skip to main content
10.1145/12130.12171acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free access

Topologically sweeping an arrangement

Published: 01 November 1986 Publication History
First page of PDF

References

[1]
Asano, T., Asano, T., Guibas, L.J., Hershberger, J., and Imai, H., Vislbility-polygon search and euclidean shortest paths. Proc. 26th Annual FOCS Symposium (1985), 155- 164.
[2]
Aho, A.V., Hopcroft, J.E., and Ullman, J.D., The Design and Analysis of Computer Algorithms. Addison-Wesley, 1974.
[3]
Avis, D., and Rappaport, D., Computing the largest empty convex subset of a set of polnts. Proc. 1st ACM Symp. on Comp. Geom. (1985), 161-167
[4]
Chazelle, B.M., Guibas, L.J., and Lee, D.T., The power of geometric duality. BIT 25 (1985), 76-90.
[5]
Chvathl, V., and Klincsek, G., Finding largest convex subsets. In Proc. l l t h SE Conf. on Combin., Graph Theory and Comp., 1980.
[6]
Edelsbrunner, H., Constructing edge-skeletons in three dimensions dffth applications to power diagrams and dissecting three-dimensional point sets. Report F140, Inst. Inf. Process., Techn. Univ. Graz, 1984. To appear in A1- gorithmica. JEll Edelsbrunner, H., Arrangements and Geometric Computation. To be published.
[7]
Edelsbrunner, H., Guibas, L.J., and Stolfi, J., Optimal point location in a monotone subdivision. DEC/SRC res. report 2, 1984. To appear in SIAM J. on Comp.
[8]
Edelsbrunner, H., O'Rourke, J., and Seidel, R., Constructing arrangements of lines and hyperplanes with applications. SIAM J. on Comp., to appear.
[9]
Edelsbrunner, H., Overmars, M.H., and Wood, D., Graphics in flatland: a case study. In Advances in Computing Research 1, F.P. Preparata, Ed., 1983, 35-59.
[10]
Erdi~s, P., and Szekeres, G., A combinatorial problem in geometry. Composition Math. 2, 1935, 463-470.
[11]
ErdSs, P., and Szekeres, G., On some extremum problems in elementary geometry. Ann. Univ. Sci. Budapest 3, 1960, 53-62.
[12]
Edelsbrunner, H., and Welzl, E., Constructing belts in two-dimensional arrangements with applications. SIAM J. Comp., to appear.
[13]
Fredman, M.L., On the information theoretic lower bound. Theor. Comp. Sc. 1 (1976), 355-361.
[14]
Fredman, M.L., and Tarjan, R.E., Fibonacci heaps and their uses in improved network optimization algorithms. Proc. 21st Ann. FOGS SYmposium, 1984, 338-346.
[15]
Grfinbaum, B., Arrangements and Spreads. Reg. Conf. Ser. Math., AMS, 1972.
[16]
Guibas, L.J., On a space-time trade-off for a backtracking problem. In preparation.
[17]
Guibas, L.J., and Stolfi, J., Primitives for the manipulation of general subdivisions and the computation of Voronoi diagrams. ACM Trans. on Graphics 4, 1985, 74- 123.
[18]
Harborth, H., Konvexe Fanfecke in ebenen Punkmengen. Elem. Math. 33, 1978, 116-118.
[19]
Horton, J.D., Sets with no empty convex 7-yon. Canad. Math. Bull. 26, 1983, 482-484.
[20]
Knuth, D.E., The Art of Computer Programming, vol. I (Fundamental Algorithms). Addison-Wesley, 1971.
[21]
Lee, D.T., Proximity and teachability in the plane. Ph.D. thesis, Dept. Else. Engin., Univ. of Illinois, 1979.
[22]
Lee, D.T., and Preparata, F.P., Euclidean shortest paths in the presence of rectilinear barriers. Network 14, 1984, 393-410.
[23]
MeKenna, M., and Seidel, R., Finding the optimal of a convex polytope. Proe. 1st ACM Syrup. Geom., 1985, 24-28.
[24]
Nievergelt, J., and Preparata, F.P., Plane-rithms for intersecting geometric figures. CACM 739-747.
[25]
Preparata, F.P., and Shamos, M.I., Computational ometry~ an Introduction. Springer-Verlag, 1985.
[26]
Sharir, M., personal communication, 1985.
[27]
Tarjan, R.E., Amortized computational complexity. J. on Comp., to appear.
[28]
Welzl, W., Constructing the visibility graph segments in O(n 2) time. Inf. Proc. Letters 20, 171.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
STOC '86: Proceedings of the eighteenth annual ACM symposium on Theory of computing
November 1986
461 pages
ISBN:0897911938
DOI:10.1145/12130
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 November 1986

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

STOC86
Sponsor:
STOC86: Eighteenth Annaul ACM Symposium on Theory of Computing
May 28 - 30, 1986
California, Berkeley, USA

Acceptance Rates

Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

Upcoming Conference

STOC '25
57th Annual ACM Symposium on Theory of Computing (STOC 2025)
June 23 - 27, 2025
Prague , Czech Republic

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)147
  • Downloads (Last 6 weeks)20
Reflects downloads up to 16 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media