Finite Connections for Supercritical Bernoulli Bond Percolation in 2D
|
|
- Patrick Norton
- 5 years ago
- Views:
Transcription
1 Finite Connections for Supercritical Bernoulli Bond Percolation in 2D M. Campanino 1 D. Ioffe 2 O. Louidor 3 1 Università di Bologna (Italy) 2 Technion (Israel) 3 Courant (New York University) Courant Probability Seminar, 11/6/2009
2 Outline Introduction Percolation on Z d Logarithmic Asymptotics of Connectivities Sharp Asymptotics of Connectivities Sketch of Proof Setup Geometry of Finite Connections The Structure of a Cluster Asymptotics for No Intersection of Two Decorated RWs Summary
3 Outline Introduction Percolation on Z d Logarithmic Asymptotics of Connectivities Sharp Asymptotics of Connectivities Sketch of Proof Setup Geometry of Finite Connections The Structure of a Cluster Asymptotics for No Intersection of Two Decorated RWs Summary
4 Percolation Take G = (Z d, E d ) - the integer lattice with nearest neighbor edges. Open each edge with probability p [0, 1] independently. Let B p be the underlying measure. Theorem (Broadbent, Hammersley 1957) For all d > 2, there exists p c (d) (0, 1) such that: { 0 if p < pc (d) B p (0 ) = θ(p) > 0 if p > p c (d)
5 Basic Picture Sub-critical density p < p c (d): All clusters (connected components) are finite. Radii of clusters have exponentially decaying distributions: ξ p (0, ) : B p (0 B(R)) e ξpr. Russo-Menshikov (86), Barskey-Aizenman (87). Super-critical density p > p c (d): Unique infinite cluster B p -a.s. Radii of finite clusters have exponentially decaying distributions: ζ p (0, ) : B p ( 0 B(R)) e ζpr. Chayes 2 -Newman (87), C 2 -Grimmett-Kesten-Schonmann (89).
6 Connectivities The point-to-point connectivity function is defined as: τ p (x, y) = B p (x y) ; x, y Z d.
7 Connectivities The point-to-point connectivity function is defined as: τ p (x, y) = B p (x y) ; x, y Z d. Sub-critical case: Subadditivity (via FKG of B p ) and exponential decay of cluster radius distribution imply: Theorem Assume p < p c (d). Then, for all x R d : ξ p (x) = lim n 1 n log τ p(0, nx ) is well-defined, convex and homogeneous function that is strictly positive on R d \ {0}. In other words ξ p is a norm on R d, called the inverse correlation norm.
8 Connectivities - cont d Super-critical case: FKG gives a uniform positive lower bound for all x, y Z d : B p (x y) B p (x )B p (y ) = θ 2 (p) > 0.
9 Connectivities - cont d Super-critical case: FKG gives a uniform positive lower bound for all x, y Z d : B p (x y) B p (x )B p (y ) = θ 2 (p) > 0. Therefore, define the finite (truncated) connectivity function: f τp f (x, y) = B p(x y) = B p ( x y) ; x, y Z d.
10 Connectivities - cont d Super-critical case: FKG gives a uniform positive lower bound for all x, y Z d : B p (x y) B p (x )B p (y ) = θ 2 (p) > 0. Therefore, define the finite (truncated) connectivity function: f τp f (x, y) = B p(x y) = B p ( x y) ; x, y Z d. Theorem Assume p / {0, p c (d), 1}. Then, for all x R d : ζ p (x) = lim n 1 n log τ f p(0, nx ) is well-defined, homogeneous and strictly positive on R d \ {0}. This is the finite (truncated) inverse correlation function.
11 In other words: Logarithmic Scale Asymptotics B p (x y) e ξp(θ) y x 2 and B p (x f y) e ζp(θ) y x 2 for all x, y Z d as y x, where θ = (x y)/ x y 2.
12 In other words: Logarithmic Scale Asymptotics B p (x y) e ξp(θ) y x 2 and B p (x f y) e ζp(θ) y x 2 for all x, y Z d as y x, where θ = (x y)/ x y 2. Some relations: ξ p = ξ p (e 1 ). ζ p = ζ p (e 1 ). If d = 2, p > p c (2) = 1 2 then ζ p = 2ξ 1 p. Chayes-Chayes-Grimmett-Kesten-Schonmann (89).
13 In other words: Logarithmic Scale Asymptotics B p (x y) e ξp(θ) y x 2 and B p (x f y) e ζp(θ) y x 2 for all x, y Z d as y x, where θ = (x y)/ x y 2. Some relations: ξ p = ξ p (e 1 ). ζ p = ζ p (e 1 ). If d = 2, p > p c (2) = 1 2 then ζ p = 2ξ 1 p. Chayes-Chayes-Grimmett-Kesten-Schonmann (89). Want sharp asymptotics: B p (x y)? and B p (x f y)?
14 Sharp Asymptotics - Subcritical Case For all d 2, p < p c (d), x, y Z d : B p (x y) A p (θ) y x (d 1)/2 2 e ξp(θ) y x 2 as y x. Campanino-Chayes-Chayes (88) (y x is on the axes). Campanino-Ioffe (02) (all y x). With the Gaussian correction this is called Ornstein-Zernike Behavior. after the work of L.Ornstein and F.Zernike.
15 Sharp Asymptotics - Supercritical Case d 3: For all p > p c (d), x, y Z d, it is expected: B p (x f y) Ãp(θ) y x (d 1)/2 2 e ζp(θ) y x 2 as y x. Verified for p p c (d) and y x on axes. Braga-Procacci-Sanchis (04).
16 Sharp Asymptotics - Supercritical Case d 3: For all p > p c (d), x, y Z d, it is expected: B p (x f y) Ãp(θ) y x (d 1)/2 2 e ζp(θ) y x 2 as y x. Verified for p p c (d) and y x on axes. Braga-Procacci-Sanchis (04). d = 2:
17 Sharp Asymptotics - Supercritical Case d 3: For all p > p c (d), x, y Z d, it is expected: B p (x f y) Ãp(θ) y x (d 1)/2 2 e ζp(θ) y x 2 as y x. Verified for p p c (d) and y x on axes. Braga-Procacci-Sanchis (04). d = 2:?
18 A Related Model - Nearest-Neighbor Ising
19 A Related Model - Nearest-Neighbor Ising Exactly solvable in d = 2 (Onsager (44)). Explicit formulas for (truncated) k-point correlation functions at all temperatures (Wu, McCoy, Tracy, Potts, Ward, Montroll ( 70)). Theorem (Cheng-Wu, Wu) If β < β c (2) then σ x ; σ y β σ x σ y β A β (θ) y x 1/2 2 e ξ β(θ) y x 2 and if β > β c (2) then: σ x ; σ y T β σ xσ y β σ x β σ y β Ãβ(θ) y x 2 2 e ζ β(θ) y x 2 for all x, y Z 2 as y x. No OZ Behavior in d = 2 below the critical temperature!
20 Sharp Asymptotics - Supercritical Case d 3: For all p > p c (d), x, y Z d, it is expected: B p (x f y) Ãp(θ) y x (d 1)/2 2 e ζp(θ) y x 2 as y x. Verified for p p c (d) and y x on axes. Braga-Procacci-Sanchis (04). d = 2:?
21 Sharp Asymptotics - Supercritical Case d 3: For all p > p c (d), x, y Z d, it is expected: B p (x f y) Ãp(θ) y x (d 1)/2 2 e ζp(θ) y x 2 as y x. Verified for p p c (d) and y x on axes. Braga-Procacci-Sanchis (04). d = 2: Theorem (Campanino, Ioffe, L. (09)) For all p > p c (2) = 1/2, x, y Z 2 : B p (x f y) Ãp(θ) y x 2 2 e ζp(θ) y x 2 as y x.
22 Outline Introduction Percolation on Z d Logarithmic Asymptotics of Connectivities Sharp Asymptotics of Connectivities Sketch of Proof Setup Geometry of Finite Connections The Structure of a Cluster Asymptotics for No Intersection of Two Decorated RWs Summary
23 Setup Dual lattice. In d = 2 there is an isomorphic dual Z 2. Set: b is open b is close. The dual model is Percolation with p = 1 p. We assume p < p c (2) and find B p (x f y ). However, we ll express this event mainly using direct bonds. For simplicity: x = 0, y = 0 + (N, 0) N.
24 Setup Dual lattice. In d = 2 there is an isomorphic dual Z 2. Set: b is open b is close. The dual model is Percolation with p = 1 p. We assume p < p c (2) and find B p (x f y ). However, we ll express this event mainly using direct bonds. For simplicity: x = 0, y = 0 + (N, 0) N. A bit of notation. Cl m,r (x, y) - The (possibly empty) cluster that contains x, y and uses only edges in the strip [m, r] Z.
25 Geometry of Finite Connections { } 0 f x N = {0 x N } { direct loop C N around 0 and x N }. C N γ 0 N
26 Decomposition of Finite Connection Event Idea: Find a geometric decomposition which is both unique and the sets of bonds that define each pieces are disjoint.
27 Decomposition of Finite Connection Event Idea: Find a geometric decomposition which is both unique and the sets of bonds that define each pieces are disjoint. In our case: Let C N be the inner most loop that contains Cl(0, N ). Cut along the left-most line H m and right-most line H N r that intersect C N exactly twice: C N H m = {x, v} ; C N H N r = {u, y} Get 3 pieces: L([v, x]), A([v, x], [u, y]), R([u, y]).
28 Decomposition - cont d C N γ 0 N ( ) B p 0 f x N
29 Decomposition - cont d C N y x γ 0 N v u B p ( 0 f x N l) = B p (I([v, x], [u, y])) + B p (I( )) x,v,y,u N r
30 Decomposition - cont d y y x x 0 N v v u u ( ) B p 0 f x N = x,v,y,u B p (I([v, x], [u, y])) + B p (I( )) = B p (L([v, x])) B p (A([v, x], [u, y])) B p (R([u, y])) + B p (I( )) x,v,y,u
31 Decomposition - cont d In fact: ( ) B p 0 f x N B p (L([v, x])) B p (A([v, x], [u, y]))b p (R([u, y])) x, v log N N y, N u log N and, modulo the exponential decay, the asymptotics will come from B p (A([v, x], [u, y]))
32 Two Disjoint Boundary Clusters A([v, x], [u, y]) = {..., x y, v u, Cl m,n r (v, u) Cl m,n r (x, y) = } x Cl m,n r (x, y) y v u H m Cl m,n r (v, u) H N r
33 Two Disjoint Boundary Clusters A([v, x], [u, y]) = {..., x y, v u, Cl m,n r (v, u) Cl m,n r (x, y) = } A([v, x], [u, y]) = {..., x y, v u, Cl m,n r (v, u) γ up (Cl m,n r (x, y)) = } x γ up Cl m,n r (x, y) y v u H m Cl m,n r (v, u) H N r
34 Two Disjoint Boundary Clusters A([v, x], [u, y]) = {..., x y, v u, Cl m,n r (v, u) Cl m,n r (x, y) = } A([v, x], [u, y]) = {..., x y, v u, Cl m,n r (v, u) γ up (Cl m,n r (x, y)) = } x γ up Cl m,n r (x, y) y Exploration of Cl m,n r (v, u) and γ up (Cl m,n r (x, y)) uses different bonds. v u H m Cl m,n r (v, u) H N r
35 Two Disjoint Boundary Clusters A([v, x], [u, y]) = {..., x y, v u, Cl m,n r (v, u) Cl m,n r (x, y) = } A([v, x], [u, y]) = {..., x y, v u, Cl m,n r (v, u) γ up (Cl m,n r (x, y)) = } x γ up Cl m,n r (x, y) y Exploration of Cl m,n r (v, u) and γ up (Cl m,n r (x, y)) uses different bonds. = We can sample the clusters independently: B p (A(... )) = B p (A(... )) v H m Cl m,n r (v, u) u H N r
36 The Structure of One Cluster We would like to have some geometric decomposition of a cluster Cl(x, y).
37 The Structure of One Cluster We would like to have some geometric decomposition of a cluster Cl(x, y). Assume x = 0, y = (N, 0).
38 The Structure of One Cluster We would like to have some geometric decomposition of a cluster Cl(x, y). Assume x = 0, y = (N, 0). Definition: H m is an α-cone-cut-line and z H m is an α-cone-cut-point of Cl(x, y) if Cl(x, y) (z C α ) (z + C α ). x z C α z z + C α y where: C α = {x = (t, x) : x αt}. H m
39 The Structure of One Cluster We would like to have some geometric decomposition of a cluster Cl(x, y). Assume x = 0, y = (N, 0). Definition: H m is an α-cone-cut-line and z H m is an α-cone-cut-point of Cl(x, y) if Cl(x, y) (z C α ) (z + C α ). x z C α z z + C α y where: C α = {x = (t, x) : x αt}. H m There is a well-defined irreducible decomposition of Cl(x, y) along cone-cut-lines:
40 Cluster Decomposition - An Illustration x = 0 y = (N, 0)
41 Cluster Decomposition - An Illustration x = 0 y = (N, 0)
42 Cluster Decomposition - An Illustration x = 0 Γ f y = (N, 0) Γ 1 Γ 2 Γ 3 C3 bf Γ b
43 Cluster Decomposition - An Illustration σ f σ b σ σ 3 1 σ 2 S3 bf x = 0 Γ f y = (N, 0) Γ 1 Γ 2 Γ 3 C3 bf Γ b
44 Cluster Decomposition - An Illustration σ f σ b σ σ 3 1 σ 2 S3 bf x = 0 Γ f y = (N, 0) Γ 1 Γ 2 Γ 3 C3 bf Γ b
45 Cluster Decomposition - cont d Let F be the set of all pieces that can appear between any two succeeding cone-cut-points in any decomposition.
46 Cluster Decomposition - cont d Let F be the set of all pieces that can appear between any two succeeding cone-cut-points in any decomposition. A piece Γ F comes with an offset vector σ = σ(γ), which is the difference between its left and right cut-points.
47 Cluster Decomposition - cont d Let F be the set of all pieces that can appear between any two succeeding cone-cut-points in any decomposition. A piece Γ F comes with an offset vector σ = σ(γ), which is the difference between its left and right cut-points. Similarly, define F b and F f for all possible initial and final pieces. F = Γ σ σ b F b = F f = σ f Γ b Γ f
48 Then, Cluster Decomposition - cont d B p (Cl(x, y) ) = B p (no cone-cut-lines) + where the sum is over all: Γ b F b, Γ i F for i = 1,..., n and all n, Γ f F f, such that: y = x + σ b + σ σ n + σ f. Γ B p ({Γ b })B p ({Γ 1 }) B p ({Γ n })B p ({Γ f })
49 Then, Cluster Decomposition - cont d B p (Cl(x, y) ) = B p (no cone-cut-lines) + where the sum is over all: Γ b F b, Γ i F for i = 1,..., n and all n, Γ f F f, such that: y = x + σ b + σ σ n + σ f. In fact,. Γ B p ({Γ b })B p ({Γ 1 }) B p ({Γ n })B p ({Γ f }) B p (Cl(x, y) ) Γ B p ({Γ b })B p ({Γ 1 }) B p ({Γ n })B p ({Γ f })
50 We can grow Cl(x, y) iteratively: 1. Draw Γ b F b w.p. B p ({Γ b }). Draw Γ f F f w.p. B p ({Γ f }). 2. Set C 0 =, S 0 = 0. Growing a cluster 3. At each step m: 3.1 Draw Γ m F w.p. B p({γ m}). 3.2 C m = C m 1 Γ m ; S m = S m 1 + σ m. 3.3 Cm bf = {x} Γ b C m Γ f. Sm bf = x + σ b + S m + σ f.
51 We can grow Cl(x, y) iteratively: 1. Draw Γ b F b w.p. B p ({Γ b }). Draw Γ f F f w.p. B p ({Γ f }). 2. Set C 0 =, S 0 = 0. Growing a cluster 3. At each step m: 3.1 Draw Γ m F w.p. B p({γ m}). 3.2 C m = C m 1 Γ m ; S m = S m 1 + σ m. 3.3 Cm bf = {x} Γ b C m Γ f. Sm bf = x + σ b + S m + σ f. If P x is the measure for this decorated RW, then B p (Cl(x, y), cone-cut-lines) = P x ( n s.t S bf n = y).
52 Growing a Cluster - Illustration σ b σ f x = 0 y = (N, 0) Γ S b 0 bf Γ f C0 bf
53 Growing a Cluster - Illustration σ f σ 1 σ b S1 bf x = 0 Γ Γ f y = (N, 0) 1 C1 bf Γ b
54 Growing a Cluster - Illustration σ σ f 2 σ 1 σ b S2 bf Γ 2 x = 0 Γ f Γ C y = (N, 0) 1 2 bf Γ b
55 Growing a Cluster - Illustration σ 3 σ 2 S3 bf σ 1 σ Γ f b Γ 3 C3 bf Γ 2 x = 0 Γ y = (N, 0) 1 Γ b σ f
56 Growing a Cluster - Illustration σ 3 σ 2 S3 bf σ 1 σ Γ f b Γ 3 C3 bf Γ 2 x = 0 Γ y = (N, 0) 1 Γ b σ f σ b σ f x = 0 Sbf y = (N, 0) 0 Γ b Γ f C bf 0
57 Growing a Cluster - Illustration σ 3 σ 2 S3 bf σ 1 σ Γ f b Γ 3 C3 bf Γ 2 x = 0 Γ y = (N, 0) 1 Γ b σ f σ b σ 1 σ f x = 0 S1 bf y = (N, 0) Γ b Γ 1 Γ f C1 bf
58 Growing a Cluster - Illustration σ 3 σ 2 S3 bf σ 1 σ Γ f b Γ 3 C3 bf Γ 2 x = 0 Γ y = (N, 0) 1 Γ b σ f σ b σ 1 σ 2 σ f x = 0 y = (N, 0) Γ 1 Γ 2 S2 bf Γ b Γ f C2 bf
59 Growing a Cluster - Illustration σ 3 σ 2 S3 bf σ 1 σ Γ f b Γ 3 C3 bf Γ 2 x = 0 Γ y = (N, 0) 1 Γ b σ f σ f σ b σ σ 3 1 σ 2 S3 bf x = 0 y = (N, 0) Γ Γ f 1 Γ 2 Γ 3 C Γ 3 bf b
60 Normalizing Steps Γ are not properly defined: Γ F B p ({Γ}) < 1. i.e. the random walk can die.
61 Normalizing Steps Γ are not properly defined: Γ F B p ({Γ}) < 1. i.e. the random walk can die. Tilt to make proper: P(Γ = γ) = P(Γ b,f = γ) = e K σ(γ),e 1 P(Γ = γ). k 1 e K σ(γ),e 1 P(Γb,f = γ).
62 Normalizing Steps Γ are not properly defined: Γ F B p ({Γ}) < 1. i.e. the random walk can die. Tilt to make proper: P(Γ = γ) = P(Γ b,f = γ) = e K σ(γ),e 1 P(Γ = γ). k 1 e K σ(γ),e 1 P(Γb,f = γ). K = ξ p (e 1 )!!
63 Normalizing Steps Γ are not properly defined: Γ F B p ({Γ}) < 1. i.e. the random walk can die. Tilt to make proper: P(Γ = γ) = P(Γ b,f = γ) = e K σ(γ),e 1 P(Γ = γ). k 1 e K σ(γ),e 1 P(Γb,f = γ). K = ξ p (e 1 )!! Then: B p (Cl(x, y) ) K e ξp(e 1) y x,e 1 P x ( n s.t S bf n = y).
64 Back to the Two Boundary Clusters Thus, B p (A([v, x], [u, y])) Ke 2ξp(e 1) y x,e 1 ( ) P x,v n 1, n 2 s.t Sn bf,1 1 = y, Sn bf,2 2 = u and C bf,1 C bf,2 =, n 1 n 2 where under P x,v two decorated RWs: C bf,1, C bf,1 evolve independently starting from (x, v). The prefactor will come, therefore, from the asymptotics of the probability of the RW event above.
65 Asymptotics of No Intersection Let N = y x, e 1 = u v, e 1. Then Lemma As N, uniformly in x, y, u, v D(N): ( ) P x,v n 1, n 2 s.t Sn bf,1 1 = y, Sn bf,2 2 = u and C bf,1 C bf,2 = n 1 n 2 U(x v)u(y u) 1 N 2. U( ) has polynomial growth.
66 Proof of Intersection Asymptotics 1. One (unbiased) RW staying positive: P 0 (S n = y, S k > 0 k) U(y) n P 0(S n = y) ; y n 1/2 Combinatorial proof by Alili-Doney (97).
67 Proof of Intersection Asymptotics 1. One (unbiased) RW staying positive: P 0 (S n = y, S k > 0 k) U(y) n P 0(S n = y) ; y n 1/2 Combinatorial proof by Alili-Doney (97). 2. Starting from x > 0: P x(s n = y, S k > 0 k) U(x)U(y) P x(s n = y) ; x, y n 1/2 n
68 Proof of Intersection Asymptotics 1. One (unbiased) RW staying positive: P 0 (S n = y, S k > 0 k) U(y) n P 0(S n = y) ; y n 1/2 Combinatorial proof by Alili-Doney (97). 2. Starting from x > 0: P x(s n = y, S k > 0 k) U(x)U(y) P x(s n = y) ; x, y n 1/2 n 3. Two independent RWs not intersecting: P x,v(s 1 n = y, S 2 n = u, S 1 k > S 2 k k) U(x v)u(y u) P x(s n = y)p v(s n = u) ; x, v, y, u n 1/2 n
69 Proof of Intersection Asymptotics - cont d 4 Add random time steps: ) P (0,x),(0,v) ( n 1, n 2 s.t Sn 1 1 = (N, y), Sn 2 2 = (N, u), S 1 S 2 = U(x v)u(y u) N 1 1 N ; x, v, y, u N 1/2 N
70 Proof of Intersection Asymptotics - cont d 4 Add random time steps: ) P (0,x),(0,v) ( n 1, n 2 s.t Sn 1 1 = (N, y), Sn 2 2 = (N, u), S 1 S 2 = 5 By entropic repulsion: U(x v)u(y u) N 1 1 N ; x, v, y, u N 1/2 N ( P (0,x),(0,v) C 1 n 1 C2 n = S 1 2 S 2 =,... ) const
71 Proof of Intersection Asymptotics - cont d 4 Add random time steps: ) P (0,x),(0,v) ( n 1, n 2 s.t Sn 1 1 = (N, y), Sn 2 2 = (N, u), S 1 S 2 = 5 By entropic repulsion: U(x v)u(y u) N 1 1 N ; x, v, y, u N 1/2 N ( P (0,x),(0,v) C 1 n 1 C2 n = S 1 2 S 2 =,... ) const 6 Initial and final piece only change the constant: ( ) P (0,x),(0,v) n 1, n 2 s.t Sn 1,bf 1 = (N, y), Sn 2,bf 2 = (N, u), C 1,bf C 2,bf = n 1 n 2 U(x v)u(y u) N 2 ; x, v, y, u N 1/2
72 Outline Introduction Percolation on Z d Logarithmic Asymptotics of Connectivities Sharp Asymptotics of Connectivities Sketch of Proof Setup Geometry of Finite Connections The Structure of a Cluster Asymptotics for No Intersection of Two Decorated RWs Summary
73 Open Questions Do the same for 2D Random Cluster (FK) model (q 2). Supercritical percolation on Z d for d 3 Show OZ behavior for finite connectivities in all directions and all p > p c (d).
74 Thank You Thank you.
Renormalization: An Attack on Critical Exponents
Renormalization: An Attack on Critical Exponents Zebediah Engberg March 15, 2010 1 Introduction Suppose L R d is a lattice with critical probability p c. Percolation on L is significantly differs depending
More informationAn Effective Model of Facets Formation
An Effective Model of Facets Formation Dima Ioffe 1 Technion April 2015 1 Based on joint works with Senya Shlosman, Fabio Toninelli, Yvan Velenik and Vitali Wachtel Dima Ioffe (Technion ) Microscopic Facets
More informationΩ = e E d {0, 1} θ(p) = P( C = ) So θ(p) is the probability that the origin belongs to an infinite cluster. It is trivial that.
2 Percolation There is a vast literature on percolation. For the reader who wants more than we give here, there is an entire book: Percolation, by Geoffrey Grimmett. A good account of the recent spectacular
More informationUniqueness of the critical probability for percolation in the two dimensional Sierpiński carpet lattice
Uniqueness of the critical probability for percolation in the two dimensional Sierpiński carpet lattice Yasunari Higuchi 1, Xian-Yuan Wu 2, 1 Department of Mathematics, Faculty of Science, Kobe University,
More informationPercolation in + 1 Dimensions
Percolation in + 1 Dimensions G.R. Grimmett and C.M. Newman Abstract We investigate percolation on the graph of the direct product T Z of a regular tree T and the line Z, in which each tree edge is open
More informationCONSTRAINED PERCOLATION ON Z 2
CONSTRAINED PERCOLATION ON Z 2 ZHONGYANG LI Abstract. We study a constrained percolation process on Z 2, and prove the almost sure nonexistence of infinite clusters and contours for a large class of probability
More informationPercolation and Random walks on graphs
Percolation and Random walks on graphs Perla Sousi May 14, 2018 Contents 1 Percolation 2 1.1 Definition of the model................................... 2 1.2 Coupling of percolation processes.............................
More informationBrownian Bridge and Self-Avoiding Random Walk.
Brownian Bridge and Self-Avoiding Random Walk. arxiv:math/02050v [math.pr] 9 May 2002 Yevgeniy Kovchegov Email: yevgeniy@math.stanford.edu Fax: -650-725-4066 November 2, 208 Abstract We derive the Brownian
More informationBootstrap Percolation on Periodic Trees
Bootstrap Percolation on Periodic Trees Milan Bradonjić Iraj Saniee Abstract We study bootstrap percolation with the threshold parameter θ 2 and the initial probability p on infinite periodic trees that
More informationCRITICAL BEHAVIOUR OF SELF-AVOIDING WALK IN FIVE OR MORE DIMENSIONS
BULLETIN (New Series) OF THE AMERICAN MATHEMATICAL SOCIETY Volume 25, Number 2, October 1991 CRITICAL BEHAVIOUR OF SELF-AVOIDING WALK IN FIVE OR MORE DIMENSIONS TAKASHI HARA AND GORDON SLADE ABSTRACT.
More informationA lower bound on the two arms exponent for critical percolation on the lattice
A lower bound on the two arms exponent for critical percolation on the lattice Raphaël Cerf Université Paris Sud and IUF June 13, 2013 Abstract We consider the standard site percolation model on the d
More informationMEAN-FIELD BEHAVIOUR AND THE LACE EXPANSION
MEAN-FIELD BEHAVIOUR AND THE LACE EXPANSION TAKASHI HARA Department of Applied Physics Tokyo Institute of Technology Oh-Okayama, Meguro-ku, Tokyo 152 Japan e-mail: hara@appana.ap.titech.ac.jp and GORDON
More informationLimit shapes outside the percolation cone
jointly with Tuca Auffinger and Mike Hochman Princeton University July 14, 2011 Definitions We consider first-passage percolation on the square lattice Z 2. x γ - We place i.i.d. non-negative passage times
More informationDependent percolation: some examples and multi-scale tools
Dependent percolation: some examples and multi-scale tools Maria Eulália Vares UFRJ, Rio de Janeiro, Brasil 8th Purdue International Symposium, June 22 I. Motivation Classical Ising model (spins ±) in
More informationA LOWER BOUND ON THE TWO-ARMS EXPONENT FOR CRITICAL PERCOLATION ON THE LATTICE. BY RAPHAËL CERF Université Paris Sud and IUF
The Annals of Probability 2015, Vol. 43, No. 5, 2458 2480 DOI: 10.1214/14-AOP940 Institute of Mathematical Statistics, 2015 A LOWER BOUND ON THE TWO-ARMS EXPONENT FOR CRITICAL PERCOLATION ON THE LATTICE
More informationRSW and Box-Crossing Property for Planar Percolation
March 9, 2016 11:55 ws-procs961x669 WSPC Proceedings - 9.61in x 6.69in Duminil-Copin page 1 1 RSW and Box-Crossing Property for Planar Percolation H. Duminil-Copin and V. Tassion Mathematics Department,
More informationEUROPHYSICS LETTERS OFFPRINT
EUROPHYSICS LETTERS OFFPRINT Vol. 62 Number 2 pp. 182 188 Rigorous nonperturbative Ornstein-Zernike theory for Ising ferromagnets M. Campanino, D. Ioffe and Y. Velenik Published under the scientific responsability
More informationarxiv: v1 [math.pr] 30 Dec 2015
CITICAL PECOLATION AND THE MINIMAL PANNING TEE IN LAB CHALE M. NEWMAN, VINCENT TAION, AND WEI WU arxiv:1512.09107v1 math.p] 30 Dec 2015 Abstract. The minimal spanning forest on Z d is known to consist
More informationSome percolation processes with infinite range dependencies
Some percolation processes with infinite range dependencies Marcelo Hilário UFMG (Belo Horizonte) and Unige (Genève) partialy joint with H. Duminil-Copin (Genève), G. Kozma (Tel-Aviv), V. Sidoravicius
More informationRandom geometric analysis of the 2d Ising model
Random geometric analysis of the 2d Ising model Hans-Otto Georgii Bologna, February 2001 Plan: Foundations 1. Gibbs measures 2. Stochastic order 3. Percolation The Ising model 4. Random clusters and phase
More informationThe Minesweeper game: Percolation and Complexity
The Minesweeper game: Percolation and Complexity Elchanan Mossel Hebrew University of Jerusalem and Microsoft Research March 15, 2002 Abstract We study a model motivated by the minesweeper game In this
More informationA new proof of the sharpness of the phase transition for Bernoulli percolation on Z d
A new proof of the sharpness of the phase transition for Bernoulli percolation on Z Hugo Duminil-Copin an Vincent Tassion October 8, 205 Abstract We provie a new proof of the sharpness of the phase transition
More informationarxiv:math/ v3 [math.pr] 16 Jun 2005
arxiv:math/0410359v3 [math.pr] 16 Jun 2005 A short proof of the Harris-Kesten Theorem Béla Bollobás Oliver Riordan February 1, 2008 Abstract We give a short proof of the fundamental result that the critical
More informationThe near-critical planar Ising Random Cluster model
The near-critical planar Ising Random Cluster model Gábor Pete http://www.math.bme.hu/ gabor Joint work with and Hugo Duminil-Copin (Université de Genève) Christophe Garban (ENS Lyon, CNRS) arxiv:1111.0144
More informationResistance Growth of Branching Random Networks
Peking University Oct.25, 2018, Chengdu Joint work with Yueyun Hu (U. Paris 13) and Shen Lin (U. Paris 6), supported by NSFC Grant No. 11528101 (2016-2017) for Research Cooperation with Oversea Investigators
More information1 INFO Sep 05
Events A 1,...A n are said to be mutually independent if for all subsets S {1,..., n}, p( i S A i ) = p(a i ). (For example, flip a coin N times, then the events {A i = i th flip is heads} are mutually
More informationarxiv: v1 [math.pr] 13 Dec 2017
Statistical physics on a product of trees Tom Hutchcroft arxiv:1712.04911v1 [math.pr] 13 Dec 2017 December 14, 2017 Abstract Let G be the product of finitely many trees T 1 T 2 T N, each of which is regular
More informationRandom subgraphs of finite graphs: III. The phase transition for the n-cube
Random subgraphs of finite graphs: III. The phase transition for the n-cube Christian Borgs Jennifer T. Chayes Remco van der Hofstad Gordon Slade Joel Spencer September 14, 004 Abstract We study random
More informationModern Discrete Probability Branching processes
Modern Discrete Probability IV - Branching processes Review Sébastien Roch UW Madison Mathematics November 15, 2014 1 Basic definitions 2 3 4 Galton-Watson branching processes I Definition A Galton-Watson
More informationAn Introduction to Percolation
An Introduction to Percolation Michael J. Kozdron University of Regina http://stat.math.uregina.ca/ kozdron/ Colloquium Department of Mathematics & Statistics September 28, 2007 Abstract Percolation was
More informationCENTRAL LIMIT THEOREMS FOR THE POTTS MODEL OLIVIER GARET
M P E J Mathematical Physics Electronic Journal ISSN 1086-6655 Volume 11, 2005 Paper 4 Received: Mar 11, 2004, Revised: Sep 18, 2005, Accepted: Oct 14, 2005 Editor: R. Kotecky CENTRAL LIMIT THEOREMS FOR
More informationMicrosoft Technical Report MSR-TR UNIFORM BOUNDEDNESS OF CRITICAL CROSSING PROBABILITIES IMPLIES HYPERSCALING. July 1998
Microsoft Technical Report MSR-TR-98-26 UNIFORM BOUNDEDNESS OF CRITICAL CROSSING PROBABILITIES IMPLIES HYPERSCALING C. Borgs 1,, J. T. Chayes 1,, H. Kesten 2 and J. Spencer 3 1 Microsoft Research One Microsoft
More informationarxiv: v2 [math.pr] 26 Aug 2017
CONSTRAINED PERCOLATION, ISING MODEL AND XOR ISING MODEL ON PLANAR LATTICES ZHONGYANG LI arxiv:1707.04183v2 [math.pr] 26 Aug 2017 Abstract. We study constrained percolation models on planar lattices including
More informationCourse Notes. Part IV. Probabilistic Combinatorics. Algorithms
Course Notes Part IV Probabilistic Combinatorics and Algorithms J. A. Verstraete Department of Mathematics University of California San Diego 9500 Gilman Drive La Jolla California 92037-0112 jacques@ucsd.edu
More information2. Transience and Recurrence
Virtual Laboratories > 15. Markov Chains > 1 2 3 4 5 6 7 8 9 10 11 12 2. Transience and Recurrence The study of Markov chains, particularly the limiting behavior, depends critically on the random times
More informationAlmost giant clusters for percolation on large trees
for percolation on large trees Institut für Mathematik Universität Zürich Erdős-Rényi random graph model in supercritical regime G n = complete graph with n vertices Bond percolation with parameter p(n)
More informationMathematics 530. Practice Problems. n + 1 }
Department of Mathematical Sciences University of Delaware Prof. T. Angell October 19, 2015 Mathematics 530 Practice Problems 1. Recall that an indifference relation on a partially ordered set is defined
More informationMETASTABLE BEHAVIOR FOR BOOTSTRAP PERCOLATION ON REGULAR TREES
METASTABLE BEHAVIOR FOR BOOTSTRAP PERCOLATION ON REGULAR TREES MAREK BISKUP,2 AND ROBERTO H. SCHONMANN Department of Mathematics, University of California at Los Angeles 2 School of Economics, University
More informationHomogeneous Coordinate Ring
Students: Kaiserslautern University Algebraic Group June 14, 2013 Outline Quotients in Algebraic Geometry 1 Quotients in Algebraic Geometry 2 3 4 Outline Quotients in Algebraic Geometry 1 Quotients in
More informationGradient Percolation and related questions
and related questions Pierre Nolin (École Normale Supérieure & Université Paris-Sud) PhD Thesis supervised by W. Werner July 16th 2007 Introduction is a model of inhomogeneous percolation introduced by
More informationConvergence to Equilibrium of Random Ising Models in the Griffiths Phase
Journal of Statistical Physics, Vol. 92, Nos. 3/4, 1998 Convergence to Equilibrium of Random Ising Models in the Griffiths Phase K. S. Alexander, 1 F. Cesi, 2 L. Chayes, 3 C. Maes, 4 and F. Martinelli
More informationarxiv: v2 [math.pr] 26 Jun 2017
Existence of an unbounded vacant set for subcritical continuum percolation arxiv:1706.03053v2 math.pr 26 Jun 2017 Daniel Ahlberg, Vincent Tassion and Augusto Teixeira Abstract We consider the Poisson Boolean
More informationGradient Gibbs measures with disorder
Gradient Gibbs measures with disorder Codina Cotar University College London April 16, 2015, Providence Partly based on joint works with Christof Külske Outline 1 The model 2 Questions 3 Known results
More informationRandom graphs: Random geometric graphs
Random graphs: Random geometric graphs Mathew Penrose (University of Bath) Oberwolfach workshop Stochastic analysis for Poisson point processes February 2013 athew Penrose (Bath), Oberwolfach February
More informationThe range of tree-indexed random walk
The range of tree-indexed random walk Jean-François Le Gall, Shen Lin Institut universitaire de France et Université Paris-Sud Orsay Erdös Centennial Conference July 2013 Jean-François Le Gall (Université
More informationStochastic Loewner Evolution: another way of thinking about Conformal Field Theory
Stochastic Loewner Evolution: another way of thinking about Conformal Field Theory John Cardy University of Oxford October 2005 Centre for Mathematical Physics, Hamburg Outline recall some facts about
More informationConnection to Branching Random Walk
Lecture 7 Connection to Branching Random Walk The aim of this lecture is to prepare the grounds for the proof of tightness of the maximum of the DGFF. We will begin with a recount of the so called Dekking-Host
More informationAdvanced Topics in Probability
Advanced Topics in Probability Conformal Methods in 2D Statistical Mechanics Pierre Nolin Different lattices discrete models on lattices, in two dimensions: square lattice Z 2 : simplest one triangular
More informationUNC Charlotte Super Competition Level 3 Test March 4, 2019 Test with Solutions for Sponsors
. Find the minimum value of the function f (x) x 2 + (A) 6 (B) 3 6 (C) 4 Solution. We have f (x) x 2 + + x 2 + (D) 3 4, which is equivalent to x 0. x 2 + (E) x 2 +, x R. x 2 + 2 (x 2 + ) 2. How many solutions
More informationPERCOLATION. Course: Spring 2013 Lecture notes updated: June 19, Contents
PERCOLATION ARIEL YADIN Course: 201.2.0101 Spring 2013 Lecture notes updated: June 19, 2013 Contents Lecture 1. Introduction 4 1.1. History 4 1.2. Preliminaries - Graphs 4 1.3. Percolation 7 1.4. Kolmogorov
More informationn! (k 1)!(n k)! = F (X) U(0, 1). (x, y) = n(n 1) ( F (y) F (x) ) n 2
Order statistics Ex. 4.1 (*. Let independent variables X 1,..., X n have U(0, 1 distribution. Show that for every x (0, 1, we have P ( X (1 < x 1 and P ( X (n > x 1 as n. Ex. 4.2 (**. By using induction
More informationCounting Clusters on a Grid
Dartmouth College Undergraduate Honors Thesis Counting Clusters on a Grid Author: Jacob Richey Faculty Advisor: Peter Winkler May 23, 2014 1 Acknowledgements There are a number of people who have made
More informationINTRODUCTION TO REAL ANALYTIC GEOMETRY
INTRODUCTION TO REAL ANALYTIC GEOMETRY KRZYSZTOF KURDYKA 1. Analytic functions in several variables 1.1. Summable families. Let (E, ) be a normed space over the field R or C, dim E
More informationCritical behavior of the massless free field at the depinning transition
Critical behavior of the massless free field at the depinning transition Erwin Bolthausen Yvan Velenik August 27, 200 Abstract We consider the d-dimensional massless free field localized by a δ-pinning
More information6 Markov Chain Monte Carlo (MCMC)
6 Markov Chain Monte Carlo (MCMC) The underlying idea in MCMC is to replace the iid samples of basic MC methods, with dependent samples from an ergodic Markov chain, whose limiting (stationary) distribution
More informationOberwolfach workshop on Combinatorics and Probability
Apr 2009 Oberwolfach workshop on Combinatorics and Probability 1 Describes a sharp transition in the convergence of finite ergodic Markov chains to stationarity. Steady convergence it takes a while to
More informationThe parabolic Anderson model on Z d with time-dependent potential: Frank s works
Weierstrass Institute for Applied Analysis and Stochastics The parabolic Anderson model on Z d with time-dependent potential: Frank s works Based on Frank s works 2006 2016 jointly with Dirk Erhard (Warwick),
More informationMATH 590: Meshfree Methods
MATH 590: Meshfree Methods Chapter 14: The Power Function and Native Space Error Estimates Greg Fasshauer Department of Applied Mathematics Illinois Institute of Technology Fall 2010 fasshauer@iit.edu
More informationTHE WORK OF WENDELIN WERNER
THE WORK OF WENDELIN WERNER International Congress of Mathematicians Madrid August 22, 2006 C. M. Newman Courant Institute of Mathematical Sciences New York University It is my pleasure to report on some
More information4 Sums of Independent Random Variables
4 Sums of Independent Random Variables Standing Assumptions: Assume throughout this section that (,F,P) is a fixed probability space and that X 1, X 2, X 3,... are independent real-valued random variables
More informationStochastic domination in space-time for the supercritical contact process
Stochastic domination in space-time for the supercritical contact process Stein Andreas Bethuelsen joint work with Rob van den Berg (CWI and VU Amsterdam) Workshop on Genealogies of Interacting Particle
More informationList of Publications. Roberto H. Schonmann
List of Publications Roberto H. Schonmann (1) J.F.Perez, R.H.Schonmann: On the global character of some local equilibrium conditions - a remark on metastability. Journal of Statistical Physics 28, 479-485
More informationLecture 2. We now introduce some fundamental tools in martingale theory, which are useful in controlling the fluctuation of martingales.
Lecture 2 1 Martingales We now introduce some fundamental tools in martingale theory, which are useful in controlling the fluctuation of martingales. 1.1 Doob s inequality We have the following maximal
More informationTOPICS IN PERCOLATION
TOPICS IN PERCOLATION ALEXANDER DUNLAP Abstract. Percolation is the study of connectedness in a randomly-chosen subset of an infinite graph. Following Grimmett[4], we set up percolation on a square lattice.
More informationTopics in Theoretical Computer Science: An Algorithmist's Toolkit Fall 2007
MIT OpenCourseWare http://ocw.mit.edu 18.409 Topics in Theoretical Computer Science: An Algorithmist's Toolkit Fall 2007 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.
More informationON AN INVARIANCE PRINCIPLE FOR PHASE SEPARATION LINES
ON AN INVARIANCE PRINCIPLE FOR PHASE SEPARATION LINES LEV GREENBERG AND DMITRY IOFFE Abstract. We prove invariance principles for phase separation lines in the two dimensional nearest neighbour Ising model
More informationDIFFERENTIAL POSETS SIMON RUBINSTEIN-SALZEDO
DIFFERENTIAL POSETS SIMON RUBINSTEIN-SALZEDO Abstract. In this paper, we give a sampling of the theory of differential posets, including various topics that excited me. Most of the material is taken from
More information) = nlog b ( m) ( m) log b ( ) ( ) = log a b ( ) Algebra 2 (1) Semester 2. Exponents and Logarithmic Functions
Exponents and Logarithmic Functions Algebra 2 (1) Semester 2! a. Graph exponential growth functions!!!!!! [7.1]!! - y = ab x for b > 0!! - y = ab x h + k for b > 0!! - exponential growth models:! y = a(
More informationRandom Geometric Graphs
Random Geometric Graphs Mathew D. Penrose University of Bath, UK Networks: stochastic models for populations and epidemics ICMS, Edinburgh September 2011 1 MODELS of RANDOM GRAPHS Erdos-Renyi G(n, p):
More informationRandom Walks on Hyperbolic Groups III
Random Walks on Hyperbolic Groups III Steve Lalley University of Chicago January 2014 Hyperbolic Groups Definition, Examples Geometric Boundary Ledrappier-Kaimanovich Formula Martin Boundary of FRRW on
More informationNote on the structure of Kruskal s Algorithm
Note on the structure of Kruskal s Algorithm Nicolas Broutin Luc Devroye Erin McLeish November 15, 2007 Abstract We study the merging process when Kruskal s algorithm is run with random graphs as inputs.
More informationCritical Probabilities
3 Critical Probabilities 3.1 Equalities and Inequalities Let G be a graph, and let p c (G) denote the critical probability of bond percolation on G, as in Section 1.6. It is tempting to seek an exact calculation
More informationIn English, this means that if we travel on a straight line between any two points in C, then we never leave C.
Convex sets In this section, we will be introduced to some of the mathematical fundamentals of convex sets. In order to motivate some of the definitions, we will look at the closest point problem from
More informationTHE BIRTH OF THE INFINITE CLUSTER: FINITE-SIZE SCALING IN PERCOLATION. December 2000
THE BIRTH OF THE INFINITE CLUSTER: FINITE-SIZE SCALING IN PERCOLATION C. Borgs 1, J. T. Chayes 1, H. Kesten 2, and J. Spencer 3 1 Microsoft Research One Microsoft Way, Redmond, WA 98052 2 Department of
More informationChapter 8. P-adic numbers. 8.1 Absolute values
Chapter 8 P-adic numbers Literature: N. Koblitz, p-adic Numbers, p-adic Analysis, and Zeta-Functions, 2nd edition, Graduate Texts in Mathematics 58, Springer Verlag 1984, corrected 2nd printing 1996, Chap.
More informationCFT and SLE and 2D statistical physics. Stanislav Smirnov
CFT and SLE and 2D statistical physics Stanislav Smirnov Recently much of the progress in understanding 2-dimensional critical phenomena resulted from Conformal Field Theory (last 30 years) Schramm-Loewner
More informationL n = l n (π n ) = length of a longest increasing subsequence of π n.
Longest increasing subsequences π n : permutation of 1,2,...,n. L n = l n (π n ) = length of a longest increasing subsequence of π n. Example: π n = (π n (1),..., π n (n)) = (7, 2, 8, 1, 3, 4, 10, 6, 9,
More informationDOMINO TILINGS INVARIANT GIBBS MEASURES
DOMINO TILINGS and their INVARIANT GIBBS MEASURES Scott Sheffield 1 References on arxiv.org 1. Random Surfaces, to appear in Asterisque. 2. Dimers and amoebae, joint with Kenyon and Okounkov, to appear
More informationLattice spin models: Crash course
Chapter 1 Lattice spin models: Crash course 1.1 Basic setup Here we will discuss the basic setup of the models to which we will direct our attention throughout this course. The basic ingredients are as
More informationPercolation on Transitive Graphs as a Coalescent Process: Relentless Merging Followed by Simultaneous Uniqueness
Percolation on Transitive Graphs as a Coalescent Process: Relentless Merging Followed by Simultaneous Uniqueness Olle Häggström Yuval Peres Roberto H. Schonmann July 8, 1999 Abstract Consider i.i.d. percolation
More informationarxiv:math/ v1 [math.pr] 10 Jun 2004
Slab Percolation and Phase Transitions for the Ising Model arxiv:math/0406215v1 [math.pr] 10 Jun 2004 Emilio De Santis, Rossella Micieli Dipartimento di Matematica Guido Castelnuovo, Università di Roma
More informationOn the critical value function in the divide and color model
ALEA, Lat. Am. J. Probab. Math. Stat. 10 (2), 653 666 (2013) On the critical value function in the divide and color model András Bálint, Vincent Beffara and Vincent Tassion Chalmers University of Technology
More informationPART IV Spectral Methods
PART IV Spectral Methods Additional References: R. Peyret, Spectral methods for incompressible viscous flow, Springer (2002), B. Mercier, An introduction to the numerical analysis of spectral methods,
More informationSuperconcentration inequalities for centered Gaussian stationnary processes
Superconcentration inequalities for centered Gaussian stationnary processes Kevin Tanguy Toulouse University June 21, 2016 1 / 22 Outline What is superconcentration? Convergence of extremes (Gaussian case).
More informationRANDOM WALKS AND PERCOLATION IN A HIERARCHICAL LATTICE
RANDOM WALKS AND PERCOLATION IN A HIERARCHICAL LATTICE Luis Gorostiza Departamento de Matemáticas, CINVESTAV October 2017 Luis GorostizaDepartamento de Matemáticas, RANDOM CINVESTAV WALKS Febrero AND 2017
More informationBRANCHING PROCESSES 1. GALTON-WATSON PROCESSES
BRANCHING PROCESSES 1. GALTON-WATSON PROCESSES Galton-Watson processes were introduced by Francis Galton in 1889 as a simple mathematical model for the propagation of family names. They were reinvented
More informationReal Analysis Math 125A, Fall 2012 Sample Final Questions. x 1+x y. x y x. 2 (1+x 2 )(1+y 2 ) x y
. Define f : R R by Real Analysis Math 25A, Fall 202 Sample Final Questions f() = 3 + 2. Show that f is continuous on R. Is f uniformly continuous on R? To simplify the inequalities a bit, we write 3 +
More informationFaculteit Bètawetenschappen. Percolation. Bachelor Thesis TWIN. Martijn Bouman. Wiskunde. Supervisor: Dr. Karma Dajani Mathematical Institute
Faculteit Bètawetenschappen Percolation Bachelor Thesis TWIN Martijn Bouman Wiskunde Supervisor: Dr. Karma Dajani Mathematical Institute June 14, 2017 CONTENTS 1 Contents 1 Introduction 2 2 Some definitions
More informationReturn Probabilities of a Simple Random Walk on Percolation Clusters
Return Probabilities of a Simple Random Walk on Percolation Clusters Deborah Heicklen 1,2, Christopher Hoffman 3,4 Abstract We show that the probability that a continuous time simple random walk on the
More informationConcentration estimates for the isoperimetric constant of the super critical percolation cluster
Concentration estimates for the isoperimetric constant of the super critical percolation cluster arxiv:1110.6006v2 [math.pr] 8 Nov 2011 Eviatar B. Procaccia, Ron Rosenthal November 9, 2011 Abstract We
More informationTASEP on a ring in sub-relaxation time scale
TASEP on a ring in sub-relaxation time scale Jinho Baik and Zhipeng Liu October 27, 2016 Abstract Interacting particle systems in the KPZ universality class on a ring of size L with OL number of particles
More informationarxiv:math/ v1 [math.pr] 27 Jul 2005
arxiv:math/0507566v1 [math.pr] 27 Jul 2005 The distribution of the minimum height among pivotal sites in critical two-dimensional percolation G.J. Morrow Y. Zhang July 21, 2005. Abstract Let L n denote
More informationRandom even graphs and the Ising model
Random even graphs and the Ising model Geoffrey Grimmett, Svante Janson September 19, 007 Abstract We explore the relationship between the Ising model with inverse temperature β, the q = random-cluster
More informationThe scaling limit of the incipient infinite cluster in high-dimensional percolation. II. Integrated super-brownian excursion
The scaling limit of the incipient infinite cluster in high-dimensional percolation. II. Integrated super-brownian excursion Takashi Hara and Gordon Slade October 15, 1999 Abstract For independent nearest-neighbour
More informationA mini course on percolation theory
Jyväskylä Lectures in Mathematics 3 Jeffrey E. Steif A mini course on percolation theory UNIVERSITY OF JYVÄSKYLÄ DEPARTMENT OF MATHEMATICS AND STATISTICS Jyväskylä Lectures in Mathematics 3 Jeffrey E.
More informationarxiv: v2 [math.pr] 10 Jul 2013
On the critical value function in the divide and color model András Bálint Vincent Beffara Vincent Tassion May 17, 2018 arxiv:1109.3403v2 [math.pr] 10 Jul 2013 Abstract The divide and color model on a
More informationMAT100 OVERVIEW OF CONTENTS AND SAMPLE PROBLEMS
MAT100 OVERVIEW OF CONTENTS AND SAMPLE PROBLEMS MAT100 is a fast-paced and thorough tour of precalculus mathematics, where the choice of topics is primarily motivated by the conceptual and technical knowledge
More informationIntroduction to Machine Learning CMU-10701
Introduction to Machine Learning CMU-10701 Markov Chain Monte Carlo Methods Barnabás Póczos & Aarti Singh Contents Markov Chain Monte Carlo Methods Goal & Motivation Sampling Rejection Importance Markov
More informationDynamics for the critical 2D Potts/FK model: many questions and a few answers
Dynamics for the critical 2D Potts/FK model: many questions and a few answers Eyal Lubetzky May 2018 Courant Institute, New York University Outline The models: static and dynamical Dynamical phase transitions
More informationGraphical Representations and Cluster Algorithms
Graphical Representations and Cluster Algorithms Jon Machta University of Massachusetts Amherst Newton Institute, March 27, 2008 Outline Introduction to graphical representations and cluster algorithms
More information