In this study, a new Hamiltonian loop construction algorithm is proposed for planar 3-regular diagrams of specific structures. Based on the original element theory and the perfect matching algorithm I proposed earlier, the algorithm... more
We propose a new nonparametric classification framework for numerical patterns, which can also be exploitable for exploratory data analysis. The key idea is approximating each class region by a family of convex geometric sets which can... more
We analyze a quasi-Monte Carlo method to solve the initial-value problem for a system of differential equations y (t) = f(t, y(t)). The function f is smooth in y and we suppose that f and D 1 y f are of bounded variation in t and that D 2... more
This chapter reviews randomization algorithms developed in the last few years to solve a wide range of geometric optimization problems. We review a number of general techniques, including randomized binary search, randomized... more
In this paper we present a truly practical and provably optimal O(n logh) time outputsensitive algorithm for the planar convex hull problem. The basic algorithm is similar to the algorithm presented in Chan, Snoeyink and Yap 2] where the... more
The traditional zero-one principle for sorting networks states that "if a network with n input lines sorts all 2 n binary sequences into nondecreasing order, then it will sort any arbitrary sequence of n numbers into nondecreasing order".... more
In this paper we focus on the problem of designing very fast parallel algorithms for the planar convex hull problem that achieve the optimal O(n log H) work-bound for input size n and output size H. Our algorithms are designed for the... more
We address a version of the set-cover problem where we do not know the sets initially (and hence referred to as covert) but we can query an element to find out which sets contain this element as well as query a set to know the elements.... more
The empty space around n disjoint line segments in the plane can be partitioned into n + 1 convex faces by extending the segments in some order. The dual graph of such a partition is the plane graph whose vertices correspond to the n+1... more
We show that the abstract Voronoi diagram of n sites in the plane can be constructed in time O(n log n) by a randomized algorithm. This yields an alternative, but simpler, O(n log n) algorithm in many previously considered cases and the... more
This paper studies the point location problem in Delaunay triangulations without preprocessing and additional storage. The proposed procedure finds the query point simply by "walking through" the triangulation, after selecting a "good... more
We present a randomized algorithm for computing the Voronoi diagram of line segments using coarse-grained parallel machines. Operating on P processors, for any input of n line segments, this algorithm performs O((n log n)/P) local... more
A set of agents arrive simultaneously to a service facility. Each agent requires the facility for a certain length of time and incurs a cost for each unit of time spent in queue. Attached to each agent is an index, which is the ratio of... more
We present a new Following Car Algorithm in Microscopic Urban Traffic Models which integrates some real-life factors that need to be considered, such as the effect of random distributions in the car speed, acceleration, entry of lane… Our... more
The AANDERAA-ROSENBERG conjecture states that every algorithm which decides whether some graph, which is represented by means' of its adjacencymatrix, has some non-trivial monotonic property, must in the worst case probe O(n 2 ) entries.... more
The longest increasing circular subsequence (LICS) of a list is considered. A Monte-Carlo algorithm to compute it is given which has worst case execution time O(n 3/2 log n) and storage requirement O(n). It is proved that the expected... more
In this paper, we introduced a statistical rule-based method to create rules for SpamAssassin to detect spams in different languages. The theoretical framework of generating and maintaining multilingual rules were also illustrated. The... more
This paper describes new algorithms for approximately solving the concurrent multicommodity flow problem with uniform capacities. These algorithms are much faster than algorithms discovered previously. Besides being an important problem... more
We consider the problem of incrementally designing a network to route demand to a single sink on an underlying metric space. We are given cables whose costs per unit length scale in a concave fashion with capacity. Under certain natural... more
All previously known algorithms for solving the multicommodity ow problem with capacities are based on linear programming. The best of these algorithms 15] uses a fast matrix multiplication algorithm and takes O(k 3:5 n 3 m :5 log(nDU))... more
Wireless sensor networks (WSNs) are emerging as an effective means for environment monitoring. This paper investigates a strategy for energy efficient monitoring in WSNs that partitions the sensors into covers, and then activates the... more
This paper presents two new randomized distributed algorithms for the generation of acyclic orientations upon anonymous distributed systems of arbitrary topology. Both algorithms, called Alg-Neighbors and Alg-Edges, make use of biased and... more
We present an approach for applying symmetry reduction techniques to probabilistic model checking, a formal verification method for the quantitative analysis of systems with stochastic characteristics. We target systems with a set of... more
We consider the problem of weighted rectilinear approximation on the plane and offer both exact algorithms and heuristics with provable performance bounds. Let S = {(p i , w i)} be a set of n points pi in the plane, with associated... more
We consider the problem of weighted rectilinear approximation on the plane and offer both exact algorithms and heuristics with provable performance bounds. Let S = {(p i , w i)} be a set of n points pi in the plane, with associated... more
Most algorithms of computational geometry are designed for the Real-RAM and non-degenerate inputs. We call such algorithms idealistic. Executing an idealistic algorithm with floating point arithmetic may fail. Controlled perturbation... more
In analogy with ε-biased sets over Z n 2 , we construct explicit ε-biased sets over nonabelian finite groups G. That is, we find sets S ⊂ G such that E x∈S ρ(x) ≤ ε for any nontrivial irreducible representation ρ. Equivalently, such sets... more
Drisko proved that 2n − 1 matchings of size n in a bipartite graph have a rainbow matching of size n. For general graphs it is conjectured that 2n matchings suffice for this purpose (and that 2n − 1 matchings suffice when n is even). The... more
Given a directed acyclic graph (DAG) Gn = (Vn, E), a function on Gn is given by f : Vn → R. Such a function is monotone if f (x) ≤ f (y) for all (x, y) ∈ E. A local monotonicity reconstructor for Gn, introduced by Saks and Seshadhri... more
We demonstrate that an algorithm proposed by Drineas et. al. in [7] to approximate the singular vectors/values of a matrix A, is not only of theoretical interest but also a fast, viable alternative to traditional algorithms. The algorithm... more
We demonstrate that an algorithm proposed by Drineas et. al. in [7] to approximate the singular vectors/values of a matrix A, is not only of theoretical interest but also a fast, viable alternative to traditional algorithms. The algorithm... more
Style and purpose. This is a rather basic set of lectures in algorithms, with an advanced focus. Cryptography and randomization are discussed as non trivial fields of algorithm application. Contents. Six lectures organized as follows:
A novel approach based on the application of an expressly tailored random search algorithm (Stochastic Gain Synthesis) to the design of a MiniUAV control system is presented in this paper. This methodology, joined to the well known... more
The area of research on probabilistic and randomized methods for analysis and design of uncertain systems is fairly recent and is focused both on algorithmic as well as theoretical developments. In this paper a framework for... more
Mini-UAVs (Unmanned Aerial Vehicles) have been the subject of a large number of successful designs aimed to research, commercial and military purposes. A mini-UAV platform can be considered as a miniaturized aircraft so that classical... more
In this paper, we show an O(n + m) time Turing reduction from the tree pattern matching problem to another problem called the subset matching problem. Subsequent works have given efficient deterministic and randomized algorithms for the... more
Given a graph G = (V, E) and two positive integers k and ∆, the ∆-closest phylogenetic k-th root problem (∆CP R k) is to find a (phylogenetic) tree T such that the degree of each internal node in T is at least three and at most ∆, the... more
This paper provides a formal framework for reasoning about randomized distributed algorithms. We generalize the notion of indistinguishability, the most useful tool in deterministic lower bounds, to apply to a probabilistic setting. We... more
This paper provides a formal framework for reasoning about randomized distributed algorithms. We generalize the notion of indistinguishability, the most useful tool in deterministic lower bounds, to apply to a probabilistic setting. We... more
Spammers continues to uses new methods and the types of email content becomes more difficult, text-based anti-spam methods are not good enough to prevent spam. Spam image making techniques are designed to bypass well-known image spam... more
Low-rank matrix approximation is extremely useful in the analysis of data that arises in scientific computing, engineering applications, and data science. However, as data sizes grow, traditional low-rank matrix approximation methods,... more
Consider a geometric network G in the plane. The dilation between any two vertices x and y in G is the ratio of the shortest path distance between x and y in G to the Euclidean distance between them. The maximum dilation over all pairs of... more
Data Fragments Allocation is an important issue in designing Distributed Database System. This problem is NP-complete, and thus requires fast heuristics and random algorithms to generate efficient solutions, so many algorithms for solving... more
Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After... more
x "I've never touched the hard stuff, only smoked grass a few times with the boys to be polite, and that's all, though ten is the age when the big guys come around teaching you all sorts to things. But happiness doesn't mean much to me, I... more
Spammers continues to uses new methods and the types of email content becomes more difficult, text-based anti-spam methods are not good enough to prevent spam. Spam image making techniques are designed to bypass well-known image spam... more
Let $C$ be a depth-3 arithmetic circuit of size at most $s$, computing a polynomial $ f \in \mathbb{F}[x_1,\ldots, x_n] $ (where $\mathbb{F}$ = $\mathbb{Q}$ or $\mathbb{C}$) and the fan-in of the product gates of $C$ is bounded by $d$. We... more
Segmenting Arabic characters is one of the challenging and tedious tasks in the character recognition process. This work proposes an approach to construct Arabic characters segmentation based on Voronoi area. The proposed approach is... more