Abstract
Min-Sensor-Cover is a special case of Min-Set-Cover, which can be seen as Min-Set-Cover in a geometric case with the base set formed by all targets and all given subsets of targets induced by sensing disks. When all sensing disks have the same size, a classic result indicates that Min-Sensor-Cover has PTAS. In this chapter, we introduce some related results in case that sensing disks may have different sizes. Those results may lead us to a sequence of research works on coverage and connected coverage with different sizes of sensing disks.
Another means of silently lessening the inequality of property is to exempt
all from taxation below a certain point, and to tax the higher portions of
property in geometric progression as they rise.
Thomas Jefferson
Access provided by Autonomous University of Puebla. Download chapter PDF
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
10.1 Motivation and Overview
Min-Sensor-Cover is a special case of Min-Set-Cover, which can be seen as Min-Set-Cover in a geometric case with the base set formed by all targets and all given subsets of targets induced by sensing disks. When all sensing disks have the same size, a classic result indicates that Min-Sensor-Cover has PTAS. In this chapter, we introduce some related results in case that sensing disks may have different sizes. Those results may lead us to a sequence of research works on coverage and connected coverage with different sizes of sensing disks.
10.2 Minimum Geometric Hitting Set
Consider a set V of nodes and a set \(\mathcal{D}\) of target disks in the plane. A node v ∈ V is said to hit a disk \(D \in \mathcal{D}\) if v ∈ D. A subset S of V is said to be a hitting set (HS) of \(\mathcal{D}\) if each disk in \(\mathcal{D}\) is hit by some node in V. The problem of finding a minimum subset of V which is an HS of \(\mathcal{D}\) is referred to as Min-Hitting-Set. In this section, we present a PTAS for Min-Hitting-Set.
If a target disk is hit by all nodes in V, we simply remove it from \(\mathcal{D}\). In addition, if a target disk contains some other target disk, we also remove it from \(\mathcal{D}\). Thus, we assume that each target disk in \(\mathcal{D}\) is not hit by at least one node in V and does not contain any other disk in \(\mathcal{D}\). Consequently, the disks in \(\mathcal{D}\) have distinct centers. Let T denote the set of the centers of disks in \(\mathcal{D}\). For each t ∈ T, we use \(D\left(t\right)\) to denote the disk in \(\mathcal{D}\) centered at t, and \(r\left(t\right)\) to denote the radius of the disk \(D\left(t\right)\). Let S be an HS. A set U ⊆ S is said to be a loose subset of S if there is a subset U ′ of V such that \(\left\vert {U}^{{\prime}}\right\vert < \left\vert U\right\vert\) and \(\left(S \setminus U\right) \cup {U}^{{\prime}}\) is still an HS, and to be a tight subset of S otherwise. S is said to be k-tight if every subset U ⊆ S with \(\left\vert U\right\vert \leq k\) is tight. Intuitively, a k-tight HS for sufficiently large k is close to the minimum HS in size. We will formerly prove such relation in the next theorem.
Theorem 10.2.1.
Let c and K be the two universal constants in Theorem 9.3.1. Then, for any k-tight hitting set S ⊆ V ′ with \(k \geq \max \left\{K,2\right\}\), \(\left\vert C\right\vert \leq \left(1 + c/\sqrt{k}\right)opt\) , where opt is the size of a minimum hitting set.
Theorem 10.2.1 suggests a local search algorithm for Min-Disk-Cover, referred to as k-Local Search (k -LS), where k is a positive integer parameter at least two. It computes a k-tight HS S in two phases:
-
Preprocessing Phase. Compute an HS S by the well-known greedy algorithm for minimum set cover.
-
Replacement Phase. While S is not k-tight, find a subset U of S with size at most k and a subset U ′ of V with size at most \(\left\vert U\right\vert - 1\) satisfying that \(\left(S \setminus U\right) \cup {U}^{{\prime}}\) is still an HS; replace S by \(\left(S \setminus U\right) \cup {U}^{{\prime}}\). Finally, we output S.
By Theorem 10.2.1, the algorithm k -LS has an approximation ratio at most \(1 + O\left(1/\sqrt{k}\right)\) when k ≥ K. Its running time is dominated by the second phase. Let \(m = \left\vert V \right\vert\). Then, the second phase consists of \(O\left(m\right)\) iterations. In each iteration, the search for the subset U and its replacement U ′ takes at most
time. So, the total running time is
This means that the algorithm k -LS is a PTAS.
We move on to the proof of 10.2.1. Let O be a minimum HS. Theorem 10.2.1 holds trivially if \(\left\vert S\right\vert = \left\vert O\right\vert\). So, we assume that \(\left\vert S\right\vert > \left\vert O\right\vert\). Let S ′ = S ∖ O and O ′ = O ∖ S. Then, \(\left\vert {S}^{{\prime}}\right\vert > \left\vert {O}^{{\prime}}\right\vert\). In addition, \(\left\vert {O}^{{\prime}}\right\vert \geq k\) for otherwise, we can choose a subset of \(\left\vert {O}^{{\prime}}\right\vert + 1\) nodes from S ′ and replace them by O ′ to get a smaller HS, which contradicts to the fact that S is k-tight. Let T ′ be the set of centers of the target disks not hit by O ∩ S. Then, for each t ∈ T ′, \(D\left(t\right)\) is hit by some node in S ′ and by some node in O ′. In addition, we have the following stronger property.
Lemma 10.2.2.
There is a planar bipartite graph H on O ′ and S ′ satisfying the following “ locality condition ”: For each t ∈ T, there are two adjacent nodes in H, both of which hit \(D\left(t\right)\).
Let H be the planar bipartite graph satisfying the property in the above lemma. We claim that for any U ⊆ S ′, \(\left(S \setminus U\right) \cup {N}_{H}\left(U\right)\) is still an HS. Indeed, consider any t ∈ T. If \(D\left(t\right)\) is hit by S ∖ U, then it is also hit by \(\left(S \setminus U\right) \cup {N}_{H}\left(U\right)\). If \(D\left(t\right)\) is not hit by S ∖ U, then \(D\left(t\right)\) is only hit by nodes in U and hence t ∈ T ′. By Lemma 10.2.2, there exist two adjacent nodes u ∈ S ′ and v ∈ O ′, both of which hit \(D\left(t\right)\). Then, we must have u ∈ U and hence \(v \in {N}_{H}\left(U\right)\). Thus, \(D\left(t\right)\) is still hit by \(\left(S \setminus U\right) \cup {N}_{H}\left(U\right)\). So, the claim holds.
Now, consider any U ⊆ S ′ with \(\left\vert U\right\vert \leq k\). Then \(\left\vert {N}_{H}\left(U\right)\right\vert \geq \left\vert U\right\vert\), for otherwise \(\left(S \setminus U\right) \cup {N}_{H}\left(U\right)\) is an HS smaller than S, which contradicts to the fact that S is k-tight. By Theorem 9.3.1, we have
and hence
So, Theorem 10.2.1 holds.
In the remaining of this section, we prove Lemma 10.2.2. Let V ′ = O ′ ∪S ′. Consider any t ∈ T ′. Define
Clearly, \(\bar{r}(t) > r\left(t\right)\). Let \({D}^{{\prime}}\left(t\right)\) be the disk centered at t of radius \(\bar{r}(t)\). Then, for each node v ∈ V ′, v hits \(D\left(t\right)\) if and only if v hits \({D}^{{\prime}}\left(t\right)\). Let \({\mathcal{D}}^{{\prime}}\) to denote the collection of disks \({D}^{{\prime}}\left(t\right)\) for all t ∈ T ′. Consider any v ∈ V ′. Define
Then, \(\delta \left(v\right) > 0\) and the disk of radius \(\delta \left(v\right)\) centered at v is referred to as the perturbation range of v. Then, for any point v ′ in the perturbation range of v and any t ∈ T ′, v hits \(D\left(t\right)\) if and only if v ′ hits D ′ t. In addition, the perturbation ranges of all nodes in V ′ are disjoint. A restricted perturbation of V ′ is a mapping σ from V ′ to the plane such that for each v ∈ V ′, \(\sigma \left(v\right)\) lies within the perturbation range of v.
A set of four points in the plane form a degenerate quadruple if they all lie on some circle. The next lemma shows that V ′ has a restricted perturbation containing no degenerate quadruple.
Lemma 10.2.3.
There exists a restricted perturbation σ of V ′ such that \(\sigma \left({V }^{{\prime}}\right)\) contains no degenerate quadruple.
Proof.
We prove the lemma by contradiction. Assume the lemma is not true. Let σ be the “fewest counterexample,”in other words, \(\sigma \left({V }^{{\prime}}\right)\) contains the least number of degenerate quadruples. Suppose that a node \(\sigma \left(u\right) \in {V }^{{\prime}}\) is contained in at least one degenerate quadruple in \(\sigma \left({V }^{{\prime}}\right)\). We show that we can change \(\sigma \left(u\right)\) to some point in the perturbation range of u which is not involved in any degenerate quadruple. For any triple nodes \(\left\{{v}_{1},{v}_{2},{v}_{3}\right\}\) in V ′ ∖ {u} such that \(\sigma \left({v}_{1}\right)\), \(\sigma \left({v}_{2}\right)\), and \(\sigma \left({v}_{3}\right)\) are not collinear, the circumcircle of \(\left\{\sigma \left({v}_{1}\right),\sigma \left({v}_{2}\right),\sigma \left({v}_{3}\right)\right\}\) is referred to as a forbidden circle of u. As the number of forbidden circles of u is at most \(\left({ \left\vert {V }^{{\prime}}\right\vert -1 \atop 3} \right)\), there is a point u ′ which lies in the perturbation range of u but not on any forbidden circle of u. Let σ′ be the restricted perturbation of O ′ ∪S ′ obtained from σ by replacing \(\sigma \left(u\right)\) with u ′. Then, \({u}^{{\prime}} = {\sigma }^{{\prime}}\left(u\right)\) is not contained in any degenerate quadruple of \({\sigma }^{{\prime}}\left({V }^{{\prime}}\right)\). Thus, \({\sigma }^{{\prime}}\left({V }^{{\prime}}\right)\) contains strictly fewer degenerate quadruples than \(\sigma \left({V }^{{\prime}}\right)\), which contradicts to the choice of σ. Therefore, the lemma holds.
Now, we fix a restricted perturbation σ of V ′ satisfying that \(\sigma \left({V }^{{\prime}}\right)\) contains no degenerate quadruple. Let G ′ be the graph obtained from Voronoi dual of \(\sigma \left({V }^{{\prime}}\right)\) by removing all edges between two nodes in O ′ and all edges between two nodes in S ′. Then, G ′ is planar. In the next, we show that G ′ satisfies the locality condition: For each target t ∈ T ′, there are two adjacent nodes in G ′, both of which hit \({D}^{{\prime}}\left(t\right)\). We consider two cases:
Case 1: t lies in the Voronoi cell of \(\sigma \left(u\right)\) for some u ∈ O ′. Then, \(\sigma \left(u\right)\) must hit \({D}^{{\prime}}\left(t\right)\) as \({D}^{{\prime}}\left(t\right)\) is hit by \(\sigma \left({O}^{{\prime}}\right)\). Let v be a node in S ′ such that \(\sigma \left(v\right)\) has the shortest distance from t. Then, \(\sigma \left(v\right)\) must also hit \({D}^{{\prime}}\left(t\right)\) as \({D}^{{\prime}}\left(t\right)\) is hit by \(\sigma \left({O}^{{\prime}}\right)\). If \(\sigma \left(u\right)\) and \(\sigma \left(v\right)\) are adjacent, then lemma holds trivially. So, we assume that \(\sigma \left(u\right)\) and \(\sigma \left(v\right)\) are nonadjacent. Then t lies outside the Voronoi cell of \(\sigma \left(v\right)\). We walk from t to \(\sigma \left(v\right)\) along the straight line segment \(t\sigma \left(v\right)\). During this walk, we may cross some Voronoi cells, and at some point before reaching \(\sigma \left(v\right)\), we will enter the Voronoi cell of \(\sigma \left(v\right)\) the first time. Let x be the point at which we first enter the Voronoi cell of \(\sigma \left(v\right)\). We must enter this cell from another cell, and we assume the cell is the Voronoi cell of \(\sigma \left(w\right)\). Then, \(\sigma \left(w\right)\) does not lie in the ray \(x\sigma \left(v\right)\), and hence
Since \(\sigma \left(v\right)\) hits \({D}^{{\prime}}\left(t\right)\), \(\sigma \left(w\right)\) hits \({D}^{{\prime}}\left(t\right)\) as well; and by the choice of v, w ∈ O ′. As \(\sigma \left(w\right)\) is adjacent to \(\sigma \left(v\right)\), the locality condition is satisfied.
Case 2: t lies in the Voronoi cell of \(\sigma \left(u\right)\) for some u ∈ S ′. The proof is the same as in Case 1 and is thus omitted.
Finally, we define a graph H on V ′ such that two nodes u and v are adjacent if and only if \(\sigma \left(u\right)\) and \(\sigma \left(v\right)\) are adjacent in G ′. Then, H is also a planar bipartite graph. In addition, for any target t ∈ T ′, let \(\sigma \left(u\right)\) and \(\sigma \left(v\right)\) be two adjacent nodes in G ′, both of which hit \({D}^{{\prime}}\left(t\right)\). Then, u and v are two adjacent nodes in H, both of which hit \(D\left(t\right)\). This completes the proof of Lemma 10.2.2.
10.3 Minimum Disk Cover
Consider a set \(\mathcal{D}\) of disks and a set T of target points in the plane. A disk \(D \in \mathcal{D}\) is said to cover a target t ∈ T if t ∈ D. A subset \({\mathcal{D}}^{{\prime}}\) of \(\mathcal{D}\) is said to be a cover of T if each target in T is covered by some node in V. The problem of finding a minimum subset of \(\mathcal{D}\) which is a cover of T is referred to as Min-Disk-Cover. In this section, we present a PTAS for Min-Disk-Cover.
Suppose that each disk in \(\mathcal{D}\) has a unique ID for tie-breaking. A disk \(D \in \mathcal{D}\) is said to be redundant if there exists another disk \({D}^{{\prime}}\in \mathcal{D}\) satisfying that either D only covers a proper subset of targets covered by D ′, or D covers exactly the same set of targets as D ′ but has a larger ID than D. If a disk in \(\mathcal{D}\) is redundant, we simply remove it from \(\mathcal{D}\). Thus, we assume that no disk in \(\mathcal{D}\) is redundant. Consequently, we can identify the disks in \(\mathcal{D}\) by their centers. Let V denote the set of the centers of disks in \(\mathcal{D}\). For each v ∈ V, we use \(D\left(v\right)\) to denote the disk in \(\mathcal{D}\) centered at v, and \(r\left(v\right)\) to denote the radius of the disk \(D\left(v\right)\). For simplicity, a node v ∈ V is said to cover a target t ∈ T if \(D\left(v\right)\) covers t, a subset C of V is said to be a cover of T if the set of disks \(\left\{D\left(v\right) : v \in C\right\}\) is a cover of T.
Let C ⊆ V be a cover of T. A set U ⊆ C is said to be a loose subset of C if there is a subset U ′ of V such that \(\left\vert {U}^{{\prime}}\right\vert < \left\vert U\right\vert\) and \(\left(C \setminus U\right) \cup {U}^{{\prime}}\) is still a cover, and to be a tight subset of C otherwise. C is said to be k-tight if every subset U ⊆ C with \(\left\vert U\right\vert \leq k\) is tight. Intuitively, a k-tight cover for sufficiently large k is close to the minimum cover in size. We will formerly prove such relation in the next theorem.
Theorem 10.3.1.
Let c and K be the two universal constants in Theorem 9.3.1. Then, for any k-tight cover C ⊆ V ′ with \(k \geq \max \left\{K,2\right\}\), \(\left\vert C\right\vert \leq \left(1 + c/\sqrt{k}\right)opt\) , where opt is the size of a minimum cover.
Theorem 10.3.1 suggests a local search algorithm for Min-Disk-Cover, referred to as k-Local Search (k -LS), where k is a positive integer parameter at least two. It computes a k-tight cover C in two phases:
-
Preprocessing Phase. Compute a cover C ⊆ V by the well-known greedy algorithm for minimum set cover.
-
Replacement Phase. While C is not k-tight, find a subset U of C with size at most k and a subset U of V with size at most \(\left\vert U\right\vert - 1\) satisfying that \(\left(C \setminus U\right) \cup {U}^{{\prime}}\) is still a cover; replace C by \(\left(C \setminus U\right) \cup {U}^{{\prime}}\). Finally, we output C.
By Theorem 10.3.1, the algorithm k -LS has an approximation ratio at most \(1 + O\left(1/\sqrt{k}\right)\) when k ≥ K. Its running time is dominated by the second phase. Let \(m = \left\vert V \right\vert\). Then, the second phase consists of \(O\left(m\right)\) iterations. In each iteration, the search for the subset U and its replacement U ′ takes at most
time. So, the total running time is
This means that the algorithm k -LS is a PTAS.
We move on to the proof of 10.3.1. Let O ⊆ V be a minimum cover. Theorem 10.3.1 holds trivially if \(\left\vert C\right\vert = \left\vert O\right\vert\). So, we assume that \(\left\vert C\right\vert > \left\vert O\right\vert\). Let C ′ = C ∖ O and O ′ = O ∖ C. Then, \(\left\vert {C}^{{\prime}}\right\vert > \left\vert {O}^{{\prime}}\right\vert\). In addition, \(\left\vert {O}^{{\prime}}\right\vert \geq k\) for otherwise, we can choose a subset of \(\left\vert {O}^{{\prime}}\right\vert + 1\) nodes from C ′ and replace them by O ′ to get a smaller cover, which contradicts to the fact that C is k-tight. Let T ′ be the set of targets not covered by O ∩ C. Then, each t ∈ T ′ is covered by some node in O ′ and by some node in C ′. In addition, we have the following stronger property.
Lemma 10.3.2.
There is a planar bipartite graph H on O ′ and C ′ satisfying the following “ locality condition ”: For each t ∈ T, there are two adjacent nodes in H, both of which cover t.
Let H be the planar bipartite graph satisfying the property in the above lemma. We claim that for any U ⊆ C ′, \(\left(C \setminus U\right) \cup {N}_{H}\left(U\right)\) is still a cover. Indeed, consider any t ∈ T. If t is covered by C ∖ U, then it is also covered by \(\left(C \setminus U\right) \cup {N}_{H}\left(U\right)\). If t is not covered by C ∖ U, then it is only covered by nodes in U and hence t ∈ T ′. By Lemma 10.3.2, there exist two adjacent nodes u ∈ C ′ and v ∈ O ′, both of which cover t. Then, we must have u ∈ U and hence \(v \in {N}_{H}\left(U\right)\). Thus, t is still covered by \(\left(C \setminus U\right) \cup {N}_{H}\left(U\right)\). So, the claim holds.
Now, consider any U ⊆ C ′ with \(\left\vert U\right\vert \leq k\). Then \(\left\vert {N}_{H}\left(U\right)\right\vert \geq \left\vert U\right\vert\), for otherwise \(\left(C \setminus U\right) \cup {N}_{H}\left(U\right)\) is a cover smaller than C, which contradicts to the fact that C is k-tight. By Theorem 9.3.1, we have
and hence
So, Theorem 10.3.1 holds.
In the remaining of this section, we prove Lemma 10.3.2. Let V ′ = O ′ ∪C ′. For each v ∈ V ′, define
Clearly, \(\bar{r}(v) > r\left(v\right)\), and if we increase the radius of v to any value below \(\bar{r}(v)\), the set of targets covered by v remains the same. A function ρ on V ′ is said to be coverage-preserving if \(r\left(v\right) \leq \rho \left(v\right) <\bar{ r}(v)\) for each v ∈ V ′. For each coverage-preserving function ρ, we use \({\mathcal{D}}_{\rho }\) to denote the collection of disks centered at v of radius \(\rho \left(v\right)\) for all v ∈ V ′.
Lemma 10.3.3.
There exists a coverage-preserving function ρ on V ′ such that \({\mathcal{D}}_{\rho }\) contains no degenerate quadruple.
Now, fix a coverage-preserving function ρ on V ′ such that \({\mathcal{D}}_{\rho }\) contains no degenerate quadruple. For each node v ∈ V ′, let \({D}^{{\prime}}\left(v\right)\) denote the disk centered at v of radius \(\rho \left(v\right)\). We claim that any pair of disks in \({\mathcal{D}}_{\rho }\) are geometrically nonredundant. Indeed, assume to the contrary that there exist two nodes in u and v such that \({D}^{{\prime}}\left(u\right) \subseteq {D}^{{\prime}}\left(v\right)\). Since ρ is coverage-preserving, all targets covered by u are also covered by v, which is a contradiction. Thus, our claim holds. Let H be the graph obtained from the Voronoi dual of \({\mathcal{D}}_{\rho }\) by removing all edges between two nodes in O ′ and all edges between two nodes in C ′. Then, H is a planar bipartite graph on O ′ and C ′.
Next, we show that H satisfies the locality condition: For each t ∈ T, there are two adjacent nodes in H, both of which cover t. Clearly, t is covered by a node v ∈ V ′ if and only if \(\mathcal{l}\left(t,v\right) \leq 0\) where \(\mathcal{l}\left(t,v\right) = \left\Vert tv\right\Vert - \rho \left(v\right)\) is the shifted distance from t to v. Thus, if \(\mathcal{l}\left(t,u\right) \leq \mathcal{l}\left(t,v\right)\) for some two nodes u and v in V ′ and t is covered by v, then t is also covered by u. We consider two cases:
Case 1: t lies in the Voronoi cell of \({D}^{{\prime}}\left(u\right)\) for some u ∈ O ′. Then, u must cover t as t is covered by O ′. Let v be a node in C ′ to which t has the smallest shifted distance. Then, v must also cover t, as t is covered by C ′. If u and v are adjacent, then the locality condition holds trivially. So, we assume that u and v are nonadjacent. Then, t lies outside the Voronoi cell of \({D}^{{\prime}}\left(v\right)\). We walk from t to v along the straight line segment tv. During this walk, we may cross some Voronoi cells of the disks in \({\mathcal{D}}_{\rho }\), and at some point before reaching v we will enter the Voronoi cell of \({D}^{{\prime}}\left(v\right)\) the first time. Let x be the point at which we first enter the Voronoi cell of \({D}^{{\prime}}\left(v\right)\). We must enter this cell from another cell, and we assume this cell the Voronoi cell of \({D}^{{\prime}}\left(w\right)\). Then, ℓ(t, w) ≤ ℓ(t, v) as
We further claim that ℓ(t, w) < ℓ(t, v). Indeed, assume to the contrary that ℓ(t, w) = ℓ(t, v). Then, we must have \(\left\Vert tw\right\Vert = \left\Vert tx\right\Vert + \left\Vert xw\right\Vert\), in other words, w lies in the ray tv. As ℓ(t, w) = ℓ(t, v), either \({D}^{{\prime}}\left(v\right) \subseteq {D}^{{\prime}}\left(w\right)\) or \({D}^{{\prime}}\left(w\right) \subseteq {D}^{{\prime}}\left(v\right)\), which is a contradiction. Therefore, our claim is true. By the choice of v, w ∈ O ′ and w is adjacent to v. In addition, w covers t since ℓ(t, w) < ℓ(t, v) and v dominates t. Thus, the locality condition is satisfied.
Case 2: t lies in the Voronoi cell of \({D}^{{\prime}}\left(u\right)\) for some u ∈ C ′. The proof is the same as in Case 1 and is thus omitted.
Since ρ is coverage-preserving, Lemma 10.3.2 holds.
References
Akyildiz, I.F., Pompili, D., Melodia, T.: Underwater acoustic sensor networks: research challenges. Ad Hoc Network 3(3), 257–279 (2005)
Ambühl, C., Erlebach, T., Mihalák, M., Nunkesser, M.: Constant-approximation for minimum-weight (connected) dominating sets in unit disk graphs. Proceedings of the 9th International Workshop on Approximation Algorithms for Combinatorial Optimization (APPROX 2006). Lecture Notes in Computer Science, vol. 4110 pp. 3–14. Springer, Berlin (2006)
Baker, B.S.: Approximation algorithms for NP-complete problems on planar graphs. J. ACM 41(1), 153–180 (1994)
Baudis, G., Gröpl, C., Hougardy, S., Nierhoff, T., Prömel, H.J.: Approximating minimum spanning sets in hypergraphs and polymatroids. Technical Report, Humboldt-Universitt zu Berlin (2000)
Benini, L., Castelli, G., Macii, A., Poncino, M., Scarsi, R.: A discrete-time battery model for high-level power estimation. Proceedings of DATE, pp. 35–39 (2000)
Berman, P., Calinescu, G., Shah, C., Zelikovsky, A.: Power efficient monitoring management in sensor networks. IEEE Wireless Communication and Networking Conference (WCNC’04), Atlanta, pp. 2329–2334 (2004)
Berman, P., Calinescu, G., Shah, C., Zelikovsky, A.: Efficient energy management in sensor networks. In: Xiao, Y., Pan, Y. (eds.) Ad Hoc and Sensor Networks, Wireless Networks and Mobile Computing, vol. 2. Nova Science Publishers, New York (2005)
Bharghavan, V., Das, B.: Routing in ad hoc networks using minimum connected dominating sets. International Conference on Communication, Montreal, Canada (1997)
Butenko, S., Kahruman-Anderoglu, S., Ursulenko, O.: On connected domination in unit ball graphs. Optim. Lett. 5(2), 195–205 (2011)
Byrka, J., Grandoni, F., Rothvoss, T., Sanita, L.: An improved LP-based approximation for Steiner tree. STOC’10, pp. 583–592 (2010)
Calinescu, G., Ellis, R.: On the lifetime of randomly deployed sensor networks. DialM-POMC the Fifth ACM SIGACTSIGOPS International Workshop on Foundation of Mobile Computing (2008)
Calinescu, G., Kapoor, S., Olshevsky, A., Zelikovsky, A.: Network lifetime and power assignment in ad-hoc wireless networks. Proceedings of European Symposium on Algorithms (ESA’03), Lecture Notes in Computer Science, vol. 2832, pp. 114–126 (2003)
Cardei, M., Du, D.-Z.: Improving wireless sensor network lifetime through power aware organization. ACM Wireless Network. 11(3), 333–340 (2005)
Cardei, M., Cheng, M.X., Cheng, X., Du, D.-Z.: Connected domination in ad hoc wireless networks. In: Proceedings the Sixth International Conference on Computer Science and Informatics (CS&I’2002) (2002)
Cardei, M., Thai, M., Li, Y., Wu, W.: Energy-efficient target coverage in wireless sensor networks. IEEE INFOCOM, pp. 1976–1984 (2005)
Cardei, M., MacCallum, D., Cheng, X., Min, M., Jia, X., Li, D., Du, D.-Z.: Wireless sensor networks with energy efficient organization. J. Interconnect. Networks 3(3–4), 213–229 (2002)
Chen, Y.P., Liestman, A.L.: Approximating minimum size weakly-connected dominating sets for clustering mobile ad hoc networks. In: Proceedings of the Third ACM International Symposium on Mobile ad hoc Networking and Computing, Lausanne, Switzerland (2002)
Cheng, M.X., Gong, X.: Maximum lifetime coverage preserving scheduling algorithms in sensor networks. J. Global Optim. 51(3), 447–462 (2011)
Cheng, M.X., Ruan, L., Wu, W.: Achieving minimum coverage breach under bandwidth constraints in wireless sensor networks. INFOCOM, pp. 2638–2645 (2005)
Cheng, M.X., Ruan, L., Wu, W.: Coverage breach problems in bandwidth-constrained sensor networks. TOSN 3(2), 12 (2007)
Cheng, X., Ding, M., Du, D.H., Jia, X.: Virtual backbone construction in multihop ad hoc wireless networks. Wireless Comm. Mobile Comput. 6, 183–190 (2006)
Cheng, X., Huang, X., Li, D., Wu, W., Du, D.-Z.: A polynomial-time approximation scheme for minimum connected dominating set in ad hoc wireless networks. Networks 42(2), 202–208 (2003)
Chvátal, V.: A greedy heuristic for the set-covering problem. Math. Oper. Res. 4(3), 233–235 (1979)
Clark, B.N., Colbourn, C.J., Johnson, D.S.: Unit disk graphs. Disc. Math. 86(1–3), 165–177 (1990)
Colbourn, C.J., Stewart, L.K.: Permutation graphs: connected domination and Steiner trees. Disc. Math. 86(1–3), 179–189 (1990)
Dai, F., Wu, J.: An extended localized algorithm for connected dominating set formation in ad hoc wireless networks. IEEE Trans. Parallel Distrib. Syst. 15(10), 908–920 (2004)
Dai, D., Yu, C.: A (5 + ε)-approximation algorithm for minimum weighted dominating set in unit disk graph. Theor. Comput. Sci. 410, 756–765 (2009)
Deering, S., Farinacci, D., Jacobson, V., Lui, C.-G., Wei, L.: An architecture for wide area multicast routing. In: Proceedings of ACM SIGCOMM 1994, pp. 126–135 (1994)
Ding, L., Wu, W., Willson, J.K., Du, H., Lee, W.: Construction of directional virtual backbones with minimum routing cost in wireless networks. In: 30th Annual Joint Conference of IEEE Communication and Computer Society (INFOCOM), pp. 1557–1565 (2011)
Ding, L., Wu, W., Willson, J.K., Du, H., Lee, W.: Efficient virtual backbone construction with routing cost constraint in wireless networks using directional antennas. IEEE Trans. Mobile Comput. 11(7), 1102–1112 (2012)
Ding, L., Gao, X., Wu, W., Lee, W., Zhu, X., Du, D.-Z.: An exact algorithm for minimum CDS with shortest path constraint in wireless networks. Optim. Lett. (2010) published online
Ding, L., Gao, X., Wu, W., Lee, W., Zhu, Xu, Du, D.-Z.: Distributed construction of connected dominating sets with minimum routing cost in wireless network. In: Proceedings of the 30th International Conference on Distributed Computing Systems (ICDCS), pp. 448–457 (2010)
Ding, L., Wu, W., Willson, J.K., Du, H., Lee, W., Du, D.-Z.: Efficient algorithms for topology control problem with routing cost constraints in wireless networks. IEEE. Trans. Parallel. Distr. Syst. 22(10), 1601–1609 (2011)
Ding, L., Wu, W., Willson, J.K., Wu, L., Lu, Z., Lee, W.: Constant-approximation for target coverage problem in wireless sensor networks. In: Proceedings of the 31st Annual Joint Conference of IEEE Communication and Computer Society (INFOCOM) (2012)
Douglas, R.J.: NP-completeness and degree restricted spanning trees. Disc. Math. 105(1–3), 41–47 (1992)
Du, D.-Z., Ko, K.-I., Hu, X.: Design and Analysis of Approximation Algorithms. Springer, Berlin (2011)
Du, H., Pardalos, P.M., Wu, W., Wu, L.: Maximum lifetime connected coverage with two active-phase sensors. J. Global Optim. (2012), on line
Du, D.-Z., Thai, M.Y., Li, Y., Liu, D., Zhu, S.: Strongly connected dominating sets in wireless sensor networks with unidirectional links. APWeb, pp. 13–24 (2006)
Du, H., Wu, W., Ye, Q., Li, D., Lee, W., Xu, X.: CDS-based virtual backbone construction with guaranteed routing cost in wireless sensor networks. IEEE Trans. Parallel Distr. Syst., to appear
Du, D.-Z., Graham, R.L., Pardalos, P.M., Wan, P.J., Wu, W., Zhao, W.: Analysis of greedy approximation with nonsubmodular potential functions. In: Proceedings of SODA (2008)
Du, H., Ye, Q., Zhong, J., Wang, A., Lee, W., Park, H.: PTAS for minimum connected dominating set with routing cost constraint in wireless sensor networks. In: 4th Annual International Conference on Combinatorial Optimization and Applications (COCOA) (2010)
Du, H., Wu, W., Lee, W., Liu, Q., Zhang, Z., Du, D.-Z.: On minumum submodular cover with submodular cost. J. Global Optim. 50(2), 229–234 (2011)
Du, H., Ye, Q., Wu, W., Lee, W., Li, D., Du, D.-Z., Howard, S.: Constant approximation for virtual backbone construction with guaranteed routing cost in wireless sensor networks. INFOCOM, pp. 1737–1744 (2011)
Duchet, P., Meyniel, H.: On Hadwiger’s number and stability numbers. Annal. Disc. Math. 13, 71–74 (1982)
Eriksson, H.: MBone: the multicast backbone. Commun. ACM (1994)
Erlebach, T., Mihalák, M.: A (4 + ε)-approximation for the minimum-weight dominating set problem in unit disk graphs. WAOA, pp. 135–146 (2009)
Feige, U.: A threshold of lnn for approximating set cover. J. ACM 45(4), 634–652 (1998)
Feige, U., Halldórsson, M.M., Kortsarz, G., Srinivasan, A.: Approximating the domatic number. SIAM J. Comput. 32(1), 172–195 (2002)
Fodor, F.: The densest packing of 13 congruent circles in a circle. Beitrage Algebra Geom. 44(2), 431–440 (2003)
Folkman, J.H., Graham, R.L.: A packing inequality for compact convex subsets of the plane. Canad. Math. Bull. 12, 745–752 (1969)
Funke, S., Kesselman, A., Meyer, U., Segal, M.: A simple improved distributed algorithm for minimum CDS in unit disk graphs. ACM Trans. Sensor Net. 2, 444–453 (2006)
Fujito, T.: Approximation algorithms for submodular set cover with application, IEICE Trans. Inf. Syst. E83-D(3), 480–487 (2000)
Gao, X., Huang, Y., Zhang, Z., Wu, W.: (6+epsilon)-approximation for minimum weight dominating set in unit disk graphs. COCOON, pp. 551–557 (2008)
Gao, X., Wang, Y., Li, X., Wu, W.: Analysis on theoretical bounds of approximating dominating set problems. Disc. Math. Algorithms Appl. 1(1), 71–84 (2009)
Garg, N., Könemann, J.: Faster and simpler algorithms for multicommodity flows and other fractional packing problems. In: Proceedings of 39th Annual Symposium on the Foundations of Computer Science (FOCS), pp. 300–309 (1998)
Garey, M.R., Johnson, D.S.: The rectilinear Steiner tree problem is NP-complete. SIAM J. Appl. Math. 32, 826–834 (1977)
Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. Freeman and Sons, San Francisco, CA (1979)
Gfeller, B., Vicari, E.: A faster distributed approximation scheme for the connected dominating set problem for growth-bounded graphs. In: Proceedings of the 6th Ad-Hoc, Mobile, and Wireless Networks International Conference (ADHOC-NOW 2007). Lecture Notes in Computer Science, vol. 4686, pp. 59–73. Springer, Berlin (2007)
Gibson, M., Pirwani, I.: Algorithms for dominating set in disk graphs: breaking the logn barrier. Algorithms–ESA, pp. 243–254 (2010)
Green, P.E.: Fiber-Optic Networks. Prentical-Hall, Cambrige, MA (1992)
Groemer, H.: Über die Einlagerung von Kreisen in einen konvexen Bereich. Math. Z. 73, 285–294 (1960)
Guha, S., Khuller, S.: Approximation algorithms for connected dominating sets. Algorithmica 20(4), 374–387 (1998)
Guha, S., Khuller, S.: Improved methods for approximating node weighted Steiner trees and connected dominating sets. Springer Lect. Notes Comput. Sci. 1530, 54–66 (1998)
Hahn, R., Reichl, H.: Batteries and power supplies for wearable and ubiquitous computing. In: Proceedings of the 3rd International Symposium on Wearable Computers (1999)
Hoppe, R.: Bemerkungen de redaktion. Grunert Arch. Math. Phys. 56, 307–312 (1874)
Huang, Y., Gao, X., Zhang, Z., Wu, W.: A better constant-factor approximation for weighted dominating set in unit disk graph. J. Combin. Optim. 18(2), 179–194 (2009)
Kim, D., Wu, Y., Li, Y., Zou, F., Du, D.-Z.: Constructing minimum connected dominating sets with bounded diameters in wireless networks. IEEE Trans. Parallel Distrib. Syst. 20(2), 147–157 (2009)
Kim, D., Zhang, Z., Li, X., Wang, W., Wu, W., Du, D.-Z.: A better approximation algorithm for computing connected dominating sets in unit ball graphs. IEEE Trans. Mobile Comput. 9(8), 1108–1118 (2010)
Klein, P.N., Ravi, R.: A nearly best-possible approximation for node-weighted Steiner trees. J. Algorithms 19, 104–115 (1995)
Kuhn, F., Zollinger, A.: Ad-hoc networks beyond unit disk graphs. In: Proceedings of the Joint Workshop of Foundation of Mobile Computing (DIALM-POMC) (2003)
Laskar, R., Pfaff, J.: Domination and irredundance in split graphs. Technical Report 430, Department of Mathematical Sciences, Clemson University (1983)
Li, M., Wan, P.J., Yao, F.F.: Tighter approximation bounds for minimum CDS in wireless ad hoc networks. ISAAC’2009. Lecture Notes in Computer Science, vol. 5878, pp. 699–709 (2009)
Li, D., Du, X., Hu, X., Jia, X.: Minimizing number of wavelengths in multicast routing trees in WDM networks. Networks 35(4), 260–265 (2000)
Li, Y., Thai, M.T., Wang, F., Du, D.-Z.: On the construction of a strongly connected broadcast arborescence with bounded transmission delay. IEEE Trans. Mobile Comput. 5(10), 1460–1470 (2006)
Li, Y., Thai, M.Y., Wang, F., Yi, C.-W., Wan, P.-J., Du, D.-Z.: On greedy construction of connected dominating sets in wireless networks. Wireless Commun. Mobile Comput. 5, 927–932 (2005)
Li, D., Du, H., Wan, P.-J., Gao, X., Zhang, Z., Wu, W.: Minimum power strongly connected dominating sets in wireless networks. In: Proceedings of the 2008 International Conference on Wireless Networks (ICWN’08) (2008)
Li, D., Du, H., Wan, P.-J., Gao, X., Zhang, Z., Wu, W.: Construction of strongly connected dominating sets in asymmetric multihop wireless networks. Theoret. Comput. Sci. 410(8–10), 661–669 (2009)
Liu, Q., Li, X., Wu, L., Du, H., Zhang, Z., Wu, W., Xu, Y.: A new proof for Zassenhaus–Groemer–Oler inequality. Disc. Math. Algorithms Appl. (2012), to appear
Min, M., Du, H., Jiao, X., Huang, X., Huang, S.C.-H., Wu, W.: Improving construction for connected dominating set with Steiner tree in wireless sensor networks. J. Global Optim. 35, 111–119 (2006)
Moscibroda, T., Wattenhofer, R.: Maximizing the lifetime of dominating sets. In: Proceedings of the 5th IEEE International Workshop on Algorithms for Wireless, Mobile, Ad hoc and Sensor Networks (2005)
Mukherjee, B.: WDM-based local lightwave networks Part I: single-hop system. IEEE Networks 3, 12–26 (1992)
Mukherjee, B.: WDM-based local lightwave networks Part II: multihop system. IEEE Networks 4, 22–32 (1992)
Mustafa, N., Ray, S.: Improved results on geometric hitting set problems. Disc. Comput. Geometry 44(4), 883–895 (2010)
Nemhauser, G.L., Wolsey, L.A.: Integer and Combinatorial Optimization. Wiley, New York (1999)
Oler, N.: An inequality in the geometry of numbers. Acta Math. 105, 19–48 (1961)
Pandit, S., Pemmaraju, S.V., Varadarajan, K.R.: Approximation algorithms for domatic partitions of unit disk graphs. In: Dinur, L. et al. (eds.) APPROX and RANDOM 2009. Lecture Notes in Computer Science, vol. 5687, pp. 312–325 (2009)
Ramamurthy, B., Iness, J., Mukherjee, B.: Minimizing the number of optical amplifiers needed to support a multi-wavelength optical LAN/MAN. In: Proceedings of IEEE INFOCOM’97, pp. 261–268 (1997)
Ramaswami, R., Sasaki, G.: Multiwavelength optical networks with limited wavelength conversion. IEEE/ACM Trans. Networking 6(6), 744–754 (1998)
Raz, R., Safra, S.: A sub-constant error-probability low-degree test, and a sub-constant error-probability PCP characterization of NP. In: Proceedings of 28th STOCS (1997)
Ruan, L., Du, D.-Z., Hu, X., Jia, X., Li, D.: Approximations for color-covering problems. In: Proceedings of 1st International Congress of Chinese Mathematicians, pp. 503–507. Beijing, China (1998)
Ruan, L., Du, D.-Z., Hu, X., Jia, X., Li, D., Sun, Z.: Converter placement supporting broadcast in WDM optical networks. IEEE Trans. Comput. 50(7), 750–758 (2001)
Ruan, L., Du, H., Jia, X., Wu, W., Li, Y., Ko, K.-I.: A greedy approximation for minimum connected dominating set. Algorithmca, 329(1–3), 325–330 (2004)
Salhieh, A., Weinmann, J., Kochha, M., Schwiebert, L.: Power efficient topologies for wireless sensor networks. ICPP’2001, pp. 156–163 (2001)
Sampathkumar, E., Walikar, H.B.: The connected domination number of a graph. J. Math. Phys. Sci. 13(6), 607–613 (1979)
Sivakumar, R., Das, B., Bharghavan, V.: An improved spine-based infrastructure for routing in ad hoc networks. In: IEEE Symposium on Computer and Communications, Athens, Greece (1998)
Slijepcevic, S., Potkonjak, M.: Power efficient organization of wireless sensor networks. IEEE International Conference on Communications, pp. 472–476 (2001)
Solis-Oba, R.: 2-approximation algorithm for finding a spanning tree with maximum number of leaves. In: Proceedings of 6th European Symposium on Algorithms (ESA’98). Lecture Notes in Computer Science, vol. 1461, pp. 441–452. Springer, Berlin (1998)
Srinivasan, A., Wu, J.: TRACK: A novel connected dominating set based sink mobility model for WSNs. ICCCN, pp. 664–671 (2008)
Stojmenovic, I., Seddigh, M., Zunic, J.: Dominating sets and neighbor elimination based broadcasting algorithms in wireless networks. In: Proceedings of IEEE Hawaii International Conference on System Sciences (2001)
Sum, J., Wu, J., Ho, K.: Analysis on a localized pruning method for connected dominating sets. J. Inf. Sci. Eng. 23(4), 1073–1086 (2007)
Thai, M.T., Du, D.-Z.: Connected dominating sets in disk graphs with bidirectional links. IEEE Commun. Lett. 10(3), 138–140 (2006)
Thai, M.Y., Wang, F., Liu, D., Zhu, S., Du, D.-Z.: Connected dominating sets in wireless networks with different communication ranges. IEEE Trans. Mobile Comput. 6(7), 721–730 (2007)
Vahdatpour, A., Dabiri, F., Moazeni, M., Sarrafzadeh, M.: Theoretical bound and practical analysis of connected dominating set in ad hoc and sensor networks. In: Proceedings of 22nd International Symposium on Distributed Computing (DISC), pp. 481–495 (2008)
Wan, P.J., Alzoubi, K.M., Frieder, O.: Distributed construction of connected dominating set in wireless ad hoc networks. ACM/Springer Mobile Network. Appl. 9(2), 141–149 (2004). A preliminary version of this paper appeared in IEEE INFOCOM (2002)
Wan, P.-J., Alzoubi, K.M., Frieder, O.: A simple heuristic for minimum connected dominating set in graphs. Int. J. Found. Comput. Sci. 14(2), 323–333 (2003)
Wan, P.J., Wang, L., Yao, F.F.: Two-phased approximation algorithms for minimum CDS in wireless ad hoc networks. IEEE ICDCS, pp. 337–344 (2008)
Wan, P.-J., Xu, X., Wang, Z.: Wireless coverage with disparate ranges. ACM Mobihoc (2011)
Wan, P.-J., Du, D.-Z., Pardalos, P.M., Wu, W.: Greedy approximations for minimum submodular cover with submodular cost. Comput. Optim. Appl. 45(2), 463–474 (2010)
Wan, P.J., Huang, S.C.-H., Wang, L., Wan, Z., Jia, X.: Minimum-latency aggregation scheduling in multihop wireless networks. ACM MOBIHOC (2009)
Wan, P.-J., Wang, Z., Wan, Z., Huang, S.C.-H., Liu, H.: Minimum-latency schedulings for group communications in multi-channel multihop wireless networks. WASA (2009)
Wang, F., Thai, M.T., Du, D.-Z.: On the construction of 2-connected virtual backbone in wireless networks. IEEE Trans. Wireless Commun. 8(3), 1230–1237 (2009)
Wang, L., Wan, P.-J., Yao, F.F.: Minimum CDS in multihop wireless networks with disparate communication ranges, WASA (2010)
White, K., Parber, M., Pulleyblank, W.: Steiner trees, connected domination and strongly chordal graphs. Networks 15(1), 109–124 (1985)
Willson, J.K., Ding, L., Wu, W., Wu, L., Lu, Z., Lee, W.: A better constant-approximation for coverage problem in wireless sensor networks, preprint.
Willson, J.K., Gao, X., Qu, Z., Zhu, Y., Li, Y., Wu, W.: Efficient distributed algorithms for topology control problem with shortest path constraints. Disc. Math. Algorithms Appl. 1, 437–461 (2009)
Wolsey, L.A.: An analysis of the greedy algorithm for submodular set covering problem. Combinatorica 2(4), 385–393 (1982)
Wu, J., Li, H.: On calculating connected dominating set for efficient routing in ad hoc wireless networks. In: Proceedings of the 3rd ACM International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, pp. 7–14 (1999)
Wu, J., Dai, F.: Virtual backbone construction in MANETs using adjustable transmission ranges. IEEE Trans. Mob. Comput. 5(9), 1188–1200 (2006)
Wu, J., Gao, M., Stojmenovic, I.: On calculating power-aware connected dominating sets for efficient routing in ad hoc wireless networks. ICPP pp. 346–356 (2001)
Wu, J., Wu, B., Stojmenovic, I.: Power-aware broadcasting and activity scheduling in ad hoc wireless networks using connected dominating sets. Wireless Commun. Mobile Comput. 3(4), 425–438 (2003)
Wu, J., Dai, F., Yang, S.: Iterative local solutions for connected dominating set in ad hoc wireless networks, MASS (2005)
Wu, J., Lou, W., Dai, F.: Extended multipoint relays to determine connected dominating sets in MANETs. IEEE Trans. Comput. 55(3), 347–337 (2006)
Wu, W., Du, H., Jia, X., Li, Y., Huang, S.C.-H.: Minimum connected dominating sets and maximal independent sets in unit disk graphs, Theor. Comput. Sci. 352(1–3), 1–7 (2006)
Xing, K., Cheng, W., Park, E.K., Rotenstreich, S.: Distributed connected dominating set construction in geometric k-disk graphs. IEEE ICDCS, pp. 673–680 (2008)
Zassenhaus, H.: Modern development in the geometry of numbers. Bull. Amer. Math. Soc. 67, 427–439 (1961)
Zhang, Y., Li, W.: Modeling and energy consumption evaluation of a stochastic wireless sensor networks. preprint (2011)
Zhang, Z., Gao, X., Wu, W., Du, D.-Z.: A PTAS for minimum connected dominating set in 3-dimensional wireless sensor networks. J. Global Optim. 45(3), 451–458 (2009)
Zhang, N., Shin, I., Zou, F., Wu, W., Thai, M.T.: Trade-off scheme for fault tolerant connected dominating sets on size and diameter. FOWANC, pp. 1–8 (2008)
Zhao, Y., Wu, J., Li, F., Lu, S.: VBS: Maximum lifetime sleep scheduling for wireless sensor networks using virtual backbones, INFOCOM pp. 366–370 (2010)
Zhong, C.: Sphere Packing. Springer, Berlin (1999)
Zhong, X., Wang, J., Hu, N.: Connected dominating set in 3-dimensional space for ad hoc network. In: Proceedings of IEEE Wireless Communications and Networking Conference (WCNC’07) (2007)
Zou, F., Li, X., Kim, D., Wu, W.: Construction of minimum connected dominating set in 3-dimensional wireless networks. In: Proceedings of Third International Conference on Wireless Algorithms, Systems and Applications (WASA 08) (2008)
Zou, F., Li, X., Gao, S., Wu, W.: Node-weighted Steiner tree approximation in unit disk graphs. J. Combin. Optim. 18(4), 342–349 (2009)
Zou, F., Wang, Y., Xu, X., Du, H., Li, X., Wan, P., Wu, W.: New approximations for weighted dominating sets and connected dominating sets in unit disk graphs. Theoret. Comput. Sci. 412(3), 198–208 (2011)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
Du, DZ., Wan, PJ. (2013). Geometric Hitting Set and Disk Cover. In: Connected Dominating Set: Theory and Applications. Springer Optimization and Its Applications, vol 77. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5242-3_10
Download citation
DOI: https://doi.org/10.1007/978-1-4614-5242-3_10
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-5241-6
Online ISBN: 978-1-4614-5242-3
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)