Abstract
Two points p and q in a simple polygon P are k-crossing visible when the line segment pq crosses the boundary of P at most k times. Given a query point q, an integer k, and a polygon P, we propose an algorithm that computes the region of P that is k-crossing visible from q in O(nk) time, where n denotes the number of vertices of P. This is the first such algorithm parameterized in terms of k, resulting in asymptotically faster worst-case running time relative to previous algorithms when k is \(o(\log {n})\), and bridging the gap between the O(n)-time algorithm for computing the 0-visibility region of q in P and the \(O(n\log n)\)-time algorithm for computing the k-crossing visibility region of q in P.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
All indices are computed modulo the size of the corresponding vertex set: \(m+1\) in this case.
References
Aichholzer, O., Fabila-Monroy, R., Flores-Peñaloza, D., Hackl, T., Huemer, C., Urrutia, J., Vogtenhuber, B.: Modem illumination of monotone polygons. Comput. Geometry 68, 101–118 (2018)
Aronov, B., Guibas, L.J., Teichmann, M., Zhang, L.: Visibility queries and maintenance in simple polygons. Discrete Comput. Geom. 27(4), 461–483 (2002)
Bahoo, Y., Banyassady, B., Bose, P., Durocher, S., Mulzer, W.: A time-space trade-off for computing the \(k\)-visibility region of a point in a polygon. Theor. Comput. Sci. 9 p. (2018, to appear)
Bajuelos, A.L., Canales, S., Hernández, G., Martins, M.: A hybrid metaheuristic strategy for covering with wireless devices. J. Univ. Comput. Sci. 18(14), 1906–1932 (2012)
Ballinger, B., et al.: Coverage with \(k\)-transmitters in the presence of obstacles. J. Comb. Optim. 25(2), 208–233 (2013)
Bose, P., Lubiw, A., Munro, J.I.: Efficient visibility queries in simple polygons. Comput. Geom. 23(3), 313–335 (2002)
Cannon, S., Fai, T., Iwerks, J., Leopold, U., Schmidt, C.: Combinatorics and complexity of guarding polygons with edge and point 2-transmitters. arXiv preprint arXiv:1503.05681 (2015)
Chang, H.C., Erickson, J., Xu, C.: Detecting weakly simple polygons. In: Proceedings of the 26th ACM-SIAM Symposium on Discrete Algorithms (SODA 2014), pp. 1655–1670 (2014)
Chazelle, B.: Triangulating a simple polygon in linear time. Discrete Comput. Geom. 6(3), 485–524 (1991)
Davis, L.S., Benedikt, M.L.: Computational models of space: isovists and isovist fields. Comput. Graph. Image Process. 11(1), 49–72 (1979)
Dean, J.A., Lingas, A., Sack, J.R.: Recognizing polygons, or how to spy. Vis. Comput. 3(6), 344–355 (1988)
Duque, F., Hidalgo-Toscano, C.: An upper bound on the \(k\)-modem illumination problem. arXiv preprint arXiv:1410.4099 (2014)
El Gindy, H., Avis, D.: A linear algorithm for computing the visibility polygon from a point. J. Algorithms 2(2), 186–197 (1981)
Fabila-Monroy, R., Vargas, A., Urrutia, J.: On modem illumination problems. In: Proc. XIII Encuentros de Geometria Computacional (EGC 2009) (2009)
Hoffmann, K., Mehlhorn, K., Rosenstiehl, P., Tarjan, R.E.: Sorting Jordan sequences in linear time using level-linked search trees. Inf. Control 68(1–3), 170–184 (1986)
Huang, H., Ni, C.C., Ban, X., Gao, J., Schneider, A.T., Lin, S.: Connected wireless camera network deployment with visibility coverage. In: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM 2014), pp. 1204–1212 (2014)
Joe, B., Simpson, R.B.: Corrections to Lee’s visibility polygon algorithm. BIT Numer. Math. 27(4), 458–473 (1987)
Lee, D.T.: Visibility of a simple polygon. Comput. Vis. Graph. Image Process. 22(2), 207–221 (1983)
Meguerdichian, S., Koushanfar, F., Qu, G., Potkonjak, M.: Exposure in wireless ad-hoc sensor networks. In: Proceedings of the 7th ACM International Conference on Mobile Computing and Networking (MOBICOM 2001), pp. 139–150. ACM (2001)
Mouawad, N., Shermer, T.C.: The Superman problem. Vis. Comput. 10(8), 459–473 (1994)
Murray, A.T., Kim, K., Davis, J.W., Machiraju, R., Parent, R.: Coverage optimization to support security monitoring. Comput. Environ. Urban Syst. 31(2), 133–147 (2007)
Rosenstiehl, P.: Planar permutations defined by two intersecting Jordan curves. Graph Theory and Combinatorics, pp. 259–271 (1984)
Wang, Y.C., Hu, C.C., Tseng, Y.C.: Efficient deployment algorithms for ensuring coverage and connectivity of wireless sensor networks. In: Proceedings of the 1st IEEE Conference on Wireless Internet (WICON 2005), pp. 114–121 (2005)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Bahoo, Y., Bose, P., Durocher, S., Shermer, T. (2019). Computing the k-Crossing Visibility Region of a Point in a Polygon. In: Colbourn, C., Grossi, R., Pisanti, N. (eds) Combinatorial Algorithms. IWOCA 2019. Lecture Notes in Computer Science(), vol 11638. Springer, Cham. https://doi.org/10.1007/978-3-030-25005-8_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-25005-8_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-25004-1
Online ISBN: 978-3-030-25005-8
eBook Packages: Computer ScienceComputer Science (R0)