Proceedings of the Forty-Fourth Annual ACM Symposium on Theory of Computing 2012
DOI: 10.1145/2213977.2214084
|View full text |Cite
|
Sign up to set email alerts
|

Fully dynamic approximate distance oracles for planar graphs via forbidden-set distance labels

Abstract: International audienceThis paper considers fully dynamic (1 + ε) distance oracles and (1 + ε) forbidden-set labeling schemes for pla- nar graphs. For a given n-vertex planar graph G with edge weights drawn from [1,M] and parameter ε > 0, our forbidden-set labeling scheme uses labels of length λ = O(ε−1 log2 n log (nM ) * (ε−1 + log n)). Given the labels of two vertices s and t and of a set F of faulty vertices/edges, our scheme approximates the distance between s and t in G \ F with stretch (1 + ε), in O(|F|2λ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
63
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 43 publications
(63 citation statements)
references
References 24 publications
0
63
0
Order By: Relevance
“…The root of K is also marked. Then, for every marked node v ∈ K, the slice of v is the subgraph of G enclosed by C v and not strictly enclosed 4 by C u for any marked descendent u of v. The embedding of slices is inherited from the embedding of G. Thus, the boundary of the infinite face of the slice s of v is C v . The cycle C v is also called the boundary of the slice s. Each cycle C u corresponding to a marked descendant u of v such that there are no other marked nodes on the v-to-u path becomes a face in the slice s. Such a face is called a hole of s, and C u is called the boundary of the hole.…”
Section: Proofmentioning
confidence: 99%
See 2 more Smart Citations
“…The root of K is also marked. Then, for every marked node v ∈ K, the slice of v is the subgraph of G enclosed by C v and not strictly enclosed 4 by C u for any marked descendent u of v. The embedding of slices is inherited from the embedding of G. Thus, the boundary of the infinite face of the slice s of v is C v . The cycle C v is also called the boundary of the slice s. Each cycle C u corresponding to a marked descendant u of v such that there are no other marked nodes on the v-to-u path becomes a face in the slice s. Such a face is called a hole of s, and C u is called the boundary of the hole.…”
Section: Proofmentioning
confidence: 99%
“…Adding these edges can be done consistently with the embedding of s because the path in T F V can be embedded on the same plane as s such that s and T F V only intersect at vertices of s. See Figure 2. We introduce an artificial vertex v s embedded in the infinite face of s and triangulate the infinite face of s by adding edges between v s and every vertex of the 4 A vertex or an edge x is enclosed by a cycle C if x is incident to a face enclosed by C. If x is enclosed by C but x ∈ C then x is said to be strictly enclosed by C. Proof. By construction of s , for every grandparent to grandchild path in T F V there is a corresponding edge in s .…”
Section: Proofmentioning
confidence: 99%
See 1 more Smart Citation
“…Even though the decremental setting may seem very restricted, decremental algorithms are important both theoretically and from the point of view of their applications. Many of the state-of-the-art fully-dynamic algorithms use their decremental counterparts in a black-box manner (e.g., [1,3,30]). Decremental graph algorithms are often used in the role of a data structure to design efficient static algorithms (e.g., [10,15,26]).…”
Section: Introductionmentioning
confidence: 99%
“…This bound was achieved with so-called Even-Shiloach trees [8], and it stood for over 30 years. Only recently, Henzinger et al [12] presented a randomized decremental single-source reachability algorithm with total update time O(mn 0.984+o (1) ), which they later improved to O(mn 0.9+o (1) ) [13]. Very recently, Chechik et al [5] improved the total update time to O(m √ n ) 1 .…”
Section: Introductionmentioning
confidence: 99%