Skip to main content

Showing 1–50 of 105 results for author: Goodrich, M T

  1. arXiv:2403.08105  [pdf, other

    cs.DS

    Highway Preferential Attachment Models for Geographic Routing

    Authors: Ofek Gila, Evrim Ozel, Michael T. Goodrich

    Abstract: In the 1960s, the world-renowned social psychologist Stanley Milgram conducted experiments that showed that not only do there exist ``short chains'' of acquaintances between any two arbitrary people, but that these arbitrary strangers are able to find these short chains. This phenomenon, known as the \emph{small-world phenomenon}, is explained in part by any model that has a low diameter, such as… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

    Comments: v1 appeared in the 16th Annual International Conference on Combinatorial Optimization and Applications (COCOA'23) in 2023, 25 pages, 6 figures

    ACM Class: E.1

  2. arXiv:2312.10247  [pdf, other

    cs.CR cs.DS

    Secure and Accurate Summation of Many Floating-Point Numbers

    Authors: Marina Blanton, Michael T. Goodrich, Chen Yuan

    Abstract: Motivated by the importance of floating-point computations, we study the problem of securely and accurately summing many floating-point numbers. Prior work has focused on security absent accuracy or accuracy absent security, whereas our approach achieves both of them. Specifically, we show how to implement floating-point superaccumulators using secure multi-party computation techniques, so that a… ▽ More

    Submitted 15 December, 2023; originally announced December 2023.

    Comments: Corrected version of the paper published at PETS 2023

    Journal ref: Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2023, No. 3, pp. 432-445, 2023

  3. arXiv:2311.10316  [pdf, other

    cs.LG

    Graph Sparsifications using Neural Network Assisted Monte Carlo Tree Search

    Authors: Alvin Chiu, Mithun Ghosh, Reyan Ahmed, Kwang-Sung Jun, Stephen Kobourov, Michael T. Goodrich

    Abstract: Graph neural networks have been successful for machine learning, as well as for combinatorial and graph problems such as the Subgraph Isomorphism Problem and the Traveling Salesman Problem. We describe an approach for computing graph sparsifiers by combining a graph neural network and Monte Carlo Tree Search. We first train a graph neural network that takes as input a partial solution and proposes… ▽ More

    Submitted 16 November, 2023; originally announced November 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2305.00535

  4. arXiv:2307.10527  [pdf, other

    cs.CG cs.DS

    Manipulating Weights to Improve Stress-Graph Drawings of 3-Connected Planar Graphs

    Authors: Alvin Chiu, David Eppstein, Michael T. Goodrich

    Abstract: We study methods to manipulate weights in stress-graph embeddings to improve convex straight-line planar drawings of 3-connected planar graphs. Stress-graph embeddings are weighted versions of Tutte embeddings, where solving a linear system places vertices at a minimum-energy configuration for a system of springs. A major drawback of the unweighted Tutte embedding is that it often results in drawi… ▽ More

    Submitted 30 August, 2023; v1 submitted 19 July, 2023; originally announced July 2023.

    Comments: Appears in the Proceedings of the 31st International Symposium on Graph Drawing and Network Visualization (GD 2023)

  5. arXiv:2307.08851  [pdf, other

    cs.DS quant-ph

    Quantum Tutte Embeddings

    Authors: Shion Fukuzawa, Michael T. Goodrich, Sandy Irani

    Abstract: Using the framework of Tutte embeddings, we begin an exploration of \emph{quantum graph drawing}, which uses quantum computers to visualize graphs. The main contributions of this paper include formulating a model for quantum graph drawing, describing how to create a graph-drawing quantum circuit from a given graph, and showing how a Tutte embedding can be calculated as a quantum state in this circ… ▽ More

    Submitted 25 July, 2023; v1 submitted 17 July, 2023; originally announced July 2023.

    Comments: 19 pages, 6 figures

  6. arXiv:2307.07660  [pdf, other

    cs.DS

    Zip-zip Trees: Making Zip Trees More Balanced, Biased, Compact, or Persistent

    Authors: Ofek Gila, Michael T. Goodrich, Robert E. Tarjan

    Abstract: We define simple variants of zip trees, called zip-zip trees, which provide several advantages over zip trees, including overcoming a bias that favors smaller keys over larger ones. We analyze zip-zip trees theoretically and empirically, showing, e.g., that the expected depth of a node in an $n$-node zip-zip tree is at most $1.3863\log n-1+o(1)$, which matches the expected depth of treaps and bina… ▽ More

    Submitted 2 May, 2024; v1 submitted 14 July, 2023; originally announced July 2023.

    Comments: v2 to appear in the journal Algorithmica, 24 pages, 9 figures

    ACM Class: E.1

  7. Modeling the Small-World Phenomenon with Road Networks

    Authors: Michael T. Goodrich, Evrim Ozel

    Abstract: Dating back to two famous experiments by the social-psychologist, Stanley Milgram, in the 1960s, the small-world phenomenon is the idea that all people are connected through a short chain of acquaintances that can be used to route messages. Many subsequent papers have attempted to model this phenomenon, with most concentrating on the "short chain" of acquaintances rather than their ability to effi… ▽ More

    Submitted 20 September, 2022; originally announced September 2022.

  8. arXiv:2208.05597  [pdf, other

    cs.CG

    Diamonds are Forever in the Blockchain: Geometric Polyhedral Point-Set Pattern Matching

    Authors: Gill Barequet, Shion Fukuzawa, Michael T. Goodrich, David M. Mount, Martha C. Osegueda, Evrim Ozel

    Abstract: Motivated by blockchain technology for supply-chain tracing of ethically sourced diamonds, we study geometric polyhedral point-set pattern matching as minimum-width polyhedral annulus problems under translations and rotations. We provide two $(1 + \varepsilon)$-approximation schemes under translations with $O(\varepsilon^{-d} n)$-time for $d$ dimensions and… ▽ More

    Submitted 10 August, 2022; originally announced August 2022.

    Comments: 8 pages, 5 figures, To appear in 34th Canadian Conference on Computational Geometry

  9. arXiv:2208.04216  [pdf, other

    cs.DS

    Exact Learning of Multitrees and Almost-Trees Using Path Queries

    Authors: Ramtin Afshar, Michael T. Goodrich

    Abstract: Given a directed graph, G=(V,E), a path query, path(u,v), returns whether there is a directed path from u to v in G, for u,v vertices in V. Given only V, exactly learning all the edges in G using path queries is often impossible, since path queries cannot detect transitive edges. In this paper, we study the query complexity of exact learning for cases when learning G is possible using path queries… ▽ More

    Submitted 8 August, 2022; originally announced August 2022.

    ACM Class: F.2.0; E.2

  10. arXiv:2104.12337  [pdf, other

    cs.DS cs.DM

    How to Catch Marathon Cheaters: New Approximation Algorithms for Tracking Paths

    Authors: Michael T. Goodrich, Siddharth Gupta, Hadi Khodabandeh, Pedro Matias

    Abstract: Given an undirected graph, $G$, and vertices, $s$ and $t$ in $G$, the tracking paths problem is that of finding the smallest subset of vertices in $G$ whose intersection with any $s$-$t$ path results in a unique sequence. This problem is known to be NP-complete and has applications to animal migration tracking and detecting marathon course-cutting, but its approximability is largely unknown. In th… ▽ More

    Submitted 26 April, 2021; originally announced April 2021.

    Comments: Full version of WADS 2021 conference proceedings paper

  11. arXiv:2007.08787  [pdf, ps, other

    cs.DS cs.DM

    Adaptive Exact Learning in a Mixed-Up World: Dealing with Periodicity, Errors and Jumbled-Index Queries in String Reconstruction

    Authors: Ramtin Afshar, Amihood Amir, Michael T. Goodrich, Pedro Matias

    Abstract: We study the query complexity of exactly reconstructing a string from adaptive queries, such as substring, subsequence, and jumbled-index queries. Such problems have applications, e.g., in computational biology. We provide a number of new and improved bounds for exact string reconstruction for settings where either the string or the queries are "mixed-up". For example, we show that a periodic (i.e… ▽ More

    Submitted 24 November, 2020; v1 submitted 17 July, 2020; originally announced July 2020.

    Comments: Full version of SPIRE 2020 conference proceedings paper

  12. Reconstructing Biological and Digital Phylogenetic Trees in Parallel

    Authors: Ramtin Afshar, Michael T. Goodrich, Pedro Matias, Martha C. Osegueda

    Abstract: In this paper, we study the parallel query complexity of reconstructing biological and digital phylogenetic trees from simple queries involving their nodes. This is motivated from computational biology, data protection, and computer security settings, which can be abstracted in terms of two parties, a responder, Alice, who must correctly answer queries of a given type regarding a degree-d tree, T,… ▽ More

    Submitted 9 September, 2020; v1 submitted 26 June, 2020; originally announced June 2020.

    ACM Class: F.2.2

    Journal ref: Leibniz International Proceedings in Informatics (LIPICS) 173 (2020) 3:1-3:24

  13. arXiv:1912.03416  [pdf, other

    cs.GR

    On the Optical Accuracy of the Salvator Mundi

    Authors: Marco, Liang, Michael T. Goodrich, Shuang Zhao

    Abstract: A debate in the scientific literature has arisen regarding whether the orb depicted in Salvator Mundi, which has been attributed by some experts to Leonardo da Vinci, was rendered in a optically faithful manner or not. Some hypothesize that it was solid crystal while others hypothesize that it was hollow, with competing explanations for its apparent lack of background distortion and its three whit… ▽ More

    Submitted 6 December, 2019; originally announced December 2019.

    Comments: 16 pages, 8 figures, technical article

  14. C-Planarity Testing of Embedded Clustered Graphs with Bounded Dual Carving-Width

    Authors: Giordano Da Lozzo, David Eppstein, Michael T. Goodrich, Siddharth Gupta

    Abstract: For a clustered graph, i.e, a graph whose vertex set is recursively partitioned into clusters, the C-Planarity Testing problem asks whether it is possible to find a planar embedding of the graph and a representation of each cluster as a region homeomorphic to a closed disk such that 1. the subgraph induced by each cluster is drawn in the interior of the corresponding disk, 2. each edge intersects… ▽ More

    Submitted 4 October, 2019; originally announced October 2019.

    Comments: Extended version of the paper "C-Planarity Testing of Embedded Clustered Graphs with Bounded Dual Carving-Width" to appear in the Proceedings of the 14th International Symposium on Parameterized and Exact Computation (IPEC 2019)

    Journal ref: Algorithmica 83 (8): 2471-2502, 2021

  15. arXiv:1908.05445  [pdf, other

    cs.DM cs.DS

    Tracking Paths in Planar Graphs

    Authors: David Eppstein, Michael T. Goodrich, James A. Liu, Pedro Matias

    Abstract: We consider the NP-complete problem of tracking paths in a graph, first introduced by Banik et. al. [3]. Given an undirected graph with a source $s$ and a destination $t$, find the smallest subset of vertices whose intersection with any $s-t$ path results in a unique sequence. In this paper, we show that this problem remains NP-complete when the graph is planar and we give a 4-approximation algori… ▽ More

    Submitted 28 September, 2019; v1 submitted 15 August, 2019; originally announced August 2019.

  16. arXiv:1907.01630  [pdf, other

    cs.DS cs.CG

    Computing k-Modal Embeddings of Planar Digraphs

    Authors: Juan Jose Besa, Giordano Da Lozzo, Michael T. Goodrich

    Abstract: Given a planar digraph $G$ and a positive even integer $k$, an embedding of $G$ in the plane is k-modal, if every vertex of $G$ is incident to at most $k$ pairs of consecutive edges with opposite orientations, i.e., the incoming and the outgoing edges at each vertex are grouped by the embedding into at most k sets of consecutive edges with the same orientation. In this paper, we study the $k$-Moda… ▽ More

    Submitted 2 July, 2019; originally announced July 2019.

    Comments: Extended version of a paper to appear in the Proceedings of the 27th Annual European Symposium on Algorithms (ESA 2019)

  17. arXiv:1808.03139  [pdf, other

    cs.CG

    Low Ply Drawings of Trees and 2-Trees

    Authors: Michael T. Goodrich, Timothy Johnson

    Abstract: Ply number is a recently developed graph drawing metric inspired by studying road networks. Informally, for each vertex v, which is associated with a point in the plane, a disk is drawn centered on v with a radius that is alpha times the length of the longest edge incident to v, for some constant alpha in (0, 0.5]. The ply number is the maximum number of disks that overlap at a single point. We sh… ▽ More

    Submitted 10 August, 2018; v1 submitted 9 August, 2018; originally announced August 2018.

  18. arXiv:1808.00561  [pdf, other

    cs.CG

    Geometric Fingerprint Recognition via Oriented Point-Set Pattern Matching

    Authors: David Eppstein, Michael T. Goodrich, Jordan Jorgensen, Manuel R. Torres

    Abstract: Motivated by the problem of fingerprint matching, we present geometric approximation algorithms for matching a pattern point set against a background point set, where the points have angular orientations in addition to their positions.

    Submitted 1 August, 2018; originally announced August 2018.

    Comments: 15 pages, 12 figures, to be presented at CCCG18

  19. arXiv:1805.03350  [pdf, other

    cs.DS

    Optimally Sorting Evolving Data

    Authors: Juan Jose Besa, William E. Devanny, David Eppstein, Michael T. Goodrich, Timothy Johnson

    Abstract: We give optimal sorting algorithms in the evolving data framework, where an algorithm's input data is changing while the algorithm is executing. In this framework, instead of producing a final output, an algorithm attempts to maintain an output close to the correct output for the current state of the data, repeatedly updating its best estimate of a correct output over time. We show that a simple r… ▽ More

    Submitted 8 May, 2018; originally announced May 2018.

  20. Stable-Matching Voronoi Diagrams: Combinatorial Complexity and Algorithms

    Authors: Gill Barequet, David Eppstein, Michael T. Goodrich, Nil Mamano

    Abstract: We study algorithms and combinatorial complexity bounds for \emph{stable-matching Voronoi diagrams}, where a set, $S$, of $n$ point sites in the plane determines a stable matching between the points in $\mathbb{R}^2$ and the sites in $S$ such that (i) the points prefer sites closer to them and sites prefer points closer to them, and (ii) each site has a quota or "appetite" indicating the area of t… ▽ More

    Submitted 10 February, 2020; v1 submitted 25 April, 2018; originally announced April 2018.

    Comments: 34 pages, 21 figures, This is a full version of an extended abstract presented in ICALP'18. To appear in JoCG. v2: upgraded version for JoCG

    ACM Class: I.3.5; F.2.2

    Journal ref: J. Computational Geometry 11 (1): 26-59, 2020

  21. arXiv:1803.05465  [pdf, other

    cs.DS cs.CG

    Subexponential-Time and FPT Algorithms for Embedded Flat Clustered Planarity

    Authors: Giordano Da Lozzo, David Eppstein, Michael T. Goodrich, Siddharth Gupta

    Abstract: The C-Planarity problem asks for a drawing of a $\textit{clustered graph}$, i.e., a graph whose vertices belong to properly nested clusters, in which each cluster is represented by a simple closed region with no edge-edge crossings, no region-region crossings, and no unnecessary edge-region crossings. We study C-Planarity for $\textit{embedded flat clustered graphs}$, graphs with a fixed combinato… ▽ More

    Submitted 14 March, 2018; originally announced March 2018.

    Comments: 14 pages, 6 figures

  22. arXiv:1803.04555  [pdf, other

    cs.DS

    Reactive Proximity Data Structures for Graphs

    Authors: David Eppstein, Michael T. Goodrich, Nil Mamano

    Abstract: We consider data structures for graphs where we maintain a subset of the nodes called sites, and allow proximity queries, such as asking for the closest site to a query node, and update operations that enable or disable nodes as sites. We refer to a data structure that can efficiently react to such updates as reactive. We present novel reactive proximity data structures for graphs of polynomial ex… ▽ More

    Submitted 6 January, 2020; v1 submitted 12 March, 2018; originally announced March 2018.

    Comments: Full version of the paper in 13th Latin American Theoretical INformatics Symposium (LATIN 2018), April 16-10, 2018, Buenos Aires, Argentina. 2nd version: improved writeup and slight improvements in the runtimes via a more detailed analysis

  23. arXiv:1709.06534  [pdf, other

    cs.CR cs.DS

    BIOS ORAM: Improved Privacy-Preserving Data Access for Parameterized Outsourced Storage

    Authors: Michael T. Goodrich

    Abstract: Algorithms for oblivious random access machine (ORAM) simulation allow a client, Alice, to obfuscate a pattern of data accesses with a server, Bob, who is maintaining Alice's outsourced data while trying to learn information about her data. We present a novel ORAM scheme that improves the asymptotic I/O overhead of previous schemes for a wide range of size parameters for client-side private memory… ▽ More

    Submitted 19 September, 2017; originally announced September 2017.

    Comments: Full version of paper appearing in WPES 2017

  24. arXiv:1708.09059  [pdf, other

    cs.DS

    Answering Spatial Multiple-Set Intersection Queries Using 2-3 Cuckoo Hash-Filters

    Authors: Michael T. Goodrich

    Abstract: We show how to answer spatial multiple-set intersection queries in O(n(log w)/w + kt) expected time, where n is the total size of the t sets involved in the query, w is the number of bits in a memory word, k is the output size, and c is any fixed constant. This improves the asymptotic performance over previous solutions and is based on an interesting data structure, known as 2-3 cuckoo hash-filter… ▽ More

    Submitted 29 August, 2017; originally announced August 2017.

    Comments: Full version of paper from 2017 ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems

  25. arXiv:1704.02303  [pdf, other

    cs.DS

    Algorithms for Stable Matching and Clustering in a Grid

    Authors: David Eppstein, Michael T. Goodrich, Nil Mamano

    Abstract: We study a discrete version of a geometric stable marriage problem originally proposed in a continuous setting by Hoffman, Holroyd, and Peres, in which points in the plane are stably matched to cluster centers, as prioritized by their distances, so that each cluster center is apportioned a set of points of equal area. We show that, for a discretization of the problem to an $n\times n$ grid of pixe… ▽ More

    Submitted 7 April, 2017; originally announced April 2017.

    Comments: 23 pages, 12 figures. To appear (without the appendices) at the 18th International Workshop on Combinatorial Image Analysis, June 19-21, 2017, Plovdiv, Bulgaria

  26. A Topological Algorithm for Determining How Road Networks Evolve Over Time

    Authors: M T Goodrich, Siddharth Gupta, Manuel R. Torres

    Abstract: We provide an efficient algorithm for determining how a road network has evolved over time, given two snapshot instances from different dates. To allow for such determinations across different databases and even against hand drawn maps, we take a strictly topological approach in this paper, so that we compare road networks based strictly on graph-theoretic properties. Given two road networks of sa… ▽ More

    Submitted 23 September, 2016; originally announced September 2016.

  27. arXiv:1609.04512  [pdf, other

    cs.DS

    Scheduling Autonomous Vehicle Platoons Through an Unregulated Intersection

    Authors: Juan José Besa Vial, William E. Devanny, David Eppstein, Michael T. Goodrich

    Abstract: We study various versions of the problem of scheduling platoons of autonomous vehicles through an unregulated intersection, where an algorithm must schedule which platoons should wait so that others can go through, so as to minimize the maximum delay for any vehicle. We provide polynomial-time algorithms for constructing such schedules for a $k$-way merge intersection, for constant $k$, and for a… ▽ More

    Submitted 15 September, 2016; originally announced September 2016.

  28. arXiv:1608.08970  [pdf, other

    cs.DS

    J-Viz: Sibling-First Recursive Graph Drawing for Visualizing Java Bytecode

    Authors: Md. Jawaherul Alam, Michael T. Goodrich, Timothy Johnson

    Abstract: We describe a graph visualization tool for visualizing Java bytecode. Our tool, which we call J-Viz, visualizes connected directed graphs according to a canonical node ordering, which we call the sibling-first recursive (SFR) numbering. The particular graphs we consider are derived from applying Shiver's k-CFA framework to Java bytecode, and our visualizer includes helpful links between the nodes… ▽ More

    Submitted 31 August, 2016; originally announced August 2016.

  29. arXiv:1608.03943  [pdf, other

    cs.DM

    Capturing Lombardi Flow in Orthogonal Drawings by Minimizing the Number of Segments

    Authors: Md. Jawaherul Alam, Michael Dillencourt, Michael T. Goodrich

    Abstract: Inspired by the artwork of Mark Lombardi, we study the problem of constructing orthogonal drawings where a small number of horizontal and vertical line segments covers all vertices. We study two problems on orthogonal drawings of planar graphs, one that minimizes the total number of line segments and another that minimizes the number of line segments that cover all the vertices. We show that the f… ▽ More

    Submitted 13 August, 2016; originally announced August 2016.

  30. arXiv:1605.09425  [pdf, other

    cs.MM cs.DS

    Models and Algorithms for Graph Watermarking

    Authors: David Eppstein, Michael T. Goodrich, Jenny Lam, Nil Mamano, Michael Mitzenmacher, Manuel Torres

    Abstract: We introduce models and algorithmic foundations for graph watermarking. Our frameworks include security definitions and proofs, as well as characterizations when graph watermarking is algorithmically feasible, in spite of the fact that the general problem is NP-complete by simple reductions from the subgraph isomorphism or graph edit distance problems. In the digital watermarking of many types of… ▽ More

    Submitted 30 May, 2016; originally announced May 2016.

  31. arXiv:1605.05436  [pdf, other

    cs.DS cs.DC

    Parallel Algorithms for Summing Floating-Point Numbers

    Authors: Michael T. Goodrich, Ahmed Eldawy

    Abstract: The problem of exactly summing n floating-point numbers is a fundamental problem that has many applications in large-scale simulations and computational geometry. Unfortunately, due to the round-off error in standard floating-point operations, this problem becomes very challenging. Moreover, all existing solutions rely on sequential algorithms which cannot scale to the huge datasets that need to b… ▽ More

    Submitted 18 May, 2016; originally announced May 2016.

    Comments: Conference version appears in SPAA 2016

  32. arXiv:1605.03643  [pdf, other

    cs.DS

    Parallel Equivalence Class Sorting: Algorithms, Lower Bounds, and Distribution-Based Analysis

    Authors: William E. Devanny, Michael T. Goodrich, Kristopher Jetviroj

    Abstract: We study parallel comparison-based algorithms for finding all equivalence classes of a set of $n$ elements, where sorting according to some total order is not possible. Such scenarios arise, for example, in applications, such as in distributed computer security, where each of $n$ agents are working to identify the private group to which they belong, with the only operation available to them being… ▽ More

    Submitted 11 May, 2016; originally announced May 2016.

  33. arXiv:1508.03931  [pdf, other

    cs.CG cs.DS

    Knuthian Drawings of Series-Parallel Flowcharts

    Authors: Michael T. Goodrich, Timothy Johnson, Manuel Torres

    Abstract: Inspired by a classic paper by Knuth, we revisit the problem of drawing flowcharts of loop-free algorithms, that is, degree-three series-parallel digraphs. Our drawing algorithms show that it is possible to produce Knuthian drawings of degree-three series-parallel digraphs with good aspect ratios and small numbers of edge bends.

    Submitted 17 August, 2015; originally announced August 2015.

    Comments: Full version

  34. arXiv:1409.5452  [pdf, other

    cs.DS

    Windows into Geometric Events: Data Structures for Time-Windowed Querying of Temporal Point Sets

    Authors: Michael J. Bannister, William E. Devanny, Michael T. Goodrich, Joseph A. Simons, Lowell Trott

    Abstract: We study geometric data structures for sets of point-based temporal events, answering time-windowed queries, i.e., given a contiguous time interval we answer common geometric queries about the point events with time stamps in this interval. The geometric queries we consider include queries based on the skyline, convex hull, and proximity relations of the point set. We provide space efficient data… ▽ More

    Submitted 18 September, 2014; originally announced September 2014.

    Comments: CCCG 2014

  35. arXiv:1409.3192  [pdf, other

    cs.DS

    Two-Phase Bicriterion Search for Finding Fast and Efficient Electric Vehicle Routes

    Authors: Michael T. Goodrich, Paweł Pszona

    Abstract: The problem of finding an electric vehicle route that optimizes both driving time and energy consumption can be modeled as a bicriterion path problem. Unfortunately, the problem of finding optimal bicriterion paths is NP-complete. This paper studies such problems restricted to two-phase paths, which correspond to a common way people drive electric vehicles, where a driver uses one driving style (s… ▽ More

    Submitted 10 September, 2014; originally announced September 2014.

    Comments: 11 pages, 5 tables, 10 figures. To appear at ACM SIGSPATIAL 2014

    ACM Class: F.2.2; G.2.2

  36. arXiv:1409.0597  [pdf, other

    cs.DS

    Data-Oblivious Graph Algorithms in Outsourced External Memory

    Authors: Michael T. Goodrich, Joseph A. Simons

    Abstract: Motivated by privacy preservation for outsourced data, data-oblivious external memory is a computational framework where a client performs computations on data stored at a semi-trusted server in a way that does not reveal her data to the server. This approach facilitates collaboration and reliability over traditional frameworks, and it provides privacy protection, even though the server has full a… ▽ More

    Submitted 1 September, 2014; originally announced September 2014.

    Comments: 20 pages

    MSC Class: 68 ACM Class: F.2.0

  37. arXiv:1408.4902  [pdf, other

    cs.CG

    Balanced Circle Packings for Planar Graphs

    Authors: Md. Jawaherul Alam, David Eppstein, Michael T. Goodrich, Stephen G. Kobourov, Sergey Pupyrev

    Abstract: We study balanced circle packings and circle-contact representations for planar graphs, where the ratio of the largest circle's diameter to the smallest circle's diameter is polynomial in the number of circles. We provide a number of positive and negative results for the existence of such balanced configurations.

    Submitted 21 August, 2014; originally announced August 2014.

  38. The Galois Complexity of Graph Drawing: Why Numerical Solutions are Ubiquitous for Force-Directed, Spectral, and Circle Packing Drawings

    Authors: Michael J. Bannister, William E. Devanny, David Eppstein, Michael T. Goodrich

    Abstract: Many well-known graph drawing techniques, including force directed drawings, spectral graph layouts, multidimensional scaling, and circle packings, have algebraic formulations. However, practical methods for producing such drawings ubiquitously use iterative numerical approximations rather than constructing and then solving algebraic expressions representing their exact solutions. To explain this… ▽ More

    Submitted 6 August, 2014; originally announced August 2014.

    Comments: Graph Drawing 2014

    Journal ref: J. Graph Algorithms & Applications 19 (2): 619-656, 2015

  39. arXiv:1404.0286  [pdf, other

    cs.DS

    Wear Minimization for Cuckoo Hashing: How Not to Throw a Lot of Eggs into One Basket

    Authors: David Eppstein, Michael T. Goodrich, Michael Mitzenmacher, Paweł Pszona

    Abstract: We study wear-leveling techniques for cuckoo hashing, showing that it is possible to achieve a memory wear bound of $\log\log n+O(1)$ after the insertion of $n$ items into a table of size $Cn$ for a suitable constant $C$ using cuckoo hashing. Moreover, we study our cuckoo hashing method empirically, showing that it significantly improves on the memory wear performance for classic cuckoo hashing an… ▽ More

    Submitted 1 April, 2014; originally announced April 2014.

    Comments: 13 pages, 1 table, 7 figures; to appear at the 13th Symposium on Experimental Algorithms (SEA 2014)

    ACM Class: B.8.2; E.2; F.2.2

  40. Zig-zag Sort: A Simple Deterministic Data-Oblivious Sorting Algorithm Running in O(n log n) Time

    Authors: Michael T. Goodrich

    Abstract: We describe and analyze Zig-zag Sort--a deterministic data-oblivious sorting algorithm running in O(n log n) time that is arguably simpler than previously known algorithms with similar properties, which are based on the AKS sorting network. Because it is data-oblivious and deterministic, Zig-zag Sort can be implemented as a simple O(n log n)-size sorting network, thereby providing a solution to an… ▽ More

    Submitted 11 March, 2014; originally announced March 2014.

    Comments: Appearing in ACM Symp. on Theory of Computing (STOC) 2014

  41. arXiv:1402.5524  [pdf, other

    cs.CR cs.DC cs.DS

    The Melbourne Shuffle: Improving Oblivious Storage in the Cloud

    Authors: Olga Ohrimenko, Michael T. Goodrich, Roberto Tamassia, Eli Upfal

    Abstract: We present a simple, efficient, and secure data-oblivious randomized shuffle algorithm. This is the first secure data-oblivious shuffle that is not based on sorting. Our method can be used to improve previous oblivious storage solutions for network-based outsourcing of data.

    Submitted 22 February, 2014; originally announced February 2014.

  42. arXiv:1308.6730  [pdf, other

    cs.DS cs.CG

    Achieving Good Angular Resolution in 3D Arc Diagrams

    Authors: Michael T. Goodrich, Paweł Pszona

    Abstract: We study a three-dimensional analogue to the well-known graph visualization approach known as arc diagrams. We provide several algorithms that achieve good angular resolution for 3D arc diagrams, even for cases when the arcs must project to a given 2D straight-line drawing of the input graph. Our methods make use of various graph coloring algorithms, including an algorithm for a new coloring probl… ▽ More

    Submitted 30 August, 2013; originally announced August 2013.

    Comments: 12 pages, 5 figures; to appear at the 21st International Symposium on Graph Drawing (GD 2013)

    ACM Class: F.2.2

  43. arXiv:1308.6711  [pdf, other

    cs.DS

    Streamed Graph Drawing and the File Maintenance Problem

    Authors: Michael T. Goodrich, Paweł Pszona

    Abstract: In streamed graph drawing, a planar graph, G, is given incrementally as a data stream and a straight-line drawing of G must be updated after each new edge is released. To preserve the mental map, changes to the drawing should be minimized after each update, and Binucci et al.show that exponential area is necessary and sufficient for a number of streamed graph drawings for trees if edges are not al… ▽ More

    Submitted 30 August, 2013; originally announced August 2013.

    Comments: 16 pages, 9 figures; to appear at the 21st International Symposium on Graph Drawing (GD 2013)

    ACM Class: F.2.2

  44. arXiv:1306.3482  [pdf, other

    cs.DS

    Set-Difference Range Queries

    Authors: David Eppstein, Michael T. Goodrich, Joseph A. Simons

    Abstract: We introduce the problem of performing set-difference range queries, where answers to queries are set-theoretic symmetric differences between sets of items in two geometric ranges. We describe a general framework for answering such queries based on a novel use of data-streaming sketches we call signed symmetric-difference sketches. We show that such sketches can be realized using invertible Bloom… ▽ More

    Submitted 14 June, 2013; originally announced June 2013.

  45. arXiv:1306.3000  [pdf, other

    cs.DS cs.CG

    Cole's Parametric Search Technique Made Practical

    Authors: Michael T. Goodrich, Paweł Pszona

    Abstract: Parametric search has been widely used in geometric algorithms. Cole's improvement provides a way of saving a logarithmic factor in the running time over what is achievable using the standard method. Unfortunately, this improvement comes at the expense of making an already complicated algorithm even more complex; hence, this technique has been mostly of theoretical interest. In this paper, we prov… ▽ More

    Submitted 12 June, 2013; originally announced June 2013.

    Comments: 12 pages, 4 figures. To appear at the 25th Canadian Conference on Computational Geometry (CCCG 2013)

    ACM Class: F.2.2

  46. arXiv:1305.0110  [pdf, other

    cs.DS

    Combinatorial Pair Testing: Distinguishing Workers from Slackers

    Authors: David Eppstein, Michael T. Goodrich, Daniel S. Hirschberg

    Abstract: We formalize a problem we call combinatorial pair testing (CPT), which has applications to the identification of uncooperative or unproductive participants in pair programming, massively distributed computing, and crowdsourcing environments. We give efficient adaptive and nonadaptive CPT algorithms and we show that our methods use an optimal number of testing rounds to within constant factors. We… ▽ More

    Submitted 1 May, 2013; originally announced May 2013.

    Comments: 12 pages. Extended version of a paper to appear at the Algorithms and Data Structures Symposium (WADS 2013)

    ACM Class: F.2.2

  47. arXiv:1209.0756  [pdf, other

    cs.DS

    Data-Oblivious Graph Drawing Model and Algorithms

    Authors: Michael T. Goodrich, Olga Ohrimenko, Roberto Tamassia

    Abstract: We study graph drawing in a cloud-computing context where data is stored externally and processed using a small local working storage. We show that a number of classic graph drawing algorithms can be efficiently implemented in such a framework where the client can maintain privacy while constructing a drawing of her graph.

    Submitted 4 September, 2012; originally announced September 2012.

  48. arXiv:1209.0748  [pdf, other

    cs.CG cs.SI physics.soc-ph

    Force-Directed Graph Drawing Using Social Gravity and Scaling

    Authors: Michael J. Bannister, David Eppstein, Michael T. Goodrich, Lowell Trott

    Abstract: Force-directed layout algorithms produce graph drawings by resolving a system of emulated physical forces. We present techniques for using social gravity as an additional force in force-directed layouts, together with a scaling technique, to produce drawings of trees and forests, as well as more complex social networks. Social gravity assigns mass to vertices in proportion to their network central… ▽ More

    Submitted 4 September, 2012; originally announced September 2012.

    Comments: GD2012

  49. arXiv:1205.1579  [pdf, other

    cs.DS cs.CR cs.DC cs.NI

    Anonymous Card Shuffling and its Applications to Parallel Mixnets

    Authors: Michael T. Goodrich, Michael Mitzenmacher

    Abstract: We study the question of how to shuffle $n$ cards when faced with an opponent who knows the initial position of all the cards {\em and} can track every card when permuted, {\em except} when one takes $K< n$ cards at a time and shuffles them in a private buffer "behind your back," which we call {\em buffer shuffling}. The problem arises naturally in the context of parallel mixnet servers as well as… ▽ More

    Submitted 28 June, 2012; v1 submitted 7 May, 2012; originally announced May 2012.

    Comments: Full version of a paper appearing in ICALP 2012

  50. arXiv:1204.5446  [pdf, other

    cs.CR

    Verifying Search Results Over Web Collections

    Authors: Michael T. Goodrich, Duy Nguyen, Olga Ohrimenko, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos, Cristina Videira Lopes

    Abstract: Searching accounts for one of the most frequently performed computations over the Internet as well as one of the most important applications of outsourced computing, producing results that critically affect users' decision-making behaviors. As such, verifying the integrity of Internet-based searches over vast amounts of web contents is essential. We provide the first solution to this general sec… ▽ More

    Submitted 17 December, 2012; v1 submitted 24 April, 2012; originally announced April 2012.