Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2010

Open Access 01.12.2009 | Research Article

https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq1_HTML.gif -Net Approach to Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq2_HTML.gif -Coverage

verfasst von: Giordano Fusco, Himanshu Gupta

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2010

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless sensors rely on battery power, and in many applications it is difficult or prohibitive to replace them. Hence, in order to prolongate the system's lifetime, some sensors can be kept inactive while others perform all the tasks. In this paper, we study the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq3_HTML.gif -coverage problem of activating the minimum number of sensors to ensure that every point in the area is covered by at least https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq4_HTML.gif sensors. This ensures higher fault tolerance, robustness, and improves many operations, among which position detection and intrusion detection. The https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq5_HTML.gif -coverage problem is trivially NP-complete, and hence we can only provide approximation algorithms. In this paper, we present an algorithm based on an extension of the classical https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq6_HTML.gif -net technique. This method gives an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq7_HTML.gif -approximation, where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq8_HTML.gif is the number of sensors in an optimal solution. We do not make any particular assumption on the shape of the areas covered by each sensor, besides that they must be closed, connected, and without holes.

1. Introduction

Coverage problems have been extensively studied in the context of sensor networks (see, e.g., [14]). The objective of sensor coverage problems is to minimize the number of active sensors, to conserve energy usage, while ensuring that the required region is sufficiently monitored by the active sensors. In an over-deployed network we can also seek https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq9_HTML.gif -coverage, in which every point in the area is covered by at least https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq10_HTML.gif sensors. This ensures higher fault tolerance, robustness, and improves many operations, among which position detection and intrusion detection.
The https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq11_HTML.gif -coverage problem is trivially NP-complete, and hence we focus on designing approximation algorithms. In this paper, we extend the well-known https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq12_HTML.gif -net technique to our problem and present an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq13_HTML.gif -factor approximation algorithm, where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq14_HTML.gif is the size of the optimal solution. The classical greedy algorithm for set cover [5], when applied to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq15_HTML.gif -coverage, delivers an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq16_HTML.gif -approximation solution, where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq17_HTML.gif is the number of target points to be covered. Our approximation algorithm is an improvement over the greedy algorithm, since our approximation factor of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq18_HTML.gif is independent of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq19_HTML.gif and of the number of target points.
Instead of solving the sensor's https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq20_HTML.gif -coverage problem directly, we consider a dual problem, the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq21_HTML.gif -hitting set. In the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq22_HTML.gif -hitting set problem, we are given sets and points, and we look for the minimum number of points that "hit" each set at least https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq23_HTML.gif times (a set is hit by a point if it contains it). Brönnimann and Goodrich were the first [6] to solve the hitting set using the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq24_HTML.gif -net technique [7]. In this paper, we introduce a generalization of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq25_HTML.gif -nets, which we call https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq26_HTML.gif -nets. Using https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq27_HTML.gif -nets with the Brönnimann and Goodrich algorithm's [6], we can solve the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq28_HTML.gif -hitting set, and hence the sensor's https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq29_HTML.gif -coverage problem. Our main contribution is a way of constructing https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq30_HTML.gif -nets by random sampling. A recent Infocom paper [8] uses https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq31_HTML.gif -nets to solve the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq32_HTML.gif -coverage problem. However we believe that their result is fundamentally flawed (see Section 2.1 for more details). So, to the best of our knowledge, we are the first to give a correct extension of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq33_HTML.gif -nets for the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq34_HTML.gif -coverage problem.
Paper Organization
The rest of the paper is organized as follow. The https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq35_HTML.gif -coverage problem is introduced in Section 2. Section 2.1 contains detailed discussion about related work. The https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq36_HTML.gif -net approach is presented in Section 3.

2. Problem Formulation and Related Work

We start by defining the sensing region and then we will define the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq37_HTML.gif -coverage problem with sensors. In the literature, sensing regions have been often modeled as disks. In this paper, we consider sensing regions of general shape, because this reflects a more realistic scenario.
Definition 1 (sensing region).
The sensing region of a sensor is the area "covered" by a sensor. Sensing regions can have any shape that is closed, connected, and without holes, as in Figure 1(a). Often, sensing regions are modeled as disks as in Figure 1(b), but we consider more general shapes.
Definition 2 (target points).
Target points are the given points in the 2D plane that we wish to cover using the sensors.
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq38_HTML.gif -SC Problem
Given a set of sensors with fixed positions and a set of target points, select the minimum number of sensors, such that each target point is covered (is contained in the selected sensing region) by at least https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq39_HTML.gif of the selected sensors.
For simplicity, we have defined the above https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq40_HTML.gif -SC problem's objective as coverage of a set of given target points. However, as discussed later, our algorithms and techniques easily generalize to the problem of covering a given area.
Example 1.
Suppose we are given 4 sensors and 20 points as in Figure 2(a), and we want to select the minimum number of sensors to 2-cover all points. In this particular example, 2 sensors are not enough to 2-cover all points. Instead, 3 sensors suffice, as shown in Figure 2(b).
In the recent years, there has been a lot of research done [13, 9] to address the coverage problem in sensor network. In particular, Slijepcevic and Potkonjak [3] design a centralized heuristic to select mutually exclusive sensor covers that independently cover the network region. In [2], Charkrabarty et al. investigate linear programming techniques to optimally place a set of sensors on a sensor field for a complete coverage of the field. In [10], Shakkottai et al. consider an unreliable sensor network, and derive necessary and sufficient conditions for the coverage of the region and connectivity of the network with high probability. In one of our prior works [1], we designed a greedy approximation algorithm that delivers a connected sensor cover within a logarithmic factor of the optimal solution; this work was later generalized to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq45_HTML.gif -coverage in [11].
Recently, Hefeeda and Bagheri [8] used the well-known https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq46_HTML.gif -net technique to solve the problem of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq47_HTML.gif -covering the sensor's locations. However, we strongly believe that their result is fundamentally flawed. Essentially, they select a set of subsets of size https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq48_HTML.gif (called https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq49_HTML.gif -flowers) represented by the center of their locations. However, their result is based on the following incorrect claim that if the centers of a set of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq50_HTML.gif -flowers 1-cover a set of points https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq51_HTML.gif , then the set of sensors associated with the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq52_HTML.gif -flowers will https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq53_HTML.gif -cover https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq54_HTML.gif . In addition, in their analysis, they implicitly assume that an optimal solution can be represented as a disjoint union of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq55_HTML.gif -flowers, which is incorrect. In this paper we present a correct extension of the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq56_HTML.gif -net technique for the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq57_HTML.gif -coverage problem in sensor networks.
Two closely related problems to the sensor-coverage problem are set cover and hitting set problems. The area covered by a sensor can be thought as a set, which contains the points covered by that sensor. The hitting set problem is a "dual" of the set cover problem. In both set cover and hitting set problems, we are given sets and elements. While in set cover the goal is to select the minimum number of sets to cover all elements/points, in hitting set the goal is to select a subset of elements/points such that each set is hit. The classical result for set cover [5] gives an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq58_HTML.gif -approximation algorithm, where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq59_HTML.gif is the number of target points to be covered. The same greedy algorithm also delivers a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq60_HTML.gif -approximation solution for the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq61_HTML.gif -SC problem. In contrast, the result in this paper yields an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq62_HTML.gif -approximation algorithm for the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq63_HTML.gif -SC problem, where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq64_HTML.gif is the optimal size (i.e., minimum number of sensors needed to provide https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq65_HTML.gif -coverage of the given target points). Note that our approximation factor is independent of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq66_HTML.gif and of the number of target points.
Brönnimann and Goodrich [6] were the first to use the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq67_HTML.gif -net technique [7] to solve the hitting set problem and hence the set cover with an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq68_HTML.gif -approximation, where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq69_HTML.gif is the size of the optimal solution. In this paper, we extend their https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq70_HTML.gif -net technique to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq71_HTML.gif -coverage. It is interesting to observe that our extension is independent of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq72_HTML.gif and it gives an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq73_HTML.gif -approximation also for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq74_HTML.gif -coverage. For the particular case of 1-coverage with disks, it is possible to build "small" https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq75_HTML.gif -nets using the method of Matoušek, Seidel, and Welzl [12] and obtain a constant-factor approximation for the 1-hitting set problem. Their method [12] can be easily extended to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq76_HTML.gif -hitting set, and this would give a constant-factor approximation for the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq77_HTML.gif -SC problem when the sensing regions are disks. However, in this paper we focus on sensing regions of arbitrary shapes and sizes, as long as they are closed, connected, and without holes.
Another related problem is the art gallery problem (see [13] for a survey) which is to place a minimum number of guards in a polygon so that each point in the polygon is visible from at least one of the guards. Guards may be looked upon as sensors with infinite range. However, in this paper, we focus on selecting already deployed sensor.

3. The https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq78_HTML.gif -Net-Based Approach

In this section, we present an algorithm based on the classical https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq79_HTML.gif -net technique, to solve the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq80_HTML.gif -coverage problem. The classical https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq81_HTML.gif -net technique is used to solve the hitting set problem, which is the dual of the set cover problem. The https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq82_HTML.gif -SC problem is essentially a generalization of the set cover problem—thus, we will extend the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq83_HTML.gif -net technique to solve the corresponding generalization of the hitting set problem.

3.1. Hitting Set Problem and the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq84_HTML.gif -Net Technique

We start by describing the use of the classical https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq85_HTML.gif -net technique to solve the traditional hitting set problem. We begin with a couple of formal definitions.
Set Cover (SC); Hitting Set (HS)
Given a set of points https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq86_HTML.gif and a collection of sets https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq87_HTML.gif , the set cover (SC) problem is to select the minimum number of sets from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq88_HTML.gif whose union contains (covers) all points in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq89_HTML.gif . The hitting set (HS) problem is to select the minimum number of points from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq90_HTML.gif such that all sets in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq91_HTML.gif are "hit" (a set is considered hit, if one of its points has been selected).
Note that HS is a dual of SC, and hence solving HS is sufficient to solve SC.
We now define https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq92_HTML.gif -nets. Intuitively, an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq93_HTML.gif -net is a set of points that hits all large sets (but may not hit the smaller ones). For the overall scheme, we will assign weights to points, and use a generalized concept of weighted https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq94_HTML.gif -nets that must hit all large-weighted sets.
Definition 3 ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq95_HTML.gif -Net; Weighted https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq96_HTML.gif -Net).
Given a set system https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq97_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq98_HTML.gif is a set of points and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq99_HTML.gif is a collection of sets, a subset https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq100_HTML.gif is an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq101_HTML.gif -net if for every set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq102_HTML.gif in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq103_HTML.gif s.t. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq104_HTML.gif , we have that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq105_HTML.gif .
Given a set system https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq106_HTML.gif , and a weight function https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq107_HTML.gif , define https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq108_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq109_HTML.gif . A subset https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq110_HTML.gif is a weighted https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq111_HTML.gif -net for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq112_HTML.gif if for every set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq113_HTML.gif in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq114_HTML.gif s.t. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq115_HTML.gif , we have that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq116_HTML.gif .
Using https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq117_HTML.gif -Nets to Solve the Hitting Set Problem
The original algorithm for solving hitting set problem using https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq118_HTML.gif -net was invented by Brönnimann and Goodrich [6]. Below, we give a high-level description of their overall approach (referred to as the BG algorithm), because it will help understand our own extension. We begin by showing how https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq119_HTML.gif -nets are related to hitting sets, and then, show how to use https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq120_HTML.gif -nets to actually compute hitting sets.
Let us assume that we have a black-box to compute weighted https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq121_HTML.gif -nets, and that we know the optimal hitting set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq122_HTML.gif which is of size https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq123_HTML.gif . Now, define a weight function https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq124_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq125_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq126_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq127_HTML.gif otherwise. Then, set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq128_HTML.gif , and use the black-box to compute a weighted https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq129_HTML.gif -net for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq130_HTML.gif . It is easy to see that this weighted https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq131_HTML.gif -net is actually a hitting set for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq132_HTML.gif , since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq133_HTML.gif for all sets https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq134_HTML.gif . There are known techniques [7] to compute weighted https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq135_HTML.gif -nets of size https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq136_HTML.gif for set systems with a constant VC-dimension (defined later); thus, the above gives us an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq137_HTML.gif -approximate solution. For the particular case of disks, it is possible to construct https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq138_HTML.gif -nets of size https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq139_HTML.gif [12] and hence obtain a constant-factor approximation.
However, in reality, we do not know the optimal hitting set. So, we iteratively guess its size https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq140_HTML.gif , starting with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq141_HTML.gif and progressively doubling https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq142_HTML.gif until we obtain a hitting set solution (using the above approach). Also, to "converge" close to the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq143_HTML.gif above, we use the following scheme. We start with all weights set to 1. If the computed weighted https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq144_HTML.gif -net is not a hitting set, then we pick one set in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq145_HTML.gif that is not hit by it and double the weights of all points that it contains. Then, we iterate with the new weights. It can be shown that if the estimate of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq146_HTML.gif is correct and using https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq147_HTML.gif , then we are guaranteed to find a hitting set using the previous approach after a certain number of iterations. Thus, if we do not find a hitting set after enough iterations, we double the estimate of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq148_HTML.gif and try again. It can be shown in [6] that the previous approach finds an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq149_HTML.gif -approximate hitting set in polynomial time for set systems with constant VC-dimension (defined below), where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq150_HTML.gif is the size of the optimal hitting set.
VC-dimension
We end the description of the BG algorithm, with the definition of Vapnik- https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq151_HTML.gif ervonenkis (VC) dimension of set systems. Informally, the VC-dimension of a set system https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq152_HTML.gif is a mathematical way of characterizing the "regularity" of the sets in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq153_HTML.gif (with respect to the points https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq154_HTML.gif ) in the system. A bounded VC-dimension allows the construction of an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq155_HTML.gif -net through random sampling of large enough size. The VC-dimension is formally defined in terms of set shattering, as follows.
Definition 4 (VC-dimension).
A set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq156_HTML.gif is considered to be shattered by a collection of sets C if for each https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq157_HTML.gif , there exists a set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq158_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq159_HTML.gif . The VC-dimension of a set system https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq160_HTML.gif is the cardinality of the largest set of points in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq161_HTML.gif that can be shattered by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq162_HTML.gif .
In our case, the VC dimension is at most 23 as given by the following theorem by Valtr [14].
Theorem 1.
If https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq163_HTML.gif is compact and simply connected, then VC-dimension of the set system https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq164_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq165_HTML.gif is a set of points and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq166_HTML.gif is a collection of sets, is at most 23.
Note that for a finite collection of sensors, whose covering regions are compact and simply connected, the dual is compact and simply connected too.

3.2. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq167_HTML.gif -Hitting Set Problem and the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq168_HTML.gif -Net Technique

We now formulate the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq169_HTML.gif -hitting set ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq170_HTML.gif -HS) problem, which is a generalization of the hitting set problem, normely, we want each set in the system to be hit by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq171_HTML.gif selected points.
Definition 5 ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq172_HTML.gif -hitting set ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq173_HTML.gif -HS)).
Given a set system https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq174_HTML.gif , the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq175_HTML.gif -hitting set( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq176_HTML.gif -HS) problem is to find the smallest subset of points https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq177_HTML.gif with at most one point for each sibling-set such that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq178_HTML.gif hits every set in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq179_HTML.gif at least https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq180_HTML.gif times.

3.2.1. Connection between https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq181_HTML.gif -HS and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq182_HTML.gif -SC Problem

Note that the previous https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq183_HTML.gif -HS problem is the (generalized) dual of our sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq184_HTML.gif -coverage problem ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq185_HTML.gif -SC problem). Essentially, each point in the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq186_HTML.gif -HS problem corresponds to a sensing region of a sensor, and each set in the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq187_HTML.gif -HS problem corresponds to a target point. In what followos, we describe how to solve the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq188_HTML.gif -HS problem, which essentially solves our https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq189_HTML.gif -SC problem. To solve the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq190_HTML.gif -HS, we need to define and use a generalized notion of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq191_HTML.gif -net.
Definition 6 (weighted https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq192_HTML.gif -net).
Suppose that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq193_HTML.gif is a sibling-set system, and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq194_HTML.gif is a weight function. Define https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq195_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq196_HTML.gif . A set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq197_HTML.gif is a weighted https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq198_HTML.gif -net for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq199_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq200_HTML.gif , whenever https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq201_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq202_HTML.gif .
Using https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq203_HTML.gif -Nets to Solve https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq204_HTML.gif -HS
We can solve the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq205_HTML.gif -HS problem using the BG algorithm [6], without much modification. However, we need an algorithm compute weighted https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq206_HTML.gif -nets. The below theorem states that an appropriate random sampling of about https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq207_HTML.gif points from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq208_HTML.gif gives a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq209_HTML.gif -net with high probability, if the set system https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq210_HTML.gif has a bounded VC-dimension. For the sake of clarity, we defer the proof of the following theorem.
Theorem 2.
Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq211_HTML.gif be a weighted set system. For a given number https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq212_HTML.gif , let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq213_HTML.gif be a subset of points of size https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq214_HTML.gif picked randomly from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq215_HTML.gif with probability proportional to the total weight of the points in such subset.
Then, for
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ1_HTML.gif
(1)
the subset https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq216_HTML.gif is a weighted https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq217_HTML.gif -sibling-net with probability at least https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq218_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq219_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq220_HTML.gif is the VC-dimension of the set system.
Now, based on the prevouise theorem, we can use the BG algorithm with some modifications to solve the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq221_HTML.gif -HS problem. Essentially, we estimate the size https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq222_HTML.gif of an optimal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq223_HTML.gif -HS (starting with 1 and iteratively doubling it), set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq224_HTML.gif , and use Theorem 2 to compute a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq225_HTML.gif -net https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq226_HTML.gif of size https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq227_HTML.gif . Theorem 2 gives a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq228_HTML.gif -net with high probability. It is possible to check efficiently if the obtained set is indeed a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq229_HTML.gif -net. If it is not, we can try again until we get one. On average, a small number of trials are sufficient to obtain a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq230_HTML.gif -net. If https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq231_HTML.gif is indeed a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq232_HTML.gif -hitting set, we stop; else, we pick a set in the system https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq233_HTML.gif that is not https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq234_HTML.gif -hit and double the weight of all the points it contains. With the new weights, we iterate the process. It can be shown that within https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq235_HTML.gif iterations of weight-doubling, we are guaranteed to get a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq236_HTML.gif -HS solution if the optimal size of a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq237_HTML.gif -HS is indeed https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq238_HTML.gif . See Appendix for the proof, which is similar to the one for BG in [6]. Thus, after https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq239_HTML.gif iterations, if we have not found a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq240_HTML.gif -HS, we can double our current estimate of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq241_HTML.gif , and iterate. see Algorithm 1. The below theorem shows that the previous algorithm gives an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq242_HTML.gif -approximate solution in polynomial time with high probability for general sets. The proof of the following theorem is again similar to that for the BG algorithm [6].
Algorithm 1: Solving https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq243_HTML.gif -HS problem using https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq244_HTML.gif -nets. Since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq245_HTML.gif -HS is the dual of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq246_HTML.gif -SC, this algorithm also solves https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq247_HTML.gif -SC (in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq248_HTML.gif -SC, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq249_HTML.gif corresponds to the set of sensors, and C to the set of target points).
1
Given a set system https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq250_HTML.gif .
 
2
for ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq251_HTML.gif ; https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq252_HTML.gif ; https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq253_HTML.gif )
 
3
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq254_HTML.gif
 
4
reset the weights of all points in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq255_HTML.gif to 1;
 
5
for ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq256_HTML.gif ; https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq257_HTML.gif ; https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq258_HTML.gif )
 
6
Compute a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq259_HTML.gif -net https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq260_HTML.gif of size https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq261_HTML.gif using Theorem 2;
 
7
if each set in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq262_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq263_HTML.gif -hit by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq264_HTML.gif , return https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq265_HTML.gif ;
 
8
select a set in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq266_HTML.gif that is not https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq267_HTML.gif -hit, and double the weight of all the points in the set;
 
Theorem 3.
The algorithm described previous (Algorithm 1) runs in time https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq268_HTML.gif and gives a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq269_HTML.gif -approximate solution for the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq270_HTML.gif -HS problem for a general set systems https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq271_HTML.gif of constant VC-dimension, where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq272_HTML.gif is the optimal size of a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq273_HTML.gif -HS.
Proof.
The outer for loop, where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq274_HTML.gif is doubled each time, is run at most https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq275_HTML.gif times. The inner for loop, where the weights are doubled for a set, is executed at most https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq276_HTML.gif times. Computing a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq277_HTML.gif -net using Theorem 2 takes at most https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq278_HTML.gif time, while the doubling-weight process may take up to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq279_HTML.gif time.
We now prove the approximation factor. An optimal algorithm would find a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq280_HTML.gif -hitting set of size https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq281_HTML.gif . If the VC-dimension is a constant, the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq282_HTML.gif -HS method of Theorem 2 finds a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq283_HTML.gif -net of size https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq284_HTML.gif . So if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq285_HTML.gif , the size of the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq286_HTML.gif -hitting set is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq287_HTML.gif , which is an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq288_HTML.gif -approximation.
Outline of Proof of Theorem 2
There are two challenges in generalizing the random-sampling technique of [7], namely, (i) sampling with replacement cannot be used, and (ii) weights must be part of the sampling process.

3.2.2. Challenges in Extending the Technique of [7] to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq289_HTML.gif -Hitting Set

The classical method [7] of constructing a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq290_HTML.gif -net consists of randomly picking a set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq291_HTML.gif of at least https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq292_HTML.gif points, for a certain https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq293_HTML.gif , where each point is picked independently and randomly from the given set of points. This way of constructing a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq294_HTML.gif -net may result in duplicate points in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq295_HTML.gif , but the presence of duplicates does not cause a problem in the analysis. Thus, we can also construct weighted https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq296_HTML.gif -net easily by emulating weights using duplicated copies of the same point. The above described approach works well for 1-hitting set, partly because we do not count the number of times each set is hit. However, for the case of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq297_HTML.gif -hitting set, when constructing a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq298_HTML.gif -net, we need to ensure that the number of distinct points that hit each set is at least https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq299_HTML.gif . Thus, constructing a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq300_HTML.gif -net by picking points independently at random (with duplicates) does not lead to correct analysis. Instead, we suggest a novel method to construct a weighted https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq301_HTML.gif -net https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq302_HTML.gif by: (i) selecting a random subset of points (without duplicates) at once, and (ii) including the weights directly in the previous sampling process. To the best of our knowledge, we are the first one to propose this extension (as discussed before, [8] uses https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq303_HTML.gif -nets to solve sensor's https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq304_HTML.gif -coverage, but their method is flawed).
Proof Sketch of Theorem 2
Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq305_HTML.gif be as given by (1), and let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq306_HTML.gif be the subset of points randomly picked from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq307_HTML.gif as described in Theorem 2. After picking https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq308_HTML.gif , pick another set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq309_HTML.gif (for the purposes of the below analysis) in the same way as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq310_HTML.gif . We now define two events
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ2_HTML.gif
(2)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq311_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq312_HTML.gif . The proof consists of 3 major steps.
(1)
First, we show that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq314_HTML.gif .
 
(2)
Then, it is easier to bound the probability of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq316_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ3_HTML.gif
(3)
 
(3)
Finally, we have that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq318_HTML.gif verifies https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq319_HTML.gif
 
The outline of each step follows.
( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq320_HTML.gif ) From the definition of conditional probability
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ4_HTML.gif
(4)
So we just need to show that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq321_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq322_HTML.gif (where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq323_HTML.gif 's are pairwise different). Define the random variable
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ5_HTML.gif
(5)
Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq324_HTML.gif , and we have https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq325_HTML.gif . It is possible to show that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq326_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq327_HTML.gif . Applying Chebyshev's inequality
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ6_HTML.gif
(6)
the result follows.
( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq328_HTML.gif ) We use an alternate view. Instead of picking https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq329_HTML.gif and then https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq330_HTML.gif , pick https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq331_HTML.gif of size https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq332_HTML.gif , then pick https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq333_HTML.gif and set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq334_HTML.gif . It can be shown that the two views are equivalent. Now, define
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ7_HTML.gif
(7)
Since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq335_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq336_HTML.gif are disjoint https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq337_HTML.gif and then https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq338_HTML.gif if and only if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq339_HTML.gif . So we have that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq340_HTML.gif happens only if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq341_HTML.gif . By counting the number of ways of choosing https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq342_HTML.gif s.t. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq343_HTML.gif , we can bound https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq344_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ8_HTML.gif
(8)
Since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq345_HTML.gif depends only on the intersection https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq346_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ9_HTML.gif
(9)
( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq347_HTML.gif ) it is similar to [7].
Please, refer to Appendix for the detailed proof.
Remark 1.
Note that the approximation factor of Theorem 3 could be improved, if we could design an algorithm to construct smaller https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq348_HTML.gif -nets. For instance, if we could construct a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq349_HTML.gif -net of size https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq350_HTML.gif , then we would have a constant-factor approximation for the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq351_HTML.gif -HS problem. For the particular case of disks, it is easy to extend the method in [12] to build a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq352_HTML.gif -net of size https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq353_HTML.gif (see Appendix for more details). Essentially, it is enough to replace https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq354_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq355_HTML.gif and the proof follows through. Also note that the dual of disks and points is also composed by disks and points.

3.2.3. Distributed https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq356_HTML.gif -Net Approach

Distributed implementation of the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq357_HTML.gif -net algorithm requires addressing the following main challenges.
(1)
We need to construct a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq359_HTML.gif -net, through some sort of distributed randomized selection.
 
(2)
For each constructed https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq361_HTML.gif -net https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq362_HTML.gif , we need to verify in a distributed manner whether https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq363_HTML.gif is indeed a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq364_HTML.gif -coverage set ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq365_HTML.gif -hitting set in the dual).
 
(3)
If https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq367_HTML.gif is not a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq368_HTML.gif -coverage set, then we need to select one target point (a set in the dual) that is not https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq369_HTML.gif -covered by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq370_HTML.gif and double the weights of all the sensing regions covering it.
 
We address the previous challenges in the following manner. First, we execute the distributed algorithm in rounds, where a round corresponds to one execution of the inner for loop of Algorithm 1 (i.e., execution of the sampling algorithm for a particular set of weights and a particular estimate of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq371_HTML.gif ). We implement rounds in a weakly synchronized manner using internal clocks. Now, for each of the previous challenges, we use the following solutions.
(1)
Each sensor keeps an estimate of the total weight of the system and computes https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq373_HTML.gif independently. To select https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq374_HTML.gif sensors, each sensor decides to select itself independently with a probability https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq375_HTML.gif , resulting in selection of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq376_HTML.gif sensors (in expectation).
 
(2)
Locally, verify https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq378_HTML.gif -coverage of the owned target points, by exchanging messages with near-by (that cover a common target point) sensors. If a target point owned by a sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq379_HTML.gif and its near-by sensors are all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq380_HTML.gif -covered for a certain number of rounds (e.g., 10), then https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq381_HTML.gif exits the algorithm.
 
(3)
Each sensor decides to select one of the owned target points with a probability of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq383_HTML.gif , which ensures that the expected number of selected target point is 1.
 

3.2.4. Generalizations to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq384_HTML.gif -Coverage of an Area

The https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq385_HTML.gif -net approach can also be used to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq386_HTML.gif -cover a given area, rather than a given set of target points (as required by the formulation of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq387_HTML.gif -SC problem). Essentially, coverage of an area requires dividing the given area into "subregions" as in our previous work [1]; a subregion is defined as a set of points in the plane that are covered by the same set of sensing regions. The number of such subregions can be shown to be polynomial in the total number of sensing regions in the system. The algorithm described here can then be used without any other modification, and the performance guarantee still holds.

4. Conclusions

In this paper, we studied the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq388_HTML.gif -coverage problem with sensors, which is to select the minimum number of sensors so that each target point is covered by at least https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq389_HTML.gif of them. We provided an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq390_HTML.gif -approximation, where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq391_HTML.gif is the number of sensors in an optimal solution. We introduced a generalization of the classical https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq392_HTML.gif -net technique, which we called https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq393_HTML.gif -net. We gave a method to build https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq394_HTML.gif -nets based on random sampling. We showed how to solve the sensor's https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq395_HTML.gif -coverage problem with the Brönnimann and Goodrich algorithm [6] together with our https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq396_HTML.gif -nets. We believe to be the first one to propose this extension.
As a future work, we would like to extend this technique to directional sensors. A directional sensor is a sensor that has associated multiple sensing regions, and its orientation determines its actual sensing region. The https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq397_HTML.gif -coverage problem with directional sensors is NP-complete and in [15] we proposed a greedy approximation algorithm. We believe that the use of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq398_HTML.gif -nets can give a better approximation factor for this problem.

Appendices

A. About the Number of Iterations of the Doubling Process

This appendix contains the proof that when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq403_HTML.gif is equal to the size of the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq404_HTML.gif -hitting set, then https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq405_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq406_HTML.gif iterations of the doubling process are enough to retrieve the optimal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq407_HTML.gif -hitting set. This proof follows the lines of the one in [6], but with the additional parameter https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq408_HTML.gif .
Theorem 4.
If https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq409_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq410_HTML.gif iterations of the internal for loop of Algorithm 1 are sufficient to find a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq411_HTML.gif -hitting set.
Proof.
Initially https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq412_HTML.gif . The set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq413_HTML.gif selected at the end of the internal for loop satisfies https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq414_HTML.gif , because the algorithm found a weighted https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq415_HTML.gif -net. Doubling the weights of the elements in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq416_HTML.gif adds a total of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq417_HTML.gif new weight to the system. So https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq418_HTML.gif grows at most by a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq419_HTML.gif factor at each iteration. Then, after https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq420_HTML.gif iterations
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ10_HTML.gif
(A1)
Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq421_HTML.gif be the optimal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq422_HTML.gif -hitting set. Initially we have https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq423_HTML.gif . Since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq424_HTML.gif is a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq425_HTML.gif -hitting set, there are least https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq426_HTML.gif elements of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq427_HTML.gif in each set of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq428_HTML.gif . So for any possible set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq429_HTML.gif chosen in step 11, there are at least https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq430_HTML.gif elements of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq431_HTML.gif that are doubled. By the convexity of the function https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq432_HTML.gif , the increase of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq433_HTML.gif is minimal if the doublings are spread out over the elements of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq434_HTML.gif as evenly as possible. So after https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq435_HTML.gif iterations, we have
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ11_HTML.gif
(A2)
Since the weights are positive and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq436_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq437_HTML.gif . We need to find the largest https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq438_HTML.gif for which
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ12_HTML.gif
(A3)
can be true. Taking the log
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ13_HTML.gif
(A4)
and solving for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq439_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ14_HTML.gif
(A5)
where we used the fact that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq440_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq441_HTML.gif . Since the expression on the RHS is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq442_HTML.gif for any possible value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq443_HTML.gif , the theorem follows.

B. Computing Weighted https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq444_HTML.gif -Nets by Random Sampling

This appendix contains the proof of Theorem 2, which is an extension of the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq445_HTML.gif -net theorem of Haussler and Welz [7]. As explained in Section 3.2, the two challenges in generalizing the random-sampling technique are that (i) sampling with replacement cannot be used, and (ii) weights must be part of the sampling process. Our contribution is a new method to obtain weighted https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq446_HTML.gif -nets in which (i) we sample a subset of points at once (without duplicates), and (ii) we include the weights directly in the sampling process.
We start by proving three lemmas, and then we will prove Theorem 2. Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq447_HTML.gif be as given by (1), and let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq448_HTML.gif be the subset of points randomly picked from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq449_HTML.gif as described in Theorem 2. After picking https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq450_HTML.gif , pick another set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq451_HTML.gif (for the purpose of the below analysis) in the same way as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq452_HTML.gif . We now define two events
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ15_HTML.gif
(B1)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq453_HTML.gif .
Intuitively, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq454_HTML.gif is the event that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq455_HTML.gif does not https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq456_HTML.gif -hit some set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq457_HTML.gif , but https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq458_HTML.gif has a "large" intersection with the set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq459_HTML.gif (also remember that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq460_HTML.gif is disjoint from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq461_HTML.gif ). Note that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq462_HTML.gif is a lower bound the average size of the intersection of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq463_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq464_HTML.gif (as computed below).
Lemma 1.
It holds that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq465_HTML.gif
Proof.
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq466_HTML.gif , because if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq467_HTML.gif happens, then https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq468_HTML.gif happens too. From the definition of conditional probability
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ16_HTML.gif
(B2)
it suffices to show that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq469_HTML.gif .
Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq470_HTML.gif (where the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq471_HTML.gif 's are pairwise different). Since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq472_HTML.gif happens, there is some set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq473_HTML.gif s.t. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq474_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq475_HTML.gif . Therefore, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq476_HTML.gif is at least the probability that, for this https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq477_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq478_HTML.gif .
Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq479_HTML.gif be the random variable (r.v.)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ17_HTML.gif
(B3)
Each subset https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq480_HTML.gif (resp., https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq481_HTML.gif ) is picked with probability proportional to the sum of the weights of its elements, and each element can appear in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq482_HTML.gif (resp., https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq483_HTML.gif ) subsets (because these are the ways of putting every other elements in the remaining positions). So the probability of picking one element depends only on its weight, and not on the other elements, which means that the elements are pairwise independent. So we have that
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ18_HTML.gif
(B4)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq484_HTML.gif is a function that returns the weight of given set, which is defined as the sum of the weights of its elements.
Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq485_HTML.gif . Clearly https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq486_HTML.gif . We have
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ19_HTML.gif
(B5)
To bound the deviation from the expectation, we use Chebyshev's inequality
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ20_HTML.gif
(B6)
Since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq487_HTML.gif 's are independent, the covariance is zero. So we get
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ21_HTML.gif
(B7)
where we used the fact that for the 0-1 r.v. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq488_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq489_HTML.gif .
Applying Chebyshev's inequality
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ22_HTML.gif
(B8)
where in the last inequality we used the fact that
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ23_HTML.gif
(B9)
Finally we have that
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ24_HTML.gif
(B10)
Lemma 2.
It holds that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq490_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq491_HTML.gif .
Proof.
The experiment of picking https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq492_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq493_HTML.gif can be viewed in an alternative way. Pick a subset https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq494_HTML.gif of size https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq495_HTML.gif at random (each subset is picked with probability proportional to the sum of the weights of its elements). Then, pick https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq496_HTML.gif as a subset of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq497_HTML.gif of size https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq498_HTML.gif at random (again with probability proportional to the sum of the weights of its elements). Finally, let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq499_HTML.gif . Note that this view is equivalent because the probability of picking any subset https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq500_HTML.gif is the same as before, (similarly for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq501_HTML.gif ). This can be verified as follow. We are going to compute the probability of picking a certain subset https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq502_HTML.gif in both cases. In order to do this, we need to compute the sum of all possible sets of size https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq503_HTML.gif . Among all possible sets of size https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq504_HTML.gif , each element appears in exactly https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq505_HTML.gif of them (because these are the ways of putting every other element in the remaining positions). Now, it is not necessary to know exactly in which set each element gives its contribution, but it is enough to know that it appears a total of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq506_HTML.gif times. So, the sum of weight of all possible sets of size https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq507_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq508_HTML.gif . Then
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ25_HTML.gif
(B11)
Now we are going to compute the probability of picking a subset https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq509_HTML.gif containing https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq510_HTML.gif . This requires to determine the sum of the weights of all subsets of size https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq511_HTML.gif that contain https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq512_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq513_HTML.gif appears in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq514_HTML.gif of them (as these are the number of ways of putting any other element in the remaining https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq515_HTML.gif positions), and it gives a contribution of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq516_HTML.gif in each of them. Any other element can appear in any of the remaining https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq517_HTML.gif positions, for a total of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq518_HTML.gif times (because fixed any element, the remaining https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq519_HTML.gif elements can be placed in any of the remaining https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq520_HTML.gif positions). So we get that
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ26_HTML.gif
(B12)
We also need to compute the probability of picking https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq521_HTML.gif from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq522_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ27_HTML.gif
(B13)
This requires to know https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq523_HTML.gif , which can be computed as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ28_HTML.gif
(B14)
So,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ29_HTML.gif
(B15)
Finally, it is easy to verify that
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ30_HTML.gif
(B16)
Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq524_HTML.gif , with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq525_HTML.gif , and define https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq526_HTML.gif . Since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq527_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq528_HTML.gif are disjoint, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq529_HTML.gif , and then https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq530_HTML.gif is equivalent to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq531_HTML.gif . If https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq532_HTML.gif , then https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq533_HTML.gif does not happen, and it does not happen if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq534_HTML.gif either. Suppose that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq535_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq536_HTML.gif , then we can pick https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq537_HTML.gif as follow. We select https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq538_HTML.gif elements among the points outside the intersection with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq539_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ31_HTML.gif
(B17)
and the remaining https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq540_HTML.gif elements anywhere else
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ32_HTML.gif
(B18)
Their product can be bounded in the following way:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ33_HTML.gif
(B19)
where in the last inequality we used the fact that
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ34_HTML.gif
(B20)
which can be proved by induction. The base case, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq541_HTML.gif , is trivial. Assuming that the formula is valid for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq542_HTML.gif , we get
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ35_HTML.gif
(B21)
where in the last inequality we used the fact that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq543_HTML.gif .
Using this fact, we can bound https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq544_HTML.gif . Recall that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq545_HTML.gif happens only if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq546_HTML.gif . So
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ36_HTML.gif
(B22)
For two sets https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq547_HTML.gif s.t. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq548_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq549_HTML.gif , the events https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq550_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq551_HTML.gif are the same. This is because the occurrence of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq552_HTML.gif depends only on the intersection https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq553_HTML.gif . The number of sets https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq554_HTML.gif s.t. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq555_HTML.gif is unique at most https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq556_HTML.gif by Corollary 1 below. Then
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ37_HTML.gif
(B23)
Lemma 3.
For any set system https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq557_HTML.gif , with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq558_HTML.gif and VC-dimension https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq559_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq560_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq561_HTML.gif .
Proof.
See [16].
Given a set system https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq562_HTML.gif , for any subset of the points https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq563_HTML.gif , let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq564_HTML.gif denote the projection of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq565_HTML.gif onto https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq566_HTML.gif , that is, the set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq567_HTML.gif .
Corollary 1.
For any set system https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq568_HTML.gif , if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq569_HTML.gif , then https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq570_HTML.gif has VC-dimension https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq571_HTML.gif , which implies https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq572_HTML.gif .
Finally, we prove the main theorem.

B.1. Proof of Theorem 2

Combining Lemmas 1, 2, and 3
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ38_HTML.gif
(B24)
so we need to show that
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ39_HTML.gif
(B25)
which can be written as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ40_HTML.gif
(B26)
or equivalently
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ41_HTML.gif
(B27)
Now we consider each part of the sum separately. From (1), it follows that
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ42_HTML.gif
(B28)
so it suffice to show that
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ43_HTML.gif
(B29)
If this inequality is valid for some value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq573_HTML.gif , then it is for any valid for any bigger value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq574_HTML.gif . So we just need to verify it for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq575_HTML.gif . Plugging in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq576_HTML.gif we get
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ44_HTML.gif
(B30)
and this is equivalent to
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_Equ45_HTML.gif
(B31)
which is definitely true.

C. Computing Small Weighted https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq577_HTML.gif -Nets for Disks

In this appendix we present a simple extension of [12] to build small weighted https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq578_HTML.gif -nets for disks. The original construction in [12] easily extends to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq579_HTML.gif -nets by replacing https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq580_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq581_HTML.gif . The proof presented here is simplified respect to the original one, because we consider only disks, instead of pseudodisks.
The underlining idea is to pick points that are spaced apart, which hit all large enough disks. The strategy that we are going to use is to draw "colored" disks that contain a fixed number of points, and select points only on the border of the colored disks. The position and the size of colored disks depend on the input points, but not on the input disks. All colored disks, but one, will have exactly https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq582_HTML.gif input points, where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq583_HTML.gif . Each input point gets the color of the colored disks that covers it or remains uncolored if uncovered. After placing the colored disks, we compute a Dealaunay triangulation (DT) of the colored points. DT will have uni-colored, bi-colored, and tri-colored triangles. Triangles will have uni-colored and bi-colored edges. Let us define some terminology (see Figure 3).
Definition 7 (corridor; hall; sides; ends; corners).
(i)
Let a corridor be a maximal connected chain of bi-colored triangles in DT sharing bi-colored edges. In our construction, corridors are between two colored disks.
 
(ii)
Let a hall be a maximal group of adjacent tri-colored triangles (this is a generalization of the degenerate-corridors of [12]). In our construction, halls are between 3 or more disks, attached to the end of the corridors.
 
(iii)
Corridors are bounded by two chains of uni-colored edges, which we call sides, and two bi-colored edges, which we call ends.
 
(iv)
We call the endpoints of the sides the corners of the subcorridor. Note that one of the sides can degenerate in a single point, in which case there are 3 corners, instead of 4.
 
We start by describing the algorithm for the unweighted case, and we will show how to add weights afterwords. We are given https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq584_HTML.gif , a family https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq585_HTML.gif of disks, and a set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq586_HTML.gif of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq587_HTML.gif points in the plane. For simplicity assume that the points are in general position (i.e., no three points are collinear, and no four points are cocircular). Let define https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq588_HTML.gif (the reason for this will be clear soon). Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq589_HTML.gif be disjoints subsets of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq590_HTML.gif constructed in the following manner. From the boundary of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq591_HTML.gif , "bite off" subsets of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq592_HTML.gif of size https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq593_HTML.gif with the following properties.
(i)
The union of all the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq594_HTML.gif subsets contains the boundary points of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq595_HTML.gif : https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq596_HTML.gif (where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq597_HTML.gif is the convex hull).
 
(ii)
Each https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq598_HTML.gif is representable as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq599_HTML.gif for some half-plane https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq600_HTML.gif (or equivalently, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq601_HTML.gif for some (large enough) disk https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq602_HTML.gif , and to simplify the proof we can think that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq603_HTML.gif is bigger than any input disk).
 
(iii)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq604_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq605_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq606_HTML.gif
 
Now, consider the internal points of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq607_HTML.gif , that are not part of any disk https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq608_HTML.gif . We are going to draw the largest number of disks of size https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq609_HTML.gif to cover the internal points. Specifically, let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq610_HTML.gif be a maximal collection of disjoint subsets of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq611_HTML.gif satisfying
(i)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq612_HTML.gif for some disk https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq613_HTML.gif ,
 
(ii)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq614_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq615_HTML.gif .
 
At this point, we have a total of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq616_HTML.gif disks https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq617_HTML.gif . For each https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq618_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq619_HTML.gif , color the points of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq620_HTML.gif with color https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq621_HTML.gif , and call https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq622_HTML.gif the disk defining color https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq623_HTML.gif , or colored disk https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq624_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq625_HTML.gif be the set of colored points, and call the points in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq626_HTML.gif colorless. Let DT be the Dealaunay triangulation of the set of colored points https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq627_HTML.gif . Break each corridor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq628_HTML.gif into a minim number of subcorridors, that is, subchains of the chain of triangles that form https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq629_HTML.gif , so that each subcorridor contains at most https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq630_HTML.gif colorless points. Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq631_HTML.gif be the set of the corners of all subcorridors. Clearly https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq632_HTML.gif . We are going to show that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq633_HTML.gif is a the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq634_HTML.gif -net for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq635_HTML.gif that is, any disk of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq636_HTML.gif that contains https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq637_HTML.gif points of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq638_HTML.gif also contains https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq639_HTML.gif points of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq640_HTML.gif . This construction is summarized in Algorithm 2.
Algorithm 2: Small https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq641_HTML.gif -nets for disks.
1
Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq642_HTML.gif
 
2
Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq643_HTML.gif be disjoints subsets of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq644_HTML.gif with the following properties:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq645_HTML.gif (where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq646_HTML.gif is the convex hull)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq647_HTML.gif each https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq648_HTML.gif is representable as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq649_HTML.gif for some halfplane
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq650_HTML.gif (or equivalently, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq651_HTML.gif for some (large enough) This construction of subsets of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq652_HTML.gif can be done by
disk https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq653_HTML.gif , and to simplify the proof we can think that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq654_HTML.gif is bigger than any input disk)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq655_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq656_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq657_HTML.gif
repeatedly "biting off" subsets of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq658_HTML.gif with halfplanes
 
3
Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq659_HTML.gif be a maximal collection of disjoint subsets of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq660_HTML.gif satisfying:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq661_HTML.gif for some disk https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq662_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq663_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq664_HTML.gif
 
4
For each https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq665_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq666_HTML.gif , color the points of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq667_HTML.gif with color https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq668_HTML.gif , and call https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq669_HTML.gif the disk defining color https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq670_HTML.gif , or colored disk https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq671_HTML.gif .
Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq672_HTML.gif be the set of colored points, and call the points in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq673_HTML.gif colorless;
 
5
Let DT be the Dealaunay triangulation of the set of colored points https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq674_HTML.gif ;
 
6
Break each corridor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq675_HTML.gif into a minim number of subcorridors, i.e. subchains of the chain of triangles
that form https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq676_HTML.gif , so that each subcorridor contains at most https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq677_HTML.gif colorless points
 
7
Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq678_HTML.gif be the set of the corners of all subcorridors. Clearly https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq679_HTML.gif ;
 
8
Return https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq680_HTML.gif has the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq681_HTML.gif -net for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq682_HTML.gif ;
 
First of all note that colorless points can only be in corridors and halls (because unicolored triangles are contained in the corresponding color-defining disks). Also, we can observe that any disk https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq683_HTML.gif containing no colored points contains less than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq684_HTML.gif points of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq685_HTML.gif . In fact, from the maximality of the construction, there cannot be colorless disks with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq686_HTML.gif points. Than we claim what follows.
Claim
There are at most https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq687_HTML.gif corridors in DT, and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq688_HTML.gif
Proof.
See [12]. Note that, since all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq689_HTML.gif are disjoint, and all but maybe one contain https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq690_HTML.gif points, so https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq691_HTML.gif .
We now prove the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq692_HTML.gif -net theorem for disks.
Theorem 5 ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq693_HTML.gif -net theorem for disks).
Algorithm 2 creates a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq694_HTML.gif -net of size https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq695_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq696_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq697_HTML.gif is a set of points https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq698_HTML.gif in non-D-degenerate position (i.e., no three points are collinear, and no four points are cocircular), and D is a family of disks.
Proof.
By claim https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq699_HTML.gif we have that the size of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq700_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq701_HTML.gif . So we only need to show that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq702_HTML.gif contains at least https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq703_HTML.gif points in each input disk of size at least https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq704_HTML.gif .
First of all, the case https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq705_HTML.gif is already proved in [12], so we focus on the case of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq706_HTML.gif .
For a generic input disk of size at least https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq707_HTML.gif , we are going to compute the minimum number of corners contributed by each intersecting region (colored disk, subcorridor, or hall), while assuming that it has the largest possible intersection. Also, we will pay attention not to count the same corner multiple times. If a colored disk is completely contained in an input disk, it will contribute for the biggest number of corners. So we should only consider colored disks that intersect the boundary of the input disk. We claim that the minimum contribution is given when the boundary of an input disk intersects an alternation of colored disks and corridors. In this case we should count 1 corner, for each colored disk/corridor. The only case in which (a part of) the boundary of the input disk does not intersect any colored disk is when it is contained inside a corridor. But this can only happen if there is a colored disk inside the input disk, but we already argued that this will give a higher contribution. The following is an upper bound on the number of intersecting points. There can be https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq708_HTML.gif points for the colored disk, plus another https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq709_HTML.gif points for the subcorridor on the side of the corner that we are counting, plus another https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq710_HTML.gif points for the hall adjacent to them. This means that for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq711_HTML.gif points there is at least 1 corner. We are considering input disks of size at least https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq712_HTML.gif , and this implies that there are at least https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq713_HTML.gif points in each disk.
Finally, we consider the weighted case. The construction is similar to the unweighted one, with the only difference that the colored disks contain https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq714_HTML.gif points, where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq715_HTML.gif is the sum of the weights of all points. It is easy to see that the proof follows through.

Acknowledgments

This work was supported in part by the NSF awards: 0713186, 0721701, 0721665.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://​creativecommons.​org/​licenses/​by/​2.​0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literatur
1.
Zurück zum Zitat Gupta H, Zhou Z, Das SR, Gu Q: Connected sensor cover: self-organization of sensor networks for efficient query execution. IEEE/ACM Transactions on Networking 2006, 14(1):55-67.CrossRef Gupta H, Zhou Z, Das SR, Gu Q: Connected sensor cover: self-organization of sensor networks for efficient query execution. IEEE/ACM Transactions on Networking 2006, 14(1):55-67.CrossRef
2.
Zurück zum Zitat Chakrabarty K, Iyengar SS, Qi H, Cho E: Grid coverage for surveillance and target location in distributed sensor networks. IEEE Transactions on Computers 2002, 51(12):1448-1453. 10.1109/TC.2002.1146711MathSciNetCrossRef Chakrabarty K, Iyengar SS, Qi H, Cho E: Grid coverage for surveillance and target location in distributed sensor networks. IEEE Transactions on Computers 2002, 51(12):1448-1453. 10.1109/TC.2002.1146711MathSciNetCrossRef
3.
Zurück zum Zitat Slijepcevic S, Potkonjak M: Power efficient organization of wireless sensor networks. Proceedings of the International Conveference of Communication (ICC '01), June 2001, Helsinki, Finland 2: 472-476. Slijepcevic S, Potkonjak M: Power efficient organization of wireless sensor networks. Proceedings of the International Conveference of Communication (ICC '01), June 2001, Helsinki, Finland 2: 472-476.
4.
Zurück zum Zitat Meguerdichian S, Koushanfar F, Qu G, Potkonjak M: Exposure in wireless ad-hoc sensor networks. Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MOBICOM '01), July 2001, Rome, Italy 139-150.CrossRef Meguerdichian S, Koushanfar F, Qu G, Potkonjak M: Exposure in wireless ad-hoc sensor networks. Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MOBICOM '01), July 2001, Rome, Italy 139-150.CrossRef
5.
Zurück zum Zitat Cormen TH, Leiserson CE, Rivest RL, Stein C: Introduction to Algorithms. 2nd edition. MIT Press, Boston, Mass, USA; 2001.MATH Cormen TH, Leiserson CE, Rivest RL, Stein C: Introduction to Algorithms. 2nd edition. MIT Press, Boston, Mass, USA; 2001.MATH
6.
Zurück zum Zitat Brönnimann H, Goodrich MT: Almost optimal set covers in finite VC-dimension. Discrete and Computational Geometry 1995, 14(1):463-479. 10.1007/BF02570718MathSciNetCrossRefMATH Brönnimann H, Goodrich MT: Almost optimal set covers in finite VC-dimension. Discrete and Computational Geometry 1995, 14(1):463-479. 10.1007/BF02570718MathSciNetCrossRefMATH
7.
Zurück zum Zitat Haussler D, Welzl E: -nets and simplex range queries. Discrete and Computational Geometry 1987, 2(1):127-151. 10.1007/BF02187876MathSciNetCrossRefMATH Haussler D, Welzl E: https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq399_HTML.gif -nets and simplex range queries. Discrete and Computational Geometry 1987, 2(1):127-151. 10.1007/BF02187876MathSciNetCrossRefMATH
8.
Zurück zum Zitat Hefeeda M, Bagheri M:Randomized -coverage algorithms for dense sensor networks. Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM '07), May 2007 2376-2380. Hefeeda M, Bagheri M:Randomized https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq400_HTML.gif -coverage algorithms for dense sensor networks. Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM '07), May 2007 2376-2380.
9.
Zurück zum Zitat Ye F, Zhong G, Cheng J, Lu S, Zhang L: PEAS: a robust energy conserving protocol for long-lived sensor networks. Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS '03), May 2003, Providence, RI, USA 28-37. Ye F, Zhong G, Cheng J, Lu S, Zhang L: PEAS: a robust energy conserving protocol for long-lived sensor networks. Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS '03), May 2003, Providence, RI, USA 28-37.
10.
Zurück zum Zitat Shakkottai S, Srikant R, Shroff N: Unreliable sensor grids: coverage, connectivity and diameter. Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '03), March-April 2003, San Francisco, Calif, USA 2: 1073-1083. Shakkottai S, Srikant R, Shroff N: Unreliable sensor grids: coverage, connectivity and diameter. Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '03), March-April 2003, San Francisco, Calif, USA 2: 1073-1083.
11.
Zurück zum Zitat Zhou Z, Das S, Gupta H: Connected K-coverage problem in sensor networks. Proceedings of the 13th International Conference on Computer Communications and Networks (ICCCN '04), 2004 373-378. Zhou Z, Das S, Gupta H: Connected K-coverage problem in sensor networks. Proceedings of the 13th International Conference on Computer Communications and Networks (ICCCN '04), 2004 373-378.
12.
Zurück zum Zitat Matousek J, Seidel R, Welzl E:How to net a lot with little: small -nets for disks and halfspaces. Proceedings of the 6th Annual Symposium on Computational Geometry (SCG '90), June 1990, Berkeley, Calif, USA 16-22.CrossRef Matousek J, Seidel R, Welzl E:How to net a lot with little: small https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq401_HTML.gif -nets for disks and halfspaces. Proceedings of the 6th Annual Symposium on Computational Geometry (SCG '90), June 1990, Berkeley, Calif, USA 16-22.CrossRef
13.
Zurück zum Zitat O'Rourke J: Art Gallery Theorems and Algorithms, International Series of Monographs on Computer Science. Volume 3. Oxford University Press, New York, NY, USA; 1987. O'Rourke J: Art Gallery Theorems and Algorithms, International Series of Monographs on Computer Science. Volume 3. Oxford University Press, New York, NY, USA; 1987.
14.
Zurück zum Zitat Valtr P: Guarding galleries where no point sees a small area. Israel Journal of Mathematics 1998, 104: 1-16. 10.1007/BF02897056MathSciNetCrossRefMATH Valtr P: Guarding galleries where no point sees a small area. Israel Journal of Mathematics 1998, 104: 1-16. 10.1007/BF02897056MathSciNetCrossRefMATH
15.
Zurück zum Zitat Fusco G, Gupta H: Selection and orientation of directional sensors for coverage maximization. Proceedings of the 6th Annual IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON '09), June 2009, Rome, Italy Fusco G, Gupta H: Selection and orientation of directional sensors for coverage maximization. Proceedings of the 6th Annual IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON '09), June 2009, Rome, Italy
16.
Zurück zum Zitat Alon N, Spencer JH: -nets and VC-dimensions of range spaces. In The Probabilistic Method. 2nd edition. Wiley-Interscience, New York, NY, USA; 2000:220-225.CrossRef Alon N, Spencer JH: https://static-content.springer.com/image/art%3A10.1155%2F2010%2F192752/MediaObjects/13638_2009_Article_1822_IEq402_HTML.gif -nets and VC-dimensions of range spaces. In The Probabilistic Method. 2nd edition. Wiley-Interscience, New York, NY, USA; 2000:220-225.CrossRef
Metadaten
Titel
-Net Approach to Sensor -Coverage
verfasst von
Giordano Fusco
Himanshu Gupta
Publikationsdatum
01.12.2009
Verlag
Springer International Publishing
DOI
https://doi.org/10.1155/2010/192752

Weitere Artikel der Ausgabe 1/2010

EURASIP Journal on Wireless Communications and Networking 1/2010 Zur Ausgabe