March 2025
Theoretical Computer Science
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
March 2025
Theoretical Computer Science
February 2025
·
4 Reads
·
1 Citation
Discrete Mathematics & Theoretical Computer Science
We study a primitive vehicle routing-type problem in which a fleet of nunit speed robots start from a point within a non-obtuse triangle , where . The goal is to design robots' trajectories so as to visit all edges of the triangle with the smallest visitation time makespan. We begin our study by introducing a framework for subdividing into regions with respect to the type of optimal trajectory that each point P admits, pertaining to the order that edges are visited and to how the cost of the minimum makespan is determined, for . These subdivisions are the starting points for our main result, which is to study makespan trade-offs with respect to the size of the fleet. In particular, we define , and we prove that, over all non-obtuse triangles : (i) ranges from to 4, (ii) ranges from to 2, and (iii) ranges from 5/2 to 3. In every case, we pinpoint the starting points within every triangle that maximize , as well as we identify the triangles that determine all and over the set of non-obtuse triangles. Comment: 47 pages, 27 figures
February 2025
·
4 Reads
November 2024
·
10 Reads
We consider n unit-speed mobile agents initially positioned at the center of a unit disk, tasked with inspecting all points on the disk's perimeter. A perimeter point is considered covered if an agent positioned outside the disk's interior has unobstructed visibility of it, treating the disk itself as an obstacle. For n=1, this problem is referred to as the shoreline problem with a known distance. Isbell in 1957 derived an optimal trajectory that minimizes the worst-case inspection time for that problem. The one-agent version of the problem was originally proposed as a more tractable variant of Bellman's famous lost-in-the-forest problem. Our contributions are threefold. First, and as a warm-up, we extend Isbell's findings by deriving worst-case optimal trajectories addressing the partial inspection of a section of the disk, hence deriving an alternative proof of optimality for inspecting the disk with agents. Second, we analyze the average-case inspection time, assuming a uniform distribution of perimeter points (equivalent to randomized inspection algorithms). Using spatial discretization and Nonlinear Programming (NLP), we propose feasible solutions to the continuous problem and evaluate their effectiveness compared to NLP solutions. Third, we establish Pareto-optimal bounds for the multi-objective problem of jointly minimizing the worst-case and average-case inspection times.
August 2024
·
2 Citations
Theoretical Computer Science
June 2024
·
10 Reads
We consider \emph{weighted group search on a disk}, which is a search-type problem involving 2 mobile agents with unit-speed. The two agents start collocated and their goal is to reach a (hidden) target at an unknown location and a known distance of exactly 1 (i.e., the search domain is the unit disk). The agents operate in the so-called \emph{wireless} model that allows them instantaneous knowledge of each others findings. The termination cost of agents' trajectories is the worst-case \emph{arithmetic weighted average}, which we quantify by parameter w, of the times it takes each agent to reach the target, hence the name of the problem. Our work follows a long line of research in search and evacuation, but quite importantly it is a variation and extension of two well-studied problems, respectively. The known variant is the one in which the search domain is the line, and for which an optimal solution is known. Our problem is also the extension of the so-called \emph{priority evacuation}, which we obtain by setting the weight parameter w to 0. For the latter problem the best upper/lower bound gap known is significant. Our contributions for weighted group search on a disk are threefold. \textit{First}, we derive upper bounds for the entire spectrum of weighted averages w. Our algorithms are obtained as a adaptations of known techniques, however the analysis is much more technical. \textit{Second}, our main contribution is the derivation of lower bounds for all weighted averages. This follows from a \emph{novel framework} for proving lower bounds for combinatorial search problems based on linear programming and inspired by metric embedding relaxations. \textit{Third}, we apply our framework to the priority evacuation problem, improving the previously best lower bound known from 4.38962 to 4.56798, thus reducing the upper/lower bound gap from 0.42892 to 0.25056.
June 2024
·
17 Reads
We present several advancements in search-type problems for fleets of mobile agents operating in two dimensions under the wireless model. Potential hidden target locations are equidistant from a central point, forming either a disk (infinite possible locations) or regular polygons (finite possible locations). Building on the foundational disk evacuation problem, the disk priority evacuation problem with k Servants, and the disk w-weighted search problem, we make improvements on several fronts. First we establish new upper and lower bounds for the n-gon priority evacuation problem with 1 Servant for , and for -gons with Servants, where , , and , offering tight or nearly tight bounds. The only previous results known were a tight upper bound for k=1 and n=6 and lower bounds for k=1 and . Second, our work improves the best lower bound known for the disk priority evacuation problem with k=1 Servant from 4.46798 to 4.64666 and for k=2 Servants from 3.6307 to 3.65332. Third, we improve the best lower bounds known for the disk w-weighted group search problem, significantly reducing the gap between the best upper and lower bounds for w values where the gap was largest. These improvements are based on nearly tight upper and lower bounds for the 11-gon and 12-gon w-weighted evacuation problems, while previous analyses were limited only to lower bounds and only to 7-gons.
June 2024
·
1 Read
·
2 Citations
October 2023
·
42 Reads
p> We initiate the study of a problem on searching and fetching, motivated by real-life surveillance and search-and-rescue operations where unmanned vehicles, e.g. drones, search for victims in areas of a disaster. In treasure-evacuation, we are interested in designing algorithms that minimize the time it takes for a treasure (a victim) to be discovered and brought (fetched) to the exit (shelter) by any of two robots (rescuers) which are performing in a distributed environment (the case of searching and fetching with 1 robot has been previously considered).The communication protocol between the robots is either wireless, where information is shared at any time, or face-to-face, where information can be shared only if the robots meet. For both models we obtain upper bounds for fetching the treasure to the exit. Our algorithms make explicit use of the distance between the treasure and the exit, which is assumed to be known in advance, showing this way how partial information of the unknown input can be beneficial. Our main technical contribution pertains to the face-to-face model. More specifically, we demonstrate how robots can exchange information without meeting, effectively achieving a highly efficient treasure-evacuation protocol which is minimally affected by the lack of distant communication. Finally, we complement our positive results above by providing a lower bound in the face-to-face model.</p
October 2023
·
11 Reads
p>Let G be a graph in which each vertex initially has weight 1. In each step, the unit weight from a vertex u to a neighbouring vertex v can be moved, provided that the weight on v is at least as large as the weight on u . The unit acquisition number of G , denoted by a u (G) , is the minimum cardinality of the set of vertices with positive weight at the end of the process (over all acquisition protocols). In this paper, we investigate the Erdõs-Rényi random graph process ( G(n,m) ) N m=0 , where N =(n 2).We show that asymptotically almost surely a u (G)(n,m)) = 1 right at the time step the random graph process creates a connected graph. Since trivially a u (G)(n,m)) ≥ 2 if the graphs is disconnected, the result holds in the strongest possible sense. </p
... Combinatorial trade-offs of triangle edge visitation costs have been explored in [19]. In contrast, the current work pertains to the cost associated with the perpetual monitoring of the triangle edges by a single unit speed agent. ...
Reference:
The Fagnano Triangle Patrolling Problem
February 2025
Discrete Mathematics & Theoretical Computer Science
... Another key similarity between these studies and ours is that, depending on the strategy the searcher uses, it may not detect the target when passing through its location. This is reminiscent of work in search with uncertain detection where the searcher may miss the target with some probability [1,12]. ...
Reference:
Multimodal Search on a Line
August 2024
Theoretical Computer Science
... searching the disk in the face-toface model [27], with different searchers' speeds [6], and with different searchers' communication capabilities [23,31]. Last but not least, search problems have also been considered under faultiness settings, see for example [8,16,22,24,25,34,39] A number of search problems have also been considered with less standard objectives. For example [12] considered a multi-objective search-type problem, [3] studied search problems under a broad competitive algorithmic lens, [38] considered information/cost trade-offs, [17,18] considered time/energy trade-offs, and [33] introduced search-and-fetch problems in two dimensions. ...
March 2023
Information Processing Letters
... Two-dimensional search introduces added complexity, with early results for polygons [33] and disks [25], and expanded to include shapes like triangles, squares, and ℓ p disks [10,27,38,39]. Multiagent models in these contexts address coordination, speed [11], and fault tolerance [13,18,26]. ...
Reference:
Multi-Agent Disk Inspection
December 2022
Theoretical Computer Science
... searching the disk in the face-toface model [27], with different searchers' speeds [6], and with different searchers' communication capabilities [23,31]. Last but not least, search problems have also been considered under faultiness settings, see for example [8,16,22,24,25,34,39] A number of search problems have also been considered with less standard objectives. For example [12] considered a multi-objective search-type problem, [3] studied search problems under a broad competitive algorithmic lens, [38] considered information/cost trade-offs, [17,18] considered time/energy trade-offs, and [33] introduced search-and-fetch problems in two dimensions. ...
December 2022
Algorithmica
... Linear search problems, such as the classic cow-path problem, are fundamental and have been extensively studied for single [9] and multiple agents [21]. Recent work introduces variations minimizing weighted completion times [40] and adapts searches to complex domains such as rays [20], terrains [28], and graphs [5]. ...
Reference:
Multi-Agent Disk Inspection
October 2022
Theoretical Computer Science
... Therefore, the planner needs to decide the ideal beam energy when designing a treatment plan, and it may also vary with the gantry angle. Previous studies showed potential advantages of mixed energy photons in improving plan quality in prostate and breast plans (3)(4)(5)(6)(7)(8)(9). However, none of these studies have fully demonstrated the concept of photon energy synthesis systemaically and its potential advantages in radiation treatment. ...
February 2021
Physica Medica
... Research has also explored non-standard objectives, including multi-objective search problems [17], competitive algorithmic approaches [4], and trade-offs between information and cost [53]. Studies have also considered time and energy trade-offs [24,25], and search-and-fetch problems in two dimensions [45,46]. ...
January 2021
Theoretical Computer Science
... Last but not least, search problems have also been considered under faultiness settings, see for example [8,16,22,24,25,34,39] A number of search problems have also been considered with less standard objectives. For example [12] considered a multi-objective search-type problem, [3] studied search problems under a broad competitive algorithmic lens, [38] considered information/cost trade-offs, [17,18] considered time/energy trade-offs, and [33] introduced search-and-fetch problems in two dimensions. More closely related to our work, is the so-called priority evacuation objective introduced in [19,20] where search termination is called when a distinguished searcher reaches the target. ...
November 2020
Theoretical Computer Science
... Multiagent models in these contexts address coordination, speed [11], and fault tolerance [13,18,26]. The only related work addressing worst-case and average-case trade-offs in mobile agent search is in [22], examining single-agent search and evacuation in a unit disk. ...
Reference:
Multi-Agent Disk Inspection
October 2020