The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
45th Annual IEEE Symposium on Foundations of Computer Science
DOI: 10.1109/focs.2004.70
|View full text |Cite
|
Sign up to set email alerts
|

Triangulation and Embedding Using Small Sets of Beacons

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
102
0

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 96 publications
(102 citation statements)
references
References 18 publications
0
102
0
Order By: Relevance
“…Partial and scaling embeddings 5 have been studied in several papers [21,1,3,12,4,5]. Some of the notable results are embedding arbitrary metrics into a distribution over trees [1] or into Euclidean space [3] with tight O(log(1/ )) scaling distortion.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Partial and scaling embeddings 5 have been studied in several papers [21,1,3,12,4,5]. Some of the notable results are embedding arbitrary metrics into a distribution over trees [1] or into Euclidean space [3] with tight O(log(1/ )) scaling distortion.…”
Section: Related Workmentioning
confidence: 99%
“…Yet, as already mentioned above, when communication is required between specific pairs of nodes, the cost of routing through the MST may be extremely high, even when their real distance is small. However, in practice it is the average distortion, rather than the worst-case distortion, that is often used as a practical measure of quality, as has been a major motivation behind the initial work of [21,3,4]. As noted above, the MST still fails even in this relaxed measure.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Specifically, we consider the doubling dimension of X , denoted ddim(X ), which was introduced by [19] based on earlier work of [1,9], and has been since utilized in several algorithmic contexts, including networking, combinatorial optimization, and similarity search, see e.g. [23,46,31,5,21,11,10]. (A formal definition and typical examples appear in Section 2.)…”
Section: Introductionmentioning
confidence: 99%
“…Since we cannot efficiently compute a metric on ∂G, we need a modified approach. Before we describe our method, however, let us briefly review the beacon-based scheme of [9].…”
Section: Beacon-based Embedding For δ-Hyperbolic Graphsmentioning
confidence: 99%