Konstantinos Georgiou’s research while affiliated with University of Toronto and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (108)


TCS Special Issue on Selected Papers from AlgoWin 2023
  • Article

March 2025

Theoretical Computer Science

Konstantinos Georgiou

·

Evangelos Kranakis

Makespan Trade-offs for Visiting Triangle Edges
  • Article
  • Full-text available

February 2025

·

4 Reads

·

1 Citation

Discrete Mathematics & Theoretical Computer Science

We study a primitive vehicle routing-type problem in which a fleet of nunit speed robots start from a point within a non-obtuse triangle Δ\Delta, where n{1,2,3}n \in \{1,2,3\}. The goal is to design robots' trajectories so as to visit all edges of the triangle with the smallest visitation time makespan. We begin our study by introducing a framework for subdividing Δ\Deltainto regions with respect to the type of optimal trajectory that each point P admits, pertaining to the order that edges are visited and to how the cost of the minimum makespan Rn(P)R_n(P) is determined, for n{1,2,3}n\in \{1,2,3\}. These subdivisions are the starting points for our main result, which is to study makespan trade-offs with respect to the size of the fleet. In particular, we define Rn,m(Δ)=maxPΔRn(P)/Rm(P) R_{n,m} (\Delta)= \max_{P \in \Delta} R_n(P)/R_m(P), and we prove that, over all non-obtuse triangles Δ\Delta: (i) R1,3(Δ)R_{1,3}(\Delta) ranges from 10\sqrt{10} to 4, (ii) R2,3(Δ)R_{2,3}(\Delta) ranges from 2\sqrt{2} to 2, and (iii) R1,2(Δ)R_{1,2}(\Delta) ranges from 5/2 to 3. In every case, we pinpoint the starting points within every triangle Δ\Delta that maximize Rn,m(Δ)R_{n,m} (\Delta), as well as we identify the triangles that determine all infΔRn,m(Δ)\inf_\Delta R_{n,m}(\Delta) and supΔRn,m(Δ)\sup_\Delta R_{n,m}(\Delta) over the set of non-obtuse triangles. Comment: 47 pages, 27 figures

Download


Figure 8: Supporting figures for Lemma 3.1.1.
Figure 9: The inspection time of points P ϕ , where ϕ P r0, θs, in the initial movement O Ñ A 0 of the trajectory ExtendedPolySegment.
Multi-Agent Disk Inspection

November 2024

·

10 Reads

We consider n unit-speed mobile agents initially positioned at the center of a unit disk, tasked with inspecting all points on the disk's perimeter. A perimeter point is considered covered if an agent positioned outside the disk's interior has unobstructed visibility of it, treating the disk itself as an obstacle. For n=1, this problem is referred to as the shoreline problem with a known distance. Isbell in 1957 derived an optimal trajectory that minimizes the worst-case inspection time for that problem. The one-agent version of the problem was originally proposed as a more tractable variant of Bellman's famous lost-in-the-forest problem. Our contributions are threefold. First, and as a warm-up, we extend Isbell's findings by deriving worst-case optimal trajectories addressing the partial inspection of a section of the disk, hence deriving an alternative proof of optimality for inspecting the disk with n2n \geq 2 agents. Second, we analyze the average-case inspection time, assuming a uniform distribution of perimeter points (equivalent to randomized inspection algorithms). Using spatial discretization and Nonlinear Programming (NLP), we propose feasible solutions to the continuous problem and evaluate their effectiveness compared to NLP solutions. Third, we establish Pareto-optimal bounds for the multi-objective problem of jointly minimizing the worst-case and average-case inspection times.



Weighted Group Search on the Disk & Improved Lower Bounds for Priority Evacuation

June 2024

·

10 Reads

We consider \emph{weighted group search on a disk}, which is a search-type problem involving 2 mobile agents with unit-speed. The two agents start collocated and their goal is to reach a (hidden) target at an unknown location and a known distance of exactly 1 (i.e., the search domain is the unit disk). The agents operate in the so-called \emph{wireless} model that allows them instantaneous knowledge of each others findings. The termination cost of agents' trajectories is the worst-case \emph{arithmetic weighted average}, which we quantify by parameter w, of the times it takes each agent to reach the target, hence the name of the problem. Our work follows a long line of research in search and evacuation, but quite importantly it is a variation and extension of two well-studied problems, respectively. The known variant is the one in which the search domain is the line, and for which an optimal solution is known. Our problem is also the extension of the so-called \emph{priority evacuation}, which we obtain by setting the weight parameter w to 0. For the latter problem the best upper/lower bound gap known is significant. Our contributions for weighted group search on a disk are threefold. \textit{First}, we derive upper bounds for the entire spectrum of weighted averages w. Our algorithms are obtained as a adaptations of known techniques, however the analysis is much more technical. \textit{Second}, our main contribution is the derivation of lower bounds for all weighted averages. This follows from a \emph{novel framework} for proving lower bounds for combinatorial search problems based on linear programming and inspired by metric embedding relaxations. \textit{Third}, we apply our framework to the priority evacuation problem, improving the previously best lower bound known from 4.38962 to 4.56798, thus reducing the upper/lower bound gap from 0.42892 to 0.25056.


Lower bounds for P E n 1 , i.e., n-gon priority evacuation with 1 Servant. Values of n labeled with ‹ indicate known evaluations reported previously in [50].
Lower bounds for P E n 3 , i.e., n-gon priority evacuation with 3 Servants. All results are novel.
Multi-Agent Search-Type Problems on Polygons

June 2024

·

17 Reads

We present several advancements in search-type problems for fleets of mobile agents operating in two dimensions under the wireless model. Potential hidden target locations are equidistant from a central point, forming either a disk (infinite possible locations) or regular polygons (finite possible locations). Building on the foundational disk evacuation problem, the disk priority evacuation problem with k Servants, and the disk w-weighted search problem, we make improvements on several fronts. First we establish new upper and lower bounds for the n-gon priority evacuation problem with 1 Servant for n13n \leq 13, and for nkn_k-gons with k=2,3,4k=2, 3, 4 Servants, where n211n_2 \leq 11, n39n_3 \leq 9, and n410n_4 \leq 10, offering tight or nearly tight bounds. The only previous results known were a tight upper bound for k=1 and n=6 and lower bounds for k=1 and n9n \leq 9. Second, our work improves the best lower bound known for the disk priority evacuation problem with k=1 Servant from 4.46798 to 4.64666 and for k=2 Servants from 3.6307 to 3.65332. Third, we improve the best lower bounds known for the disk w-weighted group search problem, significantly reducing the gap between the best upper and lower bounds for w values where the gap was largest. These improvements are based on nearly tight upper and lower bounds for the 11-gon and 12-gon w-weighted evacuation problems, while previous analyses were limited only to lower bounds and only to 7-gons.



Figure 3: The non-wireless algorithm for two robots with performance π − α/2 + 3 sin (α/2).
Figure 3 i. Robot R 2 that finds the treasure will evacuate in time no more than x + 2 sin (α/2) + 2 sin (α) ≤ α/2 + 2 sin (α/2) + 2 sin (α) < π − α/2 + 3 sin (α/2) for all α ∈ [0, π]. (I = E, B = T,C = null): If R 2 is the first to find the treasure, then this case is depicted in Figure 3 i. This happens exactly when x + 2 sin (α/2) ≤ 2π − x − α, so that the total evacuation time is x + 4 sin (α/2) ≤ π − α/2 + 3 sin (α/2) for all α ∈ [0, π]. Otherwise x > π − α/2 − sin (α/2), and R 1 is the robot that reaches the treasure first. If R 1 decides to run A 1 , then the cost would be 2π − x − α + 2 sin (α/2) < π − α/2 + 3 sin (α/2) for all α ∈ [0, π]. Finally, if R 1 decides to run A 2 or A 3 ,
Search-and-Fetch with 2 Robots on a Disk: Wireless and Face-to-Face Communication Models

October 2023

·

42 Reads

p> We initiate the study of a problem on searching and fetching, motivated by real-life surveillance and search-and-rescue operations where unmanned vehicles, e.g. drones, search for victims in areas of a disaster. In treasure-evacuation, we are interested in designing algorithms that minimize the time it takes for a treasure (a victim) to be discovered and brought (fetched) to the exit (shelter) by any of two robots (rescuers) which are performing in a distributed environment (the case of searching and fetching with 1 robot has been previously considered).The communication protocol between the robots is either wireless, where information is shared at any time, or face-to-face, where information can be shared only if the robots meet. For both models we obtain upper bounds for fetching the treasure to the exit. Our algorithms make explicit use of the distance between the treasure and the exit, which is assumed to be known in advance, showing this way how partial information of the unknown input can be beneficial. Our main technical contribution pertains to the face-to-face model. More specifically, we demonstrate how robots can exchange information without meeting, effectively achieving a highly efficient treasure-evacuation protocol which is minimally affected by the lack of distant communication. Finally, we complement our positive results above by providing a lower bound in the face-to-face model.</p


The Unit Acquisition Number of Binomial Random Graphs

October 2023

·

11 Reads

p>Let G be a graph in which each vertex initially has weight 1. In each step, the unit weight from a vertex u to a neighbouring vertex v can be moved, provided that the weight on v is at least as large as the weight on u . The unit acquisition number of G , denoted by a u (G) , is the minimum cardinality of the set of vertices with positive weight at the end of the process (over all acquisition protocols). In this paper, we investigate the Erdõs-Rényi random graph process ( G(n,m) ) N m=0 , where N =(n 2).We show that asymptotically almost surely a u (G)(n,m)) = 1 right at the time step the random graph process creates a connected graph. Since trivially a u (G)(n,m)) ≥ 2 if the graphs is disconnected, the result holds in the strongest possible sense. </p


Citations (55)


... Combinatorial trade-offs of triangle edge visitation costs have been explored in [19]. In contrast, the current work pertains to the cost associated with the perpetual monitoring of the triangle edges by a single unit speed agent. ...

Reference:

The Fagnano Triangle Patrolling Problem
Makespan Trade-offs for Visiting Triangle Edges

Discrete Mathematics & Theoretical Computer Science

... Another key similarity between these studies and ours is that, depending on the strategy the searcher uses, it may not detect the target when passing through its location. This is reminiscent of work in search with uncertain detection where the searcher may miss the target with some probability [1,12]. ...

Overcoming probabilistic faults in disoriented linear search
  • Citing Article
  • August 2024

Theoretical Computer Science

... searching the disk in the face-toface model [27], with different searchers' speeds [6], and with different searchers' communication capabilities [23,31]. Last but not least, search problems have also been considered under faultiness settings, see for example [8,16,22,24,25,34,39] A number of search problems have also been considered with less standard objectives. For example [12] considered a multi-objective search-type problem, [3] studied search problems under a broad competitive algorithmic lens, [38] considered information/cost trade-offs, [17,18] considered time/energy trade-offs, and [33] introduced search-and-fetch problems in two dimensions. ...

Optimal Circle Search Despite the Presence of Faulty Robots
  • Citing Article
  • March 2023

Information Processing Letters

Konstantinos Georgiou

·

·

·

[...]

·

... Two-dimensional search introduces added complexity, with early results for polygons [33] and disks [25], and expanded to include shapes like triangles, squares, and ℓ p disks [10,27,38,39]. Multiagent models in these contexts address coordination, speed [11], and fault tolerance [13,18,26]. ...

Evacuating from ℓ Unit Disks in the Wireless Model
  • Citing Article
  • December 2022

Theoretical Computer Science

... searching the disk in the face-toface model [27], with different searchers' speeds [6], and with different searchers' communication capabilities [23,31]. Last but not least, search problems have also been considered under faultiness settings, see for example [8,16,22,24,25,34,39] A number of search problems have also been considered with less standard objectives. For example [12] considered a multi-objective search-type problem, [3] studied search problems under a broad competitive algorithmic lens, [38] considered information/cost trade-offs, [17,18] considered time/energy trade-offs, and [33] introduced search-and-fetch problems in two dimensions. ...

Algorithms for p-Faulty Search on a Half-Line

Algorithmica

... Linear search problems, such as the classic cow-path problem, are fundamental and have been extensively studied for single [9] and multiple agents [21]. Recent work introduces variations minimizing weighted completion times [40] and adapts searches to complex domains such as rays [20], terrains [28], and graphs [5]. ...

Weighted group search on a line & implications to the priority evacuation problem
  • Citing Article
  • October 2022

Theoretical Computer Science

... Therefore, the planner needs to decide the ideal beam energy when designing a treatment plan, and it may also vary with the gantry angle. Previous studies showed potential advantages of mixed energy photons in improving plan quality in prostate and breast plans (3)(4)(5)(6)(7)(8)(9). However, none of these studies have fully demonstrated the concept of photon energy synthesis systemaically and its potential advantages in radiation treatment. ...

Photon beam energy dependent single-arc volumetric modulated arc optimization
  • Citing Article
  • February 2021

Physica Medica

... Research has also explored non-standard objectives, including multi-objective search problems [17], competitive algorithmic approaches [4], and trade-offs between information and cost [53]. Studies have also considered time and energy trade-offs [24,25], and search-and-fetch problems in two dimensions [45,46]. ...

Treasure evacuation with one robot on a disk
  • Citing Article
  • January 2021

Theoretical Computer Science

... Last but not least, search problems have also been considered under faultiness settings, see for example [8,16,22,24,25,34,39] A number of search problems have also been considered with less standard objectives. For example [12] considered a multi-objective search-type problem, [3] studied search problems under a broad competitive algorithmic lens, [38] considered information/cost trade-offs, [17,18] considered time/energy trade-offs, and [33] introduced search-and-fetch problems in two dimensions. More closely related to our work, is the so-called priority evacuation objective introduced in [19,20] where search termination is called when a distinguished searcher reaches the target. ...

Time-energy tradeoffs for evacuation by two robots in the wireless model
  • Citing Article
  • November 2020

Theoretical Computer Science

... Multiagent models in these contexts address coordination, speed [11], and fault tolerance [13,18,26]. The only related work addressing worst-case and average-case trade-offs in mobile agent search is in [22], examining single-agent search and evacuation in a unit disk. ...

A Multi-Objective Optimization Problem on Evacuating 2 Robots from the Disk in the Face-to-Face Model; Trade-Offs between Worst-Case and Average-Case Analysis