Union of Random Minkowski Sums and Network Vulnerability Analysis
 161 Downloads
 3 Citations
Abstract
Let \(\mathcal {C}=\{C_1,\ldots ,C_n\}\) be a set of \(n\) pairwisedisjoint convex sets of constant description complexity, and let \(\pi \) be a probability density function (density for short) over the nonnegative reals. For each \(i\), let \(K_i\) be the Minkowski sum of \(C_i\) with a disk of radius \(r_i\), where each \(r_i\) is a random nonnegative number drawn independently from the distribution determined by \(\pi \). We show that the expected complexity of the union of \(K_1, \ldots , K_n\) is \(O(n^{1+{\varepsilon }})\) for any \({\varepsilon }> 0\); here the constant of proportionality depends on \({\varepsilon }\) and the description complexity of the sets in \(\mathcal {C}\), but not on \(\pi \). If each \(C_i\) is a convex polygon with at most \(s\) vertices, then we show that the expected complexity of the union is \(O(s^2n\log n)\). Our bounds hold in a more general model in which we are given an arbitrary multiset \(\varTheta =\{\theta _1,\ldots ,\theta _n\}\) of expansion radii, each a nonnegative real number. We assign them to the members of \(\mathcal {C}\) by a random permutation, where all permutations are equally likely to be chosen; the expectations are now with respect to these permutations. We also present an application of our results to a problem that arises in analyzing the vulnerability of a network to a physical attack.
Keywords
Minkowski sum Arrangement Network vulnerability Stochastic model1 Introduction
Union of random Minkowski sums
Our goal is to obtain an upper bound on the expected combinatorial complexity of \(\mathcal {U}\), under a suitable probabilistic model for choosing the expansion radii \(\mathbf {r}\) of the members of \(\mathcal {C}\)—see below for the precise models that we will use.
Network vulnerability analysis Our motivation for studying the above problem comes from the problem of analyzing the vulnerability of a network to a physical attack (e.g., electromagnetic pulse (EMP) attacks, military bombing, or natural disasters [13]), as studied in [2]. Specifically, let \(\mathcal {G}=(V,\mathcal {E})\) be a planar graph embedded in the plane, where \(V\) is a set of points in the plane and \(\mathcal {E}=\{e_1, \ldots , e_n\}\) is a set of \(n\) segments (often called links) with pairwisedisjoint relative interiors, whose endpoints are points of \(V\). For a point \(q\in {\mathbb R}^2\) and an edge \(e\), let \(d(q,e)= \min _{p\in e}\Vert qp\Vert \) denote the (minimum) distance between \(q\) and \(e\). Let \({\varphi }: {{\mathbb R}_{{\ge }0}}\rightarrow [0,1]\) denote the edge failure probability function, so that the probability of an edge \(e\) to be damaged by a physical attack at a location \(q\) is \({\varphi }(d(q,e))\). In this model, the failure probability only depends on the distance of the point of attack from \(e\). We assume that \(1{\varphi }\) is a cumulative distribution function (cdf), or, equivalently, that \(\varphi (0)=1\), \(\varphi (\infty )=0\), and \(\varphi \) is monotonically decreasing. A typical example is \({\varphi }(x) = \max \{1x,0\}\), where the cdf is the uniform distribution on \([0,1]\).
(ii) Network vulnerability analysis Most of the early work on network vulnerability analysis considered a small number of isolated, independent failures; see, e.g., [8, 23] and the references therein. Since physical networks rely heavily on their physical infrastructure, they are vulnerable to physical attacks such as electromagnetic pulse (EMP) attacks as well as natural disasters [13, 27], not to mention military bombing and other similar kinds of attack. This has led to recent work on analyzing the vulnerability of a network under geographically correlated failures due to a physical attack at a single location [1, 2, 21, 22, 27]. Most papers on this topic have studied a deterministic model for the damage caused by such an attack, which assumes that a physical attack at a location \(x\) causes the failure of all links that intersect some simple geometric region (e.g., a vertical segment of unit length, a unit square, or a unit disk) centered at \(x\). The impact of an attack is measured in terms of its effect on the connectivity of the network, (e.g., how many links fail, how many pairs of nodes get disconnected, etc.), and the goal is to find the location of attack that causes the maximum damage to the network. In the simpler model studied in [2] and in the present paper, the damage is measured by the number of failed links. This kind of problem is something that both attackers and planners of such networks would like to solve. The former for obvious reasons, and the latter for identifying the most vulnerable portions of the network, in order to protect them better.
In practice, though, it is hard to be certain in advance whether a link will fail by a nearby physical attack. To address this situation, Agarwal et al. [2] introduced the simple probabilistic framework for modeling the vulnerability of a network under a physical attack, as described above. One of the problems that they studied is to compute the largest expected number of links damaged by a physical attack. They described an approximation algorithm for this problem whose expected running time is quadratic in the worst case. A major motivation for the present study is to improve the efficiency of this algorithm and to somewhat simplify it at the same time.
Finally, we note that the study in this paper has potential applications in other contexts, where one wishes to analyze the combinatorial and topological structure of the Minkowski sums (or rather convolutions) of a set of geometric objects (or a function over the ambient space) with some kernel function (most notably a Gaussian kernel), or to perform certain computations on the resulting configuration. Problems of this kind arise in many applications, including statistical learning, computer vision, and robotics; see, e.g., [12, 19] and references therein.
Our models We consider two probabilistic models for choosing the sequence \(\mathbf {r}=\langle r_1,\ldots ,r_n\rangle \) of expansion distances:
(i) The density model We are given an arbitrary density (or a probability mass function) \(\pi \) over the nonnegative reals; for each \(1 \le i \le n\), we take \(r_i\) to be a random value drawn independently from the distribution determined by \(\pi \).
(ii) The permutation model We are given a multiset \(\varTheta =\{\theta _1,\ldots ,\theta _n\}\) of \(n\) arbitrary nonnegative real numbers. We draw a random permutation \(\sigma \) on \([1:n]\), where all permutations are equally likely to be chosen, and assign \(r_i:=\theta _{\sigma (i)}\) to \(C_i\) for each \(i=1,\ldots ,n\).
Our goal is to prove sharp bounds on the expected complexity of the union \(\mathcal {U}(\mathcal {K})\) under these two models. More precisely, for the density model, let \(\psi (\mathcal {C},\pi )\) denote the expected value of \(\psi (\mathcal {C},\mathbf {r})\) (recall that \(\psi (\mathcal {C},\mathbf {r})\) is the complexity of \(\mathcal {U}(\mathcal {K})\) under a specific assignment sequence \(\mathbf {r}\) of expansion distances), where the expectation is taken over the random choices of \(\mathbf {r}\), made from \(\pi \) in the manner specified above. Set \(\psi (\mathcal {C})=\max \psi (\mathcal {C},\pi )\), where the maximum is taken over all probability density (mass) functions. For the permutation model, in an analogous manner, we let \(\psi (\mathcal {C},\varTheta )\) denote the expected value of \(\psi (\mathcal {C},\mathbf {r})\), where the expectation is taken over the choices of \(\mathbf {r}\), obtained by randomly shuffling the members of \(\varTheta \). Then, with a slight overloading of the notation, we define \(\psi (\mathcal {C}) = \max \psi (\mathcal {C},\varTheta )\), where the maximum is over all possible choices of the multiset \(\varTheta \). We wish to obtain an upper bound on \(\psi (\mathcal {C})\) under both models.
We note that the permutation model is more general than the density model, in the sense that an upper bound on \(\psi (\mathcal {C})\) under the permutation model immediately implies the same bound on \(\psi (\mathcal {C})\) under the density model. Indeed, consider some given density \(\pi \), out of whose distribution the distances \(r_i\) are to be sampled (in the density model). Interpret such a random sample as a 2stage process, where we first sample from the distribution of \(\pi \) a multiset \(\varTheta \) of \(n\) such distances, in the standard manner of independent repeated draws, and then assign the elements of \(\varTheta \) to the sets \(C_i\) using a random permutation (it is easily checked that this reinterpretation does not change the probability space). Let \(\mathbf {r}\) be the resulting sequence of expansion radii for the members of \(\mathcal {C}\). Using the new interpretation, the expectation of \(\psi (\mathcal {C},\mathbf {r})\) (under the density model), conditioned on the fixed \(\varTheta \), is at most \(\psi (\mathcal {C})\) under the permutation model. Since this bound holds for every \(\varTheta \), the unconditional expected value of \(\psi (\mathcal {C},\mathbf {r})\) (under the density model) is also at most \(\psi (\mathcal {C})\) under the permutation model. Since this holds for every \(\textit{density}\), the claim follows.
We do not know whether the opposite inequality also holds. A natural reduction from the permutation model to the density model would be to take the input set \(\varTheta \) of the \(n\) expansion distances and regard it as a discrete mass distribution (where each of its members can be picked with probability \(1/n\)). But then, since the draws made in the density model are independent, most of the draws will not be permutations of \(\varTheta \), so this approach will not turn \(\psi (\mathcal {C})\) under the density model into an upper bound for \(\psi (\mathcal {C})\) under the permutation model.
Our results The main results of this paper are nearlinear upper bounds on \(\psi (\mathcal {C})\) under the two models discussed above. Since the permutation model is more general, in the sense made above, we state, and prove, our results in this model only. We obtain (in Sect. 2) the following bound for the general case.
Theorem 1
Let \(\mathcal {C}=\{C_1,\ldots ,C_n\}\) be a set of \(n\) pairwisedisjoint convex sets of constant description complexity in \({\mathbb R}^2\). Then the value of \(\psi (\mathcal {C})\) under the permutation model, for any multiset \(\varTheta \) of expansion radii, is \(O(n^{1+{\varepsilon }})\), for any \({\varepsilon }> 0\); the constant of proportionality depends on \({\varepsilon }\) and the description complexity of the members of \(\mathcal {C}\), but not on \(\varTheta \).
If \(\mathcal {C}\) is a collection of convex polygons, we obtain a slightly improved bound by using a different, more geometric argument.
Theorem 2
Let \(\mathcal {C}=\{C_1,\ldots ,C_n\}\) be a set of \(n\) pairwisedisjoint convex polygons in \({\mathbb R}^2\), where each \(C_i\) has at most \(s\) vertices. Then the maximum value of \(\psi (\mathcal {C})\) under the permutation model, for any multiset \(\varTheta \) of expansion radii, is \(O(s^2n \log n)\); the constant of proportionality that does not depend on \(\varTheta \).
For simplicity, we first prove Theorem 2 in Sect. 3 for the special case where \(\mathcal {C}\) is a set of \(n\) segments with pairwisedisjoint relative interiors. Then we extend the proof, in a reasonably straightforward manner, to polygons in Sect. 4. The version involving segments admits a somewhat cleaner proof, and is sufficient for the application to network vulnerability analysis.
Using the Clarkson–Shor argument [10], we also obtain the following corollary, which will be needed for the analysis in Sect. 5.
Corollary 1
Let \(\mathcal {C}=\{C_1,\ldots ,C_n\}\) be a set of \(n\) pairwisedisjoint convex sets of constant description complexity. Let \(r_1,\ldots ,r_n\) be the random expansion distances, obtained under the permutation model, for any multiset \(\varTheta \) of expansion radii, that are assigned to \(C_1,\ldots ,C_n\), respectively, and set \(\mathcal {K}= \{C_i \oplus D(r_i) \mid 1\ \le i \le n\}\). Then, for any \(1\le k\le n\), the expected number of vertices in the arrangement \(\mathcal {A}(\mathcal {K})\) whose depth is at most \(k\) is \(O(n^{1+{\varepsilon }}k^{1{\varepsilon }})\), for any \({\varepsilon }> 0\); the constant of proportionality depends on \({\varepsilon }\) and the description complexity of the members of \(\mathcal {C}\) but not on \(\varTheta \). If each \(C_i\) is a convex polygon with at most \(s\) vertices, then the bound improves to \(O(s^2nk\log (n/k))\).
We note that the variants of Theorem 1, Theorem 2, and Corollary 1 under the density model have identical statements, except that now the constants of proportionality are independent of the density function \(\pi \).
Using Theorem 2 and Corollary 1, we present (in Sect. 5) an efficient MonteCarlo \(\delta \)approximation algorithm for computing an approximately most vulnerable location for a network, as defined earlier. Our algorithm is a somewhat simpler, and considerably more efficient, variant of the algorithm proposed by Agarwal et al. [2], and the general approach is similar to the approximation algorithms presented in [3, 4, 6] for computing the depth in an arrangement of a set of objects. Specifically, we establish the following result.
Theorem 3
Given a set \(\mathcal {E}\) of \(n\) segments in \({\mathbb R}^2\) with pairwisedisjoint relative interiors, an edgefailureprobability function \({\varphi }\) such that \(1{\varphi }\) is a cdf, and a constant \(0< \delta < 1\), one can compute, in \(O(\delta ^{4}n\log ^3 n)\) time, a location \(\tilde{q} \in {\mathbb R}^2\), such that \(\varPhi (\tilde{q},\mathcal {E}) \ge (1\delta )\varPhi (\mathcal {E})\) with probability at least \(11/n^c\), for arbitrarily large \(c\); the constant of proportionality in the runningtime bound depends on \(c\).
2 The Case of Convex Sets
In this section we prove Theorem 1. We have a collection \(\mathcal {C}=\{C_1,\ldots ,C_n\}\) of \(n\) pairwisedisjoint compact convex sets in the plane, each of constant description complexity. Let \(\varTheta \) be a multiset of \(n\) nonnegative real numbers \(0 \le \theta _1\le \theta _2\le \cdots \le \theta _n\). We choose a random permutation \(\sigma \) of \([1:n]\), where all permutations are equally likely to be chosen, put \(r_i = \theta _{\sigma (i)}\) for \(i=1,\ldots ,n\), and form the Minkowski sums \(K_i = C_i \oplus D(r_i)\), for \(i=1,\ldots ,n\). We put \(\mathcal {K}=\{K_1,\ldots ,K_n\}\). We prove a nearlinear upper bound on the expected complexity of \(\mathcal {U}(\mathcal {K})\), as follows.
Fix a parameter \(t\), whose value will be determined later, and put \(\rho =\theta _{nt}\), the \((t+1)\)st largest distance in \(\varTheta \). Put \(\mathcal {C}^+ = \{ C_i\in \mathcal {C}\mid \sigma (i) > nt \}\) and \(\mathcal {C}^ = \{ C_i\in \mathcal {C}\mid \sigma (i) \le nt \}\). That is, \(\mathcal {C}^+\) is the set of the \(t\) members of \(\mathcal {C}\) that were assigned the \(t\) largest distances in \(\varTheta \), and \(\mathcal {C}^\) is the complementary subset.
By construction, \(\mathcal {C}^+\) is a random subset of \(\mathcal {C}\) of size \(t\) (where all \(t\)element subsets of \(\mathcal {C}\) are equally likely to arise as \(\mathcal {C}^+\)). Moreover, conditioned on the choice of \(\mathcal {C}^+\), the set \(\mathcal {C}^\) is fixed, and the subset \(\varTheta ^\) of the \(nt\) distances in \(\varTheta \) that are assigned to them is also fixed. Furthermore, the permutation that assigns the elements of \(\varTheta ^\) to the sets in \(\mathcal {C}^\) is a random permutation.
For each \(C_i\in \mathcal {C}^+\), put \(K_i^* = C_i\oplus D(\rho )\). Put \((\mathcal {K}^*)^+ = \{ K_i^* \mid C_i\in \mathcal {C}^+\}\), and let \(\mathcal {U}^*\) denote the union of \((\mathcal {K}^*)^+\). Note that \(\mathcal {U}^*\subseteq \mathcal {U}\), because \(K_i^*\subseteq K_i\) for each \(C_i\in \mathcal {C}^+\). Since the \(C_i\)’s are pairwisedisjoint and we now add the same disk to each of them, \((\mathcal {K}^*)^+\) is a collection of pseudodisks [18], and therefore \(\mathcal {U}^*\) has \(O(t)\) complexity. More precisely, \({\partial }\mathcal {U}^*\) has at most \(6t12\) vertices that are intersection points of boundaries of pairs of sets of \((\mathcal {K}^*)^+\) [18].
Let \(\mathcal {V}\) denote the vertical decomposition of the complement of \(\mathcal {U}^*\); it consists of \(O(t)\) pseudotrapezoids, each defined by at most four elements of \((\mathcal {K}^*)^+\) (that is, of \(\mathcal {C}^+\)). See [25] for more details concerning vertical decompositions. For short, we refer to these pseudotrapezoids as trapezoids.
In a similar manner, for each \(C_i\in \mathcal {C}^\), define \(K_i^* = C_i \oplus D(\rho )\); note that \(K_i\subseteq K_i^*\) for each such \(i\). Put \((\mathcal {K}^*)^ = \{ K_i^* \mid C_i\in \mathcal {C}^\}\). Since \(\mathcal {C}^+\) is a random sample of \(\mathcal {C}\) of size \(t\), the following lemma follows from a standard randomsampling argument; see [20, Section 4.6] for a proof.
Lemma 1
With probability at least \(1O\big (\frac{1}{n^{c4}}\big )\), every (open) trapezoid \(\tau \) of \(\mathcal {V}\) intersects at most \(k:= \frac{cn}{t}\ln n\) of the sets of \((\mathcal {K}^*)^\), for sufficiently large \(c>4\).
For each trapezoid \(\tau \) of \(\mathcal {V}\), let \(\mathcal {C}_\tau ^\) denote the collection of the sets \(C_i\in \mathcal {C}^\) for which \(K_i^*\) intersects \(\tau \). We form the union \(\mathcal {U}_\tau ^\) of the “real” (and smaller) corresponding sets \(K_i\), for \(C_i\in \mathcal {C}_\tau ^\), and clip it to within \(\tau \), i.e., keep only its portion with \(\tau \) (clearly, no other set \(C_i\in \mathcal {C}^\) can have its real expansion \(K_i\) meet \(\tau \)). Finally, we take all the “larger” sets \(C_i\in \mathcal {C}^+\), and form the union of \(\mathcal {U}_\tau ^\) with the corresponding “real” \(K_i\)’s, again clipping it to within \(\tau \). The overall union \(\mathcal {U}\) is the union of \(\mathcal {U}^*\) and of all the modified unions \(\mathcal {U}_\tau ^\), for \(\tau \in \mathcal {V}\).
This divideandconquer process leads to the following recursive estimation of the expected complexity of \(\mathcal {U}\). For \(m\le n\), let \(\mathcal {C}'\) be any subset of \(m\) sets of \(\mathcal {C}\), and let \(\varTheta '\) be any subset of \(m\) elements of \(\varTheta \), which we enumerate, with some abuse of notation, as \(\theta _1,\ldots ,\theta _m\). Let \(T(\mathcal {C}',\varTheta ')\) denote the expected complexity of the union of the expanded regions \(C_i \oplus D(\theta _{\sigma '(i)})\), for \(C_i\in \mathcal {C}'\), where the expectation is over the random shuffling permutation \(\sigma '\) (on \([1:m]\)). Let \(T(m)\) denote the maximum value of \(T(\mathcal {C}',\varTheta ')\), over all subsets \(\mathcal {C}'\) and \(\varTheta '\) of size \(m\) each, as just defined.
Remark
It might be possible to improve the bound on the expected complexity of \(\mathcal {U}(\mathcal {K})\) to \(O(n\mathop {\mathrm {polylog}}(n))\) by replacing the above divideandconquer approach with a randomized incremental construction, as in [15].
3 The Case of Segments
Let \(\mathcal {E}=\{e_1,\ldots ,e_{n}\}\) be a collection of \(n\) line segments in the plane with pairwisedisjoint relative interiors, and as in Sect. 2, let \(\varTheta \) be a multiset of \(n\) nonnegative real numbers \(0 \le \theta _1 \le \theta _2 \le \cdots \le \theta _n\). For simplicity, we assume that the segments in \(\mathcal {E}\) are in general position, i.e., no segment is vertical, no two of them share an endpoint, and no two are parallel. Moreover, we assume that the expansion distances in \(\varTheta \) are positive and in “general position” with respect to \(\mathcal {E}\), so as to ensure that, no matter which permutation we draw, the expanded sets of \(\mathcal {K}\) are also in general position—no pair of them are tangent and no three have a common boundary point.^{1} Using the standard symbolic perturbation techniques (see, e.g., [25, Chapter 7]), the proof can be extended when \(\mathcal {E}\) or \(\varTheta \) is not in general position or when some of the expansion distances are \(0\); we omit here the routine details.
As above, let \(\mathcal {U}= \mathcal {U}(\mathcal {K})\) denote the union of \(\mathcal {K}\). We show that the expected number of vertices on \({\partial }\mathcal {U}\) is \(O(n\log n)\), where the expectation is over the choice of the random permutation \(\sigma \) that produces the distances \(r_1,\ldots ,r_{n}\).
 (i)
CCvertices, which lie on two semicircular arcs of the respective pair of racetrack boundaries;
 (ii)
RRvertices, which lie on two straightline edges; and
 (iii)
CRvertices, which lie on a semicircular arc and on a straightline edge.
3.1 RRVertices
Let \(v\) be an RRvertex of \(\mathcal {U}\), lying on \(\partial R_i\) and \(\partial R_j\), the rectangles of two respective segments \(e_i\) and \(e_j\). Denote the edges of \(R_i\) and \(R_j\) containing \(v\) as \(e^\pm _i \in \{e_i^,e_i^+\}\) and \(e^\pm _j \in \{e_j^,e_j^+\}\), respectively. A vertex \(v\) is terminal if either a subsegment of \(e^\pm _i\) connecting \(v\) to one of the endpoints of \(e^\pm _i\) is fully contained in \(K_j\), or a subsegment of \(e^\pm _j\) connecting \(v\) to one of the endpoints of \(e^\pm _j\) is fully contained in \(K_i\); otherwise \(v\) is a nonterminal vertex. For example, in Fig. 5(ii), \(\beta \) is a terminal vertex, and \(\alpha \) is a nonterminal vertex. There are at most \(4n\) terminal vertices on \({\partial }\mathcal {U}\), so it suffices to bound the expected number of nonterminal vertices.
Our strategy is first to describe a scheme that charges each nonterminal RRvertex \(v\) to one of the portal s of one of the two rectangles of \(\mathcal {R}\) on whose boundary \(v\) lies, and then to prove that the expected number of vertices charged to each portal is \(O(\log n)\). The bound \(O(n\log n)\) on the expected number of (nonterminal) RRvertices then follows.
Let \(v\) be a nonterminal RRvertex lying on \({\partial }R_i\cap {\partial }R_j\), for two respective input segments \(e_i\) and \(e_j\). To simplify the notation, we rename \(e_i\) and \(e_j\) as \(e_1\) and \(e_2\). Note that \(v\) is an intersection of \(e^+_1\) or \(e_1^\) with \(e_2^+\) or \(e_2^\). Since the analysis is the same for each of these four choices we will say, using the notations already introduced, that \(v\) is the intersection of \(e_1^\pm \) with \(e_2^\pm \) where \(e_1^\pm \) (resp., \(e_2^\pm \)) is either \(e^+_1\) (resp., \(e_2^+\)) or \(e_1^\) (resp., \(e_2^\)).
Each rectangle \(Q_i\), \(i=1,2\), has a complementary rectangle \(Q'_i\) on the same side of \(e_i\), which is openly disjoint from \(Q_i\), so that \(Q_i\cup Q'_i\) is the half of the rectangular portion \(R_i\), between \(e_i\) and \(e_i^\pm \), of the full racetrack \(K_i\). Again, see Fig. 6.
Since \(E_i\subset e_i\) for \(i=1,2\), it follows that \(E_1\) and \(E_2\) are disjoint. Since \(v\) is a nonterminal RRvertex, \(w_1\) lies outside \(K_2\) and \(w_2\) lies outside \(K_1\). So, as we walk along the edge \(vw_i\) of \(Q_i\) from \(v\) to \(w_i\), we enter, locally near \(v\), into the other racetrack \(K_{3i}\), but then we have to exit it before we get to \(w_i\). Note that either of these walks, say from \(v\) to \(w_1\), may enter \(Q_2\) or keep away from \(Q_2\) (and enter instead the complementary rectangle \(Q'_2\)); see Figs. 6 and 8(i) for the former situation, and Fig. 8(ii) for the latter one.
Another important property of the rectangles \(Q_1\) and \(Q_2\), which follows from their definition, is that they are “oppositely oriented”, when viewed from \(v\), in the following sense. When we view from \(v\) one of \(Q_1\) and \(Q_2\), say \(Q_1\), and turn counterclockwise, we first see \(E_1\) and then \(A_1\), and when we view \(Q_2\) and turn counterclockwise, we first see \(A_2\) and then \(E_2\).
So far our choice of which among the segments defining \(v\) is denoted by \(e_1\) and which is denoted by \(e_2\) was arbitrary. But in the rest of our analysis we will use \(e_1\) to denote the segment such that when we view \(Q_1\) from \(v\) and turn counterclockwise, we first see \(E_1\) and then \(A_1\). The other segment is denoted by \(e_2\). (This is indeed the situation depicted in Fig. 6.)
The following lemma provides the key ingredient for our charging scheme.
Lemma 2
Let \(v\) be a nonterminal \(RR\)vertex. Then, in the terminology defined above, one of the edges, say \(E_1\), has to intersect either the portal \(A_2\) of the other rectangle \(Q_2\), or the portal \(A'_2\) of the complementary rectangle \(Q'_2\).
Proof
Finally, the overlapping of \(Q_1\) and \(Q_2\) near \(v\) mean that the arcs \(\varGamma _1\) and \(\varGamma _2\) overlap too. Let \(\varGamma _0:=\varGamma _1\cap \varGamma _2\).

AAoverlap: The clockwise and the counterclockwise endpoints of \(\varGamma _0\) are the Aendpoints of \(\varGamma _2\) and \(\varGamma _1\), respectively. See Fig. 8(i).

EEoverlap: The clockwise and the counterclockwise endpoints of \(\varGamma _0\) are the Eendpoints of \(\varGamma _1\) and \(\varGamma _2\), respectively. See Fig. 8(ii).
AAoverlap For \(i=1,2\), let \(\rho _i(\theta )\), for \(\theta \in \varGamma _i\), denote the length of the intersection of \(Q_i\) with the ray emanating from \(v\) in direction \(\theta \). Note that \(\rho _i\) is bimodal: it increases to its maximum, which occurs at the direction to the vertex of \(Q_i\) opposite to \(v\), and then decreases back (each of the two pieces is a simple trigonometric function of \(\theta \)).
Write \(\varGamma _0 = [\alpha ,\beta ]\). Since the overlap of \(\varGamma _1\) and \(\varGamma _2\) is an AAoverlap, \(\alpha \) is the orientation of \(\overrightarrow{vw_2}\), and we have \(\rho _2(\alpha ) > \rho _1(\alpha )\) (we have to exit \(Q_1\) before we reach \(w_2\)). Symmetrically, we have \(\rho _2(\beta ) < \rho _1(\beta )\). See Fig. 8(i). Hence, by continuity, there must exist \(\theta \in \varGamma _0\) where \(\rho _1(\theta )=\rho _2(\theta )\).
We claim however that this equality is impossible. Indeed, by taking into account the partitions \(\varGamma _1=\varGamma _1^E\cup \varGamma _1^A\), \(\varGamma _2=\varGamma _2^A\cup \varGamma _2^E\), and by overlaying them within \(\varGamma _0\), we see that \(\varGamma _0\) is partitioned into at most three subarcs, each being the intersection (within \(\varGamma _0\)) of one of \(\varGamma _1^E\), \(\varGamma _1^A\) with one of \(\varGamma _2^A\), \(\varGamma _2^E\). See Fig. 9 (and also Fig. 7, where the overlap has only two subarcs, of \(\varGamma _1^E\cap \varGamma _2^E\) and \(\varGamma _1^A\cap \varGamma _2^E\)). Since \(E_1\) and \(E_2\) are disjoint, and since, by assumption, no \(E\)edge of any rectangle intersects the \(A\)edge of the other rectangle, the intersection \(\rho _1(\theta )=\rho _2(\theta )\) can only occur within \(\varGamma _1^A\cap \varGamma _2^A\). As we trace \(\varGamma _0\) from \(\alpha \) to \(\beta \), we start with \(\rho _2 > \rho _1\), so this still holds as we reach \(\varGamma _1^A\cap \varGamma _2^A\). However, the bimodality of \(\rho _1\), \(\rho _2\) and the different orientations of \(Q_1\), \(Q_2\) mean that \(\rho _1\) is decreasing on \(\varGamma _1^A\), whereas \(\rho _2\) is increasing on \(\varGamma _2^A\), so no intersection of these functions can occur within \(\varGamma _1^A\cap \varGamma _2^A\), a contradiction that shows that an AAoverlap is impossible.
EEoverlap We follow the same notations as in the analysis of AAoverlaps, but use different arguments, which bring to bear the complementary rectangles \(Q'_1\), \(Q'_2\).
If \(A_1^*\) exits \(Q_2\) at \(A_2\), the argument is simpler, because then \(w_2\) is contained in the disk with \(A_1^*\) as a diameter, which is contained in \(K_1\), again contrary to the assumption that \(v\) is nonterminal (see Fig. 10).
A fully symmetric argument leads to a contradiction in the case where \(\rho _1(\beta ) < \rho _2(\beta )\). It therefore remains to consider the case where \(\rho _1(\alpha ) < \rho _2(\alpha )\) and \(\rho _1(\beta ) > \rho _2(\beta )\). Here we argue exactly as in the case of AAoverlaps, using the bimodality of \(\rho _1\) and \(\rho _2\), that this case cannot happen. (Fig. 9 depicts the situation in this case too.) Specifically, there has to exist an intersection point of \(\rho _1\) and \(\rho _2\) within \(\varGamma _0\), and it can only occur at \(\varGamma _1^A\cap \varGamma _2^A\). But over this subarc \(\rho _1\) is decreasing and \(\rho _2\) is increasing, and we enter this subarc with \(\rho _1 < \rho _2\), so these functions cannot intersect within this arc. This completes the argument showing that our assumption implies that an EEoverlap is not possible.
We conclude that one of the intersections stated in the lemma must exist. \(\square \)
The charging scheme We charge \(v\) to a portal (\(A_2\) or \(A_2'\)) of \(R_2\) that intersects \(E_1\) or to a portal (\(A_1\) or \(A_1'\)) of \(R_1\) that intersects \(E_2\). At least one such intersection must exist by Lemma 2. A useful property of this charging, which will be needed in the next part of the analysis, is given by the following lemma.
Lemma 3
Let \(v\) be a nonterminal RRvertex, lying on \({\partial }R_i\cap {\partial }R_j\), which is charged to a portal \(h_j\) of \(R_j\). Then \(e_i\), traced from its intersection with \(h_j\) into \(R_j\), gets further away from \(e_j\) (that is, the distance from the traced point to \(e_j\) keeps increasing).
Proof
Let \(q\) denote the endpoint of \(h_j\) incident to \(e_j\) and let \(q'\) denote the lower endpoint of \(h_j\). (Note that \(q'\) is \(w_j\) if \(v\) is charged to the portal \(A_j\) of \(R_j\) which is also a portal of \(Q_j\) and \(q'\) is the endpoint of \(A_j'\), the portal of the complementary rectangle \(Q_j'\), otherwise.) Since \(v\) is a nonterminal RRvertex, the segment \(\overrightarrow{vq'}\), as we trace it from \(v\), enters \(R_i\) (this follows as \(e_i\) has positive slope) and then exits it before reaching \(q'\). The exit point lies on a portal \(h_i\) of \(R_i\). Since \(e_i\) intersects \(h_j\), it follows that \(h_i\) must also cross \(h_j\). But then \(q'\) must lie inside the diametral disk spanned by \(h_i\), and thus it lies inside \(K_i\), a contradiction (to \(v\) being nonterminal) that completes the proof. \(\square \)
The expected number of vertices charged to a portal Fix a segment of \(\mathcal {E}\), denote it as \(e_0\), and rename the other segments as \(e_1,\dots ,e_{n1}\). Assume, for simplicity, that \(e_0\) is horizontal. We bound the expected number of vertices charged to the lowerleft portal, denoted by \(g\), of the rectangle \(R_0\) (which is incident to the left endpoint, \(a_0\), of \(e_0\)); symmetric arguments will apply to the other three portal s of \(R_0\). Given a specific permutation \((r_0,\ldots ,r_{n1})\) of the input set of distances \(\varTheta \), let \(\chi _\mathrm {RR}(g;r_0,\ldots ,r_{n1})\) denote the number of vertices charged to \(g\) if \(e_i\) is expanded by \(r_i\), for \(i=0,\ldots ,n1\). We wish to bound \(\bar{\chi }_\mathrm {RR}(g)\), the expected value of \(\chi _\mathrm {RR}(g;r_0,\ldots ,r_{n1})\) with respect to the random choice of the \(r_i\)’s, as effected by randomly shuffling them (by a random permutation acting on \(\varTheta \)).
We first fix a value \(r\) (one of the values \(\theta _i\in \varTheta \)) of \(r_0\) and bound \(\bar{\chi }_\mathrm {RR}(g\mid r)\), the expected number of vertices charged to \(g\) conditioned on the choice \(r_0=r\); the expectation is taken over those permutations that fix \(r_0=r\); they can be regarded as random permutations of the remaining elements of \(\varTheta \). Then we bound \(\bar{\chi }_\mathrm {RR}(g)\) by taking the expection of the resulting bound over the choice of \(r_0\).
For a fixed permutation \((r_1,\ldots ,r_{n1})\), set \(K_l := e_l\oplus D(r_l)\), for \(e_l \in \mathcal {E}_g\), \(\mathcal {K}_g = \{ K_l \mid e_l \in \mathcal {E}_g\}\), and \(\mathcal {U}_g = \mathcal {U}(\mathcal {K}_g) \cap e_0^\). We call a vertex of \(\mathcal {U}_g\) an Rvertex if it lies on \({\partial }R_i\) for some \(e_i \in \mathcal {E}_g\) (as opposed to lying on some semicircular arc). If a nonterminal RRvertex \(v\) is charged to the portal \(g\), then \(v\) is an Rvertex of \(\mathcal {U}_g\) (for the specific choice \(r_0=r\)). It thus suffices to bound the expected number of Rvertices on \(\mathcal {U}_g\), where the expectation is taken over the random shuffles of \(r_1, \ldots , r_{n1}\).
For \(i=1,\ldots ,m\), let \(r_i\) be, as above, the (random) expansion distance chosen for \(e_i\), and set \(J_i = R_i \cap \ell _0^\). If \(r_i \le r_i^*\) then \(J_i=\emptyset \), and if \(r_i > r_i^*\) then \(J_i\) is an interval containing \(q_i\). Let \(\mathcal {U}_0\) be the union of the intervals \(J_i\), and let \(\mu (r; r_1,\ldots r_m)\) be the number of connected components of \(\mathcal {U}_0\). Clearly, each Rvertex of \(\mathcal {U}_g\) is an endpoint of a component of \(\mathcal {U}_0\), which implies that \(\chi _\mathrm {RR}(g; r, r_1,\ldots ,r_{n1}) \le 2\mu (r; r_1,\ldots ,r_m)\). It therefore suffices to bound \(\bar{\mu }(r)\), the expected value of \(\mu (r; r_1,\ldots ,r_m)\) over the random shuffles of \(r_1,\ldots ,r_m\).
For each \(e_i \in \mathcal {E}_g\), let \(\beta _i\) be the length of the segment connecting \(a_0^\) to its orthogonal projection on \(e_i\). As is easily checked, we have \(\beta _i < r\). It is also clear that if \(r_i \ge \beta _i\) then the entire segment \(q_i a_0^\) is contained in \(K_i\).
Lemma 4
In the preceding notations, the expected value of \(\bar{\mu }(r)\) is \(O(\log n)\).
Proof
Assume that \(r=\theta _{nk+1}\), for some \(k\in \{1,\ldots ,n\}\). We claim that is this case \(\bar{\mu }(r) \le n/k\).
For \(i=1,\ldots ,m\), if \(r_i > r\) then \(r_i > \beta _i\) and therefore \(a_0^ \in J_i\). Hence, if \(i\) is the smallest index for which \(r_i > r\) (assuming that such an index exists), then \(\mathcal {U}_0\) has at most \(i\) connected components: the one containing \(J_i\) and at most \(i1\) intervals to its right.
Recall that we condition the analysis on the choice of \(r_0=r\), and that we are currently assuming that \(r_0\) is the \(k\)th largest value of \(\varTheta \). For this fixed value of \(r_0\), the set \(\mathcal {E}_g\) is fixed.
Order the segments in \(\mathcal {E}_0:=\mathcal {E}{\setminus } e_0\) by placing first the \(m\) segments of \(\mathcal {E}_g\) in their order as defined above, and then place the remaining \(nm1\) segments in an arbitrary order. Clearly this reshuffling of the segments does not affect the property that the expansion distances in \(\varTheta _0:=\varTheta {\setminus }\{r\}\) that are assigned to them form a random permutation of \(\varTheta _0\).
In this context, \(\bar{\mu }(r)\) is upper bounded by the expected value of the index \(j\) of the first segment \(e_j\) in \(\mathcal {E}_0\) that gets one of the \(k1\) distances larger than \(r\). In general, the two quantities are not equal, because we set \(\mu (r; r_1,\ldots ,r_m)=m\) when \(j\) is greater than \(m\), that is, in case no segment of \(\mathcal {E}_g\) gets a larger distance.
As is well known, the expected value of the index \(j\) of the first appearance of one of \(k1\) distinguished elements in a random permutation of \(n1\) elements is \(n/k\), from which our claim follows. This follows since the expected size of a set in an ordered partition of \(n\) elements into \(k\) sets is \(n/k\), e.g., as in [14, p. 175, Problem 2]. Here we partition \(n1(k1)\) elements into \(k\) sets, by placing the distinguished elements between them, and we are interested in the expected size of the first group, plus the distinguished element following it, that is \((n1(k1))/k + 1 = n/k\). Note that the case \(k=1\) is special, because no index can get a larger value, but the resulting expectation, namely \(n\), serves as an upper bound for \(\bar{\mu }(r)\).
Putting it all together Lemma 4 proves that the expected number of nonterminal vertices of \(\mathcal {U}\) charged to a fixed portal of some rectangle in \(\mathcal {R}\) is \(O(\log n)\). By Lemma 2, each nonterminal RRvertex of \(\mathcal {U}\) is charged to one of the \(4n\) portal s of the rectangles in \(\mathcal {R}\). Repeating this analysis for all these \(4n\) portal s, the expected number of nonterminal RRvertices in \(\mathcal {U}\) is \(O(n\log n)\). Adding the linear bound on the number of terminal RRvertices, we obtain the following result.
Lemma 5
The expected number of RRvertices of \(\mathcal {U}(\mathcal {K})\) is \(O(n\log n)\).
3.2 CRVertices
Next, we bound the expected number of CRvertices of \(\mathcal {U}\). Using a standard notation, we call a vertex \(v \in \mathcal {U}\) lying on \({\partial }K_i \cap {\partial }K_j\) regular if \({\partial }K_i\) and \({\partial }K_j\) intersect at two points (one of which is \(v\)); otherwise \(v\) is called irregular. By a result of Pach and Sharir [24], the number of regular vertices on \({\partial }\mathcal {U}\) is proportional to \(n\) plus the number of irregular vertices on \({\partial }\mathcal {U}\). Since the expected number of RR and CCvertices on \({\partial }\mathcal {U}\) is \(O(n\log n)\), the number of regular CRvertices on \({\partial }\mathcal {U}\) is \(O(n\log n+\kappa )\), where \(\kappa \) is the number of irregular CRvertices on \({\partial }\mathcal {U}\). It thus suffices to prove that the expected value of \(\kappa \) is \(O(n\log n)\).
Geometric properties of CRvertices We begin by establishing a few simple geometric lemmas.
Lemma 6
Let \(D\) and \(D'\) be two disks of respective radii \(r,r'\) and centers \(o,o'\). Assume that \(r'\ge r\) and that \(o'\in D\). Then \(D'\cap {\partial }D\) is an arc of angular extent at least \(2\pi /3\), whose midpoint lies at the radius vector of \(D\) from \(o\) through \(o'\).
Proof
Corollary 2
 (a)
If \(o'\in D_1\) and \(r < r'\), then \(\gamma _1\) is fully contained in \(D'\).
 (b)
If \(o' \in D {\setminus } D_1\), then either \(D'\) is disjoint from \(\gamma _1\) or \(D'\cap \gamma _1\) consists of one or two arcs, each containing an endpoint of \(\gamma _1\). See Fig. 16(ii), (iii).
Proof
See Fig. 16(i). Claim (a) follows from the preceding lemma, since \(D'\cap {\partial }D\) is an arc of angular extent at least \(2\pi /3\) whose midpoint lies at a point on \(\gamma _1\).
For (b), \(D'\cap {\partial }D\) is a connected arc \(\delta \), whose midpoint lies in direction \(\varvec{oo'}\) and thus outside \(\gamma _1\) (recall that \(o'\not \in D_1\)), and \(D'\cap \gamma _1 = \delta \cap \gamma _1\). The intersection of two arcs of the same circle consists of zero, one, or two connected subarcs. In the first case the claim is obvious. In the third case, each of the arcs \(\delta \), \(\gamma _1\) must contain both endpoints of the other arc, so (b) follows. In the second case, the only situation that we need to rule out is when \(\delta \cap \gamma _1\) is contained in the relative interior of \(\gamma _1\), in which case \(\delta \), and its midpoint, are contained in \(\gamma _1\), contrary to assumption. Hence (b) holds in this case too. \(\square \)
Fix a segment of \(\mathcal {E}\), call it \(e_0\), and rename the other segments to be \(e_1,\dots ,e_{n1}\). \(\partial K_0\) has two semicircular arcs, each corresponding to a different endpoint of \(e_0\). We fix one of the semicircular arcs of \(K_0\) and denote it by \(\gamma _0\). Let \(r_0\) be the random distance assigned to \(e_0\), let \(D_0\) be the disk of radius \(r_0\) containing \(\gamma _0\) on its boundary, and let \(H_0\subset D_0\) be the halfdisk spanned by \(\gamma _0\).
Partition \(H_0\) into three sectors of angular extent \(\pi /3\) each, denoted as \(H_{01},H_{02},H_{03}\). Let \(\gamma _{0i} \subset \gamma _0\) denote the arc bounding \(H_{0i}\), for \(i=1,2,3\). Here we call a vertex \(v \in {\partial }\mathcal {U}\) formed by \(\gamma _{0i} \cap {\partial }K_j\), for some \(j\), a terminal vertex if the portion of \(\gamma _{0i}\) between \(v\) and one of its endpoints is contained in \(K_j\), and a nonterminal vertex otherwise. There are at most \(O(1)\) terminal vertices on \(\gamma _0\), for an overall bound of \(O(n)\) on the number of such vertices, so it suffices to bound the expected number of nonterminal irregular CRvertices on each subarc \(\gamma _{0i}\), for \(i=1,2,3\).
Let \(\mathcal {E}(r_0)\) denote the set of all segments \(e_j\ne e_0\) that intersect the disk \(D_0\), and, for \(i=1,2,3\), let \(\mathcal {E}_i(r_0)\subseteq \mathcal {E}(r_0)\) denote the set of all segments \(e_j\ne e_0\) that intersect the sector \(H_{0i}\). Set \(m_i := m_i(r_0) = \mathcal {E}_i(r_0)\). Segments in \(\mathcal {E}(r_0){\setminus } \mathcal {E}_i(r_0)\) intersect \(D_0\) but are disjoint from \(H_{0i}\). (The parameter \(r_0\) is to remind us that all these sets depend (only) on the choice of \(r_0\).)
Lemma 7
Let \(e_j\in \mathcal {E}{\setminus } \mathcal {E}(r_0)\). If \(\mathcal {U}\) has a CRvertex \(v \in \gamma _{0i}\cap {\partial }K_j\), for some \(i =1,2,3\), then \(v\) is either a regular vertex or a terminal vertex.
Proof
Let \(c\) denote the center of \(D_0\) (it is an endpoint of \(e_0\)), and consider the interaction between \(K_j\) and \(D_0\). We split the analysis into the following two cases.
Case 1, \(r_j \le r_0\): Regard \(D_0\) as \(D_0^*\oplus D(r_j)\), where \(D_0^*\) is the disk of radius \(r_0r_j\) centered at \(c\). By assumption, \(D_0^*\) and \(e_j\) are disjoint, implying that \(D_0\) and \(K_j\) are pseudodisks (cf. [18]), that is, their boundaries intersect in two points, one of which is \(v\); denote the other point as \(v'\). See Fig. 17(i).
If only \(v\) lies on \(\gamma _0\), then \(v\) must be a terminal vertex, so assume that both \(v\) and \(v'\) lie on \(\gamma _0\). We claim that \({\partial }K_j\) and \({\partial }K_0\) can intersect only at \(v\) and \(v'\), implying that \(v\) is regular. Indeed, \(v\) and \(v'\) partition \({\partial }K_j\) into two connected pieces. One piece is inside \(D_0\), locally near \(v\) and \(v'\), and cannot intersect \({\partial }K_i\) in a point other than \(v\) and \(v'\) without intersecting \(D_0\) in a third point (other than \(v\) and \(v'\)), contradicting the property that \(D_0\) and \(K_j\) are pseudodisks. The other connected piece of \({\partial }K_j\) between \(v\) and \(v'\) is separated from \({\partial }K_i {\setminus } \gamma _0\) by the line through \(v\) and \(v'\) and therefore cannot contain intersections other than \(v\) and \(v'\) between \({\partial }K_j\) and \({\partial }K_i\).
Case 2, \(r_j > r_0\): Let \(K_j^* = e_j \oplus D(r_jr_0)\). \(K_j\) can now be regarded as \(K_j^* \oplus D(r_0)\). If \(c \not \in K_j^*\), then by the result of [18], \(D_0=c\oplus D(r_0)\) and \(K_j\) are pseudodisks; see Fig. 17(ii). Therefore, the argument given above for the case where \(r_0\ge r_j\) implies the lemma in this case as well. Finally, \(c \in K_j^*\) implies that \(K_j\) contains \(D_0\), so this case cannot occur (it contradicts the existence of \(v\)). See Fig. 17(iii). \(\square \)
Using Lemmas 6 and 7, we obtain the following property.
Lemma 8
Let \(v \in \gamma _{0i}\cap {\partial }K_j\) be a nonterminal, irregular CRvertex of \(\mathcal {U}\). Then (i) \(e_j \in \mathcal {E}_i(r_0)\), and (ii) for all \(e_l \in \mathcal {E}_i(r_0)\), \(r_l < r_0\).
Proof
Assume then that \(v'\notin D_0\). Since \(e_j\) intersects \(D_0\), there exists a point \(u\in e_j\cap {\partial }D_0\) such that \(uv'\) is openly disjoint from \(D_0\). By our assumption that \(e_j \in \mathcal {E}(r_0){\setminus } \mathcal {E}_i(r_0)\), \(u\notin \gamma _{0i}\). Let \(\delta \) denote the arc of \({\partial }D_0\) that connects \(u\) and \(v\) and lies, locally near \(u\), on the side of \(e_j\) that contains \(v\). See Fig. 18(ii). It can be verified that \(\delta \) is the smaller of the two arcs of \({\partial }D_0\) connecting \(u\) and \(v\). Clearly, \(\delta \) contains an endpoint of \(\gamma _{0i}\), and the desired contradiction will be reached by showing that \(\delta \) is contained in \(K_j\).
The arc \(\delta \) lies inside a wedge \(W\), with apex \(u\), formed by the ray \(uv\) and the line supporting \(e_j\), and also inside the strip \(\Sigma \) bounded by \(e_j\) and the parallel line through \(v\). Let \(b_j\) be the endpoint of \(e_j\) that lies on the boundary of \(W\), \(\gamma _j^+\) the circular arc of \(K_j\) centered at \(b_j\), and \(C_j^+\) the circle (centered at \(b_j\)) containing the arc \(\gamma _j^+\). Since \(\delta \subset W \cap \Sigma \), \(\delta \) can intersect \(\partial K_j\) only at a point on the arc \(\gamma _j\). Therefore, if \(\delta \not \subset K_j\), then \(\delta \) escapes \(K_j\) through a point \(w \in \gamma _j^+\). Note that the endpoint \(v\) of \(\delta \) lies outside \(C_j^+\), so the portion of \(\delta \) between \(v\) and \(w\) intersects \(C_j^+\) at a point other than \(w\). Finally, the endpoint \(u\) of \(\delta \) lies inside \(K_j\), so the portion of \(\delta \) between \(w\) and \(u\), which lies outside \(D_j^+\) locally near \(w\), also intersects \(\gamma _j^+\) at a point different from \(w\); \(\delta \) enters the disk \(D_j^+\) bounded by \(C_j^+\) at this point. This, however, implies that \(\delta \) intersect \(C_j^+\) at three points, a contradiction. Hence \(\delta \subset K_j\).
To establish (ii), notice that Part (a) of Corollary 2 implies that \(r_l < r_0\) for all \(e_l \in \mathcal {E}_i(r_0)\), because otherwise we would have \(\gamma _{0i}\subset K_l\) and \(\gamma _{0i}\) would not contain any vertex of \({\partial }\mathcal {U}\). \(\square \)
Lemma 9
Using the notation above, \(\bar{\chi }_\mathrm {CR}(\gamma _0) = O(\log n)\).
Proof
Following the above scheme, suppose that the value \(r_0\) is indeed fixed to \(r\), so \(\gamma _0\) and \(\gamma _{0i}\), \(1 \le i \le 3\), are fixed. As above, set \(m_i= \mathcal {E}_i(r)\), for \(i=1,2,3\); the sets \(\mathcal {E}_i(r)\) and their sizes \(m_i\) are also fixed. We bound the expected number of nonterminal irregular vertices on \(\gamma _{0i}\), for a fixed \(i\in \{1,2,3\}\). By Lemma 8, any such vertex lies on the boundary of \(\mathcal {J}_0\), the intersection of \(\gamma _{0i}\) with the union of \(\{K_l \mid e_l \in \mathcal {E}_i(r)\}\). Equivalently, it suffices to bound the expected number of connected components of \(\mathcal {J}_0\) that lie in the interior of \(\gamma _{0i}\). By Lemma 8, if \(r_l \ge r\) for any \(e_l \in \mathcal {E}_i(r)\), then there are no such components.
Summing this bound over all three subarcs of \(\gamma _0\) and adding the constant bound on the number of terminal (irregular) vertices, we obtain that the expected number of irregular CRvertices of \(\mathcal {U}\) on \(\gamma _0\) is \(O(\log n)\). Summing these expectations over the \(2n\) semicircular arcs of the racetracks in \(\mathcal {K}\), and adding the bounds on the number of regular CRvertices we obtain the following lemma.
Lemma 10
The expected number of CRvertices on \(\mathcal {U}(\mathcal {K})\) is \(O(n\log n)\).
Combining Lemma 5, Lemma 10, and the linear bound on the number of CCvertices, completes the proof of Theorem 2 for the case of segments.
4 The Case of Polygons
In this section we consider the case where the objects of \(\mathcal {C}\) are \(n\) convex polygons, each with at most \(s\) vertices. For simplicity, we prove Theorem 2 when each \(C_i\) is a convex \(s\)gon—if \(C_i\) has fewer than \(s\) vertices, we can split some of its edges into multiple edges so that it has exactly \(s\) vertices. We reduce this case to the case of segments treated above. A straightforward reduction that just takes the individual edges of the \(s\)gons as our set of segments does not work, since edges of the same polygon are all expanded by the same distance. Nevertheless, we can overcome this difficulty as follows.
Let \(\mathcal {C}=\{C_1,\ldots ,C_n\}\) be the set of the \(n\) given polygons, and consider a fixed assignment of expansion distances \(r_i\) to the polygons \(C_i\). For each \(i\), enumerate the edges of \(C_i\) as \(e_{i1},e_{i2},\ldots ,e_{is}\); the order of enumeration is not important. Let \(v\) be a vertex of \({\partial }\mathcal {U}\), lying on the boundaries of \(K_i\) and \(K_j\), for some \(1\le i<j\le n\). Then there exist an edge \(e_{ip}\) of \(C_i\) and an edge \(e_{jq}\) of \(C_j\) such that \(v\) lies on \({\partial }(e_{ip}\oplus D(r_i))\) and on \({\partial }(e_{jq}\oplus D(r_j))\); the choice of \(e_{ip}\) is unique if the portion of \({\partial }K_i\) containing \(v\) is a straight edge, and, when that portion is a circular arc, any of the two edges incident to the center of the corresponding disk can be taken to be \(e_{ip}\). A similar property holds for \(e_{jq}\).
The following stronger property holds too. For each \(1\le p\le s\), let \(\mathcal {C}_p\) be the set of edges \(\{e_{1p},e_{2p},\ldots ,e_{np}\}\), and let \(\mathcal {K}_p = \{ e_{1p} \oplus D(r_1),\ldots ,e_{np} \oplus D(r_n) \}\). Then, as is easily verified, \(v\) is a vertex of the union \(\mathcal {U}(\mathcal {K}_p \cup \mathcal {K}_q)\). Moreover, for each \(p\), the expansion distances \(r_i\) of the edges \(e_{ip}\) of \(\mathcal {C}_p\) are all the elements of \(\varTheta \), each appearing once, and their assignment to the segments of \(\mathcal {C}_p\) is a random permutation. Fix a pair of indices \(1\le p<q\le s\), and note that each expansion distance \(r_i\) is assigned to exactly two segments of \(\mathcal {C}_p\cup \mathcal {C}_q\), namely, to \(e_{ip}\) and \(e_{iq}\).
We now repeat the analysis given in the preceding section for the collection \(\mathcal {C}_p\cup \mathcal {C}_q\), and make the following observations. First, the analysis of CCvertices remains the same, since the complexity of the union of any family of disks is linear.
Second, in the analysis of RR and CRvertices, the exploitation of the random nature of the distances \(r_i\) comes into play only after we have fixed one segment (that we call \(e_0\)) and its expansion distance \(r_0\), and consider the expected number of RRvertices and CRvertices on the boundary of \(K_0=e_0\oplus D(r_0)\), conditioned on the fixed choice of \(r_0\). Suppose, without loss of generality, that \(e_0\) belongs to \(\mathcal {C}_p\). We first ignore its sibling \(e'_0\) in \(\mathcal {C}_q\) (from the same polygon), which receives the same expansion distance \(r_0\); \(e'_0\) can form only \(O(1)\) vertices of \(\mathcal {U}\) with \(e_0\).^{2} The interaction of \(e_0\) with the other segments of \(\mathcal {C}_p\) behaves exactly as in Sect. 3, and yields an expected number of \(O(\log n)\) RRvertices of \(\mathcal {U}(\mathcal {K}_p)\) charged to the portal s of \(R_0\) and an expected number of \(O(\log n)\) CRvertices charged to circular arcs of \(K_0\). Similarly, the interaction of \(e_0\) with the other segments of \(\mathcal {C}_q\) (excluding \(e_0'\)) is also identical to that in Sect. 3, and yields an additional expected number of \(O(\log n)\) vertices of \(\mathcal {U}(\{e_0\}\cup \mathcal {K}_q)\) charged to an portal s and circular arcs of \(K_0\). Since any vertex of \(\mathcal {U}(\mathcal {K}_p\cup \mathcal {K}_q)\) involving \(e_0\) must be one of these two kinds of vertices, we obtain a bound of \(O(\log n)\) on the expected number of such vertices, and summing this bound over all segments \(e_0\) of \(\mathcal {C}_p\cup \mathcal {C}_q\), we conclude that the expected complexity of \(\mathcal {U}(\mathcal {K}_p\cup \mathcal {K}_q)\) is \(O(n\log n)\). Note also that the analysis just given manages to finesse the issue of segments sharing endpoints.
Summing this bound over all \(O(s^2)\) choices of \(p\) and \(q\), we obtain the bound asserted in Theorem 2. The constant of proportionality in the bound that this analysis yields is \(O(s^2)\).
5 Network Vulnerability Analysis
To obtain the algorithm we first discretize each \(f_i\) by choosing a finite family \(\mathcal {K}_i\) of superlevel sets of \(f_i\) (each of the form \(\{q\in {\mathbb R}^2 \mid f_i(q) \ge t\}\)), and reduce the problem of computing \(\varPhi (\mathcal {E})\) to that of computing the maximum depth in the arrangement \(\mathcal {A}(\mathcal {K})\) of \(\mathcal {K}=\bigcup _i \mathcal {K}_i\). Our algorithm then uses a samplingbased method for estimating the maximum depth in \(\mathcal {A}(\mathcal {K})\), and thereby avoids the need to construct \(\mathcal {A}(\mathcal {K})\) explicitly.
Lemma 11
 (i)
\(\displaystyle \varPhi (q,\mathcal {E}) \ge \frac{\Delta (q,\mathcal {K})}{m}\), for each point \(q\in {\mathbb R}^2\).
 (ii)
\(\displaystyle \varPhi (\mathcal {E}) \ge \frac{\Delta (\mathcal {K})}{m} \ge (1\tfrac{1}{2}\delta ) \varPhi (\mathcal {E})\).
We also need the following concept from the theory of random sampling.
The algorithm works in two phases. The first phase finds a value \(\rho \ge 1/n\) such that \(\omega (\mathcal {K}) \in [\rho , 2\rho ]\). The second phase exploits this “localization” of \(\omega (\mathcal {K})\) to compute the desired point \(\tilde{q}\).
The first phase performs a decreasing exponential search: For \(i \ge 1\), the \(i\)th step of the search tests whether \(\omega (\mathcal {K}) \le 1/2^i\). If the answer is yes, the algorithm moves to the \((i+1)\)st step; otherwise it switches to the second phase. Since we always have \(\omega (\mathcal {K}) \ge 1/n\) (see (2)), the first phase consists of at most \(\lceil \log _2 n\rceil \) steps.
Lemma 12
When the algorithm reaches step \(i\) of the first phase, we have \(\omega (\mathcal {K}) \le \rho _{i1}\) and \(\omega (\mathcal {K})\) is within the interval \([\omega (\mathcal {R}_i)\tfrac{1}{4}\rho _i, \omega (\mathcal {R}_i)+\tfrac{1}{4}\rho _i]\).
Proof
The algorithm continues to step \(i+1\) if \(\omega (\mathcal {R}_i) \le \tfrac{3}{4} \rho _i\). But then by (5) we get that \(\omega (\mathcal {K}) \le \tfrac{3}{4} \rho _i + \frac{1}{4}\rho _i = \rho _i \) as required. \(\square \)
Suppose that the algorithm decides to terminate the first phase and continue to the second phase, at step \(i\). Then, by Lemma 4.2, we have that \(\omega (\mathcal {K})\in [\omega (\mathcal {R}_i)\tfrac{1}{4}\rho _i, \omega (\mathcal {R}_i)+\tfrac{1}{4}\rho _i]\). Since, by construction, \(\omega (\mathcal {R}_i) > \tfrac{3}{4} \rho _i \), the ratio between the endpoints of this interval is at most \(2\), as is easily checked, so if we set \(\rho =\omega (\mathcal {R}_i)\tfrac{1}{4}\rho _i\) then \(\omega (\mathcal {K}) \in [\rho ,2\rho ]\) as required upon entering the second phase.
In the second phase, we set \(\rho =\omega (\mathcal {R}_i)\tfrac{1}{4}\rho _i\) and \({\varepsilon }=\delta /4\), and construct a \((\rho ,{\varepsilon })\)approximation of \(\mathcal {K}\) by choosing, as above, a random subset \(\mathcal {R}\) of size \(\nu =\nu (\rho ,{\varepsilon })=O(2^i\log n)\). We compute \(\mathcal {A}(\mathcal {R})\), using the randomized incremental algorithm in [25], and return a point \(\tilde{q} \in {\mathbb R}^2\) of maximum depth in \(\mathcal {A}(\mathcal {R})\).
This completes the description of the algorithm.
To analyze the expected time taken by the \(i\)th step of the first phase, we bound the expected number of vertices in \(\mathcal {A}(\mathcal {R}_i)\).
Lemma 13
The expected number of vertices in the arrangement \(\mathcal {A}(\mathcal {R}_i)\) is \(O(2^i\log ^3 n)\).
Proof
The expected time spent in constructing \(\mathcal {A}(\mathcal {R}_i)\) by the randomized incremental algorithm in [25] is \(O(\nu _i\log \nu _i + \mathcal {A}(\mathcal {R}_i))=O(2^i\log ^3n)\). Hence, the \(i\)th step of the first phase takes \(O(2^i \log ^3 n)\) expected time. Summing this bound over the steps of the first phase, we conclude that the expected time spent in the first phase is \(O(n\log ^3 n)\).
Putting everything together, we obtain that the expected running time of the procedure is \(O(\tfrac{n}{\delta ^4}\log ^3 n)\), and it computes, with high probability, a point \(\tilde{q}\) such that \(\varPhi (\tilde{q},\mathcal {E}) \ge (1\delta )\varPhi (\mathcal {E})\). This completes the proof of Theorem 3.
6 Discussion
We have shown that if we take the Minkowski sums of the members of a family of pairwisedisjoint convex sets, each of constant description complexity, with disks whose radii are randomly chosen according to a suitable probabilistic model, then the expected complexity of the union of the Minkowski sums is near linear. This generalizes the result of Kedem et al. [18] and indicates that the complexity of the union of Minkowski sums is quadratic only if the expansion distances are chosen in an adversarial manner. Our model is related to the socalled realistic input models, proposed to obtain more refined bounds on the performance of a variety of geometric algorithms [11]. There are also some similarities between our model and the framework of smoothed analysis [26].
A natural collection of open problems is to tighten the bounds in our theorems or prove corresponding lower bounds. In particular, the following questions arise. (i) The \(O(n^{1+\varepsilon })\) bound of Theorem 1 is unlikely to be tight. Is it possible to prove an \(O(n\log n)\) upper bound as we did for polygons in Theorem 2? (ii) Can the bound in Theorem 2 be improved from \(O(s^2n\log n)\) to \(O(sn\log n)\)? (iii) Is the bound of Theorem 2 asymptotically tight, even for segments, or could one prove a tighter \(o(n\log n)\) bound? maybe even linear?
It would be useful to prove, or disprove, that the density and permutation models are equivalent, in the sense that the value of \(\psi (\mathcal {C})\) is asymptotically the same under both models for any family \(\mathcal {C}\) of pairwisedisjoint convex sets. Nevertheless, it is conceivable that there is a large class of density functions for which the density model yields a better upper bound.
Another interesting direction for future research is to explore other problems that can benefit from our model. For example, following the work in this paper, HarPeled and Raichel [15] showed that the complexity of the multiplicatively weighted Voronoi diagram of \(n\) points in the plane is \(O(n \mathop {\mathrm {polylog}}n)\), if the weights are chosen randomly, in either of the two models assumed in this paper. Recall that if the weights are chosen by an adversary, then the complexity of the diagram can be quadratic in the worst case [7]. More recently, Chang et al. [9] showed a similar bound for more generalized Voronoi diagrams, where the distance to a site might depend on several parameters that are chosen randomly. We believe that the expected complexity of the multiplicativelyweighted Voronoi diagram of an arbitrary set of points in \({\mathbb R}^3\) is subquadratic if their weights are chosen using one of our models and the spread of the weights is at least a constant. Note that, in contrast, the standard Voronoi diagram can have quadratic complexity in the worst case.
Footnotes
 1.
When we carry over the analysis to the density model, the latter assumption will hold with probability \(1\) when \(\pi \) is Lebesguecontinuous, but may fail for a discrete probability mass distribution. In the latter situation, we can use symbolic perturbations to turn \(\pi \) into a density in general position, without affecting the asymptotic bound that we are after.
 2.
As a matter of fact, \(e_0\) and \(e'_0\) do not generate any vertex of the full union \(\mathcal {U}(\mathcal {C})\), but they might generate vertices of the partial union \(\mathcal {U}(\mathcal {C}_p\cup \mathcal {C}_q)\).
Notes
Acknowledgments
The authors thank Emo Welzl for useful discussions concerning the two probabilistic models used in the paper, and the anonymous referees for their valuable comments. A preliminary version of this paper appeared in Proc. 29th Annual Symposium of Computational Geometry, 2013, pp. 177–186. Work by Pankaj Agarwal and Micha Sharir has been supported by Grant 2012/229 from the U.S.Israel Binational Science Foundation. Work by Pankaj Agarwal has also been supported by NSF under Grants CCF0940671, CCF1012254, and CCF1161359, by ARO Grant W911NF0810452, and by an ERDC contract W9132V11C0003. Work by Sariel HarPeled has been supported by NSF under Grants CCF0915984 and CCF1217462. Work by Haim Kaplan has been supported by Grant 822/10 from the Israel Science Foundation, Grant 1161/2011 from the GermanIsraeli Science Foundation, and by the Israeli Centers for Research Excellence (ICORE) program (Center No. 4/11). Work by Micha Sharir has also been supported by NSF Grant CCF0830272, by Grants 338/09 and 892/13 from the Israel Science Foundation, by the Israeli Centers for Research Excellence (ICORE) program (Center No. 4/11), and by the Hermann Minkowski–MINERVA Center for Geometry at Tel Aviv University.
References
 1.Agarwal, P.K., Efrat, A., Ganjugunte, S.K., Hay, D., Sankararaman, S., Zussman, G.: Network vulnerability to single, multiple, and probabilistic physical attacks. In: Proceedings of Military Communication Conference 2010, pp. 1824–1829 (2010)Google Scholar
 2.Agarwal, P.K., Efrat, A., Ganjugunte, S. K., Hay, D., Sankararaman, S., Zussman, G.: The resilience of WDM networks to probabilistic geographical failures. In: IEEE/ACM Transactions of Network 21 pp. 1525–1538 (2013)Google Scholar
 3.Agarwal, P.K., Ezra, E., Sharir, M.: Nearlinear approximation algorithms for geometric hitting sets. Algorithmica 63, 1–25 (2012)MathSciNetCrossRefMATHGoogle Scholar
 4.Agarwal, P. K., Hagerup, T., Ray, R., Sharir, M., Smid, M., Welzl, E.: Translating a planar object to maximize point containment. In: Proceedings of 10th Annual European Symposium on Algorithms, pp. 42–53 (2002)Google Scholar
 5.Agarwal, P.K., Pach, J., Sharir, M.: State of the union (of geometric objects). In: Goodman, J., Pach, J., Pollack, R. (eds.) Surveys on Discrete and Computational Geometry, pp. 9–48. American Mathematical Society, Providence, RI (2008)CrossRefGoogle Scholar
 6.Aronov, B., HarPeled, S.: On approximating the depth and related problems. SIAM J. Comput. 38, 899–921 (2008)MathSciNetCrossRefMATHGoogle Scholar
 7.Aurenhammer, F., Klein, R.: Voronoi diagrams. In: Sack, J.R., Urrutia, J. (eds.) Handbook of Computational Geometry, pp. 201–290. Elsevier, Amsterdam (1999)Google Scholar
 8.Bhandari, R.: Survivable Networks: Algorithms for Diverse Routing. Kluwer, Norwell, MA (1998)Google Scholar
 9.Chang, H.C., HarPeled, S., Raichel, B.: From proximity to utility: a Voronoi partition of Pareto optima, CoRR. http://arxiv.org/abs/1404.3403 (2014)
 10.Clarkson, K.L., Shor, P.W.: Applications of random sampling in computational geometry II. Discrete Comput. Geom. 4, 387–421 (1989)MathSciNetCrossRefMATHGoogle Scholar
 11.de Berg, M., Katz, M.J., van der Stappen, A.F., Vleugels, J.: Realistic input models for geometric algorithms. Algorithmica 34, 81–97 (2002)MathSciNetCrossRefMATHGoogle Scholar
 12.Edelsbrunner, H., Fasy, B.T., Rote, G.: Add isotropic Gaussian kernels at own risk: more and more resilient modes in higher dimensions. In: Proceedings of 28th Annual Symposium Computational Geometry, pp. 91–100 (2012)Google Scholar
 13.Foster, J.S., Gjelde, E., Graham, W.R., Hermann, R.J., Kluepfel, H.M., Lawson, R.L., Soper, G.K., Wood, L.L., Woodard, J.B.: Report of the Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack, Critical National Infrastructures (2008)Google Scholar
 14.Graham, R.L., Knuth, D.E., Patashnik, O.: Concrete Mathematics: A Foundation for Computer Science, 2nd edn. Addison Wesley, Boston (1994)MATHGoogle Scholar
 15.HarPeled, S., Raichel, B.: On the complexity of randomly weighted Voronoi diagrams. In: Proceedings of 30th Annual Symposium Computational Geometry, pp. 232–241 (2014)Google Scholar
 16.HarPeled, S., Sharir, M.: Relative \((p,\varepsilon )\)approximations in geometry. Discrete Comput. Geom. 45, 462–496 (2011)MathSciNetCrossRefMATHGoogle Scholar
 17.Johnson, N.L., Kemp, A.W., Kotz, S.: Univariate Discrete Distributions, 3rd edn. Wiley, New York (2005)CrossRefMATHGoogle Scholar
 18.Kedem, K., Livne, R., Pach, J., Sharir, M.: On the union of Jordan regions and collisionfree translational motion amidst polygonal obstacles. Discrete Comput. Geom. 1, 59–71 (1986)MathSciNetCrossRefMATHGoogle Scholar
 19.Lifshitz, L.M., Pizer, S.M.: A multiresolution hierarchical approach to image segmentation based on intensity extrema. IEEE Trans. Pattern Anal. Mach. Intell. 12, 529–540 (1990)CrossRefGoogle Scholar
 20.Matoušek, J.: Lectures on Discrete Geometry. Springer, Heidelberg (2002)CrossRefMATHGoogle Scholar
 21.Neumayer, S., Modiano, E.: Network reliability with geographically correlated failures. In: Proceedings 29th IEEE International Conference on Computer Communications, pp. 1658–1666 (2010)Google Scholar
 22.Neumayer, S., Zussman, G., Cohen, R., Modiano, E.: Assessing the vulnerability of the fiber infrastructure to disasters. IEEE/ACM Trans. Netw. 19, 1610–1623 (2011)CrossRefGoogle Scholar
 23.Ou, C., Mukherjee, B.: Survivable Optical WDM Networks. Springer, Heidelberg (2005)CrossRefGoogle Scholar
 24.Pach, J., Sharir, M.: On the boundary of the union of planar convex sets. Discrete Comput. Geom. 21, 321–328 (1999)MathSciNetCrossRefMATHGoogle Scholar
 25.Sharir, M., Agarwal, P.K.: DavenportSchinzel Sequences and Their Geometric Applications. Cambridge University Press, Cambridge (1995)MATHGoogle Scholar
 26.Spielman, D.A., Teng, S.H.: Smoothed analysis: an attempt to explain the behavior of algorithms in practise. Commun. ACM 52, 76–84 (2009)CrossRefGoogle Scholar
 27.Wu, W., Moran, B., Manton, J., Zukerman, M.: Topology design of undersea cables considering survivability under major disasters. In: Proceedings of International Conference on Advanced Information Networking and Applications Workshops, pp. 1154–1159 (2009)Google Scholar