A sharp estimate for cover times on binary trees
|
|
- Ann McCormick
- 5 years ago
- Views:
Transcription
1 A sharp estimate for cover times on binary trees Jian Ding U. C. Berkeley Ofer Zeitouni University of Minnesota & Weizmann institute March 7, 0 Abstract We compute the second order correction for the cover time of the binary tree of depth n by continuous-time) random walk, and show that with probability approaching as n increases, τcov = E [ log n log n/ log + Olog log n) 8 ], thus showing that the second order correction differs from the corresponding one for the maximum of the Gaussian free field on the tree. Introduction The cover time of a random walk on a graph, which is the time it takes the walk to visit every vertex in the graph, is a basic parameter and has been researched intensively over the last several decades see [3,, 3] for background). One often studied aspect concerns precise estimates for cover times on specific graphs including D lattices and regular trees. For the D discrete torus, the asymptotics of the cover time were established by Dembo, Peres, Rosen and Zeitouni [9]. For regular trees, the asymtotics of the cover time were evaluated by Aldous [4] and a tightness result for the cover time after suitable normalization was demonstrated by Bramson and Zeitouni [7]. It was conjectured in [7] that the cover time of D discrete torii exhibits a similar tightness behavior. Meanwhile, the supremum of the Gaussian free field GFF) was also heavily studied. For squares in the D lattice, the first order asymptotics were evaluated by Bolthausen, Deuschel and Giacomin [5]. Interestingly, both [5] and [9] are based on the study of similar tree structures for the D lattice; in fact, the square of the GFF has the same first order asymptotics as the cover time after proper normalization. Recently, Ding, Lee, and Peres [0] demonstrated a useful connection between cover times and GFFs, by showing that, for any graph, the cover time is equivalent, up to a universal multiplicative constant, to the product of the number of edges and the supremum of the GFF. An important ingredient in [0] is a version of the so-called Dynkin Isomorphism theorem, which completely characterizes the distribution of local times closely related to the cover time) using GFFs. All these connections seem to suggest that a detailed study of fluctuations for one model should carry over to the other with moderate work. A particular motivating example in this direction is the case of squares in the D discrete lattice. Recently, Bramson and Zeitouni Partially supported by Microsoft Research. Much of the work was carried out during a visit of J.D. to Weizmann institute. Partially supported by NSF grant DMS and a grant from the Israel Science Foundation.
2 [6] established a tightness result for the supremum of GFF there with proper centering, but no other normalization), and further computed the centering up to an additive constant. One could hope that transfering this result to the cover time problem is now purely technical ; an essential part of such a program would be to verify that the supremum of the GFF correctly predicts the second order correction for the rescaled) cover time. The present paper is a cautionary note in that direction. We study the cover time on binary trees and obtain the sharp second order term. Interestingly, we demonstrate that the latter is larger than the corresponding one for the binary tree GFF. Our result improves the estimate in [4], and complements the result of [7]. We focus here on binary trees, but it should be clear from the proof that the method applies to more general Galton Watson trees. Let T = V,E) be a binary tree rooted at ρ of height n, and consider a continuous-time random walk X t ) started at ρ. Let τ cov be the first time when the random walk visited every single vertex in the tree. Our main result is the following. Theorem.. Consider a random walk on a binary tree T = V,E) of height n, started at the root ρ. Then, with high probability, τcov E = log n log n log + Olog log n) 8 ). ) At the cost of a more refined analysis, we believe that the error term Olog log n) 8 ) can be improved to O). To relate Theorem. to the GFF {η v } v V on the tree, recall that the latter can be defined as follows. Let {X e } e E be i.i.d. standard Gaussian variables and set η v = e:e ρ v where the sum is over all the edges that belong to the path from ρ to v. By adapting Bramson s arguments on branching Brownian motion [8] to the discrete setup, as in Addario-Berry and Reed [], one can show that E supη v = log n v X e, 3log n + O). ) log The lower bound in ) follows directly from [, Theorem 3]. The upper bound, that involves also the internal nodes of the tree, requires the use of [, Lemma 3] and a union bound over the levels.) Comparing ) and ), we do observe agreement in the first order and a discrepancy in the second order terms. Our proof uses ideas from [8] and is based on the study of the local times associated with the random walk. For any v V, we define the local time L v t to be the time that the random walk spends at v up to t, with a normalization by the degree of v. More precisely, L v t = t d {Xs=v}ds. v 0 Define the inverse local time τt) to be the first time when the local time at the root achieves t, by τt) = inf{s 0 : L ρ s t}.
3 We will let τt) be defined as above throughout the paper. We also set t + = log n log n log + 00log log n) and t = log n log n log 00log log n)8). 3) The following is the key to the proof of Theorem.. Theorem.. Consider a random walk on a binary tree T of height n, started at the root ρ. Then, Pτt ) τ cov τt + )) = + o), as n. In the next two sections, we prove the upper and lower bounds for the preceding theorem respectively; we conclude the paper by deriving Theorem. from Theorem.. Notation and convention: Throughout, C, c denote generic constants that may change from line to line, but are independent of n. Further, the phrase with high probability should be understood as the statement with probability approaching as n. Upper bound We establish an upper bound on the cover time in this section, as formulated in the next theorem. Theorem.. With notation as in Theorem., we have Pτ cov τt + )) = + o), as n. Theorem. is equivalent to the statement that at time τt + ), all the leaf-nodes have positive local times, with high probability. To this end, we consider a leaf-node of local time 0 with typical and non-typical profiles, respectively. For the latter, we show its unlikeliness directly; for the former, we prove it is a rare event by comparing to the same type of event for Gaussian free field.. Unlikeliness for non-typical profile As preparation, we prove a large deviation result which will be used to control the pairwise concentration of local times. Definition.. For r,λ > 0, let N be a Poisson variable with mean r and Y i be i.i.d. exponential variables with mean λ. Then, the random variable Z = N i= Y i is said to follow the distribution PoiGammar, λ), and we write Z PoiGammar, λ). Lemma.3. For α,r > 0, let Z PoiGammar,λ). Then for α < λr, Furthermore, for all α > 0, PZ λr α) exp rr α/λ) + α/λ r ). 4) PZ λr + α) exp rr + α/λ) r α/λ ). 5) 3
4 Proof. As in the definition of the PoiGammar, λ) distribution, let N be Poisson variable with mean r and let Y be an independent exponential variable with mean λ. For θ > 0, we have Ee θz/λ = EEe θy/λ ) N = E/ + θ)) N = e θr +θ. Combined with Markov s inequality, it follows that PZ λr α) = Pe θz/λ e θλr α)/λ ) e θr +θ e θr α/λ) = exp θ r +θ θα ) λ. For α < λr, optimizing the exponent at θ = r leads to inequality 4). To prove 5), consider 0 < θ <. We have r α/λ Ee θz/λ = EEe θy/λ ) N = E/ θ)) N = e θr θ. Another application of Markov s inequality gives that PZ λr + α) Pe θz/λ e θλr+α)/λ ) = exp θ r θ θα ) λ. Optimizing the exponent at θ = r, we deduce the inequality 5). r+α/λ Remark. The right side of 4) can be bounded by e α /4λ r. In this form, it is closely related to the discrete time bound in [, Lemma 5.]. We have the following immediate and useful corollary. Corollary.4. With notation as in Lemma.3, we have for any β > 0, P Z β) λr) e rβ, 6) and P Z + β) λr) e rβ. 7) For k N, we denote by V k V the set of vertices in k-th level of the tree. We next show that it is unlikely to have a too small local time for a vertex in intermediate levels. Lemma.5. With notation as in Theorem., define Then, PA) = o) as n. A = n log n k= u Vk {L u τt + ) k/n) t + 3log n) }. 8) Proof. Throughout the proof, we write t for t +. Consider u V k such that k n log n. It is clear that L u τt) has the distribution PoiGammat/k,k). Applying 4), we obtain that P Z k/n) t 3log n) ) exp k tk/n + 3log n) ) k n. Now a simple union bound gives that PA) n log n k= k k n /n = o). 4
5 For v V and k < n, let v k V k be the ancestor of v in the k-th level. Define γk) = min{ k log k, n k logn k)} +. 9) Lemma.6. With notation as in Theorem., define { B = v V n, k < n log n : L v τt + ) = 0, L v k+ τt + ) L v k τt + ) q } L v k τt + ) γk) A c. 0) Then, PB) = o) as n. Proof. We continue to write t = t +. Consider v V n and k < n log n. Note that conditioned on L v k τt), the collection of random variables {Lv k+j τt) } j 0 possess the same law as {L v k+j τ v kl v } k τt) ) j 0 this is an instance of the second Ray-Knight theorem in this context). Abusing notation, this implies in particular that conditioned on {L v k τt) = x}, Lv k+ τt) has distribution PoiGammax,). We will employ such an abuse of notation repeatedly throughout the paper.) Fixing x k/n) t 3log n, an application of Corollary.4 gives for j, P j x γk) L v k+ τt) x j + ) x L γk),lv τt) = 0 v k τt) = x) e j x /γk)) e x j+)/γk)) n k. Note that the right hand side in the above decays geometrically with j. Thus, summing over j, we obtain that P L v k+ τt) x x L γk),lv τt) = 0 v k τt) = x) 4e x 4x n k e n k)γk)e x γk)) 4e x n k e x γk)). Noting that PL v τt) = 0 Lv k τt) = x ) = e x n k, we obtain that P L v k+ τt) x x γk) L v τt) = 0,Lv k τt) = x) e x γk)) e log3/ n, where the last nequality follows from the fact that x k/n) t 3log n) and k n log n. Therefore, q ) P A c,l v τt) = 0, L v k+ τt) L v k L v k τt) τt) γk) PL v τt) = 0) e log3/ n = e t/n e log3/ n n n. At this point, a simple union bound completes the proof.. Unlikeliness for typical profile We next compare the density of local times and Gaussian variables. This comparison of density is of significance for the proof of both upper and lower bounds. Lemma.7. For l > 0, let Z PoiGammal,) and let f ) denote the density function of Z on R +, with f0) = PZ = 0). Denote by W a standard Gaussian variable, and denote by g ) the density function of W/. Then, for any w such that w l/, we have fl + w) = w l + O w + l )) gw). 5
6 Proof. Write y = l + w, and let h ) be the density function of Z. Then for z > 0, we have hz) = k= Applying a change of variables, we obtain that fy) = y e k= l lk k! l lk z k e k! e z k )!. e y yk ) k )! = le l +y ) where I x) is a modified Bessel function defined by I x) = k=0 k=0 x/) k+ k!k + )!. yl) k+ k!k + )! = le l +y ) I yl), For the modified Bessel function I x), the following expansion is known when x is large see []): I x) = Plugging into the preceding expansion, we get that e yl ex πx 3 8x + O x )). fy) = le l +y ) 3 πyl 8 yl + O ) ) y l = e w w π l + O )) w + l. Combined with the fact that gw) = π e w, the desired estimate follows immediately. We single out the next calculation, which will be used repeatedly. Claim.8. Consider z i,l i R with l i+ = l i + z i for i = 0,...,m such that z i l i / for all i. Assume that i z i + l i Proof. On one hand, note that l m l 0 = m i= = O). Then, m i= z i l i + O zi + )) l0 l = Θ). i lm l i = m i= + z i ) l l i = exp m i= z i l i + O m i On the other hand, we have zi i= l i m i= z i l i + O zi + )) l = exp m i= z i l i i + O m i= Combining these estimates completes the proof. = exp m i= z i l i + O) ) = )) = exp m i= z i l i + O) ). zi + l i )) l 0 l m expo)). We next demonstrate that it is unlikely to have a leaf-node of local time 0, even with a typical profile for local times along the path from ρ to the leaf. 6
7 Lemma.9. With notation as in Theorem. and A,B as in 8) and 0), define Then, PD v ) = o n ). D v = {L v τt + ) = 0} \ A B), for v V n. ) Proof. Again, we write t = t +. Write n = n log n. Let Ω R n be such that for z,...,z n Ω, we have { } n k= L v k τt) L v k τt) = z k D v. Let α ) and β ) be density functions for L v k τt) L v k τt) ) k n and η v k / η vk / ) k n, respectively. Denote by l k = t + k i= z i. Note that for z,...,z n ) Ω, we have n +zi i= l i = O) n i= Applying Lemma.7 and Claim.8, we obtain that Therefore, we obtain that PD v ) = Ω n i) + γi)) ) = O). αz,...,z n ) βz,...,z n ) = n i= z i l i + O zi + )) l = Θ) n log n. i αz,...,z n )PL v τt) = 0 L v n n τt) = l n )dz O) log n Ω βz,...,z n )e l n n n dz. Write s = n /n) t 3log n. Let βx) = {l n =x} βz,...,z n )dz for x s. Note that βx) = x e n Pη vk / k/n) t 3log n for k n η vn πn / = x). 3) ) Conditioning on η vn / = x, we have {η vk / ) k n η vn / = x} law = {W k / + k/n )x) k n }, where W r ) 0 r n, is a Brownian Bridge of length n, i.e., a Brownian motion conditioned on hitting 0 at both time 0 and n. It is well-known that the maximum of a Brownian bridge W r ) on [0,q] follows the Rayleigh distribution see, e.g., [4]), i.e., Therefore, we obtain that Pmax 0 r q W r λ) = e λ q, for all λ 0. 4) Pη vk / k/n) t 3log n for k n η vn / = x) Pmin r n W r / 3log n x s)) = Pmax r n W r 3log n + x s))) Plugging the above estimate into 3), we obtain that 43log n+x s)) n. βx) 43log n + x s)) n ) 3/ e x n. 7
8 Together with ), we obtain that PD v ) O) s log n + x s)) n log n Using the change of variables y = x + PD v ) O) e t n n log n e x t+x) n e n n dx O) tn n, we obtain that log n + x s)) n log n 4log n + y) e n + n n )y dy = n olog 6 n), where we used the fact that n = n log n, completing the proof. e x t+x) n e n n dx. Proof of Theorem.. The proof now follows trivially. Since v V n PD v ) = n n o) = o) as well as PA) = o) and PB) = o), we see that with high probability, every leaf-node has positive local time by τt), implying the desired upper bound on cover time. 3 Lower bound This section is devoted to the proof of the following lower bound on the cover time for a binary tree T. Theorem 3.. With notation as in Theorem., Pτ cov τt )) = + o), as n. The proof consists of an analysis for exceptionally large values in the Gaussian free field and a comparison argument based on Lemma Exceptional points for Gaussian free field We first study the Gaussian free field {η v } v V on the tree T of height n, with η ρ = 0. For k < n, let ψk) = logk n k)). Denote by log a k = k/n) log n log n ) log ψk) +, for k < n, and an = log n log n log. 5) Consider = a n + log 4 n. Recall the definition of γk) in 9). For v V n, define E v = {η vk / a k, for all k < n,a n η v / a n + }, 6) F v = {E v, k n : η vk η vk η vk / /γk)}. 7) We start with a lower bound on the probability for event E v. Lemma 3.. There exists a constant c > 0 such that for all v V n, we have PE v ) c n n. 8
9 Proof. It is clear that PE v ) Pa n η v / a n +) min PE v η v = x) a n x a n+ n 5 n min a n x a n+ PE v η v = x), where the second inequality follows from a bound on the Gaussian density. Denote by W t ) 0 t n a Brownian bridge. We note that {η vl : 0 l n} η v = ) law } x = {W l + l n x : 0 l n. This implies that, for x a n, PE v η v = x) PW l ψl) for 0 l n). By [8, Proposition ], we have that PW l ψl) for 0 l n) c/n for a constant c > 0. Altogether, we obtain that PE v ) c 5 n n. We now show that the event F v is extremely rare. Lemma 3.3. For any v V n, we have Proof. Take v V n. It is clear that PF v ) = n o/n), as n. PF v ) Pa n η v / a n + )J n nj, where J = max an x an+ y a k n P η vk η vk η vk / /γk) η v = x,η vk = y). k= Conditioning on η v = x,η vk = y, we have η vk η vk distributed as a Gaussian variable with mean n k n k+ x y) and variance n k+. For x,y that is under consideration, we have n k+ x y) = ). Therefore, we obtain that o y γk) P η vk η vk η vk / /γk) η v = x,η vk = y) e y) 4γk)) e log n, for large enough n. This implies that J ne log n, and thus PF v ) = n o/n). We next study the correlation for events E u and E v. For u,v V, denote by u v the least common ancestor of u and v. Lemma 3.4. Consider u,v V n and assume that u v V k. Then, 0log n PE u E v ) PE u ) n k). n k n k) k) 9
10 Proof. Denote by w = u v, and let f ) be the density function of η w /. For i < j, write = {η vl / a l, for all i l < j}. Then, E i,j v PE u E v ) = PE u )PE v E u ) PE u ) max an+ PE u ) max x a k a n x a k PE k,n e y x) n k n k v,a n η v a n + η w / = x) PE k,n v η w / = x,η v / = y)dy. 8) For x a k and a n ya n +, we first analyze the probability PEv k,n η w / = x,η v / = y). Let W s ) 0 s n k be a Brownian bridge. It is clear that { η vl / } : k l n η w / = x,η v / ) law = y = {W l k / } + l k n k y + n l n k x : k l n. Combined with 4), it follows that PE k,n v η w / = x,η v / = y) Pmax W s log n + a k x))) 4log n + a k x)). 9) s n k By a straightforward calculation, we have that e y x) n k e an a k ) n k e an a k )a k x) n k n k) e n k n log n logn k) k) e log x a k ) n k) n k log n k) k e x ak ). Combined with 9), it follows that an+ a n e y x) n k n k PE k,n v η w = x,η v = y)dy n k) 4log n + a k x)) n k n k) k) e log x a k ) n k) 0log n. n k n k) k) Together with 8), we deduce that 0log n PE u E v ) PE u ) n k). n k n k) k) 3. Lower bound for cover times We now turn to study the cover time. The key estimate lies in the following proposition. Proposition 3.5. With notation as in Theorem., let s = log n log n log + log4 n). Then there exists a constant c > 0 such that Pmin v Vn L v τs) log8 n) c log 5 n. 0
11 Proof. Let Z v = L v τs) for v V. Let a k be defined as in 5). For v V n, define Ẽ v = { s Z vk a k, for all k < n,a n s Z v a n + }, 0) F v = {Ẽv, k n : Z vk Z vk Z vk /γk)}. ) Define Ω v R n such that for any z,...,z n ) Ω v It is clear from 6) and 7) that {Z vk Z vk = z k for all k n} Ẽv \ F v. {η vk / η vk / = z k for all k n} E v \ F v. Let α v ),β v ) be density functions over Ω for Z vk Z vk ) k n and η vk / η vk / ) k n, respectively. Consider z,...,z n ) Ω v. By Lemma.7, we have α v z,...,z n ) = β v z,...,z n ) n k= z k l k + O z k + l k ) ), ) where l k = s k i= z k. Since z,...,z n ) Ω v, we have that n k= z k + l k n k= γk)) + 4 n k) +log 4 n ) = O). Applying Claim.8, we obtain that n α v z,...,z n ) = Θ) log n β vz,...,z n ). Integrating over both sides and recalling Lemmas 3.3 and 3., we obtain that PẼv \ F n v ) = Θ) log n PE v \ F v ) = Θ) c n log n PE v) Θ) log n n. 3) We next analyze the correlation of Ẽv \ F v and Ẽu \ F u. Consider u,v V n and assume that u v V k. We write Z = Z v Z v0,...,z vn Z vn,z uk+ Z uk,...,z un Z un ), η = η v0 η v,...,η vn η vn,η uk η uk+,...,η un η un ). Define Ω u,v R n k such that for all z = z v,,...,z v,n,z u,k+,...,z u,n ) Ω u,v, {Z = z} Ẽv \ F v ) Ẽu \ F u ). It is then clear that {η = z} E v \F v ) E u \F u ). Let α u,v ) and β u,v ) be density functions for Z and η, respectively. Let z u,i = z v,i for all i k. For w {u,v}, write l w,j = t j i= z w,j. By Lemma.7, we get that that α u,v z) = β u,v z) n j= z v,j l v,j + O zv,j + )) l v,j n j=k z u,j l u,j + O zu,j + )) l. u,j
12 Applying Claim.8 again, we obtain that nn k) αu,v)z) = O) log β u,v z). n Integrating over both sides and applying Lemma 3.4, we get that PẼv \ F v ) Ẽu \ F n u ) = O) n k) k PE v) n k). This implies that for a constant C > 0 E w V n Ẽw\ F w ) C n n PE v ) n j= w:w v V j n j) n j) j C n n PE v ) 4log n. At this point, an application of the second moment method together with 3) gives that P w V n : Ẽw \ F w ) E w V n Ẽw\ F w ) E ) n PẼv \ F v )) w V Ẽw\ F C n n PE v ) n w C log 5 n, for a constant C > 0. Recalling the definition of Ẽv, we complete the proof of the proposition. Next, we bootstrap the above estimate and prove the main result in this section. Proof of Theorem 3.. Throughout the proof, we write t = t. Let n = 30log log n, n 3 = log 4 n log, n 4 = 0log log n) 8, and n = n n n 3 n 4. For k N, write b k = log k log k log. Note that t + 50n b n + b n3. Our proof is divided into 4 steps. Step. Write t = t + n ). Since for all v V n we have L v τt) PoiGammat/n,n ), an application of 7) yields that P v V n : L v τt) t ) n PPoiGammat/n,n ) t ) n e 4n = o). 4) Step. For v V n, let T v be the subtree rooted at v of height n. Write t = t b n ). By 4), we assume in what follows that L v τt) t. Applying Proposition 3.5 to the subtree T v, we deduce that for a constant c > 0, P min u T v V n +n L u τt) t ) c log 5 n. Let S = {v V n : min u Tv V n L u τt) t }. By independence of the random walk on different subtrees, we obtain that with high probability S n /log 6 n log log n. We assume this in what follows. Define S = {u V n +n : L u τt) t }. We see that S S log log n. Step 3. For u S, consider the subtree T u rooted at u of height n 3. Since t b n3 ) log log n) 8. We can apply Proposition 3.5 again to the subtree T u and obtain that for a constant c > 0 P min w T u V n +n +n 3 L w τt) log log n)8 ) c log log n) 5.
13 Let S 3 = {w T u V n +n +n 3 : L w τt) log log n)8 }. We can then obtain that with high probability S 3 log log n, and we assume this in what follows. Step 4. For w S 3, let T w be the subtree rooted at w that contains all its descendants. We trivially have that P min w T w L w τt) = 0). Since S 3 log log n, we see that with high probability there exists a vertex w w S3 T w V with L w τt) = 0, completing the proof. 3.3 Concentration of inverse local time We have been measuring the cover time via the inverse local time so far. In this subsection, we prove that the inverse local is well-concentrated around the mean and thus it indeed yields a good estimate on the cover time. Lemma 3.6. Consider a random walk on a rooted binary tree T = V,E) of height n. Then, Varτt)) = O) n t. Proof. Note that τt) = v V d vl v τt). Consider u,v V and write w = u v. Assume that w V k. Then, EL v τt) Lu τt) ) = EELv τt) Lu τt) ) Lw τt) ) = ELw τt) ) ) = t + VarL w τt) ) t + 6tk, where the last transition follows from the fact that L w τt) PoiGammat/k,k) and a simple application of the total variance formula VarX = EVarX Y )) + VarEX Y )). We then have CovL v τt),lu τt) ) 6tk. Therefore, Varτt)) = u,v V where we used the fact that d v 3. n d v d u CovL v τt),lu τt) ) k n k) 3 6tk = O) n t, Now it is obvious that Theorems., 3. imply Theorem.. Together with Lemma 3.6, we complete the proof of Theorem., by noting that Eτt)) = t E = n+ 4)t. Acknowledgement k= We thank Amir Dembo and Yuval Peres for helpful discussions. References [] Handbook of mathematical functions, with formulas, graphs, and mathematical tables, volume 55 of Edited by Milton Abramowitz and Irene A. Stegun. Third printing, with corrections. National Bureau of Standards Applied Mathematics Series. Superintendent of Documents, U.S. Government Printing Office, Washington, D.C.,
14 [] L. Addario-Berry and B. Reed. Minima in branching random walks. Ann. Probab., 373): , 009. [3] D. Aldous and J. Fill. Reversible Markov Chains and Random Walks on Graphs. In preparation, available at aldous/rwg/book.html. [4] D. J. Aldous. Random walk covering of some special trees. J. Math. Anal. Appl., 57):7 83, 99. [5] E. Bolthausen, J.-D. Deuschel, and G. Giacomin. Entropic repulsion and the maximum of the twodimensional harmonic crystal. Ann. Probab., 94):670 69, 00. [6] M. Bramson and O. Zeitouni. Tightness of the recentered maximum of the two-dimensional discrete gaussian free field. Preprint, availabel at [7] M. Bramson and O. Zeitouni. Tightness for a family of recursion equations. Ann. Probab., 37):65 653, 009. [8] M. D. Bramson. Maximal displacement of branching Brownian motion. Comm. Pure Appl. Math., 35):53 58, 978. [9] A. Dembo, Y. Peres, J. Rosen, and O. Zeitouni. Cover times for Brownian motion and random walks in two dimensions. Ann. of Math. ), 60): , 004. [0] J. Ding, J. Lee, and Y. Peres. Cover times, blanket times, and majorizing measures. Preprint, availabe at [] J. Kahn, J. H. Kim, L. Lovász, and V. H. Vu. The cover time, the blanket time, and the Matthews bound. In 4st Annual Symposium on Foundations of Computer Science Redondo Beach, CA, 000), pages IEEE Comput. Soc. Press, Los Alamitos, CA, 000. [] D. A. Levin, Y. Peres, and E. L. Wilmer. Markov chains and mixing times. American Mathematical Society, Providence, RI, 009. With a chapter by James G. Propp and David B. Wilson. [3] R. Lyons, with Y. Peres. Probability on Trees and Networks. In preparation. Current version available at [4] G. R. Shorack and J. A. Wellner. Empirical processes with applications to statistics. Wiley Series in Probability and Mathematical Statistics: Probability and Mathematical Statistics. John Wiley & Sons Inc., New York,
(K2) For sum of the potential differences around any cycle is equal to zero. r uv resistance of {u, v}. [In other words, V ir.]
Lectures 16-17: Random walks on graphs CSE 525, Winter 2015 Instructor: James R. Lee 1 Random walks Let G V, E) be an undirected graph. The random walk on G is a Markov chain on V that, at each time step,
More informationDeterministic approximation for the cover time of trees
Deterministic approximation for the cover time of trees Uriel Feige Ofer Zeitouni September 10, 2009 Abstract We present a deterministic algorithm that given a tree T with n vertices, a starting vertex
More informationThe range of tree-indexed random walk
The range of tree-indexed random walk Jean-François Le Gall, Shen Lin Institut universitaire de France et Université Paris-Sud Orsay Erdös Centennial Conference July 2013 Jean-François Le Gall (Université
More informationA. Bovier () Branching Brownian motion: extremal process and ergodic theorems
Branching Brownian motion: extremal process and ergodic theorems Anton Bovier with Louis-Pierre Arguin and Nicola Kistler RCS&SM, Venezia, 06.05.2013 Plan 1 BBM 2 Maximum of BBM 3 The Lalley-Sellke conjecture
More informationA note on the Green s function for the transient random walk without killing on the half lattice, orthant and strip
arxiv:1608.04578v1 [math.pr] 16 Aug 2016 A note on the Green s function for the transient random walk without killing on the half lattice, orthant and strip Alberto Chiarini Alessandra Cipriani Abstract
More informationConnection to Branching Random Walk
Lecture 7 Connection to Branching Random Walk The aim of this lecture is to prepare the grounds for the proof of tightness of the maximum of the DGFF. We will begin with a recount of the so called Dekking-Host
More informationSharpness of second moment criteria for branching and tree-indexed processes
Sharpness of second moment criteria for branching and tree-indexed processes Robin Pemantle 1, 2 ABSTRACT: A class of branching processes in varying environments is exhibited which become extinct almost
More informationResistance Growth of Branching Random Networks
Peking University Oct.25, 2018, Chengdu Joint work with Yueyun Hu (U. Paris 13) and Shen Lin (U. Paris 6), supported by NSFC Grant No. 11528101 (2016-2017) for Research Cooperation with Oversea Investigators
More informationA note on general sliding window processes
A note on general sliding window processes Noga Alon Ohad N. Feldheim September 19, 214 Abstract Let f : R k [r] = {1, 2,..., r} be a measurable function, and let {U i } i N be a sequence of i.i.d. random
More informationSome remarks on the elliptic Harnack inequality
Some remarks on the elliptic Harnack inequality Martin T. Barlow 1 Department of Mathematics University of British Columbia Vancouver, V6T 1Z2 Canada Abstract In this note we give three short results concerning
More informationCycle lengths in sparse graphs
Cycle lengths in sparse graphs Benny Sudakov Jacques Verstraëte Abstract Let C(G) denote the set of lengths of cycles in a graph G. In the first part of this paper, we study the minimum possible value
More informationarxiv: v2 [math.pr] 4 Sep 2017
arxiv:1708.08576v2 [math.pr] 4 Sep 2017 On the Speed of an Excited Asymmetric Random Walk Mike Cinkoske, Joe Jackson, Claire Plunkett September 5, 2017 Abstract An excited random walk is a non-markovian
More informationExtremal process associated with 2D discrete Gaussian Free Field
Extremal process associated with 2D discrete Gaussian Free Field Marek Biskup (UCLA) Based on joint work with O. Louidor Plan Prelude about random fields blame Eviatar! DGFF: definitions, level sets, maximum
More informationSusceptible-Infective-Removed Epidemics and Erdős-Rényi random
Susceptible-Infective-Removed Epidemics and Erdős-Rényi random graphs MSR-Inria Joint Centre October 13, 2015 SIR epidemics: the Reed-Frost model Individuals i [n] when infected, attempt to infect all
More informationA simple branching process approach to the phase transition in G n,p
A simple branching process approach to the phase transition in G n,p Béla Bollobás Department of Pure Mathematics and Mathematical Statistics Wilberforce Road, Cambridge CB3 0WB, UK b.bollobas@dpmms.cam.ac.uk
More informationG(t) := i. G(t) = 1 + e λut (1) u=2
Note: a conjectured compactification of some finite reversible MCs There are two established theories which concern different aspects of the behavior of finite state Markov chains as the size of the state
More informations k k! E[Xk ], s <s 0.
Chapter Moments and tails M X (s) =E e sx, defined for all s R where it is finite, which includes at least s =0. If M X (s) is defined on ( s 0,s 0 ) for some s 0 > 0 then X has finite moments of all orders
More informationChapter 11. Min Cut Min Cut Problem Definition Some Definitions. By Sariel Har-Peled, December 10, Version: 1.
Chapter 11 Min Cut By Sariel Har-Peled, December 10, 013 1 Version: 1.0 I built on the sand And it tumbled down, I built on a rock And it tumbled down. Now when I build, I shall begin With the smoke from
More informationAlmost giant clusters for percolation on large trees
for percolation on large trees Institut für Mathematik Universität Zürich Erdős-Rényi random graph model in supercritical regime G n = complete graph with n vertices Bond percolation with parameter p(n)
More informationUniversity of Chicago Autumn 2003 CS Markov Chain Monte Carlo Methods
University of Chicago Autumn 2003 CS37101-1 Markov Chain Monte Carlo Methods Lecture 4: October 21, 2003 Bounding the mixing time via coupling Eric Vigoda 4.1 Introduction In this lecture we ll use the
More informationNon-Essential Uses of Probability in Analysis Part IV Efficient Markovian Couplings. Krzysztof Burdzy University of Washington
Non-Essential Uses of Probability in Analysis Part IV Efficient Markovian Couplings Krzysztof Burdzy University of Washington 1 Review See B and Kendall (2000) for more details. See also the unpublished
More informationTHE CENTER OF MASS OF THE ISE AND THE WIENER INDEX OF TREES
Elect. Comm. in Probab. 9 (24), 78 87 ELECTRONIC COMMUNICATIONS in PROBABILITY THE CENTER OF MASS OF THE ISE AND THE WIENER INDEX OF TREES SVANTE JANSON Departement of Mathematics, Uppsala University,
More informationModern Discrete Probability Branching processes
Modern Discrete Probability IV - Branching processes Review Sébastien Roch UW Madison Mathematics November 15, 2014 1 Basic definitions 2 3 4 Galton-Watson branching processes I Definition A Galton-Watson
More informationLECTURE 2: LOCAL TIME FOR BROWNIAN MOTION
LECTURE 2: LOCAL TIME FOR BROWNIAN MOTION We will define local time for one-dimensional Brownian motion, and deduce some of its properties. We will then use the generalized Ray-Knight theorem proved in
More information< k 2n. 2 1 (n 2). + (1 p) s) N (n < 1
List of Problems jacques@ucsd.edu Those question with a star next to them are considered slightly more challenging. Problems 9, 11, and 19 from the book The probabilistic method, by Alon and Spencer. Question
More informationPrime numbers and Gaussian random walks
Prime numbers and Gaussian random walks K. Bruce Erickson Department of Mathematics University of Washington Seattle, WA 9895-4350 March 24, 205 Introduction Consider a symmetric aperiodic random walk
More informationExtrema of discrete 2D Gaussian Free Field and Liouville quantum gravity
Extrema of discrete 2D Gaussian Free Field and Liouville quantum gravity Marek Biskup (UCLA) Joint work with Oren Louidor (Technion, Haifa) Discrete Gaussian Free Field (DGFF) D R d (or C in d = 2) bounded,
More informationFinite Metric Spaces & Their Embeddings: Introduction and Basic Tools
Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools Manor Mendel, CMI, Caltech 1 Finite Metric Spaces Definition of (semi) metric. (M, ρ): M a (finite) set of points. ρ a distance function
More informationOn the concentration of eigenvalues of random symmetric matrices
On the concentration of eigenvalues of random symmetric matrices Noga Alon Michael Krivelevich Van H. Vu April 23, 2012 Abstract It is shown that for every 1 s n, the probability that the s-th largest
More informationUPPER DEVIATIONS FOR SPLIT TIMES OF BRANCHING PROCESSES
Applied Probability Trust 7 May 22 UPPER DEVIATIONS FOR SPLIT TIMES OF BRANCHING PROCESSES HAMED AMINI, AND MARC LELARGE, ENS-INRIA Abstract Upper deviation results are obtained for the split time of a
More informationBALANCING GAUSSIAN VECTORS. 1. Introduction
BALANCING GAUSSIAN VECTORS KEVIN P. COSTELLO Abstract. Let x 1,... x n be independent normally distributed vectors on R d. We determine the distribution function of the minimum norm of the 2 n vectors
More informationExtrema of log-correlated random variables Principles and Examples
Extrema of log-correlated random variables Principles and Examples Louis-Pierre Arguin Université de Montréal & City University of New York Introductory School IHP Trimester CIRM, January 5-9 2014 Acknowledgements
More information6.207/14.15: Networks Lecture 3: Erdös-Renyi graphs and Branching processes
6.207/14.15: Networks Lecture 3: Erdös-Renyi graphs and Branching processes Daron Acemoglu and Asu Ozdaglar MIT September 16, 2009 1 Outline Erdös-Renyi random graph model Branching processes Phase transitions
More informationLower Tail Probabilities and Related Problems
Lower Tail Probabilities and Related Problems Qi-Man Shao National University of Singapore and University of Oregon qmshao@darkwing.uoregon.edu . Lower Tail Probabilities Let {X t, t T } be a real valued
More informationOn metric characterizations of some classes of Banach spaces
On metric characterizations of some classes of Banach spaces Mikhail I. Ostrovskii January 12, 2011 Abstract. The first part of the paper is devoted to metric characterizations of Banach spaces with no
More informationANATOMY OF THE GIANT COMPONENT: THE STRICTLY SUPERCRITICAL REGIME
ANATOMY OF THE GIANT COMPONENT: THE STRICTLY SUPERCRITICAL REGIME JIAN DING, EYAL LUBETZKY AND YUVAL PERES Abstract. In a recent work of the authors and Kim, we derived a complete description of the largest
More informationMoments and tails. Chapter 2
Chapter Moments and tails M X (s) =E e sx, defined for all s R where it is finite, which includes at least s =0. If M X (s) is defined on ( s 0,s 0 ) for some s 0 > 0 then X has finite moments of all orders
More informationThe Tightness of the Kesten-Stigum Reconstruction Bound for a Symmetric Model With Multiple Mutations
The Tightness of the Kesten-Stigum Reconstruction Bound for a Symmetric Model With Multiple Mutations City University of New York Frontier Probability Days 2018 Joint work with Dr. Sreenivasa Rao Jammalamadaka
More informationA Conceptual Proof of the Kesten-Stigum Theorem for Multi-type Branching Processes
Classical and Modern Branching Processes, Springer, New Yor, 997, pp. 8 85. Version of 7 Sep. 2009 A Conceptual Proof of the Kesten-Stigum Theorem for Multi-type Branching Processes by Thomas G. Kurtz,
More informationNonamenable Products are not Treeable
Version of 30 July 1999 Nonamenable Products are not Treeable by Robin Pemantle and Yuval Peres Abstract. Let X and Y be infinite graphs, such that the automorphism group of X is nonamenable, and the automorphism
More informationGärtner-Ellis Theorem and applications.
Gärtner-Ellis Theorem and applications. Elena Kosygina July 25, 208 In this lecture we turn to the non-i.i.d. case and discuss Gärtner-Ellis theorem. As an application, we study Curie-Weiss model with
More informationk-protected VERTICES IN BINARY SEARCH TREES
k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from
More informationCharacterization of cutoff for reversible Markov chains
Characterization of cutoff for reversible Markov chains Yuval Peres Joint work with Riddhi Basu and Jonathan Hermon 3 December 2014 Joint work with Riddhi Basu and Jonathan Hermon Characterization of cutoff
More informationHard-Core Model on Random Graphs
Hard-Core Model on Random Graphs Antar Bandyopadhyay Theoretical Statistics and Mathematics Unit Seminar Theoretical Statistics and Mathematics Unit Indian Statistical Institute, New Delhi Centre New Delhi,
More informationTHE MAXIMAL SUBGROUPS AND THE COMPLEXITY OF THE FLOW SEMIGROUP OF FINITE (DI)GRAPHS
THE MAXIMAL SUBGROUPS AND THE COMPLEXITY OF THE FLOW SEMIGROUP OF FINITE (DI)GRAPHS GÁBOR HORVÁTH, CHRYSTOPHER L. NEHANIV, AND KÁROLY PODOSKI Dedicated to John Rhodes on the occasion of his 80th birthday.
More informationThe coupling method - Simons Counting Complexity Bootcamp, 2016
The coupling method - Simons Counting Complexity Bootcamp, 2016 Nayantara Bhatnagar (University of Delaware) Ivona Bezáková (Rochester Institute of Technology) January 26, 2016 Techniques for bounding
More informationarxiv: v3 [math.pr] 10 Nov 2017
Harmonic measure for biased random walk in a supercritical Galton Watson tree Shen LIN LPMA, Université Pierre et Marie Curie, Paris, France -mail: shenlinmath@gmailcom arxiv:70708v3 mathpr 0 Nov 207 November
More informationRandom trees and branching processes
Random trees and branching processes Svante Janson IMS Medallion Lecture 12 th Vilnius Conference and 2018 IMS Annual Meeting Vilnius, 5 July, 2018 Part I. Galton Watson trees Let ξ be a random variable
More informationLecture 18: March 15
CS71 Randomness & Computation Spring 018 Instructor: Alistair Sinclair Lecture 18: March 15 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They may
More informationInduced subgraphs with many repeated degrees
Induced subgraphs with many repeated degrees Yair Caro Raphael Yuster arxiv:1811.071v1 [math.co] 17 Nov 018 Abstract Erdős, Fajtlowicz and Staton asked for the least integer f(k such that every graph with
More informationSTAT 200C: High-dimensional Statistics
STAT 200C: High-dimensional Statistics Arash A. Amini May 30, 2018 1 / 59 Classical case: n d. Asymptotic assumption: d is fixed and n. Basic tools: LLN and CLT. High-dimensional setting: n d, e.g. n/d
More informationLecture 4: Applications: random trees, determinantal measures and sampling
Lecture 4: Applications: random trees, determinantal measures and sampling Robin Pemantle University of Pennsylvania pemantle@math.upenn.edu Minerva Lectures at Columbia University 09 November, 2016 Sampling
More informationGradient interfaces with and without disorder
Gradient interfaces with and without disorder Codina Cotar University College London September 09, 2014, Toronto Outline 1 Physics motivation Example 1: Elasticity Recap-Gaussian Measure Example 2: Effective
More informationKRUSKAL-WALLIS ONE-WAY ANALYSIS OF VARIANCE BASED ON LINEAR PLACEMENTS
Bull. Korean Math. Soc. 5 (24), No. 3, pp. 7 76 http://dx.doi.org/34/bkms.24.5.3.7 KRUSKAL-WALLIS ONE-WAY ANALYSIS OF VARIANCE BASED ON LINEAR PLACEMENTS Yicheng Hong and Sungchul Lee Abstract. The limiting
More informationIntroduction The Poissonian City Variance and efficiency Flows Conclusion References. The Poissonian City. Wilfrid Kendall.
The Poissonian City Wilfrid Kendall w.s.kendall@warwick.ac.uk Mathematics of Phase Transitions Past, Present, Future 13 November 2009 A problem in frustrated optimization Consider N cities x (N) = {x 1,...,
More informationMAXIMAL COUPLING OF EUCLIDEAN BROWNIAN MOTIONS
MAXIMAL COUPLING OF EUCLIDEAN BOWNIAN MOTIONS ELTON P. HSU AND KAL-THEODO STUM ABSTACT. We prove that the mirror coupling is the unique maximal Markovian coupling of two Euclidean Brownian motions starting
More informationRecurrence of Simple Random Walk on Z 2 is Dynamically Sensitive
arxiv:math/5365v [math.pr] 3 Mar 25 Recurrence of Simple Random Walk on Z 2 is Dynamically Sensitive Christopher Hoffman August 27, 28 Abstract Benjamini, Häggström, Peres and Steif [2] introduced the
More informationMIXING TIME OF NEAR-CRITICAL RANDOM GRAPHS
MIXING TIME OF NEAR-CRITICAL RANDOM GRAPHS JIAN DING, EYAL LUBETZKY AND YUVAL PERES Abstract. Let C 1 be the largest component of the Erdős-Rényi random graph G(n, p). The mixing time of random walk on
More informationSelf-normalized Cramér-Type Large Deviations for Independent Random Variables
Self-normalized Cramér-Type Large Deviations for Independent Random Variables Qi-Man Shao National University of Singapore and University of Oregon qmshao@darkwing.uoregon.edu 1. Introduction Let X, X
More informationAlmost sure asymptotics for the random binary search tree
AofA 10 DMTCS proc. AM, 2010, 565 576 Almost sure asymptotics for the rom binary search tree Matthew I. Roberts Laboratoire de Probabilités et Modèles Aléatoires, Université Paris VI Case courrier 188,
More informationOn the mean connected induced subgraph order of cographs
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 71(1) (018), Pages 161 183 On the mean connected induced subgraph order of cographs Matthew E Kroeker Lucas Mol Ortrud R Oellermann University of Winnipeg Winnipeg,
More informationThe diameter of a random Cayley graph of Z q
The diameter of a random Cayley graph of Z q Gideon Amir Ori Gurel-Gurevich September 4, 009 Abstract Consider the Cayley graph of the cyclic group of prime order q with k uniformly chosen generators.
More informationLecture 1: Overview of percolation and foundational results from probability theory 30th July, 2nd August and 6th August 2007
CSL866: Percolation and Random Graphs IIT Delhi Arzad Kherani Scribe: Amitabha Bagchi Lecture 1: Overview of percolation and foundational results from probability theory 30th July, 2nd August and 6th August
More informationJim Pitman. Department of Statistics. University of California. June 16, Abstract
The asymptotic behavior of the Hurwitz binomial distribution Jim Pitman Technical Report No. 5 Department of Statistics University of California 367 Evans Hall # 386 Berkeley, CA 9472-386 June 16, 1998
More informationList coloring hypergraphs
List coloring hypergraphs Penny Haxell Jacques Verstraete Department of Combinatorics and Optimization University of Waterloo Waterloo, Ontario, Canada pehaxell@uwaterloo.ca Department of Mathematics University
More informationBoolean Inner-Product Spaces and Boolean Matrices
Boolean Inner-Product Spaces and Boolean Matrices Stan Gudder Department of Mathematics, University of Denver, Denver CO 80208 Frédéric Latrémolière Department of Mathematics, University of Denver, Denver
More informationSIMILAR MARKOV CHAINS
SIMILAR MARKOV CHAINS by Phil Pollett The University of Queensland MAIN REFERENCES Convergence of Markov transition probabilities and their spectral properties 1. Vere-Jones, D. Geometric ergodicity in
More informationStein s Method: Distributional Approximation and Concentration of Measure
Stein s Method: Distributional Approximation and Concentration of Measure Larry Goldstein University of Southern California 36 th Midwest Probability Colloquium, 2014 Stein s method for Distributional
More informationPartial cubes: structures, characterizations, and constructions
Partial cubes: structures, characterizations, and constructions Sergei Ovchinnikov San Francisco State University, Mathematics Department, 1600 Holloway Ave., San Francisco, CA 94132 Abstract Partial cubes
More informationBounds on the generalised acyclic chromatic numbers of bounded degree graphs
Bounds on the generalised acyclic chromatic numbers of bounded degree graphs Catherine Greenhill 1, Oleg Pikhurko 2 1 School of Mathematics, The University of New South Wales, Sydney NSW Australia 2052,
More informationSOLUTIONS OF SEMILINEAR WAVE EQUATION VIA STOCHASTIC CASCADES
Communications on Stochastic Analysis Vol. 4, No. 3 010) 45-431 Serials Publications www.serialspublications.com SOLUTIONS OF SEMILINEAR WAVE EQUATION VIA STOCHASTIC CASCADES YURI BAKHTIN* AND CARL MUELLER
More informationUpper Bound for Intermediate Singular Values of Random Sub-Gaussian Matrices 1
Upper Bound for Intermediate Singular Values of Random Sub-Gaussian Matrices 1 Feng Wei 2 University of Michigan July 29, 2016 1 This presentation is based a project under the supervision of M. Rudelson.
More informationarxiv: v1 [math.pr] 1 Jan 2013
The role of dispersal in interacting patches subject to an Allee effect arxiv:1301.0125v1 [math.pr] 1 Jan 2013 1. Introduction N. Lanchier Abstract This article is concerned with a stochastic multi-patch
More informationTREE AND GRID FACTORS FOR GENERAL POINT PROCESSES
Elect. Comm. in Probab. 9 (2004) 53 59 ELECTRONIC COMMUNICATIONS in PROBABILITY TREE AND GRID FACTORS FOR GENERAL POINT PROCESSES ÁDÁM TIMÁR1 Department of Mathematics, Indiana University, Bloomington,
More informationarxiv:math/ v1 [math.pr] 24 Apr 2003
ICM 2002 Vol. III 1 3 arxiv:math/0304374v1 [math.pr] 24 Apr 2003 Random Walks in Random Environments Ofer Zeitouni Abstract Random walks in random environments (RWRE s) have been a source of surprising
More informationRandom walks on graphs: a survey
Random walks on graphs: a survey University of Warwick 26th Cumberland Conference on Combinatorics, Graph Theory & Computing 24/5/13 Problem 1: A mailman has to deliver a letter to each vertex of a finite
More informationOn the Logarithmic Calculus and Sidorenko s Conjecture
On the Logarithmic Calculus and Sidorenko s Conjecture by Xiang Li A thesis submitted in conformity with the requirements for the degree of Msc. Mathematics Graduate Department of Mathematics University
More informationChannel Dispersion and Moderate Deviations Limits for Memoryless Channels
Channel Dispersion and Moderate Deviations Limits for Memoryless Channels Yury Polyanskiy and Sergio Verdú Abstract Recently, Altug and Wagner ] posed a question regarding the optimal behavior of the probability
More informationCounting independent sets up to the tree threshold
Counting independent sets up to the tree threshold Dror Weitz March 16, 2006 Abstract We consider the problem of approximately counting/sampling weighted independent sets of a graph G with activity λ,
More informationLatent voter model on random regular graphs
Latent voter model on random regular graphs Shirshendu Chatterjee Cornell University (visiting Duke U.) Work in progress with Rick Durrett April 25, 2011 Outline Definition of voter model and duality with
More informationOn trees with a given degree sequence
On trees with a given degree sequence Osvaldo ANGTUNCIO-HERNÁNDEZ and Gerónimo URIBE BRAVO Instituto de Matemáticas Universidad Nacional Autónoma de México 3rd Bath-UNAM-CIMAT workshop 16-05-2016 Our discrete
More informationWorking papers of the Department of Economics University of Perugia (IT)
ISSN 385-75 Working papers of the Department of Economics University of Perugia (IT) The Heat Kernel on Homogeneous Trees and the Hypergeometric Function Hacen Dib Mauro Pagliacci Working paper No 6 December
More informationBrownian motion. Samy Tindel. Purdue University. Probability Theory 2 - MA 539
Brownian motion Samy Tindel Purdue University Probability Theory 2 - MA 539 Mostly taken from Brownian Motion and Stochastic Calculus by I. Karatzas and S. Shreve Samy T. Brownian motion Probability Theory
More informationON THE COMPLETE CONVERGENCE FOR WEIGHTED SUMS OF DEPENDENT RANDOM VARIABLES UNDER CONDITION OF WEIGHTED INTEGRABILITY
J. Korean Math. Soc. 45 (2008), No. 4, pp. 1101 1111 ON THE COMPLETE CONVERGENCE FOR WEIGHTED SUMS OF DEPENDENT RANDOM VARIABLES UNDER CONDITION OF WEIGHTED INTEGRABILITY Jong-Il Baek, Mi-Hwa Ko, and Tae-Sung
More informationarxiv: v2 [math.pr] 25 Feb 2017
ypical behavior of the harmonic measure in critical Galton Watson trees with infinite variance offspring distribution Shen LIN LPMA, Université Pierre et Marie Curie, Paris, France E-mail: shen.lin.math@gmail.com
More informationChordal Graphs, Interval Graphs, and wqo
Chordal Graphs, Interval Graphs, and wqo Guoli Ding DEPARTMENT OF MATHEMATICS LOUISIANA STATE UNIVERSITY BATON ROUGE, LA 70803-4918 E-mail: ding@math.lsu.edu Received July 29, 1997 Abstract: Let be the
More informationRandom Graphs. 7.1 Introduction
7 Random Graphs 7.1 Introduction The theory of random graphs began in the late 1950s with the seminal paper by Erdös and Rényi [?]. In contrast to percolation theory, which emerged from efforts to model
More informationMonte-Carlo MMD-MA, Université Paris-Dauphine. Xiaolu Tan
Monte-Carlo MMD-MA, Université Paris-Dauphine Xiaolu Tan tan@ceremade.dauphine.fr Septembre 2015 Contents 1 Introduction 1 1.1 The principle.................................. 1 1.2 The error analysis
More informationLecture 06 01/31/ Proofs for emergence of giant component
M375T/M396C: Topics in Complex Networks Spring 2013 Lecture 06 01/31/13 Lecturer: Ravi Srinivasan Scribe: Tianran Geng 6.1 Proofs for emergence of giant component We now sketch the main ideas underlying
More informationInternal DLA in Higher Dimensions
Internal DLA in Higher Dimensions David Jerison Lionel Levine Scott Sheffield December 14, 2010 Abstract Let A(t) denote the cluster produced by internal diffusion limited aggregation (internal DLA) with
More informationGenerating Orthogonal Polynomials and their Derivatives using Vertex Matching-Partitions of Graphs
Generating Orthogonal Polynomials and their Derivatives using Vertex Matching-Partitions of Graphs John P. McSorley, Philip Feinsilver Department of Mathematics Southern Illinois University Carbondale,
More informationFerromagnetic Ising models
Stat 36 Stochastic Processes on Graphs Ferromagnetic Ising models Amir Dembo Lecture 3-4 - 0/5/2007 Introduction By ferromagnetic Ising models we mean the study of the large-n behavior of the measures
More informationStrong log-concavity is preserved by convolution
Strong log-concavity is preserved by convolution Jon A. Wellner Abstract. We review and formulate results concerning strong-log-concavity in both discrete and continuous settings. Although four different
More informationThe Contour Process of Crump-Mode-Jagers Branching Processes
The Contour Process of Crump-Mode-Jagers Branching Processes Emmanuel Schertzer (LPMA Paris 6), with Florian Simatos (ISAE Toulouse) June 24, 2015 Crump-Mode-Jagers trees Crump Mode Jagers (CMJ) branching
More informationDisjoint Hamiltonian Cycles in Bipartite Graphs
Disjoint Hamiltonian Cycles in Bipartite Graphs Michael Ferrara 1, Ronald Gould 1, Gerard Tansey 1 Thor Whalen Abstract Let G = (X, Y ) be a bipartite graph and define σ (G) = min{d(x) + d(y) : xy / E(G),
More informationA Lower Bound for the Size of Syntactically Multilinear Arithmetic Circuits
A Lower Bound for the Size of Syntactically Multilinear Arithmetic Circuits Ran Raz Amir Shpilka Amir Yehudayoff Abstract We construct an explicit polynomial f(x 1,..., x n ), with coefficients in {0,
More informationSCALE INVARIANT FOURIER RESTRICTION TO A HYPERBOLIC SURFACE
SCALE INVARIANT FOURIER RESTRICTION TO A HYPERBOLIC SURFACE BETSY STOVALL Abstract. This result sharpens the bilinear to linear deduction of Lee and Vargas for extension estimates on the hyperbolic paraboloid
More informationMaximizing the number of independent sets of a fixed size
Maximizing the number of independent sets of a fixed size Wenying Gan Po-Shen Loh Benny Sudakov Abstract Let i t (G be the number of independent sets of size t in a graph G. Engbers and Galvin asked how
More informationIntroduction to Markov Chains and Riffle Shuffling
Introduction to Markov Chains and Riffle Shuffling Nina Kuklisova Math REU 202 University of Chicago September 27, 202 Abstract In this paper, we introduce Markov Chains and their basic properties, and
More informationErgodic Theorems. Samy Tindel. Purdue University. Probability Theory 2 - MA 539. Taken from Probability: Theory and examples by R.
Ergodic Theorems Samy Tindel Purdue University Probability Theory 2 - MA 539 Taken from Probability: Theory and examples by R. Durrett Samy T. Ergodic theorems Probability Theory 1 / 92 Outline 1 Definitions
More information