

    Secure Fingerprint Alignment and Matching Protocols

    Authors: Fattaneh Bayatbabolghani, Marina Blanton, Mehrdad Aliasgari, Michael Goodrich

    Abstract: We present three private fingerprint alignment and matching protocols, based on what are considered to be the most precise and efficient fingerprint recognition algorithms, which use minutia points. Our protocols allow two or more honest-but-curious parties to compare their respective privately-held fingerprints in a secure way such that they each learn nothing more than an accurate score of how w… ▽ More

    Submitted 16 December, 2017; v1 submitted 10 February, 2017; originally announced February 2017.

  38. A Topological Algorithm for Determining How Road Networks Evolve Over Time

    Authors: M T Goodrich, Siddharth Gupta, Manuel R. Torres

    Abstract: We provide an efficient algorithm for determining how a road network has evolved over time, given two snapshot instances from different dates. To allow for such determinations across different databases and even against hand drawn maps, we take a strictly topological approach in this paper, so that we compare road networks based strictly on graph-theoretic properties. Given two road networks of sa… ▽ More

    Submitted 23 September, 2016; originally announced September 2016.

  39. arXiv:1609.04512  [pdf, other

    cs.DS

    Scheduling Autonomous Vehicle Platoons Through an Unregulated Intersection

    Authors: Juan José Besa Vial, William E. Devanny, David Eppstein, Michael T. Goodrich

    Abstract: We study various versions of the problem of scheduling platoons of autonomous vehicles through an unregulated intersection, where an algorithm must schedule which platoons should wait so that others can go through, so as to minimize the maximum delay for any vehicle. We provide polynomial-time algorithms for constructing such schedules for a $k$-way merge intersection, for constant $k$, and for a… ▽ More

    Submitted 15 September, 2016; originally announced September 2016.

  40. arXiv:1608.08970  [pdf, other

    cs.DS

    J-Viz: Sibling-First Recursive Graph Drawing for Visualizing Java Bytecode

    Authors: Md. Jawaherul Alam, Michael T. Goodrich, Timothy Johnson

    Abstract: We describe a graph visualization tool for visualizing Java bytecode. Our tool, which we call J-Viz, visualizes connected directed graphs according to a canonical node ordering, which we call the sibling-first recursive (SFR) numbering. The particular graphs we consider are derived from applying Shiver's k-CFA framework to Java bytecode, and our visualizer includes helpful links between the nodes… ▽ More

    Submitted 31 August, 2016; originally announced August 2016.

  41. arXiv:1608.03943  [pdf, other

    cs.DM

    Capturing Lombardi Flow in Orthogonal Drawings by Minimizing the Number of Segments

    Authors: Md. Jawaherul Alam, Michael Dillencourt, Michael T. Goodrich

    Abstract: Inspired by the artwork of Mark Lombardi, we study the problem of constructing orthogonal drawings where a small number of horizontal and vertical line segments covers all vertices. We study two problems on orthogonal drawings of planar graphs, one that minimizes the total number of line segments and another that minimizes the number of line segments that cover all the vertices. We show that the f… ▽ More

    Submitted 13 August, 2016; originally announced August 2016.

  42. arXiv:1605.09425  [pdf, other

    cs.MM cs.DS

    Models and Algorithms for Graph Watermarking

    Authors: David Eppstein, Michael T. Goodrich, Jenny Lam, Nil Mamano, Michael Mitzenmacher, Manuel Torres

    Abstract: We introduce models and algorithmic foundations for graph watermarking. Our frameworks include security definitions and proofs, as well as characterizations when graph watermarking is algorithmically feasible, in spite of the fact that the general problem is NP-complete by simple reductions from the subgraph isomorphism or graph edit distance problems. In the digital watermarking of many types of… ▽ More

    Submitted 30 May, 2016; originally announced May 2016.

  43. arXiv:1605.05436  [pdf, other

    cs.DS cs.DC

    Parallel Algorithms for Summing Floating-Point Numbers

    Authors: Michael T. Goodrich, Ahmed Eldawy

    Abstract: The problem of exactly summing n floating-point numbers is a fundamental problem that has many applications in large-scale simulations and computational geometry. Unfortunately, due to the round-off error in standard floating-point operations, this problem becomes very challenging. Moreover, all existing solutions rely on sequential algorithms which cannot scale to the huge datasets that need to b… ▽ More

    Submitted 18 May, 2016; originally announced May 2016.

    Comments: Conference version appears in SPAA 2016

  44. arXiv:1605.03643  [pdf, other

    cs.DS

    Parallel Equivalence Class Sorting: Algorithms, Lower Bounds, and Distribution-Based Analysis

    Authors: William E. Devanny, Michael T. Goodrich, Kristopher Jetviroj

    Abstract: We study parallel comparison-based algorithms for finding all equivalence classes of a set of $n$ elements, where sorting according to some total order is not possible. Such scenarios arise, for example, in applications, such as in distributed computer security, where each of $n$ agents are working to identify the private group to which they belong, with the only operation available to them being… ▽ More

    Submitted 11 May, 2016; originally announced May 2016.

  45. arXiv:1508.03931  [pdf, other

    cs.CG cs.DS

    Knuthian Drawings of Series-Parallel Flowcharts

    Authors: Michael T. Goodrich, Timothy Johnson, Manuel Torres

    Abstract: Inspired by a classic paper by Knuth, we revisit the problem of drawing flowcharts of loop-free algorithms, that is, degree-three series-parallel digraphs. Our drawing algorithms show that it is possible to produce Knuthian drawings of degree-three series-parallel digraphs with good aspect ratios and small numbers of edge bends.

    Submitted 17 August, 2015; originally announced August 2015.

    Comments: Full version

  46. arXiv:1409.5452  [pdf, other

    cs.DS

    Windows into Geometric Events: Data Structures for Time-Windowed Querying of Temporal Point Sets

    Authors: Michael J. Bannister, William E. Devanny, Michael T. Goodrich, Joseph A. Simons, Lowell Trott

    Abstract: We study geometric data structures for sets of point-based temporal events, answering time-windowed queries, i.e., given a contiguous time interval we answer common geometric queries about the point events with time stamps in this interval. The geometric queries we consider include queries based on the skyline, convex hull, and proximity relations of the point set. We provide space efficient data… ▽ More

    Submitted 18 September, 2014; originally announced September 2014.

    Comments: CCCG 2014

  47. arXiv:1409.3192  [pdf, other

    cs.DS

    Two-Phase Bicriterion Search for Finding Fast and Efficient Electric Vehicle Routes

    Authors: Michael T. Goodrich, Paweł Pszona

    Abstract: The problem of finding an electric vehicle route that optimizes both driving time and energy consumption can be modeled as a bicriterion path problem. Unfortunately, the problem of finding optimal bicriterion paths is NP-complete. This paper studies such problems restricted to two-phase paths, which correspond to a common way people drive electric vehicles, where a driver uses one driving style (s… ▽ More

    Submitted 10 September, 2014; originally announced September 2014.

    Comments: 11 pages, 5 tables, 10 figures. To appear at ACM SIGSPATIAL 2014

    ACM Class: F.2.2; G.2.2

  48. arXiv:1409.0597  [pdf, other

    cs.DS

    Data-Oblivious Graph Algorithms in Outsourced External Memory

    Authors: Michael T. Goodrich, Joseph A. Simons

    Abstract: Motivated by privacy preservation for outsourced data, data-oblivious external memory is a computational framework where a client performs computations on data stored at a semi-trusted server in a way that does not reveal her data to the server. This approach facilitates collaboration and reliability over traditional frameworks, and it provides privacy protection, even though the server has full a… ▽ More

    Submitted 1 September, 2014; originally announced September 2014.

    Comments: 20 pages

    MSC Class: 68 ACM Class: F.2.0

  49. arXiv:1408.4902  [pdf, other

    cs.CG

    Balanced Circle Packings for Planar Graphs

    Authors: Md. Jawaherul Alam, David Eppstein, Michael T. Goodrich, Stephen G. Kobourov, Sergey Pupyrev

    Abstract: We study balanced circle packings and circle-contact representations for planar graphs, where the ratio of the largest circle's diameter to the smallest circle's diameter is polynomial in the number of circles. We provide a number of positive and negative results for the existence of such balanced configurations.

    Submitted 21 August, 2014; originally announced August 2014.

  50. The Galois Complexity of Graph Drawing: Why Numerical Solutions are Ubiquitous for Force-Directed, Spectral, and Circle Packing Drawings

    Authors: Michael J. Bannister, William E. Devanny, David Eppstein, Michael T. Goodrich

    Abstract: Many well-known graph drawing techniques, including force directed drawings, spectral graph layouts, multidimensional scaling, and circle packings, have algebraic formulations. However, practical methods for producing such drawings ubiquitously use iterative numerical approximations rather than constructing and then solving algebraic expressions representing their exact solutions. To explain this… ▽ More

    Submitted 6 August, 2014; originally announced August 2014.

    Comments: Graph Drawing 2014

    Journal ref: J. Graph Algorithms & Applications 19 (2): 619-656, 2015