<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Finite Guarding of Weakly Visible Segments via Line Aspect Ratio in Simple Polygons</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Arash Vaezi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science, Institute for Research in Fundamental Sciences</institution>
          ,
          <addr-line>IPM</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>We address the problem of covering a target segment  using a finite set of guards  placed on a source segment  within a simple polygon , assuming weak visibility between the target and source. Without geometric constraints,  may be infinite, as shown by prior hardness results. To overcome this, we introduce the line aspect ratio (AR), defined as the ratio of the long width (LW) to the short width (SW) of . These widths are determined by parallel lines tangent to convex vertices outside  (LW) and reflex vertices inside  (SW), respectively. Under the assumption that AR is constant or polynomial in  (the polygon's complexity), we prove that a finite guard set  always exists, with size bounded by (AR). This AR-based framework generalizes some previous assumptions, encompassing a broader class of polygons. Our result establishes a framework guaranteeing finite solutions for segment guarding under practical and intuitive geometric constraints.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Simple polygon</kwd>
        <kwd>Segment's visibility</kwd>
        <kwd>Line aspect ratio</kwd>
        <kwd>Weakly visible</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <sec id="sec-1-1">
        <title>1.1. Literature Review</title>
        <p>
          Avis et. al. [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] developed a linear-time method for computing weak visibility polygons, enabling
the characterization of regions visible from a given segment. Similarly, Guibas et. al. [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] introduced
trapezoidal decomposition methods to support eficient segment-to-segment visibility queries. These
techniques are crucial for testing the visibility conditions in diferent scenarios. Complementing these,
Hershberger et. al. [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] proposed an optimal algorithm for visibility graph construction, efectively
determining the visibility relationships between points on two segments.
        </p>
        <p>
          The combinatorial conditions for mutual visibility between segments have been extensively studied.
Sack et. al. [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] established necessary and suficient conditions for weak mutual visibility, providing a
duality-based framework that explains cases where partial visibility permits finite covering sets. Later,
Ghodsi et. al. [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] developed decision algorithms for testing weak visibility between disjoint segments,
showing that determining whether  ⊆ WVP() is solvable in ( log ) time.
        </p>
        <p>
          Guard placement optimization has been explored in related contexts. Tóth [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] demonstrated that
⌊/4⌋ edge guards sufice to cover simple polygons. King et. al. [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] investigated mobile guards along
segments. Additionally, Bhattacharya et. al. [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] provided an (log )-approximation for guarding
weakly visible polygons.
        </p>
        <p>
          The study of visibility within simple polygons has advanced significantly, particularly with specialized
cases like sliding cameras, reflections, and structured segment visibility. Biedl et al. explored
slidingcamera guards, providing approximation algorithms and demonstrating the NP-hardness of
slidingcamera coverage in polygons with holes [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. Vaezi et. al. addressed reflection-extended visibility, where
polygon edges act as mirrors, enabling previously invisible segments to become visible; their work
covers weak, strong, and complete visibility settings [
          <xref ref-type="bibr" rid="ref11 ref12 ref13">11, 12, 13</xref>
          ]. Lee and Chwa [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] focused on chain
visibility, investigating the visibility of polygonal chains and providing eficient algorithms for both
convex and reflex chains. Recent research has introduced k-transmitters, extending visibility to cases
where light rays may cross polygon boundaries multiple times [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]. Furthermore, structured visibility
profiles and eficient data structures for segment-to-segment queries have been studied extensively,
ofering solutions for visibility tracking and analysis in dynamic environments [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ].
        </p>
        <p>
          The inherent dificulty of unrestricted guarding has motivated the introduction of geometric
constraints. Bonnet et. al. [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ] proved the APX-hardness of guarding problems, highlighting the necessity
of assumptions like integer coordinates for the given simple polygon. Notably, their results demonstrate
that without such constraints, the set of guards  may be infinite—a key motivation for our approach.
Unlike previous work relying on integer-coordinate assumptions, our framework accommodates
realcoordinate polygons with exponential complexity, generalizing these results.
        </p>
      </sec>
      <sec id="sec-1-2">
        <title>1.2. Positioning of Our Contribution</title>
        <p>
          Existing research has laid a strong foundation in:
• Eficient computation of weak visibility polygons [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]
• Visibility testing between segments [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]
• Hardness results for general guarding problems [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]
Our work extends this body of knowledge by providing:
• A guarantee of finite guard sets  for segment coverage under the line aspect ratio assumption
• Explicit bounds on guard set size, || = (AR) (Theorem 1)
        </p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Problem Definition</title>
      <p>Consider two line segments: a target segment  and a source segment . The visibility between these
segments may fall into one of three cases:
1.  and  are completely visible (CVP).
2. At least one point of  or  is invisible to the other segment.
3.  and  are partially visible (i.e., every point on one segment is visible to at least one point
on the other, but not necessarily all points). From now on we refer to this case as the target is
weakly visible from the source.</p>
      <p>This work focuses on the third case. We aim to find a finite and polynomial set
source segment  such that:
 of points on the</p>
    </sec>
    <sec id="sec-3">
      <title>3. Assumptions</title>
      <p>To ensure a finite size for , certain assumptions about  are necessary. This section introduces these
assumptions. Specifically, we present an algorithm for determining the points of  and demonstrate
that, under Assumption 1, the algorithm yields a finite set  whose size is polynomial in .
Assumption 1 (Line Aspect Ratio (Our assumption)). For a simple polygon , the long width
( ) is the maximum distance between two parallel lines tangent to convex vertices of , on the outside
of  without intersecting its interior. The short width ( ) is the minimum distance between two such
parallel line segments tangent to the reflex vertices in the interior of  and constrained by the polygon’s
boundary. The line aspect ratio is:</p>
      <sec id="sec-3-1">
        <title>One may consider two cases:</title>
        <p>where  is the complexity of .</p>
        <p>• Constant line aspect ratio: ARline = (1)
• Polynomial line aspect ratio: ARline = poly()
Assumption 2 (Disk Aspect Ratio). For a simple polygon , the long diameter () is the diameter
of the smallest enclosing circle tangent to the boundary. The short diameter () is the diameter of the
largest inscribed circle tangent to the boundary. The disk aspect ratio is:</p>
      </sec>
      <sec id="sec-3-2">
        <title>One may consider:</title>
        <p>• Constant disk aspect ratio: ARdisk = (1)
• Polynomial disk aspect ratio: ARdisk = poly()</p>
        <p>For consistency, we use AR = ARline to denote the line aspect ratio in subsequent discussions.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Our Contribution</title>
      <p>Theorem 1. Under the line aspect ratio assumption (Definition 1), there exists a finite set
that:
 on  such
|| is bounded by AR
Proof. The size of  is determined by AR = / :
1. The slicing approach (Section 4.1) decomposes  into visibility intervals.
2. By Lemma 1, the points in  cover the target.
3. Observation 3 establishes that each interval has length ≥  .</p>
      <p>4. Since  has maximum length  , the number of intervals is ≤  = AR.
Thus || is finite and bounded by AR.</p>
      <p>In the continue we present the slicing algorithm in Subsection 4.1, and Subsection 4.2 covers the
lemmas and observations and their proofs. Section 5 provides a final discussion.</p>
      <sec id="sec-4-1">
        <title>4.1. Slicing Algorithm</title>
        <p>This subsection covers the slicing algorithm that splits a given source segment () by some middle
points so that the union visibility of the set of all these points including the endpoints of the source
segment covers an entire given target segment (). Without lost of generality, we already suppose
that the given source and target segments are weakly visible.</p>
        <p>We start the slicing algorithm by defining two specific reflex vertices and their computing approach.</p>
        <p>Since the target is weakly visible from the source, consider the visibility of those points on the source
whose view of the target is obstructed by some reflex vertices of . For each point on the source, its
visibility can be blocked by at most two reflex vertices. However, these two reflex vertices may difer
for diferent points on the source. For a precise definition of these reflex vertices, refer to Definition 1.
Definition 1. Consider two reflex vertices: LBV, denoting the Left Blocking Vertex, and RBV, representing
the Right Blocking Vertex. These reflex vertices are defined with respect to a specific point on the source. For
a point  on the source, imagine standing at , positioned between  and , while observing . Assume
that  lies to the left and  lies to the right of . There exists a single reflex vertex on each side of  such
that LBV and RBV are uniquely determined by  (see Observation 2).</p>
        <p>LBV (if it exists) is the reflex vertex where the line segment LBV intersects with  and lies entirely
inside , passes through at least one reflex vertex ( LBV), and has the exterior of  on the left side of
LBV. If multiple reflex vertices lie on a single line crossing LBV, the closest reflex vertex to  along that
line defines LBV .</p>
        <p>The same strategy defines RBV , except that the exterior of  lies on the right side of RBV.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.1.1. Computing LBV and RBV for a point  on</title>
        <p>We already know that  and  are weakly visible. Consider the line  and run a sweeping algorithm
on the reflex vertices of  to obtain a line that meets the requirements of Definition 1. That is a line
that lies on at least one reflex vertex passing  and holds other reflex vertices of  on its left side. Note
that if multiple reflex vertices lie on this line, the closest reflex vertex to  along that line defines LBV.</p>
        <p>Using the same sweeping algorithm on the other side with an opposite direction obtains RBV.
4.1.2. Computing points on 
Denoting  as 0 and  as 0, we will perform the iterations described below to compute a sequence
of points  and  on . This process continues until an iteration  ≥ 1 is reached where  lies to
the right of  . We will demonstrate that, assuming  has a bounded line aspect ratio, the number of
iterations has a polynomial upper bound (Lemma 2). Furthermore, when  lies to the right of  , the
target will be covered by the set of points {,  | 0 ≤  ≤ } (denoted as ) (see Lemma 1).</p>
        <p>Iterations of the algorithm after computing LBV and RBV vertices
Consider two lines: the line intersecting  and LBV , and the line intersection  and RBV ,  ≥ 0.</p>
        <p>The line crossing LBV intersect the target on  . The line crossing RBV intersects the target
on  .</p>
        <p>In each iteration 0 ≤  &lt; , compute  and  .</p>
        <p>Consider  / as a middle point on  where  places at the left side of  . Assuming  as the
source compute LBV and RBV vertices for  and  points.</p>
        <p>Draw the line crossing  and LBV . The intersection of this line with  creates a point denoted
as +1.</p>
        <p>Draw the line crossing  and RBV . The intersection of this line with  creates a point denoted as
+1.</p>
        <p>If +1 lies to the left of +1, set  =  + 1 and repeat the iteration procedure. Otherwise (that
+1 lies to the right of (or if they lie on one point) +1), we reach the th iteration and the slicing
algorithm stops since the target is covered (Lemma 3 reveals that in the ℎ iteration the target gets
covered successfully).</p>
        <p>In case one of the points LBV, RBV does not exist, the corresponding lines do not exist as well. If it is
an  or  points the point in that iteration can see the rest of the target. If it is a  point it can see rest of
the source so the next point on the next point on the source is  or  itself. So, the algorithm has already
reached a position where the points can see the entire target and the slicing algorithm terminates.</p>
        <p>Coverage of y points
u
ty0
tx2
ty1
tx1</p>
        <p>Coverage of x points
ty2 tx0
v
x
x1 y2
x2 y1
y
4.1.3. Results of the slicing algorithm
Lemma 1 indicates that the set  obtained by the slicing algorithm covers the target. Lemma 2 we know
that under the cases of Assumption 1 || remains polynomial in .</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.2. Observations, Lemmas, Theorems, and their proofs</title>
        <p>Observation 1. Given two segments a source  and  inside a simple polygon , Assumption 2 cannot
guarantee a finite set  of points on the source to cover the target.</p>
        <p>
          Proof. See Figure.2. Based on Lemma 4 of [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] mentioned previously, we cannot find an finite set of
points around  (including the sub-segment of the source around ) that the union visibility of the
points in the set can cover the visibility of . Figure.2 illustrates a counter example for Assumption
2, where we can set the ratio of  to be large enough without modifying the size of  . Still the
position of  and ℓ can be set so that  sees  as an interval on the target. For enlarging the ratio  ,

we can enlarge the minimal circle by taking the reflex vertices away, in fact we can move the reflex
vertices on the parallel lines and provide a large polygon without changing SW. So, Assumption 2
cannot guarantee of finding a finite set of points on the source to cover the target.
        </p>
        <p>a
d</p>
        <p>LD = |ac|
target
Ip
ℓ</p>
        <p>SD</p>
        <p>SW</p>
        <p>p
source
c</p>
        <p>Observation 2. Given a segment  as the source and a target segment  that is partially visible to ,
consider a midpoint on the source, denoted as . There exists a unique reflex vertex obstructing the visibility
of , denoted by LBV. This vertex is unique for . Specifically, if we stand on  with  to our left, LBV
blocks the visibility of  from the left side (if it exists). Similarly, RBV is unique (if it exists) and blocks the
visibility of  from the right side of .</p>
        <p>Proof. We have to prove that LBV and RBV are unique reflex vertices on each side for a specific point
 on . Suppose considering the condition of the lemma both of these reflex vertices exist.</p>
        <p>Without lost of generality consider LBV. On the contrary, suppose it is not unique. For proof, let’s
consider another reflex vertex denoted by  ̸= LBV, which could potentially obstruct the visibility of
 (a point on ) not to see some part of the target from the left side.</p>
        <p>See Figure.3. To begin, we show that the visibility of  cannot be obstructed by any other reflex vertex
aside from LBV. Suppose, for the sake of contradiction, that there exists a reflex vertex  on the left
side of LBV, which obstructs the visibility of , preventing it from seeing a portion of the target. In
such a scenario, the line crossing  should holds LBV on its left side. Otherwise,  defines LBV
itself.</p>
        <p>The same analysis reveals that RBV is unique for  on the other side.</p>
        <p>Observation 3. Any point  on the source sees an interval  which  &lt;  , where  comes from
Assumption 1.</p>
        <p>Proof. A point  moving from  to  on the source, the half-lines through LBV and RBV are divergent.
So, the interval created on the target are larger than distance between the parallel lines crossing LBV
and RBV.</p>
        <p>Lemma 1. Given two weakly visible segments,  (the source) and  (the target), inside a simple polygon
, the slicing algorithm described in Subsection 4.1 generates a set of points on , denoted by , that
collectively cover the entire target.</p>
        <p>Proof. Without loss of generality, consider . Any point  sees the target between two lines: one
crossing LBV and the other crossing RBV . Note that the target is weakly visible to the source.
Thus,  = 0 must see , and the visibility of the  points progressively aims to cover the target from 
to . The reflex vertices that block the visibility of the  series from seeing a part of the target are the</p>
        <p>LBVq
lrv
lrv</p>
        <p>RBVq
x
q
y
v
LBV vertices. In each iteration , the line crossing LBV determines +1 (see Figure.4), and +1 can
see the target starting from +1 . Therefore, the visibility of the  points on the target are connected.
Thus, the target is visible to  from  to +1 . This process continues until the iteration stops, either
when  sees  or when reaching a point  where the remaining portion of the target has already been
covered by  points from the previous iterations.</p>
        <p>Lemma 2. The output of the slicing algorithm (as detailed in Subsection 4.1) produces a finite set of points,
, on the source. Under Assumption 1, the size of  is polynomial in , where  represents the complexity
of .</p>
        <p>Proof. Without loss of generality, we present the proof considering only the points labeled .</p>
        <p>First, observe that RBV+1 and LBV must be the same reflex vertex. If they were diferent, +1
would be able to see a point closer to  on the target, and LBV would not be obstructing its visibility.</p>
        <p>Thus, in each iteration,  sees the target between two lines: one crossing LBV and the other
crossing RBV . From Observation 3, we know that the number of points on the source obtained by
the slicing algorithm is upper bounded by the ratio of  to  .</p>
        <p>Lemma 3. Given two weakly visible segments, the source  and the target , inside a simple polygon
, the slicing algorithm presented in Subsection 4.1 completes its execution in the ℎ iteration, where 
lies to the left of  . In this iteration, the target segment is guaranteed to be fully covered.
Proof. We only have to prove that  lies to the left of (or on)  . This means that the coverage of the
target from the left meets the coverage from the right side.</p>
        <p>u
LBVy0</p>
        <p>LBVx0</p>
        <p>RBVy0
x = x0</p>
        <p>y = y0
(a)</p>
        <p>v
RBVx0</p>
        <p>P</p>
        <p>Without loss of generality, suppose the visibility of both  and  is obstructed by reflex vertices.
Consider the triangle formed by the points  ,  , and LBV . Since  is to the left of  and has
visibility of some part of the target,  must lie to the left of the line passing through  LBV . Similarly,
analyzing the triangle formed by  ,  , and RBV reveals that  lies to the right of the line passing
through  RBV . Given that LBV lies to the left of the interior of  and RBV lies to the right of the
interior of , the lines passing through  LBV and  RBV must intersect, placing their intersection
on the target. Consequently,  lies to the left of  on the target.</p>
        <p>In case  and  coincide at a single point, the LBV and RBV of that point are distinct. The lines
passing through  (or  ) and LBV, and through  (or  ) and RBV, intersect the target at diferent
points such that  lies to the left of  .</p>
        <p>Lemma 4. For two parallel lines 1 and 2 at distance  tangent to reflex vertices in a simple polygon ,
the strip between them contains a region of area Ω(2).</p>
        <p>Proof. Let 1 and 2 be two parallel lines at distance , tangent to reflex vertices of a simple polygon
. Since 1 and 2 are tangent, the polygon must touch both lines, ensuring that  spans the strip
between them.</p>
        <p>The region of  within this strip must occupy an area dictated by the strip’s width . The minimal
configuration occurs when  forms a parallelogram spanning the strip, with base and height both equal
to , yielding an area of 2. In degenerate cases, the polygon may form a triangular region within the
strip, with area 22 .</p>
        <p>Since both cases satisfy the lower bound of Ω(2), the result follows.</p>
        <p>To be more precise:
1. The tangent lines create a “corridor” of width .
v
y
u
txj</p>
        <p>tyj tx0
LBVxj</p>
        <p>RBVyj
x
x1
yj
xj y1
2. By the isoperimetric inequality, the minimal-area shape fitting this corridor is a rectangle or
parallelogram.
3. The polygon must occupy at least the area of a parallelogram with: Base = , and Height = 
(ensuring area 2)
4. In degenerate cases, the region may be a triangle with area 2/2, preserving Ω(2).</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Discussion</title>
      <p>Our work addresses a core problem in segment guarding by ensuring finite solutions without relying
on restrictive stability assumptions. We introduce the novel concept of the line aspect ratio (AR), a
geometric parameter quantifying the anisotropy of reflex vertices. This framework guarantees finite
guard sets () with a size bounded by (AR).</p>
      <sec id="sec-5-1">
        <title>5.1. A few open problems</title>
        <p>1. Optimality of ||: Is || = Θ(AR) optimal?
2. Dynamic Guarding: Can the guard set  adapt to polygon deformation while maintaining bounded
size?
3. Extension to 3D: How can the AR framework be generalized for guarding problems in
threedimensional environments?
The AR assumption aligns with realistic geometric constraints observed in various domains:
1. Architectural Layouts: Reflex vertices often form corridors with bounded anisotropy, such as in
building floor plans [19].
2. Geographic Meshing: Terrain models exhibit moderate variations in width and feature distribution
[20].
3. Sensor Networks: Eficient sensor deployment frequently leverages regions with bounded aspect
ratios [21].
4. Robotic Navigation: Structured environments simplify visibility reasoning for autonomous systems
[22].</p>
        <p>This framework bridges theoretical advances and practical applications, providing a robust foundation
for future research in visibility and guarding problems</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>The author has not employed any Generative AI tools.
International Symposium on Computational Geometry (SoCG’17) 77 (2017) 20:1–20:15. URL:
https://hal.science/hal-01994349v1. doi:10.4230/LIPIcs.SoCG.2017.20.
[19] Y. Schwartzburg, M. Pauly, High-resolution topological tools for immersive architectural design,
Computer-Aided Design 55 (2014) 45–57. Demonstrates bounded aspect ratios in architectural
feature decomposition.
[20] E. Puppo, Variable resolution terrain surfaces, Proc. CG International (1997) 81–90. Shows natural
terrains have bounded width ratios in mesh simplification.
[21] B. Wang, K. C. Chua, Coverage in hybrid mobile sensor networks, in: IEEE MASS, 2007, pp. 1–8.</p>
      <p>Uses aspect-ratio constraints for sensor placement optimization.
[22] S. M. Lavalle, Probabilistic roadmaps for path planning in high-dimensional configuration spaces,
IEEE Transactions on Robotics 12 (2004) 566–580. Assumes bounded environment anisotropy for
eficient visibility sampling.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>D.</given-names>
            <surname>Avis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. T.</given-names>
            <surname>Toussaint</surname>
          </string-name>
          ,
          <article-title>An optimal algorithm for determining the visibility of a polygon from an edge</article-title>
          .,
          <source>IEEE Transactions on Computers</source>
          <volume>30</volume>
          (
          <year>1981</year>
          )
          <fpage>910</fpage>
          -
          <lpage>1014</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>L. J.</given-names>
            <surname>Guibas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Hershberger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Leven</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sharir</surname>
          </string-name>
          ,
          <string-name>
            <surname>R. E. Tarjan.</surname>
          </string-name>
          ,
          <article-title>Linear-time algorithms for visibility and shortest path problems inside triangulated simple polygons</article-title>
          .,
          <string-name>
            <surname>Algorithmica</surname>
          </string-name>
          (
          <year>1987</year>
          )
          <fpage>209</fpage>
          -
          <lpage>233</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>L. J.</given-names>
            <surname>Guibas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Motwani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Raghavan</surname>
          </string-name>
          , Visibility of disjoint polygons,
          <source>Algorithmica</source>
          <volume>1</volume>
          (
          <year>1987</year>
          )
          <fpage>49</fpage>
          -
          <lpage>63</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>J.</given-names>
            <surname>Hershberger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Suri</surname>
          </string-name>
          ,
          <article-title>An optimal algorithm for euclidean shortest paths in the plane</article-title>
          ,
          <source>SIAM Journal on Computing</source>
          <volume>28</volume>
          (
          <year>1989</year>
          )
          <fpage>2215</fpage>
          -
          <lpage>2256</lpage>
          . doi:
          <volume>10</volume>
          .1137/0728167.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>J.-R.</given-names>
            <surname>Sack</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Suri</surname>
          </string-name>
          ,
          <article-title>Weak visibility of two simple polygons</article-title>
          ,
          <source>Computational Geometry: Theory and Applications</source>
          <volume>1</volume>
          (
          <year>1991</year>
          )
          <fpage>43</fpage>
          -
          <lpage>58</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Ghods</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mirzaian</surname>
          </string-name>
          ,
          <article-title>Weak visibility queries between disjoint line segments in polygons</article-title>
          ,
          <source>Computational Geometry: Theory and Applications</source>
          <volume>39</volume>
          (
          <year>2008</year>
          )
          <fpage>239</fpage>
          -
          <lpage>249</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.comgeo.
          <year>2007</year>
          .
          <volume>12</volume>
          .001.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>C. D.</given-names>
            <surname>Tóth</surname>
          </string-name>
          ,
          <article-title>Art gallery problem with guards on edges</article-title>
          ,
          <source>SIAM Journal on Discrete Mathematics</source>
          <volume>24</volume>
          (
          <year>2010</year>
          )
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>V.</given-names>
            <surname>King</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Snoeyink</surname>
          </string-name>
          ,
          <article-title>Guarding polygons with mobile guards</article-title>
          ,
          <source>Computational Geometry: Theory and Applications</source>
          <volume>26</volume>
          (
          <year>2004</year>
          )
          <fpage>209</fpage>
          -
          <lpage>219</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>B.</given-names>
            <surname>Bhattacharya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Ghosh</surname>
          </string-name>
          ,
          <article-title>Approximability of guarding weakly visible polygons</article-title>
          ,
          <source>in: Proceedings of the 31st International Symposium on Computational Geometry (SoCG)</source>
          , Springer,
          <year>2015</year>
          , pp.
          <fpage>201</fpage>
          -
          <lpage>215</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -20086-6_
          <fpage>15</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>T. C.</given-names>
            <surname>Biedl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. M.</given-names>
            <surname>Chan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Montecchiani</surname>
          </string-name>
          ,
          <article-title>Sliding cameras in orthogonal polygons: Approximation, hardness, and art gallery bounds</article-title>
          ,
          <source>in: Proceedings of the Symposium on Computational Geometry (SoCG)</source>
          ,
          <year>2017</year>
          , pp.
          <volume>45</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>45</lpage>
          :
          <fpage>16</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.</given-names>
            <surname>Vaezi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Roy</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. Ghodsi.</surname>
          </string-name>
          ,
          <article-title>Reflection helps guarding an art gallery</article-title>
          .,
          <source>The</source>
          <volume>38</volume>
          ℎ European Workshop on Computational Geometry,
          <year>Mar 2022</year>
          , Perugia, Italy. hal-
          <volume>03674221</volume>
          (
          <year>2022</year>
          )
          <article-title>3:1-3:7</article-title>
          . URL: https://eurocg2022.unipg.it/booklet/EuroCG2022-Booklet.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A.</given-names>
            <surname>Vaezi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ghodsi</surname>
          </string-name>
          ,
          <article-title>How to extend visibility polygons by mirrors to cover invisible segments</article-title>
          , in: S.
          <string-name>
            <surname>-H. Poon</surname>
            ,
            <given-names>M. S.</given-names>
          </string-name>
          <string-name>
            <surname>Rahman</surname>
          </string-name>
          , H.-C. Yen (Eds.),
          <source>WALCOM: Algorithms and Computation</source>
          , Springer International Publishing, Cham,
          <year>2017</year>
          , pp.
          <fpage>42</fpage>
          -
          <lpage>53</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A.</given-names>
            <surname>Vaezi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ghodsi</surname>
          </string-name>
          ,
          <article-title>Visibility extension via reflection-edges to cover invisible segments</article-title>
          .,
          <source>Theoretical Computer Science</source>
          (
          <year>2019</year>
          ). doi:
          <volume>10</volume>
          .1016/j.tcs.
          <year>2019</year>
          .
          <volume>02</volume>
          .011.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>D. T.</given-names>
            <surname>Lee</surname>
          </string-name>
          , K.-Y. Chwa,
          <article-title>Visibility of a simple chain in a polygon</article-title>
          ,
          <source>in: Proceedings of the 6th Annual Symposium on Computational Geometry (SoCG)</source>
          ,
          <year>1990</year>
          , pp.
          <fpage>211</fpage>
          -
          <lpage>220</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Authors, k-transmitters for segment visibility: Algorithms and applications</article-title>
          ,
          <source>ALGOWIN</source>
          <volume>10</volume>
          (
          <year>2023</year>
          )
          <fpage>100</fpage>
          -
          <lpage>115</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>D.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <article-title>Structured visibility profiles in polygons</article-title>
          ,
          <source>in: Proceedings of the Symposium on Computational Geometry (SoCG)</source>
          ,
          <year>1998</year>
          , pp.
          <fpage>23</fpage>
          -
          <lpage>30</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>É. Bonnet</surname>
          </string-name>
          , T. Miltzow,
          <article-title>Approximating the art gallery problem</article-title>
          ,
          <source>Leibniz International Proceedings in Informatics (LIPIcs) 51</source>
          (
          <year>2016</year>
          )
          <volume>17</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>17</lpage>
          :
          <fpage>15</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>E.</given-names>
            <surname>Bonnet</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Miltzow</surname>
          </string-name>
          ,
          <article-title>An approximation algorithm for the art gallery problem, The 33rd</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>