Proceedings of 37th Conference on Foundations of Computer Science
DOI: 10.1109/sfcs.1996.548477
|View full text |Cite
|
Sign up to set email alerts
|

Probabilistic approximation of metric spaces and its algorithmic applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

8
611
0
2

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 468 publications
(625 citation statements)
references
References 29 publications
8
611
0
2
Order By: Relevance
“…More specifically, we deduce that any n-point metric space with spread 1 ∆ can be embedded on-line into p with distortion O((log ∆) 1/p log n). Similarly, we also obtain an analog of a theorem due to Bartal [2] for embedding into ultrametrics. More precisely, we give an on-line probabilistic embedding of an input metric into a distribution over ultrametrics with distortion O(log n · log ∆).…”
Section: Results and Motivationmentioning
confidence: 81%
See 3 more Smart Citations
“…More specifically, we deduce that any n-point metric space with spread 1 ∆ can be embedded on-line into p with distortion O((log ∆) 1/p log n). Similarly, we also obtain an analog of a theorem due to Bartal [2] for embedding into ultrametrics. More precisely, we give an on-line probabilistic embedding of an input metric into a distribution over ultrametrics with distortion O(log n · log ∆).…”
Section: Results and Motivationmentioning
confidence: 81%
“…We observe that Bartal's embedding [2] can be easily modified to work in the on-line setting. We remark that this observation was also made independently by Englert, Räcke, and Westermann [6].…”
Section: Results and Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…To show this lower bound, we need to specify an instance of the problem such that no algorithm can come with in a factor of Ω log N log log N of the optimal offline cost, where N is the total number of customers. The proof is by construction, and we start by building a hierarchically well-separated binary tree (Bartal [6]) of depth h (Figure 1), where h will be specified later. The root node will be level 0, its children will be level 1, and so on.…”
Section: Lower Bound For Facility Location Problem With Online Custommentioning
confidence: 99%