Security News
The Dark Side of Open Source
At Node Congress, Socket CEO Feross Aboukhadijeh uncovers the darker aspects of open source, where applications that rely heavily on third-party dependencies can be exploited in supply chain attacks.
planar-dual
Advanced tools
Readme
Given a planar embedding of a graph, find all faces.
var getFaces = require("planar-dual")
//Create a triforce
var positions = [
[0, 0],
[-1, -1],
[0, 1],
[1, -1]
]
var edges = [
[1, 2],
[2, 3],
[3, 1],
[0, 1],
[0, 2],
[0, 3]
]
//Compute dual graph
console.log(getFaces(edges, positions))
Output:
[ [ 0, 1, 2 ], [ 0, 2, 3 ], [ 0, 3, 1 ], [ 1, 3, 2 ] ]
npm install planar-dual
require("planar-dual")(edges, positions)
Splits an embedded planar graph into a collection of faces
edges
are the edges of the graphpositions
are the locations of the vertices of the graphReturns A list of faces of the graph represented as ordered lists of vertices
(c) 2014 Mikola Lysenko. MIT License
FAQs
Find the faces of a planar graph
The npm package planar-dual receives a total of 87,868 weekly downloads. As such, planar-dual popularity was classified as popular.
We found that planar-dual demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
At Node Congress, Socket CEO Feross Aboukhadijeh uncovers the darker aspects of open source, where applications that rely heavily on third-party dependencies can be exploited in supply chain attacks.
Research
Security News
The Socket Research team found this npm package includes code for collecting sensitive developer information, including your operating system username, Git username, and Git email.
Security News
OpenJS is warning of social engineering takeovers targeting open source projects after receiving a credible attempt on the foundation.