CONTAINMENT GAME PLAYED ON RANDOM GRAPHS: ANOTHER ZIG-ZAG THEOREM

Size: px
Start display at page:

Download "CONTAINMENT GAME PLAYED ON RANDOM GRAPHS: ANOTHER ZIG-ZAG THEOREM"

Transcription

1 CONTAINMENT GAME PLAYED ON RANDOM GRAPHS: ANOTHER ZIG-ZAG THEOREM PAWE L PRA LAT Abstract. We consier a variant of the game of Cops an Robbers, calle Containment, in which cops move from ege to ajacent ege, the robber moves from vertex to ajacent vertex but cannot move along an ege occupie by a cop). The cops win by containing the robber, that is, by occupying all eges incient with a vertex occupie by the robber. The minimum number of cops, ξg), require to contain a robber playe on a graph G is calle the containability number, a natural counterpart of the well-known cop number cg). This variant of the game was recently introuce by Komarov an Mackey, who prove that for every graph G, cg) ξg) γg) G), where γg) an G) are the omination number an the maximum egree of G, respectively. They conjecture that an upper boun can be improve an, in fact, ξg) cg) G). Observe that, trivially, cg) γg).) This seems to be the main question for this game at the moment. By investigating expansion properties, we provie asymptotically almost sure bouns on the containability number of binomial ranom graphs Gn, p) for a wie range of p = pn), showing that it forms an intriguing zigzag shape. This result also proves that the conjecture hols for some range of p or hols up to a constant or an Olog n) multiplicative factors for some other ranges).. Introuction The game of Cops an Robbers efine, along with all the stanar notation, later in this section) is usually stuie in the context of the cop number, the minimum number of cops neee to ensure a winning strategy. The cop number is often challenging to analyze; establishing upper bouns for this parameter is the focus of Meyniel s conjecture that the cop number of a connecte n-vertex graph is O n). For aitional backgroun on Cops an Robbers an Meyniel s conjecture, see the book [7]. A number of variants of Cops an Robbers have been stuie. For example, we may allow a cop to capture the robber from a istance k, where k is a non-negative integer [5], play on eges [9], allow one or both players to move with ifferent spees [, 0] or to teleport, allow the robber to capture the cops [6], make the robber invisible or runk [2, 3], or allow at most one cop to move in any given roun [6, 2, 3]. See Chapter 8 of [7] for a non-comprehensive survey of variants of Cops an Robbers. In this paper, we consier a variant of the game of Cops an Robbers, calle Containment, introuce recently by Komarov an Mackey [4]. In this version, cops move 99 Mathematics Subject Classification. 05C57, 05C80. Key wors an phrases. Containment, Cops an Robbers, vertex-pursuit games, ranom graphs. Supporte by grants from NSERC an Ryerson.

2 2 PAWE L PRA LAT from ege to ajacent ege, the robber moves as in the classic game, from vertex to ajacent vertex but cannot move along an ege occupie by a cop). Formally, the game is playe on a finite, simple, an unetecte graph. There are two players, a set of cops an a single robber. The game is playe over a sequence of iscrete time-steps or turns, with the cops going first on turn 0 an then playing on alternate time-steps. A roun of the game is a cop move together with the subsequent robber move. The cops occupy eges an the robber occupies vertices; for simplicity, we often ientify the player with the vertex/ege they occupy. When the robber is reay to move in a roun, she can move to a neighbouring vertex but cannot move along an ege occupie by a cop, cops can move to an ege that is incient to their current location. Players can always pass, that is, remain on their own vertices/eges. Observe that any subset of cops may move in a given roun. The cops win if after some finite number of rouns, all eges incient with the robber are occupie by cops. This is calle a capture. The robber wins if she can evae capture inefinitely. A winning strategy for the cops is a set of rules that if followe, result in a win for the cops. A winning strategy for the robber is efine analogously. As state earlier, the original game of Cops an Robbers is efine almost exactly as this one, with the exception that all players occupy vertices. If we place a cop at each ege, then the cops are guarantee to win. Therefore, the minimum number of cops require to win in a graph G is a well-efine positive integer, name the containability number of the graph G. Following the notation introuce in [4], we write ξg) for the containability number of a graph G an cg) for the original cop-number of G. In [4], Komarov an Mackey prove that for every graph G, cg) ξg) γg) G), where γg) an G) are the omination number an the maximum egree of G, respectively. It was conjecture that the upper boun can be strengthene an, in fact, the following hols. Conjecture. [4]). For every graph G, ξg) cg) G). Observe that, trivially, cg) γg) so this woul imply the previous result. This seems to be the main question for this variant of the game at the moment. By investigating expansion properties, we provie asymptotically almost sure bouns on the containability number of binomial ranom graphs Gn, p) for a wie range of p = pn), proving that the conjecture hols for some ranges of p or hols up to a constant or an Olog n) multiplicative factors for some other ranges of p). However, before we state the result, let us introuce the probability space we eal with an mention a few results for the classic cop-number that will be neee to examine the conjecture since the corresponing upper boun is a function of the cop number). The ranom graph Gn, p) consists of the probability space Ω, F, P), where Ω is the set of all graphs with vertex set {, 2,..., n}, F is the family of all subsets of Ω, an for every G Ω, PG) = p EG) p) n 2) EG).

3 CONTAINMENT GAME PLAYED ON RANDOM GRAPHS: ANOTHER ZIG-ZAG THEOREM 3 This space may be viewe as the set of outcomes of n 2) inepenent coin flips, one for each pair u, v) of vertices, where the probability of success that is, aing ege uv) is p. Note that p = pn) may an usually oes) ten to zero as n tens to infinity. All asymptotics throughout are as n we emphasize that the notations o ) an O ) refer to functions of n, not necessarily positive, whose growth is boune). We say that an event in a probability space hols asymptotically almost surely or a.a.s.) if the probability that it hols tens to as n goes to infinity. Let us now briefly escribe some known results on the classic) cop-number of Gn, p). Bonato, Wang, an the author of this paper investigate such games in Gn, p) ranom graphs an in generalizations use to moel complex networks with power-law egree istributions see [8]). From their results it follows that if 2 log n/ n p < ε for some ε > 0, then a.a.s. we have that cgn, p)) = Θlog n/p), so Meyniel s conjecture hols a.a.s. for such p. In fact, for p = n o) we have that a.a.s. cgn, p)) = + o)) log / p) n. A simple argument using ominating sets shows that Meyniel s conjecture also hols a.a.s. if p tens to as n goes to infinity see [7] for this an stronger results). Bollobás, Kun an Leaer [4] showe that if pn) 2. log n/n, then a.a.s. pn) 2 n/2 9/2 log logpn)) cgn, p)) n log n. From these results, if np 2. log n an either np = n o) or np = n /2+o), then a.a.s. cgn, p)) = n /2+o). Somewhat surprisingly, between these values it was shown by Luczak an the author of this paper [5] that the cop number has more complicate behaviour. It follows that a.a.s. log n cgn, n x )) is asymptotic to the function fx) shown in Figure enote in blue). Figure. The zigzag functions representing the orinary cop number blue) an the containability number re).

4 4 PAWE L PRA LAT Formally, the following result hols for the classic game. Theorem.2 [5, 8]). Let 0 < α < an = n) = np = n α+o). i) If < α < for some integer j, then a.a.s. 2j+ 2j ii) If 2j < α < 2j cgn, p)) = Θ j ). for some integer j 2, then a.a.s. n ) cgn, p)) = Ω, an j ) n log n cgn, p)) = O. iii) If /2 < α <, then a.a.s. ) n log n cgn, p)) = Θ. The above result shows that Meyniel s conjecture hols a.a.s. for ranom graphs except perhaps when np = n /2k)+o) for some k N, or when np = n o). The author of this paper an Wormal showe recently that the conjecture hols a.a.s. in Gn, p) [8] as well as in ranom -regular graphs [9]. Finally, we are able to state the result of this paper. Theorem.3. Let 0 < α < an = n) = np = n α+o). i) If < α < for some integer j, then a.a.s. 2j+ 2j ξgn, p)) = Θ j+ ) = ΘcGn, p)) Gn, p))). Hence, a.a.s. Conjecture. hols up to a multiplicative constant factor). ii) If < α < for some integer j 2, then a.a.s. 2j 2j n ) ξgn, p)) = Ω, an j ) n log n ξgn, p)) = O = OcGn, p)) Gn, p)) log n). j Hence, a.a.s. Conjecture. hols up to a multiplicative Olog n) factor). iii) If /2 < α <, then a.a.s. ξgn, p)) = Θn) = ΘcGn, p)) Gn, p))/ log n) cgn, p)) Gn, p). Hence, a.a.s. Conjecture. hols. It follows that a.a.s. log n ξgn, n x )) is asymptotic to the function gx) shown in Figure enote in re). The fact the conjecture hols is associate with the observation that gx) fx) = x, which is equivalent to saying that a.a.s. the ratio ξgn, p))/cgn, p)) = n o) = Gn, p)) n o). Moreover, let us mention that Theorem.3 implies that the conjecture is best possible again, up to a constant or an Olog n) multiplicative factors for corresponing ranges of p). j

5 CONTAINMENT GAME PLAYED ON RANDOM GRAPHS: ANOTHER ZIG-ZAG THEOREM 5 Note that in the above result we skip the case when np = n /k+o) for some positive integer k or np = n o). It is one for a technical reason: an argument for the lower boun for ξgn, p)) uses a technical lemma from [5] that, in turn, uses Corollary 2.6 from [20] which is state only for np = n α+o), where α /k for any positive integer k. Clearly, one can repeat the argument given in [20], which is a very nice but slightly technical application of the polynomial concentration metho inequality by Kim an Vu. However, in orer to make the paper easier an more compact, a reay-to-use lemma from [5] is use an we concentrate on the linear parts of the graph of the zigzag function. Nonetheless, similarly to the corresponing result for cgn, p)), one can expect that, up to a factor of log O) n, the result extens naturally also to the case np = n /k+o) as well. On the other han, there is no problem with the upper boun so the case when np = n /k+o) for some positive integer k is also investigate see below for a precise statement). Moreover, some expansion properties that were use to prove that Meyniel s conjecture hols for Gn, p) [8] are incorporate here to investigate sparser graphs. The rest of the paper is evote to prove Theorem Proof of Theorem Typical properties of Gn, p) an useful inequalities. Let us start by listing some typical properties of Gn, p). These observations are part of folklore an can be foun in many places, so we will usually skip proofs, pointing to corresponing results in existing literature. Let N i v) enote the set of vertices at istance i from v, an let N i [v] enote the set of vertices within istance i of v, that is, N i [v] = 0 j i N jv). For simplicity, we use N[v] to enote N [v], an Nv) to enote N v). Since cops occupy eges but the robber occupies vertices, we will nee to investigate the set of eges at istance i from a given vertex v that we enote by E i v). Formally, E i v) consists of eges between N i v) an N i v), an within N i v). In particular, E v) is the set of eges incient to v. Finally, let P i v, w) enote the number of paths of length i joining v an w. Let us start with the following lemma. Lemma 2.. Let = n) = pn ) log 3 n. Then, there exists a positive constant c such that a.a.s. the following properties hol in Gn, p) = V, E). i) Let S V be any set of s = S vertices, an let r N. Then N r [v] c min{sr, n}. v S Moreover, if s an r are such that s r < n/ log n, then N r [v] = + o))sr. ii) Gn, p) is connecte. v S

6 6 PAWE L PRA LAT iii) Let r = rn) be the largest integer such that r n log n. Then, for every vertex v V an w N r+ v), the number of eges from w to N r v) is at most b, where { 250 if n 0.49 b = 3 log n if n 0.49 < n. log log n Proof. The proof of part i) can be foun in [8]. The fact that Gn, p) is connecte is well known see, for example, []). In fact, the sharp) threshol for connectivity is p = log n/n so this property hols for even sparser graphs. For part iii), let us first expose the rth neighbourhoo of v. By part i), we may assume that N r [v] = + o)) r < 2 r. For any w V \ N r [v], the probability that there are at least b eges joining w to N r v) is at most If n 0.49, then 2 r q := b ) p b 2e r b ) b n ) b ) 2e r+ b =. bn ) b 2e n log n q n 0.005b = on 2 ), bn provie that b is large enough say, b = 250). For n 0.49 < n an so r = ), we observe that ) b 2e q = exp + o))b log b) = on 2 ), b provie b = 3 log n/ log log n. The claim follows by the union boun over all pairs v, w. The proof of the lemma is finishe. The next lemma can be foun in [5]. See also [3] for its extension.) Lemma 2.2. Let ε an α be constants such that 0 < ε < 0., ε < α < ε, an let = n) = pn ) = n α+o). Let l N be the largest integer such that l < /α. Then, a.a.s. for every vertex v of Gn, p) the following properties hol. i) If w N i [v] for some i with 2 i l, then P i v, w) 3 ii) If w N l+ [v] an l+ 7n log n, then P l+ v, w) 6 lα iii) If w N l+ [v] an l+ < 7n log n, then P l+ v, w) 42 lα. iα l+. n log n. Moreover, a.a.s. iv) Every ege of Gn, p) is containe in at most ε cycles of length at most l + 2. We will also use the following variant of Chernoff s boun see, for example, []): Lemma 2.3 Chernoff Boun). If X is a binomial ranom variable with expectation µ, an 0 < δ <, then ) Pr[X < δ)µ] exp δ2 µ 2

7 CONTAINMENT GAME PLAYED ON RANDOM GRAPHS: ANOTHER ZIG-ZAG THEOREM 7 an if δ > 0, ) Pr[X > + δ)µ] exp δ2 µ. 2 + δ 2.2. Upper boun. First, let us eal with ense graphs that correspon to part iii) of Theorem.3. In fact, we are going to make a simple observation that the containability number is linear if G has a perfect or a near-perfect matching. The result will follow since it is well-known that for p = pn) such that pn log n, Gn, p) has a perfect or a near-perfect) matching a.a.s. As usual, see [], for more etails.) Lemma 2.4. Suppose that G on n vertices has a perfect matching n is even) or a near-perfect matching n is o). Then, ξg) n. Proof. Suppose first that n is even. The cops start on the eges of a perfect matching; two cops occupy any ege of the matching for a total of n cops. All vertices of G can be associate with unique cops. The robber starts on some vertex v. One ege incient to v the ege vv that belongs to the perfect matching use) is alreay occupie by a cop in fact, by two cops, associate with v an v ). Moreover, the remaining cops can move so that all eges incient to v are protecte an the game ens. Inee, for each ege vu, the cop associate with u moves to vu. The case when n is o is also very easy. Two cops start on each ege of a nearperfect matching which matches all vertices but u. If u is isolate, we may simply remove it from G an arrive back to the case when n is even. Recall that the cops win if all eges incient with the robber are occupie by cops. As this property is vacuously true when the robber starts on an isolate vertex, we may assume that she oes not start on u.) Hence, we may assume that u is not isolate. We introuce one more cop on some ege incient to u. The total number of cops is at most 2 n + = n; again, 2 each vertex of G can be associate with a unique cop an the proof goes as before. Now, let us move to the following lemma that yiels part i) of Theorem.3. We combine an ajust ieas from both [5] an [8] in orer to inclue much sparser graphs. Cases when α = /k for some positive integer k are also covere. Lemma 2.5. Let = n) = pn ) log 3 n. Suppose that there exists a positive integer r = rn) such that Then, a.a.s. n log n) 2r+ n log n) 2r. ξgn, p)) = O r+ ). Proof. Since our aim is to prove that the esire boun hols a.a.s. for Gn, p), we may assume, without loss of generality, that a graph G the players play on satisfies the properties state in Lemma 2.. A team of cops is etermine by inepenently choosing each ege of e EG) to be occupie by a cop with probability C r /n, where C is a large) constant to be etermine soon. It follows from Lemma 2.i) that G has + o))n/2 eges. Hence, the expecte number of cops is equal to + o)) n 2 Cr n = + o))cr+. 2

8 8 PAWE L PRA LAT It follows from Chernoff s boun that the total number of cops is Θ r+ ) a.a.s. The robber appears at some vertex v V G). Let X EG) be the set of eges between N r v) an N r+ v). It follows from Lemma 2.i) that X + o)) N r v) 2 r+. Our goal is to show that with probability on ) it is possible to assign istinct cops to all eges e in X such that a cop assigne to e is within istance r + ) of e. Note that here, the probability refers to the ranomness in istributing the cops; the graph G is fixe.) If this can be one, then after the robber appears these cops can begin moving straight to their assigne estinations in X. Since the first move belongs to the cops, they have r + ) steps, after which the robber must still be insie N r [v], which is fully occupie by cops. She is trappe insie N r [v], so we can sen an auxiliary team of, say, 2 r+ cops to go to every ege in the graph inuce by N r [v], an the game ens. Hence, the cops will win with probability on ), for each possible starting vertex v V G). It will follow that the strategy gives a win for the cops a.a.s. Let Y be the ranom) set of eges occupie by cops. Instea of showing that the esire assignment between X an Y exists, we will show that it is possible to assign bu) istinct cops to all vertices u of N r+ v), where bu) is the number of neighbours of u that are in N r v) that is, the number of eges of X incient to u) an such that each cop assigne to u is within istance r + ) from u. Note that this time istance is measure between vertex u an eges which is non-stanar. In this paper, we efine it as follows: ege e is at istance at most r + ) from u if e is at istance at most r from some ege ajacent to u.) Inee, if this can be one, assigne cops run to u, after r rouns they are incient to u, an then sprea to eges between u an N r v); the entire X is occupie by cops. In orer to show that the require assignment between N r+ v) an Y exists with probability on ), we show that with this probability, N r+ v) satisfies Hall s conition for matchings in bipartite graphs. Suppose first that n 0.49 an fix b = 250. It follows from Lemma 2.iii) that bu) b for every u N r+ v). Set k 0 = max{k : k r < n}. Let K N r+ v) with K = k k 0. We may apply Lemma 2.i) to boun the size of u K N r[u] an the number of eges incient to each vertex. It follows that the number of eges of Y that are incient to some vertex in u K N r[u] can be stochastically boune from below by the binomial ranom variable Bin ck r /3), C r /n), whose expecte value is asymptotic to Cc/3)k 2r+ /n Cc/3)k log n. Using Chernoff s boun we get that the probability that there are fewer than bk eges of Y incient to this set of vertices is less than exp 4k log n) when C is a sufficiently large constant. Hence, the probability that the sufficient conition in the statement of Hall s theorem fails for at least one set K with K k 0 is at most k 0 ) Nr+ v) k 0 exp 4k log n) n k exp 4k log n) = on ). k k= Now consier any set K N r+ v) with k 0 < K = k N r+ v) 2 r+ if such a set exists). Lemma 2.i) implies that the size of u K N r[u] is at least cn, so we k=

9 CONTAINMENT GAME PLAYED ON RANDOM GRAPHS: ANOTHER ZIG-ZAG THEOREM 9 expect at least cn /3) C r /n = Cc/3) r+ eges of Y incient to this set. Again using Chernoff s boun, we euce that the number of eges of Y incient to this set is at least 2b r+ b N r+ v) bk with probability at least exp 4 r+ ), by taking the constant C to be large enough. Since N r+ v) k=k 0 + Nr+ v) k ) exp 4 r+ ) 2 2r+ exp 4 r+ ) = on ), the necessary conition in Hall s theorem hols with probability on ). Finally, suppose that > n Since Lemma 2.4 implies that the result hols for > n, we may assume that n. In fact, for > n we get a better boun of n rather than O 2 ) that we aim for.) This time, set b = 3 log log n/ log n to make sure bu) b for all u N r+ v). The proof is almost the same as before. For small sets of size at most k 0 = Θn/), we expect Cc/3)k 3 /n Cc/3)kn 0.47 eges, much more than we actually nee, namely, bk. For large sets of size more than k 0, we moify the argument slightly an instea of assigning b cops to each vertex of N r+ v), we notice that the number of cops neee to assign is equal to u K bu) X 2r+. There might be some vertices of N r+ v) that are incient to b eges of X but the total number of incient eges to K is clearly at most X.) The rest is not affecte an the proof is finishe. The next lemma takes care of part ii) of Theorem.3. Lemma 2.6. Let = n) = pn ) log 3 n. Suppose that there exists an integer r = rn) 2 such that Then, a.a.s. n log n) 2r n log n) 2r. ) n log n ξgn, p)) = O. Proof. We mimic the proof of the previous lemma so we skip etails focusing only on ifferences. A team of cops is etermine by inepenently choosing each ege of e EG) to be occupie by a cop with probability C log n/ r, for the total number of cops Θn log n/ r ) a.a.s. The robber appears at some vertex v V G). This time, X EG) is the set of eges between N r v) an N r v) an X 2 r. We show that it is possible to assign b = 250 istinct cops to all vertices u of N r v) such that a cop assigne to u is within istance r from u. The efinition of k 0 has to be ajuste. Set r k 0 = max{k : k r < n}. Let K N r v) with K = k k 0. The expecte number of eges of Y that are incient to some vertex in u K N r [u] is at least ck r )/3)C log n/ r ) = Cc/3)k log n, an the rest of the argument is not affecte. Now consier any set K N r v) with

10 0 PAWE L PRA LAT k 0 < K = k N r v) 2 r if such a set exists). The size of u K N r [u] is at least cn, so we expect at least ) ) C log n cn) = Ccr n log n Ccr 3 r 3 2r 3 eges of Y incient to this set. Hence, the number of eges of Y incient to this set is at least 2b r b N r v) bk with probability at least exp 4 r ), by taking the constant C to be large enough. The argument we ha before works again, an the proof is finishe Lower boun. The proof of the lower boun is an aaptation of the proof use for the classic cop number in [5]. The two bouns, corresponing to parts i) an ii) in Theorem.3, are prove inepenently in the following two lemmas. Lemma 2.7. Let < α < for some integer j, c = cj, α) = 3, an 2j+ 2j 2jα = n) = np = n α+o). Then, a.a.s. ξgn, p)) > K := 30c2j + ) ) j+. Proof. Since our aim is to prove that the esire boun hols a.a.s. for Gn, p), we may assume, without loss of generality, that a graph G the players play on satisfies the properties state in Lemmas 2. an 2.2. Suppose that the robber is chase by K cops. Our goal is to provie a winning strategy for the robber on G. For vertices x, x 2,..., x s, let C x,x 2,...,x s i v) enote the number of cops in E i v) that is, at istance i from v) in the graph G \ {x, x 2,..., x s }. Right before the robber makes her move, we say that the vertex v occupie by the robber is safe, if for some neighbour x of v we have C x v), an 30c2j+) ) i+ C x 2iv), C x 2i+v) 30c2j + ) for i =, 2,..., j such a vertex x will be calle a ealy neighbour of v). The reason for introucing ealy neighbours is to eal with a situation that many cops apply a greey strategy an always ecrease the istance between them an the robber. As a result, there might be many cops right behin the robber but they are not so angerous unless she makes a step backwars by moving to a vertex she came from in the previous roun, a ealy neighbour! Moreover, note that a vertex is calle safe for a reason: if the robber occupies a safe vertex, then the game is efinitely not over since the conition for C x v) guarantees that at most a small fraction of incient eges are occupie by cops. Since a.a.s. G is connecte see Lemma 2.ii)), without loss of generality we may assume that at the beginning of the game all cops begin at the same ege, e. Subsequently, the robber may choose a vertex v so that e is at istance 2j + 2 from v see Lemma 2.i) applie with r = 2j + to see that almost all vertices are at istance 2j + from both enpoints of e). Hence, even if all cops will move from e to E 2j+ v) after this move, v will remain safe as no boun is require for C x 2j+v). Of course,

11 CONTAINMENT GAME PLAYED ON RANDOM GRAPHS: ANOTHER ZIG-ZAG THEOREM again, without loss of generality we may assume that all cops pass for the next roun an stay at e before starting applying their best strategy against the robber.) Hence, in orer to prove the lemma, it is enough to show that if the robber s current vertex v is safe, then she can move along an unoccupie ege to a neighbour y so that no matter how the cops move in the next roun, y remains safe. For 0 r 2j, we say that a neighbour y of v is r-angerous if i) an ege vy is occupie by a cop for r = 0), or i ii) C v,x r y) 3 30c2j+)) for r = 2i or r = 2i, where i =, 2,..., j), where x is a ealy neighbour of v. We will check that for every r {0,,..., 2j}, the number of r-angerous neighbours of v, which we enote by angr), is smaller than. Clearly, since v is safe, 22j+) ang0) C x v) 30c2j + ) 22j + ). Suppose then that r = 2i or r = 2i for some i {, 2,..., j}. Every r-angerous i neighbour of v has at least 3 30c2j+)) cops occupying E r+) v). On the other han, every ege from E r+) v) is incient to at most 2 vertices at istance at most r from v. Moreover, Lemma 2.2i) implies that there are at most c paths between v an any w N r v). Finally, by the assumption that v is safe, we have C x 2iv), C x 2i+v) ) i+, 30c2j+) provie that i j ; the corresponing conitions for C x 2jv) an C x 2j+v) are trivially true, since both can be boune from above by K, the total number of cops. Combining all of these yiels ) i angr) 2c C x 3 30c2j + ) r+)v) 2c 2 + o))c x r+v) ) i+ 5c, 30c2j + ) an consequently angr), as require. Thus, there at most /2 of neighbours 22j+) of v are r-angerous for some r {0,,..., 2j}. Since we have + o)) neighbours to choose from see Lemma 2.i)), there are plenty of neighbours of v which are not r-angerous for any r = 0,,..., 2j an the robber might want to move to one of them. However, there is one small issue we have to eal with. In the efinition of being angerous, we consier the graph G \ {v, x} whereas in the efinition of being safe we want to use G \ {v} instea. Fortunately, Lemma 2.2iv) implies that we can fin a neighbour y of v that is not only not angerous but also x oes not belong to the 2j-neighbourhoo of y in G \ {v}. It follows that vy is not occupie by a cop an C v ry) < 3 i =, 2,..., j. We move the robber to y. Now, it is time for the cops to make their move. Because of our choice of the vertex y, we can assure that the esire upper boun for C v ry) require for y to be safe will hol for r {, 2,..., 2j }. Inee, the best that the cops can o to try to fail i 30c2j+)) for r = 2i or r = 2i, where

12 2 PAWE L PRA LAT the conition for C v ry) is to move all cops at istance r an r + from y to r- neighbourhoo of y, an to make cops at istance r stay put, but this woul not be enough. Thus, regarless of the strategy use by the cops, y is safe an the proof is finishe. Lemma 2.8. Let < α < for some integer j, c = cα) = 6 2j 2j 2j )α = n) = np = n α+o). Then, a.a.s. ξgn, p)) K := 30 c2j + ) ) j+ n 2j. Proof. The proof is very similar to that of Lemma 2.7. The only ifference is that checking the esire bouns for ang2j ) an ang2j) is slightly more complicate. As before, we o not control the number of cops in E 2j v) an E 2j+ v), clearly C x 2jv) an C x 2j+v) are boune from above by K, the total number of cops. We get ) j ang2j ) 2 c C x 3 30 c2j + ) 2j)v) 2 c 2 + o)) K 5 c 30 c2j + ) ) j+, an consequently ang2j ), as require. Note that we have room to spare 22j+) here but we cannot take avantage of it so we o not moify the efinition of being 2j )-angerous.) Let us now notice that a cop at istance 2j + from v can contribute to the angerousness of more than c neighbours of v. However, the number of paths of length 2j joining v an w is boune from above by c 2j /n see Lemma 2.2ii) an note that 2j = n 2jα+o) 7n log n, since 2jα > ). Hence, ) j ang2j) 2 c2j 3 30 c2j + ) an, as esire, ang2j) basically the same. 22j+) n Cx 2j+)v) 2 c2j n ) j+ 5 c, 30 c2j + ) 2 + o)) K an. Besies this moification the argument remains References [] N. Alon, A. Mehrabian, Chasing a Fast Robber on Planar Graphs an Ranom Graphs, Journal of Graph Theory 782) 205), [2] D. Bal, A. Bonato, W. Kinnersley, P. Pra lat, Lazy Cops an Robbers on hypercubes, Combinatorics, Probability an Computing, to appear. [3] D. Bal, A. Bonato, W. Kinnersley, P. Pra lat, Lazy Cops an Robbers playe on ranom graphs an graphs on surfaces, preprint 204. [4] B. Bollobás, G. Kun, I. Leaer, Cops an robbers in a ranom graph, Journal of Combinatorial Theory Series B ), [5] A. Bonato, E. Chiniforooshan, P. Pra lat, Cops an Robbers from a istance, Theoretical Computer Science 4 200),

13 CONTAINMENT GAME PLAYED ON RANDOM GRAPHS: ANOTHER ZIG-ZAG THEOREM 3 [6] A. Bonato, S. Finbow, P. Gorinowicz, A. Haiar, W.B. Kinnersley, D. Mitsche, P. Pra lat, L. Stacho. The robber strikes back, In: Proceeings of the International Conference on Computational Intelligence, Cyber Security an Computational Moels ICC3), 203. [7] A. Bonato, R.J. Nowakowski, The Game of Cops an Robbers on Graphs, American Mathematical Society, Provience, Rhoe Islan, 20. [8] A. Bonato, P. Pra lat, C. Wang, Network security in moels of complex networks, Internet Mathematics ), [9] A. Duek, P. Gorinowicz, P. Pra lat, Cops an Robbers playing on eges, Journal of Combinatorics 5) 204), [0] A. Frieze, M. Krivelevich, P. Loh, Variations on Cops an Robbers, Journal of Graph Theory 69, [] S. Janson, T. Luczak, A. Ruciński, Ranom graphs, Wiley, New York, [2] A. Kehagias, D. Mitsche, P. Pra lat, Cops an Invisible Robbers: the Cost of Drunkenness, Theoretical Computer Science ), [3] A. Kehagias, P. Pra lat, Some Remarks on Cops an Drunk Robbers, Theoretical Computer Science ), [4] N. Komarov, J. Mackey, Containment: A Variation of Cops an Robbers, Preprint 204. [5] T. Luczak, P. Pra lat, Chasing robbers on ranom graphs: zigzag theorem, Ranom Structures an Algorithms ), [6] D. Offner, K. Okajian, Variations of Cops an Robber on the hypercube, Australasian Journal of Combinatorics 592) 204), [7] P. Pra lat, When oes a ranom graph have constant cop number?, Australasian Journal of Combinatorics ), [8] P. Pra lat, N.C. Wormal, Meyniel s conjecture hols for ranom graphs, Ranom Structures an Algorithms, to appear. [9] P. Pra lat, N.C. Wormal, Meyniel s conjecture hols for ranom -regular graphs, preprint 204. [20] V. Vu, A large eviation result on the number of small subgraphs of a ranom graph, Combinatorics, Probability an Computing, 0 200), no., Department of Mathematics, Ryerson University, Toronto, ON, Canaa, M5B 2K3 aress: pralat@ryerson.ca

To Catch a Falling Robber

To Catch a Falling Robber To Catch a Falling Robber William B. Kinnersley, Pawe l Pra lat,and Douglas B. West arxiv:1406.8v3 [math.co] 3 Feb 016 Abstract We consider a Cops-and-Robber game played on the subsets of an n-set. The

More information

Chasing a Fast Robber on Planar Graphs and Random Graphs

Chasing a Fast Robber on Planar Graphs and Random Graphs Chasing a Fast Robber on Planar Graphs an Ranom Graphs Noga Alon Abbas Mehrabian Abstract We consier a variant of the Cops an Robber game, in which the robber has unboune spee, i.e., can take any path

More information

Ramsey numbers of some bipartite graphs versus complete graphs

Ramsey numbers of some bipartite graphs versus complete graphs Ramsey numbers of some bipartite graphs versus complete graphs Tao Jiang, Michael Salerno Miami University, Oxfor, OH 45056, USA Abstract. The Ramsey number r(h, K n ) is the smallest positive integer

More information

MEYNIEL S CONJECTURE HOLDS FOR RANDOM GRAPHS

MEYNIEL S CONJECTURE HOLDS FOR RANDOM GRAPHS MEYNIEL S CONJECTURE HOLDS FOR RANDOM GRAPHS PAWE L PRA LAT AND NICHOLAS WORMALD Abstract. In the game of cops and robber, the cops try to capture a robber moving on the vertices of the graph. The minimum

More information

The chromatic number of graph powers

The chromatic number of graph powers Combinatorics, Probability an Computing (19XX) 00, 000 000. c 19XX Cambrige University Press Printe in the Unite Kingom The chromatic number of graph powers N O G A A L O N 1 an B O J A N M O H A R 1 Department

More information

A Sketch of Menshikov s Theorem

A Sketch of Menshikov s Theorem A Sketch of Menshikov s Theorem Thomas Bao March 14, 2010 Abstract Let Λ be an infinite, locally finite oriente multi-graph with C Λ finite an strongly connecte, an let p

More information

Iterated Point-Line Configurations Grow Doubly-Exponentially

Iterated Point-Line Configurations Grow Doubly-Exponentially Iterate Point-Line Configurations Grow Doubly-Exponentially Joshua Cooper an Mark Walters July 9, 008 Abstract Begin with a set of four points in the real plane in general position. A to this collection

More information

THE CAPTURE TIME OF THE HYPERCUBE

THE CAPTURE TIME OF THE HYPERCUBE THE CAPTURE TIME OF THE HYPERCUBE ANTHONY BONATO, PRZEMYS LAW GORDINOWICZ, WILLIAM B. KINNERSLEY, AND PAWE L PRA LAT Abstract. In the game of Cops and Robbers, the capture time of a graph is the minimum

More information

A PROBABILISTIC VERSION OF THE GAME OF ZOMBIES AND SURVIVORS ON GRAPHS

A PROBABILISTIC VERSION OF THE GAME OF ZOMBIES AND SURVIVORS ON GRAPHS A PROBABILISTIC VERSION OF THE GAME OF ZOMBIES AND SURVIVORS ON GRAPHS ANTHONY BONATO, DIETER MITSCHE, XAVIER PÉREZ-GIMÉNEZ, AND PAWE L PRA LAT Abstract. We consider a new probabilistic graph searching

More information

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Ashish Goel Michael Kapralov Sanjeev Khanna Abstract We consier the well-stuie problem of fining a perfect matching in -regular bipartite

More information

REVOLUTIONARIES AND SPIES ON RANDOM GRAPHS

REVOLUTIONARIES AND SPIES ON RANDOM GRAPHS REVOLUTIONARIES AND SPIES ON RANDOM GRAPHS DIETER MITSCHE AND PAWE L PRA LAT Abstract. Pursuit-evasion games, such as the game of Revolutionaries and Spies, are a simplified model for network security.

More information

Pursuit-Evasion in Models of Complex Networks

Pursuit-Evasion in Models of Complex Networks Internet Mathematics Vol. 4, No. 4: 419 436 Pursuit-Evasion in Models of Complex Networks Anthony Bonato, Pawe l Pra lat, and Changping Wang Abstract. Pursuit-evasion games, such as the game of Cops and

More information

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions Working Paper 2013:5 Department of Statistics Computing Exact Confience Coefficients of Simultaneous Confience Intervals for Multinomial Proportions an their Functions Shaobo Jin Working Paper 2013:5

More information

Lower Bounds for the Smoothed Number of Pareto optimal Solutions

Lower Bounds for the Smoothed Number of Pareto optimal Solutions Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.

More information

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012 CS-6 Theory Gems November 8, 0 Lecture Lecturer: Alesaner Mąry Scribes: Alhussein Fawzi, Dorina Thanou Introuction Toay, we will briefly iscuss an important technique in probability theory measure concentration

More information

SIZE-RAMSEY NUMBERS OF CYCLES VERSUS A PATH

SIZE-RAMSEY NUMBERS OF CYCLES VERSUS A PATH SIZE-RAMSEY NUMBERS OF CYCLES VERSUS A PATH ANDRZEJ DUDEK, FARIDEH KHOEINI, AND PAWE L PRA LAT Abstract. The size-ramsey number ˆRF, H of a family of graphs F and a graph H is the smallest integer m such

More information

Topic 7: Convergence of Random Variables

Topic 7: Convergence of Random Variables Topic 7: Convergence of Ranom Variables Course 003, 2016 Page 0 The Inference Problem So far, our starting point has been a given probability space (S, F, P). We now look at how to generate information

More information

arxiv: v1 [math.co] 13 Dec 2017

arxiv: v1 [math.co] 13 Dec 2017 The List Linear Arboricity of Graphs arxiv:7.05006v [math.co] 3 Dec 07 Ringi Kim Department of Mathematical Sciences KAIST Daejeon South Korea 344 an Luke Postle Department of Combinatorics an Optimization

More information

A new proof of the sharpness of the phase transition for Bernoulli percolation on Z d

A new proof of the sharpness of the phase transition for Bernoulli percolation on Z d A new proof of the sharpness of the phase transition for Bernoulli percolation on Z Hugo Duminil-Copin an Vincent Tassion October 8, 205 Abstract We provie a new proof of the sharpness of the phase transition

More information

u!i = a T u = 0. Then S satisfies

u!i = a T u = 0. Then S satisfies Deterministic Conitions for Subspace Ientifiability from Incomplete Sampling Daniel L Pimentel-Alarcón, Nigel Boston, Robert D Nowak University of Wisconsin-Maison Abstract Consier an r-imensional subspace

More information

On colour-blind distinguishing colour pallets in regular graphs

On colour-blind distinguishing colour pallets in regular graphs J Comb Optim (2014 28:348 357 DOI 10.1007/s10878-012-9556-x On colour-blin istinguishing colour pallets in regular graphs Jakub Przybyło Publishe online: 25 October 2012 The Author(s 2012. This article

More information

Lecture 5. Symmetric Shearer s Lemma

Lecture 5. Symmetric Shearer s Lemma Stanfor University Spring 208 Math 233: Non-constructive methos in combinatorics Instructor: Jan Vonrák Lecture ate: January 23, 208 Original scribe: Erik Bates Lecture 5 Symmetric Shearer s Lemma Here

More information

arxiv: v1 [math.co] 15 Sep 2015

arxiv: v1 [math.co] 15 Sep 2015 Circular coloring of signe graphs Yingli Kang, Eckhar Steffen arxiv:1509.04488v1 [math.co] 15 Sep 015 Abstract Let k, ( k) be two positive integers. We generalize the well stuie notions of (k, )-colorings

More information

Sharp Thresholds. Zachary Hamaker. March 15, 2010

Sharp Thresholds. Zachary Hamaker. March 15, 2010 Sharp Threshols Zachary Hamaker March 15, 2010 Abstract The Kolmogorov Zero-One law states that for tail events on infinite-imensional probability spaces, the probability must be either zero or one. Behavior

More information

Discrete Mathematics

Discrete Mathematics Discrete Mathematics 309 (009) 86 869 Contents lists available at ScienceDirect Discrete Mathematics journal homepage: wwwelseviercom/locate/isc Profile vectors in the lattice of subspaces Dániel Gerbner

More information

Bisecting Sparse Random Graphs

Bisecting Sparse Random Graphs Bisecting Sparse Ranom Graphs Malwina J. Luczak,, Colin McDiarmi Mathematical Institute, University of Oxfor, Oxfor OX 3LB, Unite Kingom; e-mail: luczak@maths.ox.ac.uk Department of Statistics, University

More information

Chromatic number for a generalization of Cartesian product graphs

Chromatic number for a generalization of Cartesian product graphs Chromatic number for a generalization of Cartesian prouct graphs Daniel Král Douglas B. West Abstract Let G be a class of graphs. The -fol gri over G, enote G, is the family of graphs obtaine from -imensional

More information

Linear First-Order Equations

Linear First-Order Equations 5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)

More information

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013 Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing

More information

Acute sets in Euclidean spaces

Acute sets in Euclidean spaces Acute sets in Eucliean spaces Viktor Harangi April, 011 Abstract A finite set H in R is calle an acute set if any angle etermine by three points of H is acute. We examine the maximal carinality α() of

More information

Asymptotic determination of edge-bandwidth of multidimensional grids and Hamming graphs

Asymptotic determination of edge-bandwidth of multidimensional grids and Hamming graphs Asymptotic etermination of ege-banwith of multiimensional gris an Hamming graphs Reza Akhtar Tao Jiang Zevi Miller. Revise on May 7, 007 Abstract The ege-banwith B (G) of a graph G is the banwith of the

More information

Calculus of Variations

Calculus of Variations 16.323 Lecture 5 Calculus of Variations Calculus of Variations Most books cover this material well, but Kirk Chapter 4 oes a particularly nice job. x(t) x* x*+ αδx (1) x*- αδx (1) αδx (1) αδx (1) t f t

More information

Large Triangles in the d-dimensional Unit-Cube (Extended Abstract)

Large Triangles in the d-dimensional Unit-Cube (Extended Abstract) Large Triangles in the -Dimensional Unit-Cube Extene Abstract) Hanno Lefmann Fakultät für Informatik, TU Chemnitz, D-0907 Chemnitz, Germany lefmann@informatik.tu-chemnitz.e Abstract. We consier a variant

More information

A Random Graph Model for Massive Graphs

A Random Graph Model for Massive Graphs A Ranom Graph Moel for Massive Graphs William Aiello AT&T Labs Florham Park, New Jersey aiello@research.att.com Fan Chung University of California, San Diego fan@ucs.eu Linyuan Lu University of Pennsylvania,

More information

FLUCTUATIONS IN THE NUMBER OF POINTS ON SMOOTH PLANE CURVES OVER FINITE FIELDS. 1. Introduction

FLUCTUATIONS IN THE NUMBER OF POINTS ON SMOOTH PLANE CURVES OVER FINITE FIELDS. 1. Introduction FLUCTUATIONS IN THE NUMBER OF POINTS ON SMOOTH PLANE CURVES OVER FINITE FIELDS ALINA BUCUR, CHANTAL DAVID, BROOKE FEIGON, MATILDE LALÍN 1 Introuction In this note, we stuy the fluctuations in the number

More information

A Weak First Digit Law for a Class of Sequences

A Weak First Digit Law for a Class of Sequences International Mathematical Forum, Vol. 11, 2016, no. 15, 67-702 HIKARI Lt, www.m-hikari.com http://x.oi.org/10.1288/imf.2016.6562 A Weak First Digit Law for a Class of Sequences M. A. Nyblom School of

More information

Lower bounds on Locality Sensitive Hashing

Lower bounds on Locality Sensitive Hashing Lower bouns on Locality Sensitive Hashing Rajeev Motwani Assaf Naor Rina Panigrahy Abstract Given a metric space (X, X ), c 1, r > 0, an p, q [0, 1], a istribution over mappings H : X N is calle a (r,

More information

Generalized Tractability for Multivariate Problems

Generalized Tractability for Multivariate Problems Generalize Tractability for Multivariate Problems Part II: Linear Tensor Prouct Problems, Linear Information, an Unrestricte Tractability Michael Gnewuch Department of Computer Science, University of Kiel,

More information

Permanent vs. Determinant

Permanent vs. Determinant Permanent vs. Determinant Frank Ban Introuction A major problem in theoretical computer science is the Permanent vs. Determinant problem. It asks: given an n by n matrix of ineterminates A = (a i,j ) an

More information

THE GENUINE OMEGA-REGULAR UNITARY DUAL OF THE METAPLECTIC GROUP

THE GENUINE OMEGA-REGULAR UNITARY DUAL OF THE METAPLECTIC GROUP THE GENUINE OMEGA-REGULAR UNITARY DUAL OF THE METAPLECTIC GROUP ALESSANDRA PANTANO, ANNEGRET PAUL, AND SUSANA A. SALAMANCA-RIBA Abstract. We classify all genuine unitary representations of the metaplectic

More information

On combinatorial approaches to compressed sensing

On combinatorial approaches to compressed sensing On combinatorial approaches to compresse sensing Abolreza Abolhosseini Moghaam an Hayer Raha Department of Electrical an Computer Engineering, Michigan State University, East Lansing, MI, U.S. Emails:{abolhos,raha}@msu.eu

More information

On the enumeration of partitions with summands in arithmetic progression

On the enumeration of partitions with summands in arithmetic progression AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 8 (003), Pages 149 159 On the enumeration of partitions with summans in arithmetic progression M. A. Nyblom C. Evans Department of Mathematics an Statistics

More information

A probabilistic version of the game of Zombies and Survivors on graphs

A probabilistic version of the game of Zombies and Survivors on graphs A probabilistic version of the game of Zombies and Survivors on graphs Anthony Bonato, Dieter Mitsche, Xavier Pérez-Giménez, Pawel Pralat To cite this version: Anthony Bonato, Dieter Mitsche, Xavier Pérez-Giménez,

More information

Lecture XII. where Φ is called the potential function. Let us introduce spherical coordinates defined through the relations

Lecture XII. where Φ is called the potential function. Let us introduce spherical coordinates defined through the relations Lecture XII Abstract We introuce the Laplace equation in spherical coorinates an apply the metho of separation of variables to solve it. This will generate three linear orinary secon orer ifferential equations:

More information

Lower Bounds for Local Monotonicity Reconstruction from Transitive-Closure Spanners

Lower Bounds for Local Monotonicity Reconstruction from Transitive-Closure Spanners Lower Bouns for Local Monotonicity Reconstruction from Transitive-Closure Spanners Arnab Bhattacharyya Elena Grigorescu Mahav Jha Kyomin Jung Sofya Raskhonikova Davi P. Wooruff Abstract Given a irecte

More information

19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control

19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control 19 Eigenvalues, Eigenvectors, Orinary Differential Equations, an Control This section introuces eigenvalues an eigenvectors of a matrix, an iscusses the role of the eigenvalues in etermining the behavior

More information

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments 2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor

More information

NOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy,

NOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy, NOTES ON EULER-BOOLE SUMMATION JONATHAN M BORWEIN, NEIL J CALKIN, AND DANTE MANNA Abstract We stuy a connection between Euler-MacLaurin Summation an Boole Summation suggeste in an AMM note from 196, which

More information

Agmon Kolmogorov Inequalities on l 2 (Z d )

Agmon Kolmogorov Inequalities on l 2 (Z d ) Journal of Mathematics Research; Vol. 6, No. ; 04 ISSN 96-9795 E-ISSN 96-9809 Publishe by Canaian Center of Science an Eucation Agmon Kolmogorov Inequalities on l (Z ) Arman Sahovic Mathematics Department,

More information

arxiv: v4 [cs.ds] 7 Mar 2014

arxiv: v4 [cs.ds] 7 Mar 2014 Analysis of Agglomerative Clustering Marcel R. Ackermann Johannes Blömer Daniel Kuntze Christian Sohler arxiv:101.697v [cs.ds] 7 Mar 01 Abstract The iameter k-clustering problem is the problem of partitioning

More information

Least-Squares Regression on Sparse Spaces

Least-Squares Regression on Sparse Spaces Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction

More information

Linear and quadratic approximation

Linear and quadratic approximation Linear an quaratic approximation November 11, 2013 Definition: Suppose f is a function that is ifferentiable on an interval I containing the point a. The linear approximation to f at a is the linear function

More information

Probabilistic Analysis of Power Assignments

Probabilistic Analysis of Power Assignments Probabilistic Analysis of Power Assignments Maurits e Graaf 1,2 an Boo Manthey 1 1 University of Twente, Department of Applie Mathematics, Enschee, Netherlans m.egraaf/b.manthey@utwente.nl 2 Thales Neerlan

More information

Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes

Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes Leaving Ranomness to Nature: -Dimensional Prouct Coes through the lens of Generalize-LDPC coes Tavor Baharav, Kannan Ramchanran Dept. of Electrical Engineering an Computer Sciences, U.C. Berkeley {tavorb,

More information

REAL ANALYSIS I HOMEWORK 5

REAL ANALYSIS I HOMEWORK 5 REAL ANALYSIS I HOMEWORK 5 CİHAN BAHRAN The questions are from Stein an Shakarchi s text, Chapter 3. 1. Suppose ϕ is an integrable function on R with R ϕ(x)x = 1. Let K δ(x) = δ ϕ(x/δ), δ > 0. (a) Prove

More information

Final Exam Study Guide and Practice Problems Solutions

Final Exam Study Guide and Practice Problems Solutions Final Exam Stuy Guie an Practice Problems Solutions Note: These problems are just some of the types of problems that might appear on the exam. However, to fully prepare for the exam, in aition to making

More information

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs Lectures - Week 10 Introuction to Orinary Differential Equations (ODES) First Orer Linear ODEs When stuying ODEs we are consiering functions of one inepenent variable, e.g., f(x), where x is the inepenent

More information

Introduction to the Vlasov-Poisson system

Introduction to the Vlasov-Poisson system Introuction to the Vlasov-Poisson system Simone Calogero 1 The Vlasov equation Consier a particle with mass m > 0. Let x(t) R 3 enote the position of the particle at time t R an v(t) = ẋ(t) = x(t)/t its

More information

Witt#5: Around the integrality criterion 9.93 [version 1.1 (21 April 2013), not completed, not proofread]

Witt#5: Around the integrality criterion 9.93 [version 1.1 (21 April 2013), not completed, not proofread] Witt vectors. Part 1 Michiel Hazewinkel Sienotes by Darij Grinberg Witt#5: Aroun the integrality criterion 9.93 [version 1.1 21 April 2013, not complete, not proofrea In [1, section 9.93, Hazewinkel states

More information

DEGREE DISTRIBUTION OF SHORTEST PATH TREES AND BIAS OF NETWORK SAMPLING ALGORITHMS

DEGREE DISTRIBUTION OF SHORTEST PATH TREES AND BIAS OF NETWORK SAMPLING ALGORITHMS DEGREE DISTRIBUTION OF SHORTEST PATH TREES AND BIAS OF NETWORK SAMPLING ALGORITHMS SHANKAR BHAMIDI 1, JESSE GOODMAN 2, REMCO VAN DER HOFSTAD 3, AND JÚLIA KOMJÁTHY3 Abstract. In this article, we explicitly

More information

The average number of spanning trees in sparse graphs with given degrees

The average number of spanning trees in sparse graphs with given degrees The average number of spanning trees in sparse graphs with given egrees Catherine Greenhill School of Mathematics an Statistics UNSW Australia Syney NSW 05, Australia cgreenhill@unsweuau Matthew Kwan Department

More information

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations Diophantine Approximations: Examining the Farey Process an its Metho on Proucing Best Approximations Kelly Bowen Introuction When a person hears the phrase irrational number, one oes not think of anything

More information

c 2003 Society for Industrial and Applied Mathematics

c 2003 Society for Industrial and Applied Mathematics SIAM J DISCRETE MATH Vol 7, No, pp 7 c 23 Society for Inustrial an Applie Mathematics SOME NEW ASPECTS OF THE COUPON COLLECTOR S PROBLEM AMY N MYERS AND HERBERT S WILF Abstract We exten the classical coupon

More information

The number of K s,t -free graphs

The number of K s,t -free graphs The number of K s,t -free graphs József Balogh an Wojciech Samotij August 17, 2010 Abstract Denote by f n (H the number of (labele H-free graphs on a fixe vertex set of size n. Erős conjecture that whenever

More information

Levy Process and Infinitely Divisible Law

Levy Process and Infinitely Divisible Law Stat205B: Probability Theory (Spring 2003) Lecture: 26 Levy Process an Infinitely Divisible Law Lecturer: James W. Pitman Scribe: Bo Li boli@stat.berkeley.eu Levy Processes an Infinitely Divisible Law

More information

arxiv: v1 [math.mg] 10 Apr 2018

arxiv: v1 [math.mg] 10 Apr 2018 ON THE VOLUME BOUND IN THE DVORETZKY ROGERS LEMMA FERENC FODOR, MÁRTON NASZÓDI, AND TAMÁS ZARNÓCZ arxiv:1804.03444v1 [math.mg] 10 Apr 2018 Abstract. The classical Dvoretzky Rogers lemma provies a eterministic

More information

TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE

TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS Yannick DEVILLE Université Paul Sabatier Laboratoire Acoustique, Métrologie, Instrumentation Bât. 3RB2, 8 Route e Narbonne,

More information

New bounds on Simonyi s conjecture

New bounds on Simonyi s conjecture New bouns on Simonyi s conjecture Daniel Soltész soltesz@math.bme.hu Department of Computer Science an Information Theory, Buapest University of Technology an Economics arxiv:1510.07597v1 [math.co] 6 Oct

More information

The Principle of Least Action

The Principle of Least Action Chapter 7. The Principle of Least Action 7.1 Force Methos vs. Energy Methos We have so far stuie two istinct ways of analyzing physics problems: force methos, basically consisting of the application of

More information

The concentration of the chromatic number of random graphs

The concentration of the chromatic number of random graphs The concentration of the chromatic number of random graphs Noga Alon Michael Krivelevich Abstract We prove that for every constant δ > 0 the chromatic number of the random graph G(n, p) with p = n 1/2

More information

Equilibrium in Queues Under Unknown Service Times and Service Value

Equilibrium in Queues Under Unknown Service Times and Service Value University of Pennsylvania ScholarlyCommons Finance Papers Wharton Faculty Research 1-2014 Equilibrium in Queues Uner Unknown Service Times an Service Value Laurens Debo Senthil K. Veeraraghavan University

More information

Computing Derivatives

Computing Derivatives Chapter 2 Computing Derivatives 2.1 Elementary erivative rules Motivating Questions In this section, we strive to unerstan the ieas generate by the following important questions: What are alternate notations

More information

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS MARK SCHACHNER Abstract. When consiere as an algebraic space, the set of arithmetic functions equippe with the operations of pointwise aition an

More information

MA 2232 Lecture 08 - Review of Log and Exponential Functions and Exponential Growth

MA 2232 Lecture 08 - Review of Log and Exponential Functions and Exponential Growth MA 2232 Lecture 08 - Review of Log an Exponential Functions an Exponential Growth Friay, February 2, 2018. Objectives: Review log an exponential functions, their erivative an integration formulas. Exponential

More information

COPS AND ROBBERS ORDINALS OF COP-WIN TREES

COPS AND ROBBERS ORDINALS OF COP-WIN TREES COPS AND ROBBERS ORDINALS OF COP-WIN TREES ANTHONY BONATO, PRZEMYSŁAW GORDINOWICZ, AND GEŇA HAHN Abstract. A relational characterization of cop-win graphs was provided by Nowakowski and Winkler in their

More information

Math 342 Partial Differential Equations «Viktor Grigoryan

Math 342 Partial Differential Equations «Viktor Grigoryan Math 342 Partial Differential Equations «Viktor Grigoryan 6 Wave equation: solution In this lecture we will solve the wave equation on the entire real line x R. This correspons to a string of infinite

More information

Convergence of Random Walks

Convergence of Random Walks Chapter 16 Convergence of Ranom Walks This lecture examines the convergence of ranom walks to the Wiener process. This is very important both physically an statistically, an illustrates the utility of

More information

Robustness and Perturbations of Minimal Bases

Robustness and Perturbations of Minimal Bases Robustness an Perturbations of Minimal Bases Paul Van Dooren an Froilán M Dopico December 9, 2016 Abstract Polynomial minimal bases of rational vector subspaces are a classical concept that plays an important

More information

6 General properties of an autonomous system of two first order ODE

6 General properties of an autonomous system of two first order ODE 6 General properties of an autonomous system of two first orer ODE Here we embark on stuying the autonomous system of two first orer ifferential equations of the form ẋ 1 = f 1 (, x 2 ), ẋ 2 = f 2 (, x

More information

A FURTHER REFINEMENT OF MORDELL S BOUND ON EXPONENTIAL SUMS

A FURTHER REFINEMENT OF MORDELL S BOUND ON EXPONENTIAL SUMS A FURTHER REFINEMENT OF MORDELL S BOUND ON EXPONENTIAL SUMS TODD COCHRANE, JEREMY COFFELT, AND CHRISTOPHER PINNER 1. Introuction For a prime p, integer Laurent polynomial (1.1) f(x) = a 1 x k 1 + + a r

More information

Generalizing Kronecker Graphs in order to Model Searchable Networks

Generalizing Kronecker Graphs in order to Model Searchable Networks Generalizing Kronecker Graphs in orer to Moel Searchable Networks Elizabeth Boine, Babak Hassibi, Aam Wierman California Institute of Technology Pasaena, CA 925 Email: {eaboine, hassibi, aamw}@caltecheu

More information

Make graph of g by adding c to the y-values. on the graph of f by c. multiplying the y-values. even-degree polynomial. graph goes up on both sides

Make graph of g by adding c to the y-values. on the graph of f by c. multiplying the y-values. even-degree polynomial. graph goes up on both sides Reference 1: Transformations of Graphs an En Behavior of Polynomial Graphs Transformations of graphs aitive constant constant on the outsie g(x) = + c Make graph of g by aing c to the y-values on the graph

More information

Monotonicity for excited random walk in high dimensions

Monotonicity for excited random walk in high dimensions Monotonicity for excite ranom walk in high imensions Remco van er Hofsta Mark Holmes March, 2009 Abstract We prove that the rift θ, β) for excite ranom walk in imension is monotone in the excitement parameter

More information

TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH

TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH English NUMERICAL MATHEMATICS Vol14, No1 Series A Journal of Chinese Universities Feb 2005 TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH He Ming( Λ) Michael K Ng(Ξ ) Abstract We

More information

ON CONVERGENCE FOR GRAPHEXES

ON CONVERGENCE FOR GRAPHEXES ON CONVERGENCE FOR GRAPHEXES SVANTE JANSON Abstract. We stuy four ifferent notions of convergence for graphexes, recently introuce by Borgs, Chayes, Cohn an Holen, an by Veitch an Roy. We give some properties

More information

All s Well That Ends Well: Supplementary Proofs

All s Well That Ends Well: Supplementary Proofs All s Well That Ens Well: Guarantee Resolution of Simultaneous Rigi Boy Impact 1:1 All s Well That Ens Well: Supplementary Proofs This ocument complements the paper All s Well That Ens Well: Guarantee

More information

Math 1B, lecture 8: Integration by parts

Math 1B, lecture 8: Integration by parts Math B, lecture 8: Integration by parts Nathan Pflueger 23 September 2 Introuction Integration by parts, similarly to integration by substitution, reverses a well-known technique of ifferentiation an explores

More information

Some properties of random staircase tableaux

Some properties of random staircase tableaux Some properties of ranom staircase tableaux Sanrine Dasse Hartaut Pawe l Hitczenko Downloae /4/7 to 744940 Reistribution subject to SIAM license or copyright; see http://wwwsiamorg/journals/ojsaphp Abstract

More information

Tractability results for weighted Banach spaces of smooth functions

Tractability results for weighted Banach spaces of smooth functions Tractability results for weighte Banach spaces of smooth functions Markus Weimar Mathematisches Institut, Universität Jena Ernst-Abbe-Platz 2, 07740 Jena, Germany email: markus.weimar@uni-jena.e March

More information

Combinatorica 9(1)(1989) A New Lower Bound for Snake-in-the-Box Codes. Jerzy Wojciechowski. AMS subject classification 1980: 05 C 35, 94 B 25

Combinatorica 9(1)(1989) A New Lower Bound for Snake-in-the-Box Codes. Jerzy Wojciechowski. AMS subject classification 1980: 05 C 35, 94 B 25 Combinatorica 9(1)(1989)91 99 A New Lower Boun for Snake-in-the-Box Coes Jerzy Wojciechowski Department of Pure Mathematics an Mathematical Statistics, University of Cambrige, 16 Mill Lane, Cambrige, CB2

More information

THE GOOD, THE BAD, AND THE GREAT: HOMOMORPHISMS AND CORES OF RANDOM GRAPHS

THE GOOD, THE BAD, AND THE GREAT: HOMOMORPHISMS AND CORES OF RANDOM GRAPHS THE GOOD, THE BAD, AND THE GREAT: HOMOMORPHISMS AND CORES OF RANDOM GRAPHS ANTHONY BONATO AND PAWE L PRA LAT Dedicated to Pavol Hell on his 60th birthday. Abstract. We consider homomorphism properties

More information

A simple branching process approach to the phase transition in G n,p

A simple branching process approach to the phase transition in G n,p A simple branching process approach to the phase transition in G n,p Béla Bollobás Department of Pure Mathematics and Mathematical Statistics Wilberforce Road, Cambridge CB3 0WB, UK b.bollobas@dpmms.cam.ac.uk

More information

Sharp threshold functions for random intersection graphs via a coupling method.

Sharp threshold functions for random intersection graphs via a coupling method. Sharp threshold functions for random intersection graphs via a coupling method. Katarzyna Rybarczyk Faculty of Mathematics and Computer Science, Adam Mickiewicz University, 60 769 Poznań, Poland kryba@amu.edu.pl

More information

Separation of Variables

Separation of Variables Physics 342 Lecture 1 Separation of Variables Lecture 1 Physics 342 Quantum Mechanics I Monay, January 25th, 2010 There are three basic mathematical tools we nee, an then we can begin working on the physical

More information

Mathcad Lecture #5 In-class Worksheet Plotting and Calculus

Mathcad Lecture #5 In-class Worksheet Plotting and Calculus Mathca Lecture #5 In-class Worksheet Plotting an Calculus At the en of this lecture, you shoul be able to: graph expressions, functions, an matrices of ata format graphs with titles, legens, log scales,

More information

The Exact Form and General Integrating Factors

The Exact Form and General Integrating Factors 7 The Exact Form an General Integrating Factors In the previous chapters, we ve seen how separable an linear ifferential equations can be solve using methos for converting them to forms that can be easily

More information

COUNTING VALUE SETS: ALGORITHM AND COMPLEXITY

COUNTING VALUE SETS: ALGORITHM AND COMPLEXITY COUNTING VALUE SETS: ALGORITHM AND COMPLEXITY QI CHENG, JOSHUA E. HILL, AND DAQING WAN Abstract. Let p be a prime. Given a polynomial in F p m[x] of egree over the finite fiel F p m, one can view it as

More information

On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography

On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography Christophe Doche Department of Computing Macquarie University, Australia christophe.oche@mq.eu.au. Abstract. The

More information

An alternative proof of the linearity of the size-ramsey number of paths. A. Dudek and P. Pralat

An alternative proof of the linearity of the size-ramsey number of paths. A. Dudek and P. Pralat An alternative proof of the linearity of the size-ramsey number of paths A. Dudek and P. Pralat REPORT No. 14, 2013/2014, spring ISSN 1103-467X ISRN IML-R- -14-13/14- -SE+spring AN ALTERNATIVE PROOF OF

More information