Skip to main content

Computing the k-Crossing Visibility Region of a Point in a Polygon

  • Conference paper
  • First Online:
Combinatorial Algorithms (IWOCA 2019)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 11638))

Included in the following conference series:

  • 628 Accesses

Abstract

Two points p and q in a simple polygon P are k-crossing visible when the line segment pq crosses the boundary of P at most k times. Given a query point q, an integer k, and a polygon P, we propose an algorithm that computes the region of P that is k-crossing visible from q in O(nk) time, where n denotes the number of vertices of P. This is the first such algorithm parameterized in terms of k, resulting in asymptotically faster worst-case running time relative to previous algorithms when k is \(o(\log {n})\), and bridging the gap between the O(n)-time algorithm for computing the 0-visibility region of q in P and the \(O(n\log n)\)-time algorithm for computing the k-crossing visibility region of q in P.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    All indices are computed modulo the size of the corresponding vertex set: \(m+1\) in this case.

References

  1. Aichholzer, O., Fabila-Monroy, R., Flores-Peñaloza, D., Hackl, T., Huemer, C., Urrutia, J., Vogtenhuber, B.: Modem illumination of monotone polygons. Comput. Geometry 68, 101–118 (2018)

    Article  MathSciNet  Google Scholar 

  2. Aronov, B., Guibas, L.J., Teichmann, M., Zhang, L.: Visibility queries and maintenance in simple polygons. Discrete Comput. Geom. 27(4), 461–483 (2002)

    Article  MathSciNet  Google Scholar 

  3. Bahoo, Y., Banyassady, B., Bose, P., Durocher, S., Mulzer, W.: A time-space trade-off for computing the \(k\)-visibility region of a point in a polygon. Theor. Comput. Sci. 9 p. (2018, to appear)

    Google Scholar 

  4. Bajuelos, A.L., Canales, S., Hernández, G., Martins, M.: A hybrid metaheuristic strategy for covering with wireless devices. J. Univ. Comput. Sci. 18(14), 1906–1932 (2012)

    MathSciNet  MATH  Google Scholar 

  5. Ballinger, B., et al.: Coverage with \(k\)-transmitters in the presence of obstacles. J. Comb. Optim. 25(2), 208–233 (2013)

    Article  MathSciNet  Google Scholar 

  6. Bose, P., Lubiw, A., Munro, J.I.: Efficient visibility queries in simple polygons. Comput. Geom. 23(3), 313–335 (2002)

    Article  MathSciNet  Google Scholar 

  7. Cannon, S., Fai, T., Iwerks, J., Leopold, U., Schmidt, C.: Combinatorics and complexity of guarding polygons with edge and point 2-transmitters. arXiv preprint arXiv:1503.05681 (2015)

  8. Chang, H.C., Erickson, J., Xu, C.: Detecting weakly simple polygons. In: Proceedings of the 26th ACM-SIAM Symposium on Discrete Algorithms (SODA 2014), pp. 1655–1670 (2014)

    Google Scholar 

  9. Chazelle, B.: Triangulating a simple polygon in linear time. Discrete Comput. Geom. 6(3), 485–524 (1991)

    Article  MathSciNet  Google Scholar 

  10. Davis, L.S., Benedikt, M.L.: Computational models of space: isovists and isovist fields. Comput. Graph. Image Process. 11(1), 49–72 (1979)

    Article  Google Scholar 

  11. Dean, J.A., Lingas, A., Sack, J.R.: Recognizing polygons, or how to spy. Vis. Comput. 3(6), 344–355 (1988)

    Article  Google Scholar 

  12. Duque, F., Hidalgo-Toscano, C.: An upper bound on the \(k\)-modem illumination problem. arXiv preprint arXiv:1410.4099 (2014)

  13. El Gindy, H., Avis, D.: A linear algorithm for computing the visibility polygon from a point. J. Algorithms 2(2), 186–197 (1981)

    Article  MathSciNet  Google Scholar 

  14. Fabila-Monroy, R., Vargas, A., Urrutia, J.: On modem illumination problems. In: Proc. XIII Encuentros de Geometria Computacional (EGC 2009) (2009)

    Google Scholar 

  15. Hoffmann, K., Mehlhorn, K., Rosenstiehl, P., Tarjan, R.E.: Sorting Jordan sequences in linear time using level-linked search trees. Inf. Control 68(1–3), 170–184 (1986)

    Article  MathSciNet  Google Scholar 

  16. Huang, H., Ni, C.C., Ban, X., Gao, J., Schneider, A.T., Lin, S.: Connected wireless camera network deployment with visibility coverage. In: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM 2014), pp. 1204–1212 (2014)

    Google Scholar 

  17. Joe, B., Simpson, R.B.: Corrections to Lee’s visibility polygon algorithm. BIT Numer. Math. 27(4), 458–473 (1987)

    Article  Google Scholar 

  18. Lee, D.T.: Visibility of a simple polygon. Comput. Vis. Graph. Image Process. 22(2), 207–221 (1983)

    Article  Google Scholar 

  19. Meguerdichian, S., Koushanfar, F., Qu, G., Potkonjak, M.: Exposure in wireless ad-hoc sensor networks. In: Proceedings of the 7th ACM International Conference on Mobile Computing and Networking (MOBICOM 2001), pp. 139–150. ACM (2001)

    Google Scholar 

  20. Mouawad, N., Shermer, T.C.: The Superman problem. Vis. Comput. 10(8), 459–473 (1994)

    Article  Google Scholar 

  21. Murray, A.T., Kim, K., Davis, J.W., Machiraju, R., Parent, R.: Coverage optimization to support security monitoring. Comput. Environ. Urban Syst. 31(2), 133–147 (2007)

    Article  Google Scholar 

  22. Rosenstiehl, P.: Planar permutations defined by two intersecting Jordan curves. Graph Theory and Combinatorics, pp. 259–271 (1984)

    Google Scholar 

  23. Wang, Y.C., Hu, C.C., Tseng, Y.C.: Efficient deployment algorithms for ensuring coverage and connectivity of wireless sensor networks. In: Proceedings of the 1st IEEE Conference on Wireless Internet (WICON 2005), pp. 114–121 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Yeganeh Bahoo , Prosenjit Bose , Stephane Durocher or Thomas Shermer .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bahoo, Y., Bose, P., Durocher, S., Shermer, T. (2019). Computing the k-Crossing Visibility Region of a Point in a Polygon. In: Colbourn, C., Grossi, R., Pisanti, N. (eds) Combinatorial Algorithms. IWOCA 2019. Lecture Notes in Computer Science(), vol 11638. Springer, Cham. https://doi.org/10.1007/978-3-030-25005-8_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-25005-8_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-25004-1

  • Online ISBN: 978-3-030-25005-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics