EXPONENTIAL EXTINCTION TIME OF THE CONTACT PROCESS ON FINITE GRAPHS

Size: px
Start display at page:

Download "EXPONENTIAL EXTINCTION TIME OF THE CONTACT PROCESS ON FINITE GRAPHS"

Transcription

1 EXONENTIAL EXTINCTION TIME OF THE CONTACT ROCESS ON FINITE GRAHS THOMAS MOUNTFORD 1, JEAN-CHRISTOHE MOURRAT 1, DANIEL VALESIN,3 AND QIANG YAO 4 Abstract. We study the extinction time τ of the contact process started with full occupancy, on finite trees of bounded degree. We show that, if the infection rate is larger than the critical rate for the contact process on Z, then, uniformly over all trees of degree bounded by a given number, the expectation of τ grows exponentially with the number of vertices. Additionally, for any sequence of growing trees of bounded degree, τ divided by its expectation converges in distribution to the unitary exponential distribution. These also hold if one considers a sequence of graphs having spanning trees with uniformly bounded degree, and provide the basis for powerful coarse-graining arguments. To demonstrate this, we consider the contact process on a random graph with vertex degrees following a power law. Improving a result of Chatterjee and Durrett CD09, we show that, for any non-zero infection rate, the extinction time for the contact process on this graph grows exponentially with the number of vertices. MSC 010: 8C, 05C80. Keywords: contact process, interacting particle systems, metastability. 1. Introduction Westudy the contactprocessonfinite graphs. Ourmain goalisto presentrobust results and techniques which justify that in the supercritical regime, the contact process survives for a time which is exponential in the number of vertices of the underlying graph. We start by introducing notations and recalling important facts. Let G = (V,E) be a graph with undirected edges. The contact process on G with parameter λ > 0 is a continuous-time Markov process (ξ t ) t 0 on the space of subsets of V whose transitions are given by: (1.1) for every x ξ t, ξ t ξ t \{x} with rate 1, for every x / ξ t, ξ t ξ t {x} with rate λ {y ξ t : {x,y} E}, where for a set A, we write A to denote its cardinality. Given A V, we write (ξ A t ) t 0 to denote the contact process started from the initial configuration equal to A. When we write (ξ t ) t 0, with no superscript, the initial configuration will either be clear from the context or unimportant. We often abuse notation and associate configurations ξ V with the corresponding indicator functions (that is, elements of {0,1} V ). The contact process can be thought of as a model for the spread of an infection in a population. Vertices of the graph (sometimes referred to as sites) represent individuals. In a configuration ξ {0,1} V, individuals in state 1 are said to 1 École olytechnique Fédérale de Lausanne, Département de Mathématiques, 1015 Lausanne, Switzerland University of British Columbia, Department of Mathematics, V6T1Z Vancouver, Canada 3 Research funded by the ost-doctoral Research Fellowship of the Government of Canada 4 Department of Statistics and Actuarial Science, East China Normal University, Shanghai 0041, China 1

2 T. MOUNTFORD, J.-C. MOURRAT, D. VALESIN, Q. YAO be infected, and individuals in state 0 are healthy. airs of individuals that are connected by edges in the graph are in proximity to each other in the population. With this terminology, the dynamics can be described as follows. First, infected individuals recover with rate 1. Second, an individual that is infected transmits its infection to a neighbouring site with rate λ(assuming no multiple edges). Note that there is no recovery period in the model: every healthy individual is susceptible for the infection. We begin by presenting some of the properties of the contact process for certain choices of the graph G, namely: the lattice Z d, d-regular infinite trees, and the finite counterparts of these graphs. For proofs of these properties and a detailed treatment of the topic, we refer the reader to Li1, Li. On Z d (equipped with its usual nearest-neighbour graph structure), there exists a number λ c = λ c (Z d ) such that the following holds. If λ λ c, then the contact process dies out, meaning that for any finite initial configuration, the empty configuration0isalmostsurelyeventuallyreached. Ontheotherhand, ifλ>λ c, thenthe contact process survives strongly, that is, for any non-empty initial configuration (and any x V), ξ t (x) = 1 for arbitrarily large values of t > 0. The interest in the contact process on trees was prompted when it was discovered that death and strong survival are not the only possibilities in this case e9. For d, let T d denote the infinite (d+1)-regular tree with a distinguished vertex o called the root. The different phases of the process are captured by two constants 0 < λ 1 (T d ) < λ (T d ) < +. If λ λ 1, then the contact process dies out, while if λ > λ, then it survives strongly. If λ (λ 1, λ, then the process survives weakly. That is, if started with a non-empty finite initial configurantion, then the infection has positive probability of always being present on the graph, yet each individual site eventually becomes permanently healthy. If G is a finite graph, then the contact process on G dies out. This does not however rule out qualitative changes of the behaviour of the contact process as λ varies, as we now describe. To be precise, for A V, let us write τ A G = inf{t : ξa t = 0} for the extinction time of the process started from occupancy in A. We may omit the subscript G when the context is clear enough, and simply write τ when the contact process is started from full occupancy, that is, τ = τ 1. Consider the graph {0,...,n} d (viewed as a subgraph of Z d ) and the distribution of τ for this graph, as n goes to infinity. If λ < λ c (Z d ), then τ/logn converges in probability to a constant DL88, Ch94; see alsotheorem 3.3in Li. If λ > λ c, then logeτ/n d converges to a positive constant, and τ/eτ converges in distribution to the unit exponential distribution DS88, Mo93, Mo99. In particular, when λ > λ c, the order of magnitude of the extinction time is exponential in the number of vertices of the graph; the process is said to exhibit metastability, meaning that it persists for a long time in a state that resembles an equilibrium and then quickly moves to its true equilibrium (0 in this case). Metastability for the contact process in this setting was also studied in CGOV84 and Sc85. Finally, if d = 1, is is also known that, if λ = λ c, then τ/n and τ/n 4 0 in probability DST89. For the case of finite trees, the picture is less complete, and the available results concerning the extinction time are contained in St01. Fix d, let Td h be the finite subgraph of T d defined by considering up to h generations from the root and again take the contact process started from full occupancy on this graph, with associated extinction time τ. If λ < λ, then there exist constants c,c > 0 such that (ch τ Ch) 1 as h. If λ > λ, then for any σ < 1 there exist c 1,c > 0 such that τ > c 1 e c(σd)h 1 as h. This implies that τ is at least as large as a stretched exponential function of the number of vertices, (d+1) h.

3 EXONENTIAL EXTINCTION TIME OF THE CONTACT ROCESS 3 As far as we know, no rigorous results are available concerning finite graphs which are not regular. For n N and d > 0, let Λ(n,d) be the set of all trees with n vertices and degree bounded by d, and let G(n,d) be the set ofgraphs havingaspanning tree in Λ(n,d). In this paper, we prove the following theorems. Theorem 1.1. For any d and λ > λ c (Z), there exists c > 0 such that, for any n large enough, logeτ T inf c. T Λ(n,d) n Theorem 1.. Let d, λ > λ c (Z), and G n G(n,d). The distribution of τ Gn /Eτ Gn converges to the unitary exponential distribution as n tends to infinity. Theorem 1.3. Let d and λ > λ c (Z). There exists c > 0 such that inf τ T e cn 1 as n. T Λ(n,d) Theorem 1. is a (weak) way of exposing the metastability of the contact process (see part (3) of roposition 3. for a finer statement ; note also that from this statement, it is easy to extend the above theorems to more general initial configurations than full occupancy, with appropriate modifications). In Theorems 1.1 and 1.3, one can replace Λ(n,d) by the set of all graphs having a subgraph in Λ(n,d), and in particular, one can replace Λ(n, d) by G(n, d). For instance, the above results cover the case of any sequence of increasingly large connected subsets of Z d. At the cost of requiring λ > λ c (Z), we thus recover and extend previously mentionned results, without any strong assumption on the regularity of the graph. For such values of λ, this shows in particular that on regular trees with finite depth, the extinction time is actually exponentially large in the number of vertices. This is however not quite the way in which we think our results are most useful. Rather, they are the basic ingredient of a general strategy to prove that the extinction time of the contact process is exponentially large in the number of vertices as soon as the infection parameter is above the natural critical value of the particular graphs we consider (instead of λ c (Z)). We now expose this strategy on certain random graphs whose degree distribution follows a power law. The case of finite homogeneous trees will be discussed in a subsequent work. We consider Newman-Strogatz-Watts (NSW) random graphs, that are defined as follows NSW01. For any n N, we construct a graph G n on n vertices. The vertex set is simply {1,...,n}. The random set of edges will be constructed from a probability p on {3,4,...} with the property that, for some a >, c 0 = lim m p(m)/m a existsand isin (0, ). We letd 1,,d n be independent random variables distributed according to p, and conditioned on the event that d 1 + +d n is even. Next, from each vertex i {1,...,n} we place d i half-edges; when two half-edges are connected, an edge is formed. We pair up the d 1 + +d n half-edges in a random way that is uniformly chosen among all possibilities. Let us write to denote a probability measure under which both the random graph and the contact process on this graph are defined. In CD09, it is shown that, for any λ > 0 and any δ > 0, we have τ G n e n1 δ 1 as n (see also BBCS05 for earlier results). In particular, the critical infection parameter for these graphs is 0. We show: Theorem 1.4. For any λ > 0, there exists c > 0 such that τ G n e cn 1 as n.

4 4 T. MOUNTFORD, J.-C. MOURRAT, D. VALESIN, Q. YAO Although it would be simple to deduce Theorem 1.4 from Theorem 1.3 assuming λ > λ c (Z), we stress again that Theorem 1.4 covers any non-zero infection parameter. We think that Theorem 1.4 is true for all a > 1, but we only give the proof for a >, which is the harder case (when we increase a, the degrees of the vertices become stochastically smaller, so the graph becomes less connected). For finite boxes of Z d, the proof that the extinction time is exponential in the number of vertices relies on a coarse-graining argument. This coarse-graining enables to map the initial contact process into a coarse-grained (discrete-time) contact process with an increasingly large infection parameter. The remarkable feature of Z d is its scale invariance, which ensures that the coarse-grained graph is still Z d (or rather, a finite box of Z d ). Now, simple percolation arguments show that on finite boxes of Z d, the time of survival is exponential in the number of vertices if the infection parameter is sufficiently large, say larger than λ target. To sum up, the proof for finite boxes of Z d consists in defining a coarse-graining scheme, and then in fixing a finite length of coarse-graining such that the coarse-grained system has infection parameter larger than λ target. For NSW graphs, coarse-grained blocks will consist of certain stars, that is, vertices with a given large number of neighbours. The difficulty in trying to adapt the strategy to these graphs (or to finite homogeneous trees) is that there is no easy scale invariance as on Z d. It then becomes a very delicate matter to control the geometry of the coarse-grained graph, and thus to define a suitable equivalent of λ target. However, Theorems 1.1 and 1.3 roughly tell us that we do not need to control this geometry, and that we can choose λ target = λ c (Z). The proof in CD09 is also based on a coarse-graining approach. There, the question of controlling the coarse-grained geometry was bypassed by choosing the coarse-grained scale so large as to ensure that the coarse-grained graph was a complete graph. Since the diameter of the NSW graphs goes to infinity, this cannot be ensured unless the length scale of the coarse-graining diverges. In other words, in this approach, stars should have more and more vertices as n increases, and the number of points in the coarse-grained scale must thus be o(n). With our approach, we can choose instead a large but fixed size for the relevant stars in the graph, so that the coarse-grained graph still contains of order n sites, and Theorem 1.4 follows from this construction. Organization of the paper. Section is a brief reminder on some properties of the contact process that will be useful for our purposes. In Section 3, we show a weaker version of Theorem 1.1, which states that the expectation of the extinction time is larger than e cnα for some α > 0. In order to do this, we consider two cases: either the tree contains a large segment, or it contains a large number of disjoint smaller segments. In the first case, the result follows from the known behavior of the extinction time on finite intervals of Z. In the second case, we adapt an argument of CD09 and show that, even if the segments are not too large, the time scale of extinction in individual segments is large enough for the infection to spread to other, possibly inactive, segments, so that the segments can jointly sustain activity for the desired amount of time. At this point, using a general metastability argument from Mo93, we prove Theorem 1.. Given a tree T Λ(n,d), we decompose it into two subtrees T 1,T by removing an edge; we argue that this can be done so that T 1 and T both contain a nonvanishing proportion of the vertices of T. In Section 4, we compare the contact process (ξ t ) t 0 on T to a pair of processes (ζ T1,t) t 0 on T 1 and (ζ T,t) t 0 on T. The process ζ T1 evolves as a contact process on T 1 until extinction. Once extinct, the process stays extinct for some time, and then rises from the ashes (we call it a hoenix contact process). This rebirth of the process reflects the fact that,

5 EXONENTIAL EXTINCTION TIME OF THE CONTACT ROCESS 5 as long as the true process ξ has not died out, the tree T 1 constantly receives new infections that can restore its activity. The process ζ T evolves independently, following the same rules. We show that the true process ξ dominates ζ T1 ζ T up to the extinction of ξ, with probability close to 1. With this comparison at hand, we argue that, modulo a factor that is polynomial in the number of vertices, the expected extinction time for T is larger than the product of the expected extinction times for T 1 and T. This, together with the lower bound e cnα mentioned in the previous paragraph, is then used to prove Theorem 1.1, from which Theorem 1.3 follows. In Section 5, we re-state some of the results explained above for a discrete-time version of the contact process. Finally, we prove Theorem 1.4 in Section 6. Notations. For x R, we write x for the integer part of x. When talking about the size of a graph, we always mean its number of vertices.. A reminder on the contact process We start this section by presenting the graphical construction of the contact process and its self-duality property. Fix a graph G = (V,E) and λ > 0. We take the following family of independent oisson point processes on 0, ): (R x ) : x V with rate 1; (N e ) : e E with rate λ. Let H denote a realization of all these processes. Given x,y V, s t, we say that x and y are connected by an infection path in H (and write (x,s) (y,t) in H) if there exist times t 0 = s < t 1 < < t k = t and vertices x 0 = x,x 1,...,x k 1 = y such that R xi (t i, t i+1 ) = for i = 0,...,k 1; {x i,x i+1 } E for i = 0,...,k ; t i N xi 1,xi for i = 1,...,k 1. oints of the processes (R x ) are called recovery marks and points of (N e ) are links; infection paths are thus paths that traverse links and do not touch recovery marks. H is called a Harris system; we often omit dependence on H. For A,B V, we write A {s} B {t} if (x,s) (y,t) for some x A, y B. We also write A {s} (y,t) and (x,s) B {t}. Finally, given another set C V, we write A {s} B {t} inside C if there is an infection path from a point in A {s} to a point in B {t} and the vertices of this path are entirely contained in C. Given A V, put (.1) ξ A t (x) =1 {A {0} (x,t)} for x V, t 0 (hereandintherestofthepaper,1denotestheindicatorfunction). Itiswell-known that the process (ξ A t ) t 0 = (ξ A t (H)) t 0 thus obtained has the same distribution as that defined by the infinitesimal generator (1.1). The advantage of (.1) is that it allows us to construct in the same probability space versions of the contact processes with all possible initial distributions. From this joint construction, we also obtain the attractiveness property of the contact process: if A B V, then ξ A t (H) ξ B t (H) for all t. From now on, we always assume that the contact process is constructed from a Harris system, and will write G,λ to refer to a probability measure under which such a system (on graph G and with rate λ) is defined; we usually omit G,λ. Now fix A V, t > 0 and a Harris system H. Let us define the dual process (ˆξ A,t s ) 0 s t by ˆξ A,t s (y) =1 {(y,t s) A {t} in H}.

6 6 T. MOUNTFORD, J.-C. MOURRAT, D. VALESIN, Q. YAO If A = {x}, we write (ˆξ x,t s ). This process satisfies two important properties. First, its distribution (from time 0 to t) is the same as that of a contact process with same initial configuration. Second, it satisfies the duality equation (.) ξ A t B if and only if A In particular, ˆξ B,t t. (.3) ξ 1 x,t t (x) = 1 if and only if ˆξ t, where (ξ 1 t) is the process started from full occupancy. We now recall classical results about the contact process on an interval. roposition.1. For n Z +, A Z +, let σ A n = inf { t 0 : ξ A t (n) = 1 }, where (ξ A t ) t 0 denotes the contact process on Z + with initial configuration A. For any λ > λ c (Z), there exists c 1 > 0, n 0 such that the following results hold. (1) For any n, σ {0} n < n c 1 > c 1. () For any A {0,...,n} and any n n 0, σ0 A +σn A n, ξn/c A c 1 0 e n. 1 (3) If (ξ 1 n,t ) t 0 denotes the contact process on {0,...,n} started with full occupancy, then for any n n 0 and any t 0, we have ξ 1 n,t = 0 te c1n. This follows from the classical renormalization argument that compares the contact process with supercritical oriented percolation, see for instance the proof of Li1, Corollary VI Metastability In this section, we show that for λ > λ c (Z), the extinction time of the contact process is at least e cnα for some α > 0, uniformly over T Λ(n,d). This is clear by roposition.1 if the tree has diameter at least n α. Else, we rely on a recursive decomposition of the tree into many subtrees each of which having size at least n. We then pick long intervals (of logarithmic size) inside each of these trees, and study how these can sustain the infection. For a suitable choice of the parameters, the time it takes for such an interval, isolated from the rest of the graph, to turn extinct, is much larger than the time it takes for the infection to travel from one interval to another, since the diameter of the whole graph is assumed small. Over time, the number of infected intervals can be compared to a random walk on the integers with a drift to the right. Analyzing this walk gives the desired result. Using this construction, we also show metastability of the contact process, in the sense that after time n, either the contact process is extinct, or it is equal to the contact process that was started from full occupancy (and thus the initial configuration is forgotten). Since n is much smaller than the extinction time, this is a quantitative way of presenting the metastability of the contact process, and indeed we will conclude the section by proving Theorem 1.. We begin with the following basic graph-theoretic observation, on which our recursive decomposition of the tree is based.

7 EXONENTIAL EXTINCTION TIME OF THE CONTACT ROCESS 7 Lemma 3.1. For a tree T Λ(n,d), there exists an edge whose removal separates T into two subtrees T 1 and T both of size at least n/d. roof. Associate to each edge the value of the smallest cardinality of the two subtrees resulting from the edge s removal. Let {x,y} be an edge having maximal value. We suppose that the subgraph T y containing vertex y is the smaller and that the value of its subtree is no more than n/d 1. Let the remaining edges of vertex x be {x,x 1 }, {x,x }, {x,x r }, where r d 1. Let T j be the subtree containing x j obtained by removing the edge {x,x j }, and let n j be its cardinality. By maximality, all the n j must be no more than n/d 1, but we also have T y = T \({x} T 1 T r ) = n (1+n 1 +n + +n r ) n/d 1. That is, n (d 1)( n/d 1) + n/d n (d 1), a contradiction (the case d = 1 being trivial). roposition 3.. For any λ > λ c (Z), there exists α > 0 and c > 0 such that the following holds. (1) For any n large enough, any T Λ(n,d), any non-empty A T, one has τ A e c n α c. In particular, Eτ A c e cnα. () Moreover, τ e cnα/ 1 e cnα/, where we recall that we write τ as a shorthand for τ 1. (3) For n large enough and any G G(n,d), if the contact process on G started with an arbitrary non-empty configuration survives up to time n, then the chance that at this time, it is equal to the contact process starting from full occupancy, is at least 1 e n α/. From now on, d is fixed and we consider a tree T of maximal degree d and size n. Let β > 0 to be determined later, not depending on n. Applying Lemma 3.1 repeatedly βlogn times, we obtain L n = βlogn disjoint subtrees each of size at least n (d) β log n n, provided β 1/(log(d)) (for clarity, we simply assumethatl n isaninteger, withoutwritingthat theintegerpartshouldbetaken). We write T 1,...,T Ln for the trees thus obtained. Since the tree T has maximal degree bounded by d, so do the subtrees (T j ). Now, the size of a tree with maximal degree d is at most 1+d+...+d diam = ddiam+1 1, d 1 where diam denotes its diameter. As a consequence, for n large enough, each T j logn must have a diameter at least 4logd, and thus contain a path of logn 4logd distinct vertices. We write I j to denote such a path, which we identify with an interval of length logn 4logd. In what follows, we will distinguish between the two possibilities: (A) the diameter of T is at least n α, (B) the diameter of T is less than n α, where α > 0 is a fixed number whose value will be specified in the course of the proof. It is worth keeping in mind that α will be chosen much smaller than β, itself chosen as small as necessary.

8 8 T. MOUNTFORD, J.-C. MOURRAT, D. VALESIN, Q. YAO roof of parts (1-) of roposition 3.. Assume that the tree T satisfies (A). For part (1), by attractiveness, it suffices to consider initial configurations with a single occupied site z. Condition (A) ensures that one can find an interval of length at least n α. We write x,y to denote such an interval, with x and y its endpoints. Consider the event that within time n/c 1, the contact process has infected site x, and thereafter the contact process begun at this time restricted to x,y and with only x occupied has infected y. This event has probability at least c 1 by part (1) of roposition.1. If this event occurs, then at time n/c 1, the contact process on T dominates the contact process on x, y begun with full occupancy. The desired bound now follows from bounds on survival times for supercritical contact processes onaninterval, seepart(3)ofroposition.1. art()alsofollowsusingtheinterval x,y and part (3) of roposition.1. We now consider that the graph satisfies (B), and adapt an approach due to CD09. For any A I i, we write (ξi,t A) t 0 for the contact process on I i with initial configuration A, and define p i (A) = ξ i,kn A = α ξ1 i,kn 0, α where K = /c 1. For any i L n, we say that the interval I i is good at time t if p i (ξ t ) 1 n β, where for simplicity we write p i (ξ t ) instead of p i (ξ t I i ). For k N, we let X k {0,...L n } be the number of good intervals at time kkn α. For i L n and k 0, let us write E i,k for the event that the interval I i is good at time kkn α. By definition, E i,k+1 E i,k = p i (ξ (k+1)kn α) 1 n β E i,k. By attractiveness, the latter is larger than ( ) p i ξ ξ kkn α i,kn 1 n β E α i,k ) p i (ξ 1i,Kn 1 n β,ξ ξ α kkn α i,kn = α ξ1 i,kn E α i,k ) 1 p i (ξ 1i,Kn < 1 n β ξ ξ α kkn α i,kn α ξ1 i,kn E α i,k. }{{} n β We now argue that for n large enough, ) (3.1) p i (ξ 1i,Kn < 1 n β n β. α Letting (ξs A,t ) s t be the contact process started at time t with A occupied, one can rewrite the probability on the l.h.s. of (3.1) as ξ ξ1 i,kn α,kn α i,kn α ξ1,knα i,knα or ξ1,knα i,kn = 0 α ξ1 i,kn > n β α n β ξ 1i,Kn α ξ1,knα i,kn or α ξ1 i,kn = 0. α By part (3) ofroposition.1, the contact processon I i started with full occupancy survives up to time Kn α with probability larger than 1 Kn α exp( c 1 I i ) = 1 Kn α c1/4logd. On this event, the probability that it gets coupled with the contact process started from full occupancy at time Kn α within time Kn α is larger than 1 e Ii = 1 n c1/4logd by part () of roposition.1. Hence, the l.h.s. of (3.1) is bounded by n β ( Kn α c1/4logd +n c1/4logd),

9 EXONENTIAL EXTINCTION TIME OF THE CONTACT ROCESS 9 which can be made smaller than n β if 0 < α β 1 are suitably chosen. To sum up, we have shown that for all n large enough, E i,k+1 E i,k 1 n β. Moreover, an examination of the above proof shows that this estimate still holds if we condition also on the state of the intervals (I j ) j i. In other words, we have shown that for any x 0, (3.) X k+1 X k x X k Bin(L n,n β ) x, where Bin(n,p) denotes a binomial random variable of parameters n and p. Note also that with probabilitytending to 1, all the intervals that aregood at time kkn α remain so at time (k +1)Kn α. We now show that if l < L n, then (3.3) X k+1 X k 1 ξ kkn α 0,X k = l c 1. (Obviously, if X k = l 0, then it must be that ξ kkn α 0.) By the Markov property, it suffices to show (3.3) for k = 0. We thus consider a non-empty initial configuration A with l < L n good intervals. Let I i = x,y be an interval that is not good at time 0. With probability tending to 1, all good intervals remain good at time Kn α, so we only need to study the probability that I i becomes good. The probability of the complementary event is ( p i ξ A Kn α) < 1 n β ) ξ Kn A < α ξ1 i,kn + p α i (ξ 1 i,kn < 1 n β. α Inequality (3.1) ensures that the last probability becomes arbitrarily small for n large enough. It thus suffices to show that (3.4) ξ Kn A < α ξ1i,kn 1 c α 1. Let z A. We consider the event E 1 that within time Kn α = n α /c 1, the contact process has infected x, and thereafter the contact process restricted to x, y and with only x occupied has reached y. Note that the diameter of T is less than n α (so that there exists a path of length less than n α linking z to x), while the length of I i is logn 4logd nα. As a consequence, part (1) of roposition.1 ensures that the event E 1 has probability at least c 1. Since on the event E 1, we have ξ A Kn α ξ1 i,kn α, this justifies (3.4), and thus also (3.3). The conclusion will now follow from (3.) and (3.3) by a comparison with a random walk on Z (,L n with a drift to the right. The necessary information on this drifted walk is contained in the following lemma. Lemma 3.3. Let (Z l ) l N be the random walk on Z (,L n with transition probabilities 0 if k > 1, Z l+1 = x+k Z l = x < L n = c 1/ if k = 1, e n β n k β / k! if k 1. Let also H 0 be the hitting time of Z = Z (,0, and H L be the hitting time of L n. For any n large enough and any x L n, we have H 0 < H L Z 0 = x n xβ/. Let us postpone the proof of this lemma, and see how it enables us to conclude. From (3.3), we learn that whatever the initial non-empty configuration, we have X 1 1 with probability bounded away from 0. On this event, we want to couple (X k ) with the random walk of the lemma, so that X k 1 Z k for every k 0. In the r.h.s. of (3.), a binomial random variable appears, while jumps to the left in

10 10 T. MOUNTFORD, J.-C. MOURRAT, D. VALESIN, Q. YAO the lemma follow a oisson random variable. Since a Bernoulli random variable of parameter p is stochastically dominated by a oisson random variable of parameter log(1 p), it follows that Bin(L n,n β ) is stochastically dominated by a oisson random variable of parameter L n log(1 n β ) = n βlog log(1 n β ) n β. This and(3.3) guarantee the existence of the coupling. With probability at least 1 n β/ 1/,therandomwalkhitsL n beforeenteringz. Theproofofpart(1)will be complete if we can argue that starting from L n, with probability close to 1, the walk needs to hit and exit L n at least e nα times before reachingz. Let us consider a sequence of e nα excursions from L n, and show that with high probability, none of them visits Z. The first jump out of L n is distributed according to a oisson random variable of parameter n β, which (for convenience) may be dominated by an exponential random variable of parameter 1. With probability tending to 1, the maximum over e nα such random variables does not exceed n α L n /4. In view of the lemma, given an excursion whose first step has size smaller than L n /4, the excursion will visit Z with probability smaller than n 3Lnβ/4 e nα, and this finishes the proof of part (1). As for part (), the argument is similar, except that in this case X 0 = L n. Consider e nα/ excursions from L n. With probability at least 1 e nα/, none of these excursions has size larger than n α L n /4. As noted above, given an excursion from L n whose first step has size smaller than L n /4, the excursion will visit Z with probability smaller than n 3Lnβ/4 e nα, thus finishing the proof of part (). roof of Lemma 3.3. Let h(x) = H 0 < H L Z 0 = x, h(x) = n xβ/, and let L be the generator of the random walk: + Lf(x) = c 1 (f(x+1) f(x))+e n β k=1 n kβ k! (f(x k) f(x)) (x < L n ). For x Z (0,L n ), we have Lh(x) = 0. On the other hand, for such x, we have L h(x) = c 1 c 1 c 1 ( n β/ n 1 ) h(x)+e + β ( n β/ 1 ) h(x)+ + k=1 k=1 n kβ ( ) n β/ 1 +e n β/ 1 n kβ k! n kβ/ h(x) k! h(x), (n kβ/ 1) h(x) so L h(x) 0 as soon as n is large enough. As a consequence, L(h h) 0 on Z (0,L n ). By the maximum principle, and the lemma is proved. max (h h) max (h h) = 0, Z (0,L n) Z {L n} The following observation will be useful in the proof of part(3) of roposition 3.. Remark 3.4. Let a Harris system for the contact process on some graph G = (V,E) be given (and fixed). Assume that ξt A = ξ 1 t for some A V and t > 0. This implies that in the Harris system, any infection path from V {0} to V {t} intersects the offspring of elements of A. Let (ˆξ s B,t ) 0 s t be the dual contact process for time t,

11 EXONENTIAL EXTINCTION TIME OF THE CONTACT ROCESS 11 started with configuration B. If furthermore, ˆξ B,t survives up to time t, then there must exist an infection path from A {0} to B {t}. roof of part (3) of roposition 3.. We continue with case (B), but considering that T is the spanning tree of some graph G = (V,E). For an arbitrary z V, we wish to bound ξ n z ξ1n, ξ z n 0. The probability above is equal to y : ξn z (y) ξ 1 n (y), ξ z n 0. For any fixed y, we will thus bound (3.5) ξ n z (y) ξ1n (y), ξ z n 0. Letting (ˆξ y,n t ) 0 t n be the dual contact process for time n started with configuration {y}, we can rewrite this probability as ξ n z (y) = 0, ˆξy,n n 0, ξ z n 0. As in the proof of part (1), we consider X k the number of good intervals at time kkn α. By attractiveness, if an interval is good for the contact process on T, then it must be good for the contact process on G. Note that, for H L as in Lemma 3.3, a classical large deviation estimate on sums of i.i.d. random variables with an exponential moment gives us that and as a consequence, H L > n e n, (3.6) L n / {X k, k n}, ξ z nkn α 0 e n. Let E 3/4 be the event that starting from z occupied, at least 3/4 of all the intervals (I i ) i Ln are good at time n / (which, for simplicity, is assumed to be a multiple of Kn α ). As the proof of part () reveals, once X k has reached L n, the probability that it makes an excursion below 3L n /4 before time n is smaller than e nα. Combining this with (3.6), we obtain ξn z 0, Ec 3/4 e nα, where E c 3/4 denotes the complement of E 3/4. Similarly, if we let Ê3/4 denote the event that for the dual process ˆξ y,n, at least 3/4 of the intervals are good at time n / Kn α, then ˆξy,n n 0, Ê c 3/4 e nα. Consider the event Ẽi defined by: during the time interval n /,n /+Kn α, the direct contact process restricted to I i becomes identical with the contact process started with full occupancy (on I i ), while the dual contact process restricted to I i survives. Let also I be the set of indices i such that I i is good both for the contact process and its dual. We have (Ẽi) c,e 3/4,Ê3/4. i L n (Ẽi) c,e 3/4,Ê3/4 Given that E 3/4 and Ê3/4 both happen, at least 1/ of the intervals are good both for the contact process and its dual, or in other words, I L n /. Moreover, the events E 3/4 and Ê3/4, and the set I, are independent of the state of the Harris system in the time layer T n /,n /+Kn α. By the definition of being good, i I

12 1 T. MOUNTFORD, J.-C. MOURRAT, D. VALESIN, Q. YAO we have (Ẽi) c i I n β. Note also that the events (Ẽi) are independent. Hence (n β ) Ln/. i L n (Ẽi) c,e 3/4,Ê3/4 Finally, note that when one of the Ẽi happens, it must be that ξn z (y) = 1, by Remark 3.4. We have thus proved that ξ n z (y) = 0, ˆξy,n n 0, ξ z n 0 ξ z n (y) = 0, E 3/4,Ê3/4 +4e nα ( n β) L n/ +4e n α 5e nα. Recalling that the probability on the l.h.s. above is that appearing in (3.5), we have thus shown that ξ n z ξ1n, ξ z n 0 5ne nα. Now for a general A V, we have ξ n A ξ1n, ξ A n 0 ξ z n ξ1n, ξ z n 0 5n e nα. z T In view of part (1) of roposition 3., we thus have, for A, ξ n A ξ1n ξ A n 0 5n e n α, c which proves the desired result. For case (A), the reasoningis similar, only simpler. Let I be an interval of length n α contained in T. For any A I, we write (ξi,t A ) t 0 for the contact process on I with initial configuration A, and define p(a) = ξ I,Kn A = ξ 1 I,Kn 0. We say that I is good at time t if p(ξ t ) 1 e n3α/4, and for k N, we let X k be the indicator function that I is good at time kkn. In view of the proof of part (1) of roposition 3., we have (3.7) X k+1 = 1 ξ kkn 0 c 1, while the same reasoning as in case (B) leads to (3.8) X k+1 = 1 X k = 1 1 e n3α/4. From (3.7) and (3.8), one can see that, for any z V, ξn z 0, I not good at time n3/ for ξ z e n5α/8, where for simplicity we assume that n 3/ is a multiple of Kn. Similarly, for any z V, one has ˆξy,n n 0, I not good at time n 3/ Kn for ˆξ y,n e n5α/8, and we conclude as in case (B). roof of Theorem 1.. The result follows from Mo93, roposition.1, using parts (-3) of roposition 3..

13 EXONENTIAL EXTINCTION TIME OF THE CONTACT ROCESS Comparison with hoenix contact processes The aim of this section is to prove Theorems 1.1 and 1.3. To this end, we manufacture a hoenix contact process. This process evolves as a contact process up to extinction, but has then the ability to recover activity. Separating a tree T into T 1 and T as in Lemma 3.1, we show that with high probability, the true contact process ξ dominates the union of two hoenix contact processes running independently on T 1 and T, as long as these two hoenix contact processes are not simultaneously in the empty configuration. From this, we derive a recursive relation between Eτ T and the product Eτ T1 Eτ T, which enables us to conclude. Let T Λ(n,d). Given a Harris system for the contact process on T, for any x T and t 0, we write (ξs x,t) s t for the contact process starting at time t with x the only occupied site. We say that the Harris system is trustworthy on the time interval 0,n 4 if for any (x,s) T 0,n 4 /, the following two conditions hold: (C 1 ) if ξ x,s survives up to time n 4, then ξ x,s n 4 = ξ 1 n 4, (C ) if ξ x,s survives up to time s+n, then it survives up to time n 4. We say that the Harris system H is trustworthy on the time interval t,t+n 4 if Θ t H is trustworthy on the time interval 0,n 4, where Θ t H is the Harris system obtained by a time translation of t. For a given Harris system and for (Y t ) t R+ a family of independent auxiliary random variables following a Bernoulli distribution of parameter 1/, independent of the Harris system, we define the hoenix contact process (ζ T,t ) t 0 = (ζ t ) t 0 on {0,1} T as follows. Step 0. Set ζ 0 = 1, and go to Step 1. Step 1. Evolve as a contact process according to the Harris system, up to reaching the state 0, and go to Step. Step. Let t be the time when Step is reached. Stay at 0 up to time t+n 4 and if the Harris system is trustworthy on t,t + n 4 and Y t = 1, then set ζ t+n 4 = ξ 1,t t+n (where ξ 1,t is the contact process started with full occupancy 4 at time t and governed by the Harris system), and go to Step 1 ; else, go to Step. We say that the process is active when it is running Step 1 ; is quiescent when it is running Step. Note that after initialization, the process alternates between active and quiescent phases. If it happens that during Step, the Harris system is trustworthy on t,t+n 4 and Y t = 1, but ξ 1,t t+n = 0, we consider that the process 4 is active at time t+n 4, and becomes inactive again immediately afterwards. Remark 4.1. Note that since the time the process spends on state 0 is not exponential, (ζ t ) is not Markovian. It would however be easy to make the process Markovian, by enlarging its state space into ( {0,1} T \{0} ) ( {0} 0,n 4 ) ), so that when arriving in Step, the process is in the state (0,0), and subsequently the second coordinate increases at unit speed. Remark 4.. The auxiliary randomization of ζ provided by the family (Y t ) is a technical convenience, which guarantees that if ζ t is quiescent at some time t, then with probability at least 1/ it remains so at least up to time t+n 4. Remark 4.3. Each time the process becomes active again, its distribution at this time is that of ξ 1 n 4 conditioned on the event that the Harris system is trustworthy on the time interval 0,n 4. We write ν to denote this distribution. Lemma 4.4. Let T Λ(n,d). For any n large enough and any t, the probability that the Harris system on T is trustworthy on t,t+n 4 is larger than 1/.

14 14 T. MOUNTFORD, J.-C. MOURRAT, D. VALESIN, Q. YAO roof. It suffices to show the lemma for t = 0. We first consider condition (C 1 ). By part (3) of roposition 3., the probability that (4.1) z T, ξ z,n4 / n 4 0 ξ z,n4 / n 4 = ξ 1,n4 / n 4 goes to 1 as n tends to infinity. Let (x,s) T 0,n 4 /, and assume that ξ x,s survives up to time n 4, that is, Then there must exist z T such that (x,s) T {n 4 }. (x,s) (z,n 4 /) T {n 4 }. On the event (4.1), we thus have ξ x,s n ξ 1,n4 / 4 n. The converse comparison being 4 clearly satisfied, we have in fact ξ x,s n = ξ 1,n4 / 4 n. In order to show that condition 4 (C 1 ) is satisfied for any (x,s) T 0,n 4 / with probability tending to 1, it thus suffices to show that (4.) ξ 1 n = ξ 1,n4 / 4 n 1 as n. 4 In view of part () of roposition 3., with probability tending to one, we have ξ 1 n 0. On this event, by part (3) of roposition 3., we also have ξ 1,n4 / 4 n = ξ 1 4 n 4 with probability tending to 1, and thus (4.) is proved. We now turn to condition (C ). Note that the event ξ x,s s+n 0 can be rewritten as (x,s) T {s+n }, and under such a circumstance, there must exist z T such that (x,s) (z, s/n n ) T {s+n }. It is thus sufficient to show that (4.3) z T,k {0,..., n /4 } : ξ z,kn (k+1)n 0 but ξ z,kn n = 0 0 as n. 4 For a fixed z T and integer k, we have by part (3) of roposition 3. that ξ z,kn (k+1)n 0 but ξ z,kn (k+1)n ξ 1,kn (k+1)n e nα/, so the probability of the event (4.4) z T,k {0,..., n /4 } : ξ z,kn (k+1)n = 0 or ξ z,kn (k+1)n = ξ 1,kn (k+1)n tends to 1 as n tends to infinity. On the other hand, with probability tending to 1, ξ 1 survives up to time n 4, and is clearly dominated by ξ 1,kn (k+1)n, for any k n /4. On the conjunction of this event and the one described in (4.4), we thus have z T,k {0,..., n /4 } : ξ z,kn (k+1)n = 0 or ξ z,kn (k+1)n ξ 1 n 4 0, and this proves (4.3). For the next lemma, recall that τ is the extinction time of the contact process started with full occupancy. Lemma 4.5. For any s > 0, one has τ s s Eτ, Moreover, there exists a constant C such that for any T Λ(n,d), Eτ e Cn.

15 EXONENTIAL EXTINCTION TIME OF THE CONTACT ROCESS 15 roof. Attractiveness of the contact process implies that for any r N, (4.5) τ rs ( τ s) r. Since (4.6) Eτ s + r=0 τ rs s 1 τ s, it comes that τ s 1 s Eτ, which proves the first part. For the second part, note that one can find C such that (4.7) τ 1 1 e Cn uniformly over T Λ(n, d). The conclusion thus follows from (4.6). Lemma 4.6. For any n large enough, any T Λ(n,d) and any t 0, one has (4.8) ζ t = 0 6n6 Eτ. roof. Using Lemma 4.5 with s = n 6, it is clear that (4.8) holds for any n and any t n 6. Note moreover that, writing τ ν for the extinction time of the contact process started from the distribution ν defined in Remark 4.3, we have (4.9) τ ν n 6 n 4 = τ n 6 Harris sys. trustworthy on 0,n 4 n6 Eτ, where we used Lemma 4.4 in the last step. Suppose now that t > n 6, and consider the event E defined by s (t n 6 /,t n 6 /4 such that ζ s = 0. We write τ for the first s t n 6 / such that ζ s = 0. On the event E, we have τ t n 6 /4. The event E defined by k N,k < n /4, Harris sys. not trustworthy on τ+kn 4, τ+(k +1)n 4 or Y τ+kn 4 1 has probability smaller than (3/4) n /4 by Lemma 4.4. When E and (E ) c both hold, the process ζ becomes active at some time t A t n 6 /,t, and is distributed according to ν at this time. Hence, ζ t = 0,E ζ t = 0,E,(E ) c + E τ ν n 6 / + E. Since E 1/Eτ and in view of (4.9), we have indeed (4.10) ζ t = 0,E 3n6 Eτ for any large enough n. It thus remains to bound (4.11) ζ t = 0,E c. Let k be the first positive integer such that Y t n 6 /+kn4 = 1 and the Harris system is trustworthy on a k,b k (def) = t n 6 /+kn 4,t n 6 /+(k +1)n 4. For the same reason as above, we may assume that a k,b k t n 6 /,t n 6 /4. Since on the event E c, the process ζ remains active on the time interval a k,b k, and considering the definition of trustworthiness and of the hoenix process, we know

16 16 T. MOUNTFORD, J.-C. MOURRAT, D. VALESIN, Q. YAO that ζ bk = ξ 1,a k b k, and moreover, the latter random variable is distributed according to ν. Hence, up to a negligible event, the probability in (4.11) is bounded by and thus, using (4.9) again, τ ν n 6 /, (4.1) ζ t = 0,E c 3n6 Eτ. The conclusion now follows, combining (4.10) and (4.1). Lemma 4.7. Let T be a tree with size at most n and maximal degree at most d, and let x T. Define recursively γ 0 = 0 and, for any i N, For n large enough, we have γ i+1 = inf{t γ i +n : ξ t (x) = 1} (+ if empty). γ n /8 > n 4 / ξ n4 / 0 e n. roof. In view of part (1) of roposition.1, for any non-empty A T, we have s nc1 : ξ As (x) = 1 c 1. Let F i be the σ-field generated by {ξ t,t γ i }. By induction and the Markov property, we can thus show that for any k N, γ i+1 (γ i +n ) kn, ξ γi+n c +(k 1)n/c 1 0 F i (1 c 1 ) k. 1 Hence, γ n /8 > n 4 /, ξ n 4 / 0 = n /8 1 i=0 n /8 1 i=0 γ i+1 (γ i +n ) > n 4 /4, ξ n 4 / 0 B i n/c 1 > n 4 /4, where (B i ) are independent geometric random variables of parameter 1 c 1. For λ > 0 small enough, we have and we thus obtain n /8 1 i=0 φ(λ) (def) e = Ee λbi < +, B i > c 1 n 3 /4 exp ( φ(λ)n /8 λc 1 n 3 /4 ), which, together with part (1) of roposition 3., proves the claim. roposition 4.8. For n large enough, let T Λ(n,d) be split into two subtrees T 1,T as described by Lemma 3.1. Define the process ( ζ t ) t 0 by ζ t = ζ T1,t ζ T,t (t 0), where ζ T1 and ζ T are hoenix processes defined on T 1 and T respectively, using the Harris system on T together with two independent families of auxiliary random variables, independent of the Harris system. One has t τ, ξ t ζ t 1 e n3/.

17 EXONENTIAL EXTINCTION TIME OF THE CONTACT ROCESS 17 roof. Let(σ i ) i 1 bethesequenceof(stopping)timeswhentheprocessζ T1 becomes quiescent. We start by showing that, for any i, (4.13) ξ σi+n 4 < ζ T 1,σ i+n 4, ξ σ i+n 4 0 e n7/4. For some arbitrary x T 1, consider the stopping times introduced in Lemma 4.7, but started with γ 0 = σ i, and let N be the largest index satisfying γ N σ i +n 4 /. By Lemma 4.7, we have (4.14) N < n /8, ξ σi+n 4 0 e n. Moreover, part (1) of roposition 3. ensures that, for any j, (4.15) ξ x,γj T 1 survives up to time γ j +n γ j < + c, where ξ x,γj T 1 denotes the contact process restricted to T 1 started with x occupied at time γ j. We introduce the stopping times γ j to deal with the fact that γ j may be infinite. Let j we be the largest index such that γ j σ i +n 4 /. We let γ j = γ j if j j, γ j+1 = σ i +n 4 /+n, and then recursively, γ j+1 γ j = n. We have (4.16) j N, ξ x,γj T 1,γ j+n = 0, ξ σi+n 4 0 N < n /8, ξ σi+n j n /8, ξ x, γj T 1, γ j+n = 0, Since for any j, we have γ j+1 γ j +n, the events indexed by j appearing in the second probability on the r.h.s. of (4.16) are independent. Using also (4.14) and (4.15) (with γ j replaced by γ j ), we thus arrive at (4.17) j N, ξ x,γj T 1,γ j+n = 0,,ξ σi+n 4 0 e n +(1 c ) n /8. We now show that (4.18) j N, ξ x,γj T 1,γ j+n 0 ξ σi+n 4 ζ T 1,σ i+n 4. Indeed, in order for ζ T1,σ i+n4 to be non 0, it must be that the Harris system restricted to T 1 is trustworthy on σ i,σ i + n 4. In this case, by the definition of trustworthiness, if there exists some j N such that ξ x,γj T 1,γ j+n 0, then it must be that ξ x,γj T 1,σ i+n = ξ 1,σi 4 T 1,σ i+n ζ 4 T1,σ i+n 4 (the last two being equal when Y σi = 1, otherwise ζ T1,σ i+n 4 = 0). Since ξ γ j (x) = 1, it is clear that ξ σi+n 4 ξx,γj T 1,σ i+n, thus justifying (4.18). This and (4.17) prove 4 (4.13). In order to conclude, we first show that τ cannot be too large. It comes from (4.5) and (4.7) that (4.19) τ n 4 e Cn e n, where C can be chosen uniformly over T Λ(n,d). If ζ T1 is active at time t and ξ dominates ζ T1 at this time, then the domination is preserved during the whole phase of activity, since ζ T1 is driven by a subset of the Harris system driving the evolution of ξ. When ζ T1 becomes quiescent, the domination is obviouslypreserved. As a consequence, if the domination of ζ T1 by ξ is broken at some time, it must be when ζ T1 turns from quiescent to active. We thus have t τ, ξ t < ζ T1,t = i : ξ σi+n 4 < ζ T 1,σ i+n 4 and ξ σ i+n 4 0. Since σ i+1 σ i n 4, on the event τ n 4 e Cn, there are at most e Cn times when ζ T1 turns from quiescent to active. Using (4.13), we thus obtain t τ, ξ t ζ T1,t τ n 4 e Cn +e Cn e n7/4.

18 18 T. MOUNTFORD, J.-C. MOURRAT, D. VALESIN, Q. YAO The proposition is now proved, using (4.19) together with the fact that t τ, ξ t < ζ t t τ, ξ t < ζ T1,t+ t τ, ξ t < ζ T,t. Corollary 4.9. For n large enough, let T Λ(n,d) be split into two subtrees T 1,T as described by Lemma 3.1. We have Eτ T n 9 Eτ T1 Eτ T. roof. Let σ be the first time when ζ T1 and ζ T are simultaneously quiescent. By roposition 4.8, for any t 0, we have (4.0) τ t σ t+e n3/. In view of Remark 4., at time σ, both ζ T1 and ζ T remain quiescent for a time n 4 with probability at least 1/ (one of them just becomes quiescent at time σ, while the other stays quiescent for a time n 4 with probability at least 1/). As a consequence, for any t 0, σ t t+n 4 n 4 ζs = 0 ds. Since ζ T1 and ζ T are independent, and using Lemma 4.6, we thus obtain (4.1) σ t (6n 6 ) n 4(t+n4 ) Eτ T1 Eτ T = 7n8 (t+n 4 ) Eτ T1 Eτ T. 0 Let us now fix t = Eτ T 1 Eτ T n 9. Since we know from part (1) of roposition 3. that t grows faster than any power of n, (4.1) gives us that for n large enough, In view of (4.0), we thus obtain σ t 1/4. τ t 1/4+e n3/ 1/, which implies that Eτ t/, and thus the corollary. roof of Theorem 1.1. Let ρ = 1+1/d, and consider, for any r N, the quantity V r = inf n (ρ r 1 /d,ρ r logeτ(t) inf T Λ(n,d) T Theorem 1.1 will be proved if we can show that liminf r V r > 0. Let r be a positive integer, and T be a tree of degree bounded by d and whose size lies in ( ρ r,ρ r+1. Since 1 ρ 1 = 1/(d+1) < 1/d and in view of Lemma 3.1, for r large enough, we can split up T into two subtrees T 1, T such that As a consequence, and also T 1, T T (1 ρ 1 ). T 1, T ρ r 1 /d, T 1 T T T ( 1 (1 ρ 1 ) ) ρ r, with the same inequality for T. Corollary 4.9 tells us that for r large enough, Eτ(T) 1 T 9Eτ(T 1) Eτ(T ),

19 EXONENTIAL EXTINCTION TIME OF THE CONTACT ROCESS 19 that is to say, Observing that we arrive at (4.) logeτ(t) logeτ(t 1 )+logeτ(t ) log T 9. logeτ(t 1 )+logeτ(t ) V r ( T 1 + T ) = V r T, logeτ(t) T V r log T 9. T art (1) of roposition 3. ensures that for r large enough, one has c (4.3) V r ρ r(1 α) for some constant c > 0. Recalling that T ρ r+1, we thus have and (4.) turns into log T 9 T logeτ(t) T V r ρ rα/, ( V r 1 1 ), ρ rα/ for any large enough r and any tree whose size lies in (ρ r,ρ r+1. If the size of the tree lies in (ρ r /d,ρ r, then the inequality is obvious, so we arrive at logeτ(t) T V r ( V r+1 V r 1 1 ). ρ rα/ Since V r > 0 for any r large enough by (4.3), and ( 1 1 ) > 0, ρ rα/ r we have shown that liminf r V r > 0, and this finishes the proof. roof of Theorem 1.3. Let c > 0 be given by Theorem 1.1, and T Λ(n,d). We learn from Lemma 4.5 that τ e cn/ ecn/ Eτ, which, by our choice of c, is smaller than e cn/4 for n large enough, uniformly over T Λ(n,d). 5. Discrete time growth process For comparison purposes, it is useful to consider a discrete-time analogue of the contact process; we will need to considersuch a processin the next section. Though many different definitions may be proposed, we have decided on the following. Fix p (0,1) and let {Ix,y r : r {1,,...}, x,y Z, x y 1} be a family of independent Bernoulli(p) random variables. Fix η 0 {0,1} Z and, for r 0, let The following is standard. η r+1 (x) =1{ y : x y 1, η r (y) = 1, I r y,x = 1}.

arxiv: v1 [math.pr] 1 Jan 2013

arxiv: v1 [math.pr] 1 Jan 2013 The role of dispersal in interacting patches subject to an Allee effect arxiv:1301.0125v1 [math.pr] 1 Jan 2013 1. Introduction N. Lanchier Abstract This article is concerned with a stochastic multi-patch

More information

Revisiting the Contact Process

Revisiting the Contact Process Revisiting the Contact Process Maria Eulália Vares Universidade Federal do Rio de Janeiro World Meeting for Women in Mathematics - July 31, 2018 The classical contact process G = (V,E) graph, locally finite.

More information

Latent voter model on random regular graphs

Latent voter model on random regular graphs Latent voter model on random regular graphs Shirshendu Chatterjee Cornell University (visiting Duke U.) Work in progress with Rick Durrett April 25, 2011 Outline Definition of voter model and duality with

More information

Packing and Covering Dense Graphs

Packing and Covering Dense Graphs Packing and Covering Dense Graphs Noga Alon Yair Caro Raphael Yuster Abstract Let d be a positive integer. A graph G is called d-divisible if d divides the degree of each vertex of G. G is called nowhere

More information

Some rigorous results for the stacked contact process

Some rigorous results for the stacked contact process ALEA, Lat. Am. J.Probab. Math. Stat. 13 (1), 193 222(2016) Some rigorous results for the stacked contact process Nicolas Lanchier and Yuan Zhang School of Mathematical and Statistical Sciences, Arizona

More information

Erdős-Renyi random graphs basics

Erdős-Renyi random graphs basics Erdős-Renyi random graphs basics Nathanaël Berestycki U.B.C. - class on percolation We take n vertices and a number p = p(n) with < p < 1. Let G(n, p(n)) be the graph such that there is an edge between

More information

arxiv: v1 [math.pr] 5 Jun 2016

arxiv: v1 [math.pr] 5 Jun 2016 SPATIAL GIBBS RANDOM GRAPHS JEAN-CHRISTOPHE MOURRAT, DANIEL VALESIN arxiv:606.0534v math.pr 5 Jun 206 Abstract. Many real-world networks of interest are embedded in physical space. We present a new random

More information

Intertwining of Markov processes

Intertwining of Markov processes January 4, 2011 Outline Outline First passage times of birth and death processes Outline First passage times of birth and death processes The contact process on the hierarchical group 1 0.5 0-0.5-1 0 0.2

More information

Notes on Complex Analysis

Notes on Complex Analysis Michael Papadimitrakis Notes on Complex Analysis Department of Mathematics University of Crete Contents The complex plane.. The complex plane...................................2 Argument and polar representation.........................

More information

Tree sets. Reinhard Diestel

Tree sets. Reinhard Diestel 1 Tree sets Reinhard Diestel Abstract We study an abstract notion of tree structure which generalizes treedecompositions of graphs and matroids. Unlike tree-decompositions, which are too closely linked

More information

arxiv: v1 [math.pr] 11 Dec 2017

arxiv: v1 [math.pr] 11 Dec 2017 Local limits of spatial Gibbs random graphs Eric Ossami Endo Department of Applied Mathematics eric@ime.usp.br Institute of Mathematics and Statistics - IME USP - University of São Paulo Johann Bernoulli

More information

UPPER DEVIATIONS FOR SPLIT TIMES OF BRANCHING PROCESSES

UPPER DEVIATIONS FOR SPLIT TIMES OF BRANCHING PROCESSES Applied Probability Trust 7 May 22 UPPER DEVIATIONS FOR SPLIT TIMES OF BRANCHING PROCESSES HAMED AMINI, AND MARC LELARGE, ENS-INRIA Abstract Upper deviation results are obtained for the split time of a

More information

Automorphism groups of wreath product digraphs

Automorphism groups of wreath product digraphs Automorphism groups of wreath product digraphs Edward Dobson Department of Mathematics and Statistics Mississippi State University PO Drawer MA Mississippi State, MS 39762 USA dobson@math.msstate.edu Joy

More information

Modern Discrete Probability Branching processes

Modern Discrete Probability Branching processes Modern Discrete Probability IV - Branching processes Review Sébastien Roch UW Madison Mathematics November 15, 2014 1 Basic definitions 2 3 4 Galton-Watson branching processes I Definition A Galton-Watson

More information

CONSTRAINED PERCOLATION ON Z 2

CONSTRAINED PERCOLATION ON Z 2 CONSTRAINED PERCOLATION ON Z 2 ZHONGYANG LI Abstract. We study a constrained percolation process on Z 2, and prove the almost sure nonexistence of infinite clusters and contours for a large class of probability

More information

Chapter 11. Min Cut Min Cut Problem Definition Some Definitions. By Sariel Har-Peled, December 10, Version: 1.

Chapter 11. Min Cut Min Cut Problem Definition Some Definitions. By Sariel Har-Peled, December 10, Version: 1. Chapter 11 Min Cut By Sariel Har-Peled, December 10, 013 1 Version: 1.0 I built on the sand And it tumbled down, I built on a rock And it tumbled down. Now when I build, I shall begin With the smoke from

More information

LECTURE 2: LOCAL TIME FOR BROWNIAN MOTION

LECTURE 2: LOCAL TIME FOR BROWNIAN MOTION LECTURE 2: LOCAL TIME FOR BROWNIAN MOTION We will define local time for one-dimensional Brownian motion, and deduce some of its properties. We will then use the generalized Ray-Knight theorem proved in

More information

Susceptible-Infective-Removed Epidemics and Erdős-Rényi random

Susceptible-Infective-Removed Epidemics and Erdős-Rényi random Susceptible-Infective-Removed Epidemics and Erdős-Rényi random graphs MSR-Inria Joint Centre October 13, 2015 SIR epidemics: the Reed-Frost model Individuals i [n] when infected, attempt to infect all

More information

process on the hierarchical group

process on the hierarchical group Intertwining of Markov processes and the contact process on the hierarchical group April 27, 2010 Outline Intertwining of Markov processes Outline Intertwining of Markov processes First passage times of

More information

ACO Comprehensive Exam October 14 and 15, 2013

ACO Comprehensive Exam October 14 and 15, 2013 1. Computability, Complexity and Algorithms (a) Let G be the complete graph on n vertices, and let c : V (G) V (G) [0, ) be a symmetric cost function. Consider the following closest point heuristic for

More information

THE ROLE OF DISPERSAL IN INTERACTING PATCHES SUBJECT TO AN ALLEE EFFECT

THE ROLE OF DISPERSAL IN INTERACTING PATCHES SUBJECT TO AN ALLEE EFFECT Adv. Appl. Prob. 45, 1182 1197 (2013) Printed in Northern Ireland Applied Probability Trust 2013 THE ROLE OF DISPERSAL IN INTERACTING PATCHES SUBJECT TO AN ALLEE EFFECT N. LANCHIER, Arizona State University

More information

On improving matchings in trees, via bounded-length augmentations 1

On improving matchings in trees, via bounded-length augmentations 1 On improving matchings in trees, via bounded-length augmentations 1 Julien Bensmail a, Valentin Garnero a, Nicolas Nisse a a Université Côte d Azur, CNRS, Inria, I3S, France Abstract Due to a classical

More information

Mean-field dual of cooperative reproduction

Mean-field dual of cooperative reproduction The mean-field dual of systems with cooperative reproduction joint with Tibor Mach (Prague) A. Sturm (Göttingen) Friday, July 6th, 2018 Poisson construction of Markov processes Let (X t ) t 0 be a continuous-time

More information

4 CONNECTED PROJECTIVE-PLANAR GRAPHS ARE HAMILTONIAN. Robin Thomas* Xingxing Yu**

4 CONNECTED PROJECTIVE-PLANAR GRAPHS ARE HAMILTONIAN. Robin Thomas* Xingxing Yu** 4 CONNECTED PROJECTIVE-PLANAR GRAPHS ARE HAMILTONIAN Robin Thomas* Xingxing Yu** School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332, USA May 1991, revised 23 October 1993. Published

More information

Some Results Concerning Uniqueness of Triangle Sequences

Some Results Concerning Uniqueness of Triangle Sequences Some Results Concerning Uniqueness of Triangle Sequences T. Cheslack-Postava A. Diesl M. Lepinski A. Schuyler August 12 1999 Abstract In this paper we will begin by reviewing the triangle iteration. We

More information

P i [B k ] = lim. n=1 p(n) ii <. n=1. V i :=

P i [B k ] = lim. n=1 p(n) ii <. n=1. V i := 2.7. Recurrence and transience Consider a Markov chain {X n : n N 0 } on state space E with transition matrix P. Definition 2.7.1. A state i E is called recurrent if P i [X n = i for infinitely many n]

More information

2. Transience and Recurrence

2. Transience and Recurrence Virtual Laboratories > 15. Markov Chains > 1 2 3 4 5 6 7 8 9 10 11 12 2. Transience and Recurrence The study of Markov chains, particularly the limiting behavior, depends critically on the random times

More information

A simple branching process approach to the phase transition in G n,p

A simple branching process approach to the phase transition in G n,p A simple branching process approach to the phase transition in G n,p Béla Bollobás Department of Pure Mathematics and Mathematical Statistics Wilberforce Road, Cambridge CB3 0WB, UK b.bollobas@dpmms.cam.ac.uk

More information

Topological properties

Topological properties CHAPTER 4 Topological properties 1. Connectedness Definitions and examples Basic properties Connected components Connected versus path connected, again 2. Compactness Definition and first examples Topological

More information

Lecture 21 Representations of Martingales

Lecture 21 Representations of Martingales Lecture 21: Representations of Martingales 1 of 11 Course: Theory of Probability II Term: Spring 215 Instructor: Gordan Zitkovic Lecture 21 Representations of Martingales Right-continuous inverses Let

More information

Almost giant clusters for percolation on large trees

Almost giant clusters for percolation on large trees for percolation on large trees Institut für Mathematik Universität Zürich Erdős-Rényi random graph model in supercritical regime G n = complete graph with n vertices Bond percolation with parameter p(n)

More information

Random graphs: Random geometric graphs

Random graphs: Random geometric graphs Random graphs: Random geometric graphs Mathew Penrose (University of Bath) Oberwolfach workshop Stochastic analysis for Poisson point processes February 2013 athew Penrose (Bath), Oberwolfach February

More information

Topic: Primal-Dual Algorithms Date: We finished our discussion of randomized rounding and began talking about LP Duality.

Topic: Primal-Dual Algorithms Date: We finished our discussion of randomized rounding and began talking about LP Duality. CS787: Advanced Algorithms Scribe: Amanda Burton, Leah Kluegel Lecturer: Shuchi Chawla Topic: Primal-Dual Algorithms Date: 10-17-07 14.1 Last Time We finished our discussion of randomized rounding and

More information

DR.RUPNATHJI( DR.RUPAK NATH )

DR.RUPNATHJI( DR.RUPAK NATH ) Contents 1 Sets 1 2 The Real Numbers 9 3 Sequences 29 4 Series 59 5 Functions 81 6 Power Series 105 7 The elementary functions 111 Chapter 1 Sets It is very convenient to introduce some notation and terminology

More information

Lecture 9. d N(0, 1). Now we fix n and think of a SRW on [0,1]. We take the k th step at time k n. and our increments are ± 1

Lecture 9. d N(0, 1). Now we fix n and think of a SRW on [0,1]. We take the k th step at time k n. and our increments are ± 1 Random Walks and Brownian Motion Tel Aviv University Spring 011 Lecture date: May 0, 011 Lecture 9 Instructor: Ron Peled Scribe: Jonathan Hermon In today s lecture we present the Brownian motion (BM).

More information

Ahlswede Khachatrian Theorems: Weighted, Infinite, and Hamming

Ahlswede Khachatrian Theorems: Weighted, Infinite, and Hamming Ahlswede Khachatrian Theorems: Weighted, Infinite, and Hamming Yuval Filmus April 4, 2017 Abstract The seminal complete intersection theorem of Ahlswede and Khachatrian gives the maximum cardinality of

More information

Markov Chains CK eqns Classes Hitting times Rec./trans. Strong Markov Stat. distr. Reversibility * Markov Chains

Markov Chains CK eqns Classes Hitting times Rec./trans. Strong Markov Stat. distr. Reversibility * Markov Chains Markov Chains A random process X is a family {X t : t T } of random variables indexed by some set T. When T = {0, 1, 2,... } one speaks about a discrete-time process, for T = R or T = [0, ) one has a continuous-time

More information

We are going to discuss what it means for a sequence to converge in three stages: First, we define what it means for a sequence to converge to zero

We are going to discuss what it means for a sequence to converge in three stages: First, we define what it means for a sequence to converge to zero Chapter Limits of Sequences Calculus Student: lim s n = 0 means the s n are getting closer and closer to zero but never gets there. Instructor: ARGHHHHH! Exercise. Think of a better response for the instructor.

More information

arxiv: v2 [math.pr] 4 Sep 2017

arxiv: v2 [math.pr] 4 Sep 2017 arxiv:1708.08576v2 [math.pr] 4 Sep 2017 On the Speed of an Excited Asymmetric Random Walk Mike Cinkoske, Joe Jackson, Claire Plunkett September 5, 2017 Abstract An excited random walk is a non-markovian

More information

MA131 - Analysis 1. Workbook 4 Sequences III

MA131 - Analysis 1. Workbook 4 Sequences III MA3 - Analysis Workbook 4 Sequences III Autumn 2004 Contents 2.3 Roots................................. 2.4 Powers................................. 3 2.5 * Application - Factorials *.....................

More information

Network Augmentation and the Multigraph Conjecture

Network Augmentation and the Multigraph Conjecture Network Augmentation and the Multigraph Conjecture Nathan Kahl Department of Mathematical Sciences Stevens Institute of Technology Hoboken, NJ 07030 e-mail: nkahl@stevens-tech.edu Abstract Let Γ(n, m)

More information

arxiv: v1 [math.pr] 1 Jan 2013

arxiv: v1 [math.pr] 1 Jan 2013 Stochastic spatial model of producer-consumer systems on the lattice arxiv:1301.0119v1 [math.pr] 1 Jan 2013 1. Introduction N. Lanchier Abstract The objective of this paper is to give a rigorous analysis

More information

Claw-Free Graphs With Strongly Perfect Complements. Fractional and Integral Version.

Claw-Free Graphs With Strongly Perfect Complements. Fractional and Integral Version. Claw-Free Graphs With Strongly Perfect Complements. Fractional and Integral Version. Part II. Nontrivial strip-structures Maria Chudnovsky Department of Industrial Engineering and Operations Research Columbia

More information

Lecture 2. We now introduce some fundamental tools in martingale theory, which are useful in controlling the fluctuation of martingales.

Lecture 2. We now introduce some fundamental tools in martingale theory, which are useful in controlling the fluctuation of martingales. Lecture 2 1 Martingales We now introduce some fundamental tools in martingale theory, which are useful in controlling the fluctuation of martingales. 1.1 Doob s inequality We have the following maximal

More information

Introduction to Real Analysis Alternative Chapter 1

Introduction to Real Analysis Alternative Chapter 1 Christopher Heil Introduction to Real Analysis Alternative Chapter 1 A Primer on Norms and Banach Spaces Last Updated: March 10, 2018 c 2018 by Christopher Heil Chapter 1 A Primer on Norms and Banach Spaces

More information

Appendix B for The Evolution of Strategic Sophistication (Intended for Online Publication)

Appendix B for The Evolution of Strategic Sophistication (Intended for Online Publication) Appendix B for The Evolution of Strategic Sophistication (Intended for Online Publication) Nikolaus Robalino and Arthur Robson Appendix B: Proof of Theorem 2 This appendix contains the proof of Theorem

More information

Lecture 06 01/31/ Proofs for emergence of giant component

Lecture 06 01/31/ Proofs for emergence of giant component M375T/M396C: Topics in Complex Networks Spring 2013 Lecture 06 01/31/13 Lecturer: Ravi Srinivasan Scribe: Tianran Geng 6.1 Proofs for emergence of giant component We now sketch the main ideas underlying

More information

CHAPTER 8: EXPLORING R

CHAPTER 8: EXPLORING R CHAPTER 8: EXPLORING R LECTURE NOTES FOR MATH 378 (CSUSM, SPRING 2009). WAYNE AITKEN In the previous chapter we discussed the need for a complete ordered field. The field Q is not complete, so we constructed

More information

Stochastic domination in space-time for the supercritical contact process

Stochastic domination in space-time for the supercritical contact process Stochastic domination in space-time for the supercritical contact process Stein Andreas Bethuelsen joint work with Rob van den Berg (CWI and VU Amsterdam) Workshop on Genealogies of Interacting Particle

More information

ON METEORS, EARTHWORMS AND WIMPS

ON METEORS, EARTHWORMS AND WIMPS ON METEORS, EARTHWORMS AND WIMPS SARA BILLEY, KRZYSZTOF BURDZY, SOUMIK PAL, AND BRUCE E. SAGAN Abstract. We study a model of mass redistribution on a finite graph. We address the questions of convergence

More information

Chapter One. The Real Number System

Chapter One. The Real Number System Chapter One. The Real Number System We shall give a quick introduction to the real number system. It is imperative that we know how the set of real numbers behaves in the way that its completeness and

More information

Paths and cycles in extended and decomposable digraphs

Paths and cycles in extended and decomposable digraphs Paths and cycles in extended and decomposable digraphs Jørgen Bang-Jensen Gregory Gutin Department of Mathematics and Computer Science Odense University, Denmark Abstract We consider digraphs called extended

More information

Krzysztof Burdzy University of Washington. = X(Y (t)), t 0}

Krzysztof Burdzy University of Washington. = X(Y (t)), t 0} VARIATION OF ITERATED BROWNIAN MOTION Krzysztof Burdzy University of Washington 1. Introduction and main results. Suppose that X 1, X 2 and Y are independent standard Brownian motions starting from 0 and

More information

CONTACT PROCESS WITH DESTRUCTION OF CUBES AND HYPERPLANES: FOREST FIRES VERSUS TORNADOES

CONTACT PROCESS WITH DESTRUCTION OF CUBES AND HYPERPLANES: FOREST FIRES VERSUS TORNADOES J. Appl. Prob. 48, 352 365 (2011) Printed in England Applied Probability Trust 2011 CONTACT PROCESS WITH DESTRUCTION OF CUBES AND HYPERPLANES: FOREST FIRES VERSUS TORNADOES N. LANCHIER, Arizona State University

More information

Biased random walks on subcritical percolation clusters with an infinite open path

Biased random walks on subcritical percolation clusters with an infinite open path Biased random walks on subcritical percolation clusters with an infinite open path Application for Transfer to DPhil Student Status Dissertation Annika Heckel March 3, 202 Abstract We consider subcritical

More information

Packing and decomposition of graphs with trees

Packing and decomposition of graphs with trees Packing and decomposition of graphs with trees Raphael Yuster Department of Mathematics University of Haifa-ORANIM Tivon 36006, Israel. e-mail: raphy@math.tau.ac.il Abstract Let H be a tree on h 2 vertices.

More information

Counting independent sets of a fixed size in graphs with a given minimum degree

Counting independent sets of a fixed size in graphs with a given minimum degree Counting independent sets of a fixed size in graphs with a given minimum degree John Engbers David Galvin April 4, 01 Abstract Galvin showed that for all fixed δ and sufficiently large n, the n-vertex

More information

Graph Theory. Thomas Bloom. February 6, 2015

Graph Theory. Thomas Bloom. February 6, 2015 Graph Theory Thomas Bloom February 6, 2015 1 Lecture 1 Introduction A graph (for the purposes of these lectures) is a finite set of vertices, some of which are connected by a single edge. Most importantly,

More information

Homework 6: Solutions Sid Banerjee Problem 1: (The Flajolet-Martin Counter) ORIE 4520: Stochastics at Scale Fall 2015

Homework 6: Solutions Sid Banerjee Problem 1: (The Flajolet-Martin Counter) ORIE 4520: Stochastics at Scale Fall 2015 Problem 1: (The Flajolet-Martin Counter) In class (and in the prelim!), we looked at an idealized algorithm for finding the number of distinct elements in a stream, where we sampled uniform random variables

More information

THE CAPORASO-HARRIS FORMULA AND PLANE RELATIVE GROMOV-WITTEN INVARIANTS IN TROPICAL GEOMETRY

THE CAPORASO-HARRIS FORMULA AND PLANE RELATIVE GROMOV-WITTEN INVARIANTS IN TROPICAL GEOMETRY THE CAPORASO-HARRIS FORMULA AND PLANE RELATIVE GROMOV-WITTEN INVARIANTS IN TROPICAL GEOMETRY ANDREAS GATHMANN AND HANNAH MARKWIG Abstract. Some years ago Caporaso and Harris have found a nice way to compute

More information

Spanning and Independence Properties of Finite Frames

Spanning and Independence Properties of Finite Frames Chapter 1 Spanning and Independence Properties of Finite Frames Peter G. Casazza and Darrin Speegle Abstract The fundamental notion of frame theory is redundancy. It is this property which makes frames

More information

Eves Equihoop, The Card Game SET, and Abstract SET

Eves Equihoop, The Card Game SET, and Abstract SET Eves Equihoop, The Card Game SET, and Abstract SET Arthur Holshouser 3600 Bullard St Charlotte, NC, USA Harold Reiter Department of Mathematics, University of North Carolina Charlotte, Charlotte, NC 83,

More information

Partial cubes: structures, characterizations, and constructions

Partial cubes: structures, characterizations, and constructions Partial cubes: structures, characterizations, and constructions Sergei Ovchinnikov San Francisco State University, Mathematics Department, 1600 Holloway Ave., San Francisco, CA 94132 Abstract Partial cubes

More information

SMSTC (2007/08) Probability.

SMSTC (2007/08) Probability. SMSTC (27/8) Probability www.smstc.ac.uk Contents 12 Markov chains in continuous time 12 1 12.1 Markov property and the Kolmogorov equations.................... 12 2 12.1.1 Finite state space.................................

More information

A NEW SET THEORY FOR ANALYSIS

A NEW SET THEORY FOR ANALYSIS Article A NEW SET THEORY FOR ANALYSIS Juan Pablo Ramírez 0000-0002-4912-2952 Abstract: We present the real number system as a generalization of the natural numbers. First, we prove the co-finite topology,

More information

MATH 6605: SUMMARY LECTURE NOTES

MATH 6605: SUMMARY LECTURE NOTES MATH 6605: SUMMARY LECTURE NOTES These notes summarize the lectures on weak convergence of stochastic processes. If you see any typos, please let me know. 1. Construction of Stochastic rocesses A stochastic

More information

GRAPH SEARCHING, AND A MIN-MAX THEOREM FOR TREE-WIDTH. P. D. Seymour Bellcore 445 South St. Morristown, New Jersey 07960, USA. and

GRAPH SEARCHING, AND A MIN-MAX THEOREM FOR TREE-WIDTH. P. D. Seymour Bellcore 445 South St. Morristown, New Jersey 07960, USA. and GRAPH SEARCHING, AND A MIN-MAX THEOREM FOR TREE-WIDTH P. D. Seymour Bellcore 445 South St. Morristown, New Jersey 07960, USA and Robin Thomas* School of Mathematics Georgia Institute of Technology Atlanta,

More information

Rao s degree sequence conjecture

Rao s degree sequence conjecture Rao s degree sequence conjecture Maria Chudnovsky 1 Columbia University, New York, NY 10027 Paul Seymour 2 Princeton University, Princeton, NJ 08544 July 31, 2009; revised December 10, 2013 1 Supported

More information

Semimatroids and their Tutte polynomials

Semimatroids and their Tutte polynomials Semimatroids and their Tutte polynomials Federico Ardila Abstract We define and study semimatroids, a class of objects which abstracts the dependence properties of an affine hyperplane arrangement. We

More information

CONSTRUCTING A 3-TREE FOR A 3-CONNECTED MATROID. 1. Introduction

CONSTRUCTING A 3-TREE FOR A 3-CONNECTED MATROID. 1. Introduction CONSTRUCTING A 3-TREE FOR A 3-CONNECTED MATROID JAMES OXLEY AND CHARLES SEMPLE For our friend Geoff Whittle with thanks for many years of enjoyable collaboration Abstract. In an earlier paper with Whittle,

More information

4 Sums of Independent Random Variables

4 Sums of Independent Random Variables 4 Sums of Independent Random Variables Standing Assumptions: Assume throughout this section that (,F,P) is a fixed probability space and that X 1, X 2, X 3,... are independent real-valued random variables

More information

Lecture 9 Classification of States

Lecture 9 Classification of States Lecture 9: Classification of States of 27 Course: M32K Intro to Stochastic Processes Term: Fall 204 Instructor: Gordan Zitkovic Lecture 9 Classification of States There will be a lot of definitions and

More information

Weighted Sums of Orthogonal Polynomials Related to Birth-Death Processes with Killing

Weighted Sums of Orthogonal Polynomials Related to Birth-Death Processes with Killing Advances in Dynamical Systems and Applications ISSN 0973-5321, Volume 8, Number 2, pp. 401 412 (2013) http://campus.mst.edu/adsa Weighted Sums of Orthogonal Polynomials Related to Birth-Death Processes

More information

Extension of continuous functions in digital spaces with the Khalimsky topology

Extension of continuous functions in digital spaces with the Khalimsky topology Extension of continuous functions in digital spaces with the Khalimsky topology Erik Melin Uppsala University, Department of Mathematics Box 480, SE-751 06 Uppsala, Sweden melin@math.uu.se http://www.math.uu.se/~melin

More information

APPROXIMATING CONTINUOUS FUNCTIONS: WEIERSTRASS, BERNSTEIN, AND RUNGE

APPROXIMATING CONTINUOUS FUNCTIONS: WEIERSTRASS, BERNSTEIN, AND RUNGE APPROXIMATING CONTINUOUS FUNCTIONS: WEIERSTRASS, BERNSTEIN, AND RUNGE WILLIE WAI-YEUNG WONG. Introduction This set of notes is meant to describe some aspects of polynomial approximations to continuous

More information

MULTIPLICITIES OF MONOMIAL IDEALS

MULTIPLICITIES OF MONOMIAL IDEALS MULTIPLICITIES OF MONOMIAL IDEALS JÜRGEN HERZOG AND HEMA SRINIVASAN Introduction Let S = K[x 1 x n ] be a polynomial ring over a field K with standard grading, I S a graded ideal. The multiplicity of S/I

More information

Lecture 5. If we interpret the index n 0 as time, then a Markov chain simply requires that the future depends only on the present and not on the past.

Lecture 5. If we interpret the index n 0 as time, then a Markov chain simply requires that the future depends only on the present and not on the past. 1 Markov chain: definition Lecture 5 Definition 1.1 Markov chain] A sequence of random variables (X n ) n 0 taking values in a measurable state space (S, S) is called a (discrete time) Markov chain, if

More information

C.7. Numerical series. Pag. 147 Proof of the converging criteria for series. Theorem 5.29 (Comparison test) Let a k and b k be positive-term series

C.7. Numerical series. Pag. 147 Proof of the converging criteria for series. Theorem 5.29 (Comparison test) Let a k and b k be positive-term series C.7 Numerical series Pag. 147 Proof of the converging criteria for series Theorem 5.29 (Comparison test) Let and be positive-term series such that 0, for any k 0. i) If the series converges, then also

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

The diameter of a long-range percolation graph

The diameter of a long-range percolation graph The diameter of a long-range percolation graph Don Coppersmith David Gamarnik Maxim Sviridenko Abstract We consider the following long-range percolation model: an undirected graph with the node set {0,,...,

More information

5 Birkhoff s Ergodic Theorem

5 Birkhoff s Ergodic Theorem 5 Birkhoff s Ergodic Theorem Birkhoff s Ergodic Theorem extends the validity of Kolmogorov s strong law to the class of stationary sequences of random variables. Stationary sequences occur naturally even

More information

Lecture 17 Brownian motion as a Markov process

Lecture 17 Brownian motion as a Markov process Lecture 17: Brownian motion as a Markov process 1 of 14 Course: Theory of Probability II Term: Spring 2015 Instructor: Gordan Zitkovic Lecture 17 Brownian motion as a Markov process Brownian motion is

More information

2. Intersection Multiplicities

2. Intersection Multiplicities 2. Intersection Multiplicities 11 2. Intersection Multiplicities Let us start our study of curves by introducing the concept of intersection multiplicity, which will be central throughout these notes.

More information

Infinite series, improper integrals, and Taylor series

Infinite series, improper integrals, and Taylor series Chapter 2 Infinite series, improper integrals, and Taylor series 2. Introduction to series In studying calculus, we have explored a variety of functions. Among the most basic are polynomials, i.e. functions

More information

Generalized Pigeonhole Properties of Graphs and Oriented Graphs

Generalized Pigeonhole Properties of Graphs and Oriented Graphs Europ. J. Combinatorics (2002) 23, 257 274 doi:10.1006/eujc.2002.0574 Available online at http://www.idealibrary.com on Generalized Pigeonhole Properties of Graphs and Oriented Graphs ANTHONY BONATO, PETER

More information

BRANCHING PROCESSES 1. GALTON-WATSON PROCESSES

BRANCHING PROCESSES 1. GALTON-WATSON PROCESSES BRANCHING PROCESSES 1. GALTON-WATSON PROCESSES Galton-Watson processes were introduced by Francis Galton in 1889 as a simple mathematical model for the propagation of family names. They were reinvented

More information

Example: physical systems. If the state space. Example: speech recognition. Context can be. Example: epidemics. Suppose each infected

Example: physical systems. If the state space. Example: speech recognition. Context can be. Example: epidemics. Suppose each infected 4. Markov Chains A discrete time process {X n,n = 0,1,2,...} with discrete state space X n {0,1,2,...} is a Markov chain if it has the Markov property: P[X n+1 =j X n =i,x n 1 =i n 1,...,X 0 =i 0 ] = P[X

More information

The greedy independent set in a random graph with given degr

The greedy independent set in a random graph with given degr The greedy independent set in a random graph with given degrees 1 2 School of Mathematical Sciences Queen Mary University of London e-mail: m.luczak@qmul.ac.uk January 2016 Monash University 1 Joint work

More information

Biased activated random walks

Biased activated random walks Joint work with Leonardo ROLLA LAGA (Université Paris 3) Probability seminar University of Bristol 23 April 206 Plan of the talk Introduction of the model, results 2 Elements of proofs 3 Conclusion Plan

More information

< k 2n. 2 1 (n 2). + (1 p) s) N (n < 1

< k 2n. 2 1 (n 2). + (1 p) s) N (n < 1 List of Problems jacques@ucsd.edu Those question with a star next to them are considered slightly more challenging. Problems 9, 11, and 19 from the book The probabilistic method, by Alon and Spencer. Question

More information

MORE ON CONTINUOUS FUNCTIONS AND SETS

MORE ON CONTINUOUS FUNCTIONS AND SETS Chapter 6 MORE ON CONTINUOUS FUNCTIONS AND SETS This chapter can be considered enrichment material containing also several more advanced topics and may be skipped in its entirety. You can proceed directly

More information

The structure of bull-free graphs I three-edge-paths with centers and anticenters

The structure of bull-free graphs I three-edge-paths with centers and anticenters The structure of bull-free graphs I three-edge-paths with centers and anticenters Maria Chudnovsky Columbia University, New York, NY 10027 USA May 6, 2006; revised March 29, 2011 Abstract The bull is the

More information

Laver Tables A Direct Approach

Laver Tables A Direct Approach Laver Tables A Direct Approach Aurel Tell Adler June 6, 016 Contents 1 Introduction 3 Introduction to Laver Tables 4.1 Basic Definitions............................... 4. Simple Facts.................................

More information

k-protected VERTICES IN BINARY SEARCH TREES

k-protected VERTICES IN BINARY SEARCH TREES k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from

More information

Counting independent sets up to the tree threshold

Counting independent sets up to the tree threshold Counting independent sets up to the tree threshold Dror Weitz March 16, 2006 Abstract We consider the problem of approximately counting/sampling weighted independent sets of a graph G with activity λ,

More information

Estimates for probabilities of independent events and infinite series

Estimates for probabilities of independent events and infinite series Estimates for probabilities of independent events and infinite series Jürgen Grahl and Shahar evo September 9, 06 arxiv:609.0894v [math.pr] 8 Sep 06 Abstract This paper deals with finite or infinite sequences

More information

Metric Spaces and Topology

Metric Spaces and Topology Chapter 2 Metric Spaces and Topology From an engineering perspective, the most important way to construct a topology on a set is to define the topology in terms of a metric on the set. This approach underlies

More information

Evolutionary Dynamics on Graphs

Evolutionary Dynamics on Graphs Evolutionary Dynamics on Graphs Leslie Ann Goldberg, University of Oxford Absorption Time of the Moran Process (2014) with Josep Díaz, David Richerby and Maria Serna Approximating Fixation Probabilities

More information

CONSTRUCTION OF THE REAL NUMBERS.

CONSTRUCTION OF THE REAL NUMBERS. CONSTRUCTION OF THE REAL NUMBERS. IAN KIMING 1. Motivation. It will not come as a big surprise to anyone when I say that we need the real numbers in mathematics. More to the point, we need to be able to

More information

NOTES ON MATCHINGS IN CONVERGENT GRAPH SEQUENCES

NOTES ON MATCHINGS IN CONVERGENT GRAPH SEQUENCES NOTES ON MATCHINGS IN CONVERGENT GRAPH SEQUENCES HARRY RICHMAN Abstract. These are notes on the paper Matching in Benjamini-Schramm convergent graph sequences by M. Abért, P. Csikvári, P. Frenkel, and

More information