Coupling of Scale-Free and Classical Random Graphs
|
|
- Kathleen Mitchell
- 6 years ago
- Views:
Transcription
1 Coupling of Scale-Free and Classical Random Graphs April 18, 2007
2 Introduction Consider a graph where we delete some nodes and look at the size of the largest component remaining. Just how robust are scale free graphs to random failures
3 Introduction Consider a graph where we delete some nodes and look at the size of the largest component remaining. Just how robust are scale free graphs to random failures to deliberate attacks
4 Introduction Consider a graph where we delete some nodes and look at the size of the largest component remaining. Just how robust are scale free graphs to random failures to deliberate attacks should the adversary have infinite time?
5 Introduction If we take the adversary out of the picture we can phrase the question as.
6 Introduction If we take the adversary out of the picture we can phrase the question as. How many vertices do we need to remove so that the graph breaks up into small pieces?
7 The Model Consider the Preferential Attachment Model. Assume m is fixed, G[k] G (k) m. We create G[k + 1] by adding a new vertex k + 1 with m edges (k + 1, t 1 ),..., (k + 1, t m ) where d G[k],i(j) Pr[t i = j] = 2mk + 2i 1
8 Main Result Theorem 1 There exist c > 0,m 0 s.t. for m m 0, whp G (n) m the following holds (a) Every induced subgraph of size 10n log(m) m contains a component of size at least 2n log m m (b) The graph contains an independent set of size cn log(m) m
9 Proof Technique Proof by coupling We create two graphs (G 1, G 2 ) s.t. G 1 G (n) m, G 2 G(n, p). But G 1 and G 2 are not independent but heavily correlated.
10 What is coupling? Let X D X, Y D Y. A coupling is a joint distribution D X,Y s.t. the marginals are correct, i.e. D X, = D X and D,Y = D Y.
11 What is coupling? Let X D X, Y D Y. A coupling is a joint distribution D X,Y s.t. the marginals are correct, i.e. D X, = D X and D,Y = D Y. Suppose X, Y are uniform [0, 1] and we let Y = 1 X then both marginals are still uniform but the joint distribution is far from independent.
12 Chernoff Bounds Let X Bin(n, p) then ( e δ Pr[X > (δ + 1)np] < (1 + δ) (1+δ) ( e δ Pr[X < (1 δ)np] < (1 δ) (1 δ) ) np ) np
13 The Coupling Theorem 2 Fix η < 1/2, there exist constants A, c > 0 s.t. for fixed m we can construct G 1 G (n) m, G 2 G(n, ηm/n) s.t. whp e(g 2 \ G 1 ) Ae cm n
14 The Coupling Sidenote We can create G(n, p) one node at a time G[1] contains a single node
15 The Coupling Sidenote We can create G(n, p) one node at a time G[1] contains a single node Given G[k]
16 The Coupling Sidenote We can create G(n, p) one node at a time G[1] contains a single node Given G[k] generate Y Bin(k, p)
17 The Coupling Sidenote We can create G(n, p) one node at a time G[1] contains a single node Given G[k] generate Y Bin(k, p) let S be a random subset of [k] of size Y
18 The Coupling Sidenote We can create G(n, p) one node at a time G[1] contains a single node Given G[k] generate Y Bin(k, p) let S be a random subset of [k] of size Y create edges between k and S
19 The Coupling Proof We grow G 1, G 2 one node at a time. Start with G 1 [k 0 ] G (n) m, G 2 [k 0 ] G(k 0, ηm/n), where k 0 grows slowly with n. Let t 1,..., t m be the vertices picked when growing G 1 [k]. For j k + 1 we have Pr(t i = j) = d G[k],i(j) 2mk + 2i 1 m 2km + 2m = 1 2k + 2
20 The Coupling Proof 1 2k k 1 k k + 1 Construct s 1,..., s m [k], s.t. s i s are independent Pr(s i = j) = 1 2k+2 for j and s i = j implies t i = j.
21 The Coupling Proof Let X = {i s i }, then X Bin(m, Let Y Bin(k, ηm/n), then E[X] = mk mk (1 + ɛ)η 2k + 2 n k 2k+2 ). = (1 + ɛ)e[y ] So Pr[X < Y ] Ae c m for some constants A, c > 0.
22 The Coupling Proof All the s i s are distinct w.p 1 O( m2 k ), given this and X the set S 1 = {s i s i } is a random subset of [k] of size X.
23 The Coupling Proof All the s i s are distinct w.p 1 O( m2 k ), given this and X the set S 1 = {s i s i } is a random subset of [k] of size X. If Y X we pick a random subset S 2 of size Y from S 1.
24 The Coupling Proof All the s i s are distinct w.p 1 O( m2 k ), given this and X the set S 1 = {s i s i } is a random subset of [k] of size X. If Y X we pick a random subset S 2 of size Y from S 1. Otherwise we pick S 2 a random subset of size Y from [k], this happens w.p. Ae c m + o(1).
25 The Coupling Proof Set D k+1 = #of edges added to G 2 and not G 1. Pr[D k+1 > 0] = Ae c m + o(1), and D k+1 Y so E[D k+1 ] Ame c m
26 The Coupling Proof The number of edges in G 2 \ G 2 is at most ( ) k0 2 + n k=k 0 +1 Assuming k 0 = n 1/4 we see that the sum has expected value at most Ane c m and is concentrated around its mean. D k
27 The Coupling Proof The number of edges in G 2 \ G 2 is at most ( ) k0 2 + n k=k 0 +1 Assuming k 0 = n 1/4 we see that the sum has expected value at most Ane c m and is concentrated around its mean. QED D k
28 Proof of Theorem 1(a) Let G 1, G 2 be as described in Theorem 2. Suppose G 1 has an induced subgraph on a set V, with V = 10n log(m) m where every component has size less than 2n log(m) m. Then we can partition V into two set V 1, V 2 s.t. V 1, V 2 4n log(m) m and G 1 has no V 1 -V 2 edges.
29 Proof of Theorem 1(a) Let x = Ae c m n, if the coupling works then G 2 has at most x, V 1 -V 2 edges. The number of V 1 -V 2 edges in G 2 is a binomial with mean µ = V 1 V 2 ηm/n 24η(log(m)) 2 n/m Pick m large enough s.t. x < µ/100
30 Proof of Theorem 1(a) By Chernoff bounds the probability that we have fewer than x edges crossing V 1, V 2 is at most e 11µ/12. Now ( ) n Pr[G 2 has at most x V 1 V 2 edges] 2 V e 22η(log(m))2 n/m V
31 Proof of Theorem 1(a) By Chernoff bounds the probability that we have fewer than x edges crossing V 1, V 2 is at most e 11µ/12. Now ( ) n Pr[G 2 has at most x V 1 V 2 edges] 2 V e 22η(log(m))2 n/m V ( ) en V 2 V e 22η(log(m))2 n/m V
32 Proof of Theorem 1(a) By Chernoff bounds the probability that we have fewer than x edges crossing V 1, V 2 is at most e 11µ/12. Now ( ) n Pr[G 2 has at most x V 1 V 2 edges] 2 V e 22η(log(m))2 n/m V ( ) en V 2 V e 22η(log(m))2 n/m V ( ) 2em V e 22η(log(m))2 n/m 10 log(m)
33 Proof of Theorem 1(a) By Chernoff bounds the probability that we have fewer than x edges crossing V 1, V 2 is at most e 11µ/12. Now ( ) n Pr[G 2 has at most x V 1 V 2 edges] 2 V e 22η(log(m))2 n/m V ( ) en V 2 V e 22η(log(m))2 n/m V ( ) 2em V e 22η(log(m))2 n/m 10 log(m) e (10 22η)(log(m))2 n/m
34 Proof of Theorem 1(a) By Chernoff bounds the probability that we have fewer than x edges crossing V 1, V 2 is at most e 11µ/12. Now ( ) n Pr[G 2 has at most x V 1 V 2 edges] 2 V e 22η(log(m))2 n/m V ( ) en V 2 V e 22η(log(m))2 n/m V ( ) 2em V e 22η(log(m))2 n/m 10 log(m) e (10 22η)(log(m))2 n/m QED
35 Overview of the proof The idea of the proof was this
36 Overview of the proof The idea of the proof was this We create G 1, G 2 simultaneously s.t.
37 Overview of the proof The idea of the proof was this We create G 1, G 2 simultaneously s.t. a bad event in G 1 implies w.h.p another bad event in G 2
38 Overview of the proof The idea of the proof was this We create G 1, G 2 simultaneously s.t. a bad event in G 1 implies w.h.p another bad event in G 2 which is easy to show is rare in G 2.
39 Overview of the proof The idea of the proof was this We create G 1, G 2 simultaneously s.t. a bad event in G 1 implies w.h.p another bad event in G 2 which is easy to show is rare in G 2. But we are working in the joint probability space so this implies that the bad event is rare in G 1.
40 Another Coupling Theorem 3 Let ɛ > 0 be given, there is a constant C s.t. for fixed m we can couple G 1, G 2 s.t. G 1 G (n) m, G 2 G(n, Cm/n) s.t. whp G 2 contains G 1 \ V for a set of vertices V s.t. {i V i ɛn} ɛn/m.
41 Another Coupling Proof of Theorem 3 We start with G 1 [k 0 ] G (k 0) m and G 2 [k 0 ] G(k 0, Cm/n) independent, and here k 0 = ɛn. A vertex is bad at time k if it has degree at leas Am in G 1 [k].
42 Another Coupling Proof of Theorem 3 We need the following result from Bollobás et al.: Vertex i has degree d + m in G (n) m with probability ( ) d + m 1 o(n 1 ) + (1 + o(1)) ( i m 1 n )m/2 (1 i n )d i.e. for i ɛn it is exponentially small in d for large d If we choose A large enough the expected number of bad vertices is at most e Bm n so whp there are at most ɛn/m bad vertices.
43 Another Coupling Proof of Theorem 3 Let t 1,..., t m be defined as in the previous proof. Let V k be the set of vertices j, s.t. k 0 j k that are good. Now for j V k and Pr[t i = j] (Am + m)/(2mk) A/k Aɛ 1 /n Pr[t i / V k ] k 0 m/(2mn) = ɛ/2 so Pr[t i = j r t i / {j 1,..., j r 1 }] 2Aɛ 2 /n = p
44 Another Coupling Proof of Theorem 3 Let T i be a random subset of V k s.t. every vertex is picked independently with probability p. Then we can couple T i and t i s.t. t i T i if t i is good. p j 1 j 2 j 3... j r Pr[t i = j r t i / {j 1,..., j r 1 }]
45 Another Coupling Proof of Theorem 3 Let S 1 be the set of good vertices adjacent to k + 1 in G 1. Let S 2 = T 1 T 2... T m. Then S 2 is a random subset of V k where every vertex is picked w.p. 1 (1 p) m mp Cm/n for some large C. This completes the proof since we ve constructed S 1 s.t. S 1 S 2.
46 Proof of Theorem 1(b) We re almost there For a constant a > 1 we know that G n, a n has an independent set of size log(a) a n when a. Now couple G 1 and G 2 as in Theorem 3, with ɛ = 1 2 and assume C > 2. Look at the subgraph of G 2 of vertices that come in after n 2. It has distribution G n 2, Cm n G n 2, Cm/2 n/2 so it has an independent set of size n log(m) Cm. Removing the bad vertices from this set we see that this set is also independent in G 1. So G 1 has an independent set of size n log(m) Cm n 2m. By picking m large enough we get the result.
47 The End Thank You
48 The End Thank You Questions?
Coupling Scale-Free and Classical Random Graphs
Internet Mathematics Vol. 1, No. 2: 215-225 Coupling Scale-Free and Classical Random Graphs Béla Bollobás and Oliver Riordan Abstract. Recently many new scale-free random graph models have been introduced,
More informationEquivalence of the random intersection graph and G(n, p)
Equivalence of the random intersection graph and Gn, p arxiv:0910.5311v1 [math.co] 28 Oct 2009 Katarzyna Rybarczyk Faculty of Mathematics and Computer Science, Adam Mickiewicz University, 60 769 Poznań,
More informationLecture 5: Probabilistic tools and Applications II
T-79.7003: Graphs and Networks Fall 2013 Lecture 5: Probabilistic tools and Applications II Lecturer: Charalampos E. Tsourakakis Oct. 11, 2013 5.1 Overview In the first part of today s lecture we will
More informationThe phase transition in the Erdös-Rényi random graph model
The phase transition in the Erdös-Rényi random graph model Tom van den Bosch July 17, 2014 Bachelor thesis Supervisor: Guus Regts Korteweg-de Vries Instituut voor Wiskunde Faculteit der Natuurwetenschappen,
More informationLecture 7: February 6
CS271 Randomness & Computation Spring 2018 Instructor: Alistair Sinclair Lecture 7: February 6 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They
More informationLecture 5: The Principle of Deferred Decisions. Chernoff Bounds
Randomized Algorithms Lecture 5: The Principle of Deferred Decisions. Chernoff Bounds Sotiris Nikoletseas Associate Professor CEID - ETY Course 2013-2014 Sotiris Nikoletseas, Associate Professor Randomized
More informationAn Efficient reconciliation algorithm for social networks
An Efficient reconciliation algorithm for social networks Silvio Lattanzi (Google Research NY) Joint work with: Nitish Korula (Google Research NY) ICERM Stochastic Graph Models Outline Graph reconciliation
More information. p.1. Mathematical Models of the WWW and related networks. Alan Frieze
. p.1 Mathematical Models of the WWW and related networks Alan Frieze The WWW is an example of a large real-world network.. p.2 The WWW is an example of a large real-world network. It grows unpredictably
More informationMany cliques in H-free subgraphs of random graphs
Many cliques in H-free subgraphs of random graphs Noga Alon Alexandr Kostochka Clara Shikhelman November 19, 017 Abstract For two fixed graphs T and H let ex(g(n, p), T, H) be the random variable counting
More informationLecture 5: January 30
CS71 Randomness & Computation Spring 018 Instructor: Alistair Sinclair Lecture 5: January 30 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They
More informationInduced subgraphs with many repeated degrees
Induced subgraphs with many repeated degrees Yair Caro Raphael Yuster arxiv:1811.071v1 [math.co] 17 Nov 018 Abstract Erdős, Fajtlowicz and Staton asked for the least integer f(k such that every graph with
More informationThe diameter and mixing time of critical random graphs.
The diameter and mixing time of critical random graphs. March 14, 2007 Joint work with: Asaf Nachmias. Background The Erdos and Rényi random graph G(n, p) is obtained from the complete graph on n vertices
More informationA note on network reliability
A note on network reliability Noga Alon Institute for Advanced Study, Princeton, NJ 08540 and Department of Mathematics Tel Aviv University, Tel Aviv, Israel Let G = (V, E) be a loopless undirected multigraph,
More informationConnectivity of random cubic sum graphs
Connectivity of random cubic sum graphs Andrew Beveridge Department of Mathematics, Statistics and Computer Science Macalester College Saint Paul, MN 55105 June 1, 010 Abstract Consider the set SGQ k of
More informationTianjin. June Phase Transition. Joel Spencer
Tianjin June 2007 The Erdős-Rényi Phase Transition Joel Spencer 1 TP! trivial being! I have received your letter, you should have written already a week ago. The spirit of Cantor was with me for some length
More informationvariance of independent variables: sum of variances So chebyshev predicts won t stray beyond stdev.
Announcements No class monday. Metric embedding seminar. Review expectation notion of high probability. Markov. Today: Book 4.1, 3.3, 4.2 Chebyshev. Remind variance, standard deviation. σ 2 = E[(X µ X
More informationJIGSAW PERCOLATION ON ERDÖS-RÉNYI RANDOM GRAPHS
JIGSAW PERCOLATION ON ERDÖS-RÉNYI RANDOM GRAPHS ERIK SLIVKEN Abstract. We extend the jigsaw percolation model to analyze graphs where both underlying people and puzzle graphs are Erdös-Rényi random graphs.
More informationInduced subgraphs of Ramsey graphs with many distinct degrees
Induced subgraphs of Ramsey graphs with many distinct degrees Boris Bukh Benny Sudakov Abstract An induced subgraph is called homogeneous if it is either a clique or an independent set. Let hom(g) denote
More information9.1 Branching Process
9.1 Branching Process Imagine the following stochastic process called branching process. A unisexual universe Initially there is one live organism and no dead ones. At each time unit, we select one of
More informationLocal MAX-CUT in Smoothed Polynomial Time
Local MAX-CUT in Smoothed Polynomial Time Omer Angel 1 Sebastien Bubeck 2 Yuval Peres 2 Fan Wei 3 1 University of British Columbia 2 Microsoft Research Redmond 3 Stanford University November 9, 2016 Introduction
More informationThe large deviation principle for the Erdős-Rényi random graph
The large deviation principle for the Erdős-Rényi random graph (Courant Institute, NYU) joint work with S. R. S. Varadhan Main objective: how to count graphs with a given property Only consider finite
More information< k 2n. 2 1 (n 2). + (1 p) s) N (n < 1
List of Problems jacques@ucsd.edu Those question with a star next to them are considered slightly more challenging. Problems 9, 11, and 19 from the book The probabilistic method, by Alon and Spencer. Question
More informationSets that are connected in two random graphs
Sets that are connected in two random graphs Michael Molloy August 17, 2012 Abstract We consider two random graphs G 1, G 2, both on the same vertex set. We ask whether there is a non-trivial set of vertices
More informationLecture 4. 1 Estimating the number of connected components and minimum spanning tree
CS 59000 CTT Current Topics in Theoretical CS Aug 30, 2012 Lecturer: Elena Grigorescu Lecture 4 Scribe: Pinar Yanardag Delul 1 Estimating the number of connected components and minimum spanning tree In
More informationTopic 10: Hypothesis Testing
Topic 10: Hypothesis Testing Course 003, 2016 Page 0 The Problem of Hypothesis Testing A statistical hypothesis is an assertion or conjecture about the probability distribution of one or more random variables.
More informationMixing time and diameter in random graphs
October 5, 2009 Based on joint works with: Asaf Nachmias, and Jian Ding, Eyal Lubetzky and Jeong-Han Kim. Background The mixing time of the lazy random walk on a graph G is T mix (G) = T mix (G, 1/4) =
More informationCSE 321 Solutions to Practice Problems
CSE 321 Solutions to Practice Problems Instructions: Feel free NOT to multiply out binomial coefficients, factorials, etc, and feel free to leave answers in the form of a sum. No calculators, books or
More informationCS5314 Randomized Algorithms. Lecture 18: Probabilistic Method (De-randomization, Sample-and-Modify)
CS5314 Randomized Algorithms Lecture 18: Probabilistic Method (De-randomization, Sample-and-Modify) 1 Introduce two topics: De-randomize by conditional expectation provides a deterministic way to construct
More informationDistributed Systems Gossip Algorithms
Distributed Systems Gossip Algorithms He Sun School of Informatics University of Edinburgh What is Gossip? Gossip algorithms In a gossip algorithm, each node in the network periodically exchanges information
More informationLearning Theory. Piyush Rai. CS5350/6350: Machine Learning. September 27, (CS5350/6350) Learning Theory September 27, / 14
Learning Theory Piyush Rai CS5350/6350: Machine Learning September 27, 2011 (CS5350/6350) Learning Theory September 27, 2011 1 / 14 Why Learning Theory? We want to have theoretical guarantees about our
More informationRandom Graphs III. Y. Kohayakawa (São Paulo) Chorin, 4 August 2006
Y. Kohayakawa (São Paulo) Chorin, 4 August 2006 Outline 1 Outline of Lecture III 1. Subgraph containment with adversary: Existence of monoχ subgraphs in coloured random graphs; properties of the form G(n,
More informationOutline. Martingales. Piotr Wojciechowski 1. 1 Lane Department of Computer Science and Electrical Engineering West Virginia University.
Outline Piotr 1 1 Lane Department of Computer Science and Electrical Engineering West Virginia University 8 April, 01 Outline Outline 1 Tail Inequalities Outline Outline 1 Tail Inequalities General Outline
More informationTopic 10: Hypothesis Testing
Topic 10: Hypothesis Testing Course 003, 2017 Page 0 The Problem of Hypothesis Testing A statistical hypothesis is an assertion or conjecture about the probability distribution of one or more random variables.
More informationarxiv: v1 [math.co] 28 Mar 2015
Strong-majority bootstrap percolation on regular graphs with low dissemination threshold Dieter Mitsche Xavier Pérez-Giménez Pawe l Pra lat arxiv:1503.08310v1 [math.co] 28 Mar 2015 Abstract Consider the
More informationFIRST ORDER SENTENCES ON G(n, p), ZERO-ONE LAWS, ALMOST SURE AND COMPLETE THEORIES ON SPARSE RANDOM GRAPHS
FIRST ORDER SENTENCES ON G(n, p), ZERO-ONE LAWS, ALMOST SURE AND COMPLETE THEORIES ON SPARSE RANDOM GRAPHS MOUMANTI PODDER 1. First order theory on G(n, p) We start with a very simple property of G(n,
More informationBalanced Allocation Through Random Walk
Balanced Allocation Through Random Walk Alan Frieze Samantha Petti November 25, 2017 Abstract We consider the allocation problem in which m (1 ε)dn items are to be allocated to n bins with capacity d.
More informationSusceptible-Infective-Removed Epidemics and Erdős-Rényi random
Susceptible-Infective-Removed Epidemics and Erdős-Rényi random graphs MSR-Inria Joint Centre October 13, 2015 SIR epidemics: the Reed-Frost model Individuals i [n] when infected, attempt to infect all
More informationU.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 2 Luca Trevisan August 29, 2017
U.C. Berkeley CS94: Beyond Worst-Case Analysis Handout Luca Trevisan August 9, 07 Scribe: Mahshid Montazer Lecture In this lecture, we study the Max Cut problem in random graphs. We compute the probable
More informationTom Salisbury
MATH 2030 3.00MW Elementary Probability Course Notes Part V: Independence of Random Variables, Law of Large Numbers, Central Limit Theorem, Poisson distribution Geometric & Exponential distributions Tom
More informationMATH 22 HAMILTONIAN GRAPHS. Lecture V: 11/18/2003
MATH 22 Lecture V: 11/18/2003 HAMILTONIAN GRAPHS All communities [graphs] divide themselves into the few and the many [i.e., are bipartite]. Alexander Hamilton, Debates of the Federal Convention Before
More informationCS224W: Analysis of Networks Jure Leskovec, Stanford University
CS224W: Analysis of Networks Jure Leskovec, Stanford University http://cs224w.stanford.edu 10/30/17 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, http://cs224w.stanford.edu 2
More informationCS5314 Randomized Algorithms. Lecture 15: Balls, Bins, Random Graphs (Hashing)
CS5314 Randomized Algorithms Lecture 15: Balls, Bins, Random Graphs (Hashing) 1 Objectives Study various hashing schemes Apply balls-and-bins model to analyze their performances 2 Chain Hashing Suppose
More informationTHE SECOND LARGEST COMPONENT IN THE SUPERCRITICAL 2D HAMMING GRAPH
THE SECOND LARGEST COMPONENT IN THE SUPERCRITICAL 2D HAMMING GRAPH REMCO VAN DER HOFSTAD, MALWINA J. LUCZAK, AND JOEL SPENCER Abstract. The 2-dimensional Hamming graph H(2, n consists of the n 2 vertices
More informationON SUBGRAPH SIZES IN RANDOM GRAPHS
ON SUBGRAPH SIZES IN RANDOM GRAPHS Neil Calkin and Alan Frieze Department of Mathematics, Carnegie Mellon University, Pittsburgh, U.S.A. and Brendan D. McKay Department of Computer Science, Australian
More informationThe Monte Carlo Method
The Monte Carlo Method Example: estimate the value of π. Choose X and Y independently and uniformly at random in [0, 1]. Let Pr(Z = 1) = π 4. 4E[Z] = π. { 1 if X Z = 2 + Y 2 1, 0 otherwise, Let Z 1,...,
More informationRigidity of Graphs and Frameworks
Rigidity of Graphs and Frameworks Rigid Frameworks The Rigidity Matrix and the Rigidity Matroid Infinitesimally Rigid Frameworks Rigid Graphs Rigidity in R d, d = 1,2 Global Rigidity in R d, d = 1,2 1
More informationU.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 3 Luca Trevisan August 31, 2017
U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 3 Luca Trevisan August 3, 207 Scribed by Keyhan Vakil Lecture 3 In which we complete the study of Independent Set and Max Cut in G n,p random graphs.
More informationThe typical structure of sparse K r+1 -free graphs
The typical structure of sparse K r+1 -free graphs Lutz Warnke University of Cambridge (joint work with József Balogh, Robert Morris, and Wojciech Samotij) H-free graphs / Turán s theorem Definition Let
More informationCSE 421 NP-Completeness
CSE 421 NP-Completeness Yin at Lee 1 Cook-Levin heorem heorem (Cook 71, Levin 73): 3-SA is NP-complete, i.e., for all problems A NP, A p 3-SA. (See CSE 431 for the proof) So, 3-SA is the hardest problem
More informationGraph-Constrained Group Testing
Mahdi Cheraghchi et al. presented by Ying Xuan May 20, 2010 Table of contents 1 Motivation and Problem Definitions 2 3 Correctness Proof 4 Applications call for connected pools detection of congested links
More informationPoisson approximations
Chapter 9 Poisson approximations 9.1 Overview The Binn, p) can be thought of as the distribution of a sum of independent indicator random variables X 1 + + X n, with {X i = 1} denoting a head on the ith
More informationRandom Graphs. 7.1 Introduction
7 Random Graphs 7.1 Introduction The theory of random graphs began in the late 1950s with the seminal paper by Erdös and Rényi [?]. In contrast to percolation theory, which emerged from efforts to model
More informationDominating Set. Chapter 7
Chapter 7 Dominating Set In this chapter we present another randomized algorithm that demonstrates the power of randomization to break symmetries. We study the problem of finding a small dominating set
More informationADFOCS 2006 Saarbrücken. Phase Transition. Joel Spencer
ADFOCS 2006 Saarbrücken The Erdős-Rényi Phase Transition Joel Spencer 1 TP! trivial being! I have received your letter, you should have written already a week ago. The spirit of Cantor was with me for
More informationEquitable coloring of random graphs
Michael Krivelevich 1, Balázs Patkós 2 1 Tel Aviv University, Tel Aviv, Israel 2 Central European University, Budapest, Hungary Phenomena in High Dimensions, Samos 2007 A set of vertices U V (G) is said
More informationPacking tight Hamilton cycles in 3-uniform hypergraphs
Packing tight Hamilton cycles in 3-uniform hypergraphs Alan Frieze Michael Krivelevich Po-Shen Loh Abstract Let H be a 3-uniform hypergraph with n vertices. A tight Hamilton cycle C H is a collection of
More informationON THE NUMBER OF ALTERNATING PATHS IN BIPARTITE COMPLETE GRAPHS
ON THE NUMBER OF ALTERNATING PATHS IN BIPARTITE COMPLETE GRAPHS PATRICK BENNETT, ANDRZEJ DUDEK, ELLIOT LAFORGE December 1, 016 Abstract. Let C [r] m be a code such that any two words of C have Hamming
More informationApplications of the Lopsided Lovász Local Lemma Regarding Hypergraphs
Regarding Hypergraphs Ph.D. Dissertation Defense April 15, 2013 Overview The Local Lemmata 2-Coloring Hypergraphs with the Original Local Lemma Counting Derangements with the Lopsided Local Lemma Lopsided
More informationThe expansion of random regular graphs
The expansion of random regular graphs David Ellis Introduction Our aim is now to show that for any d 3, almost all d-regular graphs on {1, 2,..., n} have edge-expansion ratio at least c d d (if nd is
More informationLecture 18: More NP-Complete Problems
6.045 Lecture 18: More NP-Complete Problems 1 The Clique Problem a d f c b e g Given a graph G and positive k, does G contain a complete subgraph on k nodes? CLIQUE = { (G,k) G is an undirected graph with
More informationDominating a family of graphs with small connected subgraphs
Dominating a family of graphs with small connected subgraphs Yair Caro Raphael Yuster Abstract Let F = {G 1,..., G t } be a family of n-vertex graphs defined on the same vertex-set V, and let k be a positive
More informationLarge cliques in sparse random intersection graphs
Large cliques in sparse random intersection graphs Valentas Kurauskas and Mindaugas Bloznelis Vilnius University 2013-09-29 Abstract Given positive integers n and m, and a probability measure P on {0,
More informationRainbow Connection of Random Regular Graphs
Rainbow Connection of Random Regular Graphs Andrzej Dudek Alan Frieze Charalampos E. Tsourakakis November 11, 2013 Abstract An edge colored graph G is rainbow edge connected if any two vertices are connected
More informationAssignment 2 : Probabilistic Methods
Assignment 2 : Probabilistic Methods jverstra@math Question 1. Let d N, c R +, and let G n be an n-vertex d-regular graph. Suppose that vertices of G n are selected independently with probability p, where
More informationn Boolean variables: x 1, x 2,...,x n 2 {true,false} conjunctive normal form:
Advanced Algorithms k-sat n Boolean variables: x 1, x 2,...,x n 2 {true,false} conjunctive normal form: k-cnf = C 1 ^C 2 ^ ^C m Is φ satisfiable? m clauses: C 1,C 2,...,C m each clause C i = `i1 _ `i2
More informationThe cover time of sparse random graphs.
The cover time of sparse random graphs Colin Cooper Alan Frieze May 29, 2005 Abstract We study the cover time of a random walk on graphs G G n,p when p = c n, c > 1 We prove that whp the cover time is
More information25 Minimum bandwidth: Approximation via volume respecting embeddings
25 Minimum bandwidth: Approximation via volume respecting embeddings We continue the study of Volume respecting embeddings. In the last lecture, we motivated the use of volume respecting embeddings by
More informationLecture 15. Theory of random processes Part III: Poisson random processes. Harrison H. Barrett University of Arizona
Lecture 15 Theory of random processes Part III: Poisson random processes Harrison H. Barrett University of Arizona 1 OUTLINE Poisson and independence Poisson and rarity; binomial selection Poisson point
More informationCS 6820 Fall 2014 Lectures, October 3-20, 2014
Analysis of Algorithms Linear Programming Notes CS 6820 Fall 2014 Lectures, October 3-20, 2014 1 Linear programming The linear programming (LP) problem is the following optimization problem. We are given
More informationLecture 2: Rumor Spreading (2)
Alea Meeting, Munich, February 2016 Lecture 2: Rumor Spreading (2) Benjamin Doerr, LIX, École Polytechnique, Paris-Saclay Outline: Reminder last lecture and an answer to Kosta s question Definition: Rumor
More informationSolution Week 68 (12/29/03) Tower of circles
Solution Week 68 (/9/03) Tower of circles Let the bottom circle have radius, and let the second circle have radius r. From the following figure, we have sin β = r, where β α/. () + r α r r -r β = α/ In
More informationLecture 6. Today we shall use graph entropy to improve the obvious lower bound on good hash functions.
CSE533: Information Theory in Computer Science September 8, 010 Lecturer: Anup Rao Lecture 6 Scribe: Lukas Svec 1 A lower bound for perfect hash functions Today we shall use graph entropy to improve the
More informationSharp threshold functions for random intersection graphs via a coupling method.
Sharp threshold functions for random intersection graphs via a coupling method. Katarzyna Rybarczyk Faculty of Mathematics and Computer Science, Adam Mickiewicz University, 60 769 Poznań, Poland kryba@amu.edu.pl
More informationGenerating all subsets of a finite set with disjoint unions
Generating all subsets of a finite set with disjoint unions David Ellis, Benny Sudakov May 011 Abstract If X is an n-element set, we call a family G PX a k-generator for X if every x X can be expressed
More informationProbabilistic Proofs of Existence of Rare Events. Noga Alon
Probabilistic Proofs of Existence of Rare Events Noga Alon Department of Mathematics Sackler Faculty of Exact Sciences Tel Aviv University Ramat-Aviv, Tel Aviv 69978 ISRAEL 1. The Local Lemma In a typical
More informationTwo-coloring random hypergraphs
Two-coloring random hypergraphs Dimitris Achlioptas Jeong Han Kim Michael Krivelevich Prasad Tetali December 17, 1999 Technical Report MSR-TR-99-99 Microsoft Research Microsoft Corporation One Microsoft
More information4F5: Advanced Communications and Coding Handout 2: The Typical Set, Compression, Mutual Information
4F5: Advanced Communications and Coding Handout 2: The Typical Set, Compression, Mutual Information Ramji Venkataramanan Signal Processing and Communications Lab Department of Engineering ramji.v@eng.cam.ac.uk
More informationEdge-disjoint induced subgraphs with given minimum degree
Edge-disjoint induced subgraphs with given minimum degree Raphael Yuster Department of Mathematics University of Haifa Haifa 31905, Israel raphy@math.haifa.ac.il Submitted: Nov 9, 01; Accepted: Feb 5,
More informationCPSC 536N: Randomized Algorithms Term 2. Lecture 9
CPSC 536N: Randomized Algorithms 2011-12 Term 2 Prof. Nick Harvey Lecture 9 University of British Columbia 1 Polynomial Identity Testing In the first lecture we discussed the problem of testing equality
More informationHomomorphism Testing
Homomorphism Shpilka & Wigderson, 2006 Daniel Shahaf Tel-Aviv University January 2009 Table of Contents 1 2 3 1 / 26 Algebra Definitions 1 Algebra Definitions 2 / 26 Groups Algebra Definitions Definition
More informationarxiv: v1 [math.st] 1 Nov 2017
ASSESSING THE RELIABILITY POLYNOMIAL BASED ON PERCOLATION THEORY arxiv:1711.00303v1 [math.st] 1 Nov 2017 SAJADI, FARKHONDEH A. Department of Statistics, University of Isfahan, Isfahan 81744,Iran; f.sajadi@sci.ui.ac.ir
More informationSPIN SYSTEMS: HARDNESS OF APPROXIMATE COUNTING VIA PHASE TRANSITIONS
SPIN SYSTEMS: HARDNESS OF APPROXIMATE COUNTING VIA PHASE TRANSITIONS Andreas Galanis Joint work with: Jin-Yi Cai Leslie Ann Goldberg Heng Guo Mark Jerrum Daniel Štefankovič Eric Vigoda The Power of Randomness
More informationSolving Random Satisfiable 3CNF Formulas in Expected Polynomial Time
Solving Random Satisfiable 3CNF Formulas in Expected Polynomial Time Michael Krivelevich and Dan Vilenchik Tel-Aviv University Solving Random Satisfiable 3CNF Formulas in Expected Polynomial Time p. 1/2
More informationCSE 312 Final Review: Section AA
CSE 312 TAs December 8, 2011 General Information General Information Comprehensive Midterm General Information Comprehensive Midterm Heavily weighted toward material after the midterm Pre-Midterm Material
More informationClique is hard on average for regular resolution
Clique is hard on average for regular resolution Ilario Bonacina, UPC Barcelona Tech July 27, 2018 Oxford Complexity Day Talk based on a joint work with: A. Atserias S. de Rezende J. Nordstro m M. Lauria
More informationRandomized Algorithms III Min Cut
Chapter 11 Randomized Algorithms III Min Cut CS 57: Algorithms, Fall 01 October 1, 01 11.1 Min Cut 11.1.1 Problem Definition 11. Min cut 11..0.1 Min cut G = V, E): undirected graph, n vertices, m edges.
More informationSHORT PATHS IN 3-UNIFORM QUASI-RANDOM HYPERGRAPHS. Joanna Polcyn. Department of Discrete Mathematics Adam Mickiewicz University
Discussiones Mathematicae Graph Theory 24 (2004 ) 469 484 SHORT PATHS IN 3-UNIFORM QUASI-RANDOM HYPERGRAPHS Joanna Polcyn Department of Discrete Mathematics Adam Mickiewicz University Poznań e-mail: joaska@amu.edu.pl
More informationTHE STRANGE LOGIC OF RANDOM GRAPHS. Joel Spencer. Courant Institute
WoLLIC 2005 THE STRANGE LOGIC OF RANDOM GRAPHS Joel Spencer Courant Institute 1 What is a Graph? Vertex Set V Edge Set E of {v, w} V Equivalently: Areflexive Symmetric Relation Write: v w Read: v, w are
More informationExample 1. The sample space of an experiment where we flip a pair of coins is denoted by:
Chapter 8 Probability 8. Preliminaries Definition (Sample Space). A Sample Space, Ω, is the set of all possible outcomes of an experiment. Such a sample space is considered discrete if Ω has finite cardinality.
More informationRandomized Load Balancing:The Power of 2 Choices
Randomized Load Balancing: The Power of 2 Choices June 3, 2010 Balls and Bins Problem We have m balls that are thrown into n bins, the location of each ball chosen independently and uniformly at random
More informationUmans Complexity Theory Lectures
Umans Complexity Theory Lectures Lecture 8: Introduction to Randomized Complexity: - Randomized complexity classes, - Error reduction, - in P/poly - Reingold s Undirected Graph Reachability in RL Randomized
More information11.1 Set Cover ILP formulation of set cover Deterministic rounding
CS787: Advanced Algorithms Lecture 11: Randomized Rounding, Concentration Bounds In this lecture we will see some more examples of approximation algorithms based on LP relaxations. This time we will use
More informationPart I: Discrete Math.
Part I: Discrete Math. 1. Propositions. 10 points. 3/3/4 (a) The following statement expresses the fact that there is a smallest number in the natural numbers, ( y N) ( x N) (y x). Write a statement that
More informationIndependent sets and repeated degrees
Independent sets repeated degrees B. Bollobás A.D. Scott Department of Pure Mathematics Mathematical Statistics, University of Cambridge, 16 Mill Lane, Cambridge, CB2 1SB, Engl. Department of Mathematics,
More informationk-regular subgraphs near the k-core threshold of a random graph
-regular subgraphs near the -core threshold of a random graph Dieter Mitsche Michael Molloy Pawe l Pra lat April 5, 208 Abstract We prove that G n,p=c/n w.h.p. has a -regular subgraph if c is at least
More information1. Introduction Given k 2, a k-uniform hypergraph (in short, k-graph) consists of a vertex set V and an edge set E ( V
MINIMUM VERTEX DEGREE THRESHOLD FOR C 4-TILING JIE HAN AND YI ZHAO Abstract. We prove that the vertex degree threshold for tiling C4 (the - uniform hypergraph with four vertices and two triples in a -uniform
More informationCryptography and Security Midterm Exam
Cryptography and Security Midterm Exam Serge Vaudenay 23.11.2017 duration: 1h45 no documents allowed, except one 2-sided sheet of handwritten notes a pocket calculator is allowed communication devices
More informationP is the class of problems for which there are algorithms that solve the problem in time O(n k ) for some constant k.
Complexity Theory Problems are divided into complexity classes. Informally: So far in this course, almost all algorithms had polynomial running time, i.e., on inputs of size n, worst-case running time
More informationDistinct edge weights on graphs
of Distinct edge weights on University of California-San Diego mtait@math.ucsd.edu Joint work with Jacques Verstraëte November 4, 2014 (UCSD) of November 4, 2014 1 / 46 Overview of 1 2 3 Product-injective
More informationU.C. Berkeley Better-than-Worst-Case Analysis Handout 3 Luca Trevisan May 24, 2018
U.C. Berkeley Better-than-Worst-Case Analysis Handout 3 Luca Trevisan May 24, 2018 Lecture 3 In which we show how to find a planted clique in a random graph. 1 Finding a Planted Clique We will analyze
More information