Coupling of Scale-Free and Classical Random Graphs

Size: px
Start display at page:

Download "Coupling of Scale-Free and Classical Random Graphs"

Transcription

1 Coupling of Scale-Free and Classical Random Graphs April 18, 2007

2 Introduction Consider a graph where we delete some nodes and look at the size of the largest component remaining. Just how robust are scale free graphs to random failures

3 Introduction Consider a graph where we delete some nodes and look at the size of the largest component remaining. Just how robust are scale free graphs to random failures to deliberate attacks

4 Introduction Consider a graph where we delete some nodes and look at the size of the largest component remaining. Just how robust are scale free graphs to random failures to deliberate attacks should the adversary have infinite time?

5 Introduction If we take the adversary out of the picture we can phrase the question as.

6 Introduction If we take the adversary out of the picture we can phrase the question as. How many vertices do we need to remove so that the graph breaks up into small pieces?

7 The Model Consider the Preferential Attachment Model. Assume m is fixed, G[k] G (k) m. We create G[k + 1] by adding a new vertex k + 1 with m edges (k + 1, t 1 ),..., (k + 1, t m ) where d G[k],i(j) Pr[t i = j] = 2mk + 2i 1

8 Main Result Theorem 1 There exist c > 0,m 0 s.t. for m m 0, whp G (n) m the following holds (a) Every induced subgraph of size 10n log(m) m contains a component of size at least 2n log m m (b) The graph contains an independent set of size cn log(m) m

9 Proof Technique Proof by coupling We create two graphs (G 1, G 2 ) s.t. G 1 G (n) m, G 2 G(n, p). But G 1 and G 2 are not independent but heavily correlated.

10 What is coupling? Let X D X, Y D Y. A coupling is a joint distribution D X,Y s.t. the marginals are correct, i.e. D X, = D X and D,Y = D Y.

11 What is coupling? Let X D X, Y D Y. A coupling is a joint distribution D X,Y s.t. the marginals are correct, i.e. D X, = D X and D,Y = D Y. Suppose X, Y are uniform [0, 1] and we let Y = 1 X then both marginals are still uniform but the joint distribution is far from independent.

12 Chernoff Bounds Let X Bin(n, p) then ( e δ Pr[X > (δ + 1)np] < (1 + δ) (1+δ) ( e δ Pr[X < (1 δ)np] < (1 δ) (1 δ) ) np ) np

13 The Coupling Theorem 2 Fix η < 1/2, there exist constants A, c > 0 s.t. for fixed m we can construct G 1 G (n) m, G 2 G(n, ηm/n) s.t. whp e(g 2 \ G 1 ) Ae cm n

14 The Coupling Sidenote We can create G(n, p) one node at a time G[1] contains a single node

15 The Coupling Sidenote We can create G(n, p) one node at a time G[1] contains a single node Given G[k]

16 The Coupling Sidenote We can create G(n, p) one node at a time G[1] contains a single node Given G[k] generate Y Bin(k, p)

17 The Coupling Sidenote We can create G(n, p) one node at a time G[1] contains a single node Given G[k] generate Y Bin(k, p) let S be a random subset of [k] of size Y

18 The Coupling Sidenote We can create G(n, p) one node at a time G[1] contains a single node Given G[k] generate Y Bin(k, p) let S be a random subset of [k] of size Y create edges between k and S

19 The Coupling Proof We grow G 1, G 2 one node at a time. Start with G 1 [k 0 ] G (n) m, G 2 [k 0 ] G(k 0, ηm/n), where k 0 grows slowly with n. Let t 1,..., t m be the vertices picked when growing G 1 [k]. For j k + 1 we have Pr(t i = j) = d G[k],i(j) 2mk + 2i 1 m 2km + 2m = 1 2k + 2

20 The Coupling Proof 1 2k k 1 k k + 1 Construct s 1,..., s m [k], s.t. s i s are independent Pr(s i = j) = 1 2k+2 for j and s i = j implies t i = j.

21 The Coupling Proof Let X = {i s i }, then X Bin(m, Let Y Bin(k, ηm/n), then E[X] = mk mk (1 + ɛ)η 2k + 2 n k 2k+2 ). = (1 + ɛ)e[y ] So Pr[X < Y ] Ae c m for some constants A, c > 0.

22 The Coupling Proof All the s i s are distinct w.p 1 O( m2 k ), given this and X the set S 1 = {s i s i } is a random subset of [k] of size X.

23 The Coupling Proof All the s i s are distinct w.p 1 O( m2 k ), given this and X the set S 1 = {s i s i } is a random subset of [k] of size X. If Y X we pick a random subset S 2 of size Y from S 1.

24 The Coupling Proof All the s i s are distinct w.p 1 O( m2 k ), given this and X the set S 1 = {s i s i } is a random subset of [k] of size X. If Y X we pick a random subset S 2 of size Y from S 1. Otherwise we pick S 2 a random subset of size Y from [k], this happens w.p. Ae c m + o(1).

25 The Coupling Proof Set D k+1 = #of edges added to G 2 and not G 1. Pr[D k+1 > 0] = Ae c m + o(1), and D k+1 Y so E[D k+1 ] Ame c m

26 The Coupling Proof The number of edges in G 2 \ G 2 is at most ( ) k0 2 + n k=k 0 +1 Assuming k 0 = n 1/4 we see that the sum has expected value at most Ane c m and is concentrated around its mean. D k

27 The Coupling Proof The number of edges in G 2 \ G 2 is at most ( ) k0 2 + n k=k 0 +1 Assuming k 0 = n 1/4 we see that the sum has expected value at most Ane c m and is concentrated around its mean. QED D k

28 Proof of Theorem 1(a) Let G 1, G 2 be as described in Theorem 2. Suppose G 1 has an induced subgraph on a set V, with V = 10n log(m) m where every component has size less than 2n log(m) m. Then we can partition V into two set V 1, V 2 s.t. V 1, V 2 4n log(m) m and G 1 has no V 1 -V 2 edges.

29 Proof of Theorem 1(a) Let x = Ae c m n, if the coupling works then G 2 has at most x, V 1 -V 2 edges. The number of V 1 -V 2 edges in G 2 is a binomial with mean µ = V 1 V 2 ηm/n 24η(log(m)) 2 n/m Pick m large enough s.t. x < µ/100

30 Proof of Theorem 1(a) By Chernoff bounds the probability that we have fewer than x edges crossing V 1, V 2 is at most e 11µ/12. Now ( ) n Pr[G 2 has at most x V 1 V 2 edges] 2 V e 22η(log(m))2 n/m V

31 Proof of Theorem 1(a) By Chernoff bounds the probability that we have fewer than x edges crossing V 1, V 2 is at most e 11µ/12. Now ( ) n Pr[G 2 has at most x V 1 V 2 edges] 2 V e 22η(log(m))2 n/m V ( ) en V 2 V e 22η(log(m))2 n/m V

32 Proof of Theorem 1(a) By Chernoff bounds the probability that we have fewer than x edges crossing V 1, V 2 is at most e 11µ/12. Now ( ) n Pr[G 2 has at most x V 1 V 2 edges] 2 V e 22η(log(m))2 n/m V ( ) en V 2 V e 22η(log(m))2 n/m V ( ) 2em V e 22η(log(m))2 n/m 10 log(m)

33 Proof of Theorem 1(a) By Chernoff bounds the probability that we have fewer than x edges crossing V 1, V 2 is at most e 11µ/12. Now ( ) n Pr[G 2 has at most x V 1 V 2 edges] 2 V e 22η(log(m))2 n/m V ( ) en V 2 V e 22η(log(m))2 n/m V ( ) 2em V e 22η(log(m))2 n/m 10 log(m) e (10 22η)(log(m))2 n/m

34 Proof of Theorem 1(a) By Chernoff bounds the probability that we have fewer than x edges crossing V 1, V 2 is at most e 11µ/12. Now ( ) n Pr[G 2 has at most x V 1 V 2 edges] 2 V e 22η(log(m))2 n/m V ( ) en V 2 V e 22η(log(m))2 n/m V ( ) 2em V e 22η(log(m))2 n/m 10 log(m) e (10 22η)(log(m))2 n/m QED

35 Overview of the proof The idea of the proof was this

36 Overview of the proof The idea of the proof was this We create G 1, G 2 simultaneously s.t.

37 Overview of the proof The idea of the proof was this We create G 1, G 2 simultaneously s.t. a bad event in G 1 implies w.h.p another bad event in G 2

38 Overview of the proof The idea of the proof was this We create G 1, G 2 simultaneously s.t. a bad event in G 1 implies w.h.p another bad event in G 2 which is easy to show is rare in G 2.

39 Overview of the proof The idea of the proof was this We create G 1, G 2 simultaneously s.t. a bad event in G 1 implies w.h.p another bad event in G 2 which is easy to show is rare in G 2. But we are working in the joint probability space so this implies that the bad event is rare in G 1.

40 Another Coupling Theorem 3 Let ɛ > 0 be given, there is a constant C s.t. for fixed m we can couple G 1, G 2 s.t. G 1 G (n) m, G 2 G(n, Cm/n) s.t. whp G 2 contains G 1 \ V for a set of vertices V s.t. {i V i ɛn} ɛn/m.

41 Another Coupling Proof of Theorem 3 We start with G 1 [k 0 ] G (k 0) m and G 2 [k 0 ] G(k 0, Cm/n) independent, and here k 0 = ɛn. A vertex is bad at time k if it has degree at leas Am in G 1 [k].

42 Another Coupling Proof of Theorem 3 We need the following result from Bollobás et al.: Vertex i has degree d + m in G (n) m with probability ( ) d + m 1 o(n 1 ) + (1 + o(1)) ( i m 1 n )m/2 (1 i n )d i.e. for i ɛn it is exponentially small in d for large d If we choose A large enough the expected number of bad vertices is at most e Bm n so whp there are at most ɛn/m bad vertices.

43 Another Coupling Proof of Theorem 3 Let t 1,..., t m be defined as in the previous proof. Let V k be the set of vertices j, s.t. k 0 j k that are good. Now for j V k and Pr[t i = j] (Am + m)/(2mk) A/k Aɛ 1 /n Pr[t i / V k ] k 0 m/(2mn) = ɛ/2 so Pr[t i = j r t i / {j 1,..., j r 1 }] 2Aɛ 2 /n = p

44 Another Coupling Proof of Theorem 3 Let T i be a random subset of V k s.t. every vertex is picked independently with probability p. Then we can couple T i and t i s.t. t i T i if t i is good. p j 1 j 2 j 3... j r Pr[t i = j r t i / {j 1,..., j r 1 }]

45 Another Coupling Proof of Theorem 3 Let S 1 be the set of good vertices adjacent to k + 1 in G 1. Let S 2 = T 1 T 2... T m. Then S 2 is a random subset of V k where every vertex is picked w.p. 1 (1 p) m mp Cm/n for some large C. This completes the proof since we ve constructed S 1 s.t. S 1 S 2.

46 Proof of Theorem 1(b) We re almost there For a constant a > 1 we know that G n, a n has an independent set of size log(a) a n when a. Now couple G 1 and G 2 as in Theorem 3, with ɛ = 1 2 and assume C > 2. Look at the subgraph of G 2 of vertices that come in after n 2. It has distribution G n 2, Cm n G n 2, Cm/2 n/2 so it has an independent set of size n log(m) Cm. Removing the bad vertices from this set we see that this set is also independent in G 1. So G 1 has an independent set of size n log(m) Cm n 2m. By picking m large enough we get the result.

47 The End Thank You

48 The End Thank You Questions?

Coupling Scale-Free and Classical Random Graphs

Coupling Scale-Free and Classical Random Graphs Internet Mathematics Vol. 1, No. 2: 215-225 Coupling Scale-Free and Classical Random Graphs Béla Bollobás and Oliver Riordan Abstract. Recently many new scale-free random graph models have been introduced,

More information

Equivalence of the random intersection graph and G(n, p)

Equivalence of the random intersection graph and G(n, p) Equivalence of the random intersection graph and Gn, p arxiv:0910.5311v1 [math.co] 28 Oct 2009 Katarzyna Rybarczyk Faculty of Mathematics and Computer Science, Adam Mickiewicz University, 60 769 Poznań,

More information

Lecture 5: Probabilistic tools and Applications II

Lecture 5: Probabilistic tools and Applications II T-79.7003: Graphs and Networks Fall 2013 Lecture 5: Probabilistic tools and Applications II Lecturer: Charalampos E. Tsourakakis Oct. 11, 2013 5.1 Overview In the first part of today s lecture we will

More information

The phase transition in the Erdös-Rényi random graph model

The phase transition in the Erdös-Rényi random graph model The phase transition in the Erdös-Rényi random graph model Tom van den Bosch July 17, 2014 Bachelor thesis Supervisor: Guus Regts Korteweg-de Vries Instituut voor Wiskunde Faculteit der Natuurwetenschappen,

More information

Lecture 7: February 6

Lecture 7: February 6 CS271 Randomness & Computation Spring 2018 Instructor: Alistair Sinclair Lecture 7: February 6 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They

More information

Lecture 5: The Principle of Deferred Decisions. Chernoff Bounds

Lecture 5: The Principle of Deferred Decisions. Chernoff Bounds Randomized Algorithms Lecture 5: The Principle of Deferred Decisions. Chernoff Bounds Sotiris Nikoletseas Associate Professor CEID - ETY Course 2013-2014 Sotiris Nikoletseas, Associate Professor Randomized

More information

An Efficient reconciliation algorithm for social networks

An Efficient reconciliation algorithm for social networks An Efficient reconciliation algorithm for social networks Silvio Lattanzi (Google Research NY) Joint work with: Nitish Korula (Google Research NY) ICERM Stochastic Graph Models Outline Graph reconciliation

More information

. p.1. Mathematical Models of the WWW and related networks. Alan Frieze

. p.1. Mathematical Models of the WWW and related networks. Alan Frieze . p.1 Mathematical Models of the WWW and related networks Alan Frieze The WWW is an example of a large real-world network.. p.2 The WWW is an example of a large real-world network. It grows unpredictably

More information

Many cliques in H-free subgraphs of random graphs

Many cliques in H-free subgraphs of random graphs Many cliques in H-free subgraphs of random graphs Noga Alon Alexandr Kostochka Clara Shikhelman November 19, 017 Abstract For two fixed graphs T and H let ex(g(n, p), T, H) be the random variable counting

More information

Lecture 5: January 30

Lecture 5: January 30 CS71 Randomness & Computation Spring 018 Instructor: Alistair Sinclair Lecture 5: January 30 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They

More information

Induced subgraphs with many repeated degrees

Induced subgraphs with many repeated degrees Induced subgraphs with many repeated degrees Yair Caro Raphael Yuster arxiv:1811.071v1 [math.co] 17 Nov 018 Abstract Erdős, Fajtlowicz and Staton asked for the least integer f(k such that every graph with

More information

The diameter and mixing time of critical random graphs.

The diameter and mixing time of critical random graphs. The diameter and mixing time of critical random graphs. March 14, 2007 Joint work with: Asaf Nachmias. Background The Erdos and Rényi random graph G(n, p) is obtained from the complete graph on n vertices

More information

A note on network reliability

A note on network reliability A note on network reliability Noga Alon Institute for Advanced Study, Princeton, NJ 08540 and Department of Mathematics Tel Aviv University, Tel Aviv, Israel Let G = (V, E) be a loopless undirected multigraph,

More information

Connectivity of random cubic sum graphs

Connectivity of random cubic sum graphs Connectivity of random cubic sum graphs Andrew Beveridge Department of Mathematics, Statistics and Computer Science Macalester College Saint Paul, MN 55105 June 1, 010 Abstract Consider the set SGQ k of

More information

Tianjin. June Phase Transition. Joel Spencer

Tianjin. June Phase Transition. Joel Spencer Tianjin June 2007 The Erdős-Rényi Phase Transition Joel Spencer 1 TP! trivial being! I have received your letter, you should have written already a week ago. The spirit of Cantor was with me for some length

More information

variance of independent variables: sum of variances So chebyshev predicts won t stray beyond stdev.

variance of independent variables: sum of variances So chebyshev predicts won t stray beyond stdev. Announcements No class monday. Metric embedding seminar. Review expectation notion of high probability. Markov. Today: Book 4.1, 3.3, 4.2 Chebyshev. Remind variance, standard deviation. σ 2 = E[(X µ X

More information

JIGSAW PERCOLATION ON ERDÖS-RÉNYI RANDOM GRAPHS

JIGSAW PERCOLATION ON ERDÖS-RÉNYI RANDOM GRAPHS JIGSAW PERCOLATION ON ERDÖS-RÉNYI RANDOM GRAPHS ERIK SLIVKEN Abstract. We extend the jigsaw percolation model to analyze graphs where both underlying people and puzzle graphs are Erdös-Rényi random graphs.

More information

Induced subgraphs of Ramsey graphs with many distinct degrees

Induced subgraphs of Ramsey graphs with many distinct degrees Induced subgraphs of Ramsey graphs with many distinct degrees Boris Bukh Benny Sudakov Abstract An induced subgraph is called homogeneous if it is either a clique or an independent set. Let hom(g) denote

More information

9.1 Branching Process

9.1 Branching Process 9.1 Branching Process Imagine the following stochastic process called branching process. A unisexual universe Initially there is one live organism and no dead ones. At each time unit, we select one of

More information

Local MAX-CUT in Smoothed Polynomial Time

Local MAX-CUT in Smoothed Polynomial Time Local MAX-CUT in Smoothed Polynomial Time Omer Angel 1 Sebastien Bubeck 2 Yuval Peres 2 Fan Wei 3 1 University of British Columbia 2 Microsoft Research Redmond 3 Stanford University November 9, 2016 Introduction

More information

The large deviation principle for the Erdős-Rényi random graph

The large deviation principle for the Erdős-Rényi random graph The large deviation principle for the Erdős-Rényi random graph (Courant Institute, NYU) joint work with S. R. S. Varadhan Main objective: how to count graphs with a given property Only consider finite

More information

< k 2n. 2 1 (n 2). + (1 p) s) N (n < 1

< k 2n. 2 1 (n 2). + (1 p) s) N (n < 1 List of Problems jacques@ucsd.edu Those question with a star next to them are considered slightly more challenging. Problems 9, 11, and 19 from the book The probabilistic method, by Alon and Spencer. Question

More information

Sets that are connected in two random graphs

Sets that are connected in two random graphs Sets that are connected in two random graphs Michael Molloy August 17, 2012 Abstract We consider two random graphs G 1, G 2, both on the same vertex set. We ask whether there is a non-trivial set of vertices

More information

Lecture 4. 1 Estimating the number of connected components and minimum spanning tree

Lecture 4. 1 Estimating the number of connected components and minimum spanning tree CS 59000 CTT Current Topics in Theoretical CS Aug 30, 2012 Lecturer: Elena Grigorescu Lecture 4 Scribe: Pinar Yanardag Delul 1 Estimating the number of connected components and minimum spanning tree In

More information

Topic 10: Hypothesis Testing

Topic 10: Hypothesis Testing Topic 10: Hypothesis Testing Course 003, 2016 Page 0 The Problem of Hypothesis Testing A statistical hypothesis is an assertion or conjecture about the probability distribution of one or more random variables.

More information

Mixing time and diameter in random graphs

Mixing time and diameter in random graphs October 5, 2009 Based on joint works with: Asaf Nachmias, and Jian Ding, Eyal Lubetzky and Jeong-Han Kim. Background The mixing time of the lazy random walk on a graph G is T mix (G) = T mix (G, 1/4) =

More information

CSE 321 Solutions to Practice Problems

CSE 321 Solutions to Practice Problems CSE 321 Solutions to Practice Problems Instructions: Feel free NOT to multiply out binomial coefficients, factorials, etc, and feel free to leave answers in the form of a sum. No calculators, books or

More information

CS5314 Randomized Algorithms. Lecture 18: Probabilistic Method (De-randomization, Sample-and-Modify)

CS5314 Randomized Algorithms. Lecture 18: Probabilistic Method (De-randomization, Sample-and-Modify) CS5314 Randomized Algorithms Lecture 18: Probabilistic Method (De-randomization, Sample-and-Modify) 1 Introduce two topics: De-randomize by conditional expectation provides a deterministic way to construct

More information

Distributed Systems Gossip Algorithms

Distributed Systems Gossip Algorithms Distributed Systems Gossip Algorithms He Sun School of Informatics University of Edinburgh What is Gossip? Gossip algorithms In a gossip algorithm, each node in the network periodically exchanges information

More information

Learning Theory. Piyush Rai. CS5350/6350: Machine Learning. September 27, (CS5350/6350) Learning Theory September 27, / 14

Learning Theory. Piyush Rai. CS5350/6350: Machine Learning. September 27, (CS5350/6350) Learning Theory September 27, / 14 Learning Theory Piyush Rai CS5350/6350: Machine Learning September 27, 2011 (CS5350/6350) Learning Theory September 27, 2011 1 / 14 Why Learning Theory? We want to have theoretical guarantees about our

More information

Random Graphs III. Y. Kohayakawa (São Paulo) Chorin, 4 August 2006

Random Graphs III. Y. Kohayakawa (São Paulo) Chorin, 4 August 2006 Y. Kohayakawa (São Paulo) Chorin, 4 August 2006 Outline 1 Outline of Lecture III 1. Subgraph containment with adversary: Existence of monoχ subgraphs in coloured random graphs; properties of the form G(n,

More information

Outline. Martingales. Piotr Wojciechowski 1. 1 Lane Department of Computer Science and Electrical Engineering West Virginia University.

Outline. Martingales. Piotr Wojciechowski 1. 1 Lane Department of Computer Science and Electrical Engineering West Virginia University. Outline Piotr 1 1 Lane Department of Computer Science and Electrical Engineering West Virginia University 8 April, 01 Outline Outline 1 Tail Inequalities Outline Outline 1 Tail Inequalities General Outline

More information

Topic 10: Hypothesis Testing

Topic 10: Hypothesis Testing Topic 10: Hypothesis Testing Course 003, 2017 Page 0 The Problem of Hypothesis Testing A statistical hypothesis is an assertion or conjecture about the probability distribution of one or more random variables.

More information

arxiv: v1 [math.co] 28 Mar 2015

arxiv: v1 [math.co] 28 Mar 2015 Strong-majority bootstrap percolation on regular graphs with low dissemination threshold Dieter Mitsche Xavier Pérez-Giménez Pawe l Pra lat arxiv:1503.08310v1 [math.co] 28 Mar 2015 Abstract Consider the

More information

FIRST ORDER SENTENCES ON G(n, p), ZERO-ONE LAWS, ALMOST SURE AND COMPLETE THEORIES ON SPARSE RANDOM GRAPHS

FIRST ORDER SENTENCES ON G(n, p), ZERO-ONE LAWS, ALMOST SURE AND COMPLETE THEORIES ON SPARSE RANDOM GRAPHS FIRST ORDER SENTENCES ON G(n, p), ZERO-ONE LAWS, ALMOST SURE AND COMPLETE THEORIES ON SPARSE RANDOM GRAPHS MOUMANTI PODDER 1. First order theory on G(n, p) We start with a very simple property of G(n,

More information

Balanced Allocation Through Random Walk

Balanced Allocation Through Random Walk Balanced Allocation Through Random Walk Alan Frieze Samantha Petti November 25, 2017 Abstract We consider the allocation problem in which m (1 ε)dn items are to be allocated to n bins with capacity d.

More information

Susceptible-Infective-Removed Epidemics and Erdős-Rényi random

Susceptible-Infective-Removed Epidemics and Erdős-Rényi random Susceptible-Infective-Removed Epidemics and Erdős-Rényi random graphs MSR-Inria Joint Centre October 13, 2015 SIR epidemics: the Reed-Frost model Individuals i [n] when infected, attempt to infect all

More information

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 2 Luca Trevisan August 29, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 2 Luca Trevisan August 29, 2017 U.C. Berkeley CS94: Beyond Worst-Case Analysis Handout Luca Trevisan August 9, 07 Scribe: Mahshid Montazer Lecture In this lecture, we study the Max Cut problem in random graphs. We compute the probable

More information

Tom Salisbury

Tom Salisbury MATH 2030 3.00MW Elementary Probability Course Notes Part V: Independence of Random Variables, Law of Large Numbers, Central Limit Theorem, Poisson distribution Geometric & Exponential distributions Tom

More information

MATH 22 HAMILTONIAN GRAPHS. Lecture V: 11/18/2003

MATH 22 HAMILTONIAN GRAPHS. Lecture V: 11/18/2003 MATH 22 Lecture V: 11/18/2003 HAMILTONIAN GRAPHS All communities [graphs] divide themselves into the few and the many [i.e., are bipartite]. Alexander Hamilton, Debates of the Federal Convention Before

More information

CS224W: Analysis of Networks Jure Leskovec, Stanford University

CS224W: Analysis of Networks Jure Leskovec, Stanford University CS224W: Analysis of Networks Jure Leskovec, Stanford University http://cs224w.stanford.edu 10/30/17 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, http://cs224w.stanford.edu 2

More information

CS5314 Randomized Algorithms. Lecture 15: Balls, Bins, Random Graphs (Hashing)

CS5314 Randomized Algorithms. Lecture 15: Balls, Bins, Random Graphs (Hashing) CS5314 Randomized Algorithms Lecture 15: Balls, Bins, Random Graphs (Hashing) 1 Objectives Study various hashing schemes Apply balls-and-bins model to analyze their performances 2 Chain Hashing Suppose

More information

THE SECOND LARGEST COMPONENT IN THE SUPERCRITICAL 2D HAMMING GRAPH

THE SECOND LARGEST COMPONENT IN THE SUPERCRITICAL 2D HAMMING GRAPH THE SECOND LARGEST COMPONENT IN THE SUPERCRITICAL 2D HAMMING GRAPH REMCO VAN DER HOFSTAD, MALWINA J. LUCZAK, AND JOEL SPENCER Abstract. The 2-dimensional Hamming graph H(2, n consists of the n 2 vertices

More information

ON SUBGRAPH SIZES IN RANDOM GRAPHS

ON SUBGRAPH SIZES IN RANDOM GRAPHS ON SUBGRAPH SIZES IN RANDOM GRAPHS Neil Calkin and Alan Frieze Department of Mathematics, Carnegie Mellon University, Pittsburgh, U.S.A. and Brendan D. McKay Department of Computer Science, Australian

More information

The Monte Carlo Method

The Monte Carlo Method The Monte Carlo Method Example: estimate the value of π. Choose X and Y independently and uniformly at random in [0, 1]. Let Pr(Z = 1) = π 4. 4E[Z] = π. { 1 if X Z = 2 + Y 2 1, 0 otherwise, Let Z 1,...,

More information

Rigidity of Graphs and Frameworks

Rigidity of Graphs and Frameworks Rigidity of Graphs and Frameworks Rigid Frameworks The Rigidity Matrix and the Rigidity Matroid Infinitesimally Rigid Frameworks Rigid Graphs Rigidity in R d, d = 1,2 Global Rigidity in R d, d = 1,2 1

More information

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 3 Luca Trevisan August 31, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 3 Luca Trevisan August 31, 2017 U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 3 Luca Trevisan August 3, 207 Scribed by Keyhan Vakil Lecture 3 In which we complete the study of Independent Set and Max Cut in G n,p random graphs.

More information

The typical structure of sparse K r+1 -free graphs

The typical structure of sparse K r+1 -free graphs The typical structure of sparse K r+1 -free graphs Lutz Warnke University of Cambridge (joint work with József Balogh, Robert Morris, and Wojciech Samotij) H-free graphs / Turán s theorem Definition Let

More information

CSE 421 NP-Completeness

CSE 421 NP-Completeness CSE 421 NP-Completeness Yin at Lee 1 Cook-Levin heorem heorem (Cook 71, Levin 73): 3-SA is NP-complete, i.e., for all problems A NP, A p 3-SA. (See CSE 431 for the proof) So, 3-SA is the hardest problem

More information

Graph-Constrained Group Testing

Graph-Constrained Group Testing Mahdi Cheraghchi et al. presented by Ying Xuan May 20, 2010 Table of contents 1 Motivation and Problem Definitions 2 3 Correctness Proof 4 Applications call for connected pools detection of congested links

More information

Poisson approximations

Poisson approximations Chapter 9 Poisson approximations 9.1 Overview The Binn, p) can be thought of as the distribution of a sum of independent indicator random variables X 1 + + X n, with {X i = 1} denoting a head on the ith

More information

Random Graphs. 7.1 Introduction

Random Graphs. 7.1 Introduction 7 Random Graphs 7.1 Introduction The theory of random graphs began in the late 1950s with the seminal paper by Erdös and Rényi [?]. In contrast to percolation theory, which emerged from efforts to model

More information

Dominating Set. Chapter 7

Dominating Set. Chapter 7 Chapter 7 Dominating Set In this chapter we present another randomized algorithm that demonstrates the power of randomization to break symmetries. We study the problem of finding a small dominating set

More information

ADFOCS 2006 Saarbrücken. Phase Transition. Joel Spencer

ADFOCS 2006 Saarbrücken. Phase Transition. Joel Spencer ADFOCS 2006 Saarbrücken The Erdős-Rényi Phase Transition Joel Spencer 1 TP! trivial being! I have received your letter, you should have written already a week ago. The spirit of Cantor was with me for

More information

Equitable coloring of random graphs

Equitable coloring of random graphs Michael Krivelevich 1, Balázs Patkós 2 1 Tel Aviv University, Tel Aviv, Israel 2 Central European University, Budapest, Hungary Phenomena in High Dimensions, Samos 2007 A set of vertices U V (G) is said

More information

Packing tight Hamilton cycles in 3-uniform hypergraphs

Packing tight Hamilton cycles in 3-uniform hypergraphs Packing tight Hamilton cycles in 3-uniform hypergraphs Alan Frieze Michael Krivelevich Po-Shen Loh Abstract Let H be a 3-uniform hypergraph with n vertices. A tight Hamilton cycle C H is a collection of

More information

ON THE NUMBER OF ALTERNATING PATHS IN BIPARTITE COMPLETE GRAPHS

ON THE NUMBER OF ALTERNATING PATHS IN BIPARTITE COMPLETE GRAPHS ON THE NUMBER OF ALTERNATING PATHS IN BIPARTITE COMPLETE GRAPHS PATRICK BENNETT, ANDRZEJ DUDEK, ELLIOT LAFORGE December 1, 016 Abstract. Let C [r] m be a code such that any two words of C have Hamming

More information

Applications of the Lopsided Lovász Local Lemma Regarding Hypergraphs

Applications of the Lopsided Lovász Local Lemma Regarding Hypergraphs Regarding Hypergraphs Ph.D. Dissertation Defense April 15, 2013 Overview The Local Lemmata 2-Coloring Hypergraphs with the Original Local Lemma Counting Derangements with the Lopsided Local Lemma Lopsided

More information

The expansion of random regular graphs

The expansion of random regular graphs The expansion of random regular graphs David Ellis Introduction Our aim is now to show that for any d 3, almost all d-regular graphs on {1, 2,..., n} have edge-expansion ratio at least c d d (if nd is

More information

Lecture 18: More NP-Complete Problems

Lecture 18: More NP-Complete Problems 6.045 Lecture 18: More NP-Complete Problems 1 The Clique Problem a d f c b e g Given a graph G and positive k, does G contain a complete subgraph on k nodes? CLIQUE = { (G,k) G is an undirected graph with

More information

Dominating a family of graphs with small connected subgraphs

Dominating a family of graphs with small connected subgraphs Dominating a family of graphs with small connected subgraphs Yair Caro Raphael Yuster Abstract Let F = {G 1,..., G t } be a family of n-vertex graphs defined on the same vertex-set V, and let k be a positive

More information

Large cliques in sparse random intersection graphs

Large cliques in sparse random intersection graphs Large cliques in sparse random intersection graphs Valentas Kurauskas and Mindaugas Bloznelis Vilnius University 2013-09-29 Abstract Given positive integers n and m, and a probability measure P on {0,

More information

Rainbow Connection of Random Regular Graphs

Rainbow Connection of Random Regular Graphs Rainbow Connection of Random Regular Graphs Andrzej Dudek Alan Frieze Charalampos E. Tsourakakis November 11, 2013 Abstract An edge colored graph G is rainbow edge connected if any two vertices are connected

More information

Assignment 2 : Probabilistic Methods

Assignment 2 : Probabilistic Methods Assignment 2 : Probabilistic Methods jverstra@math Question 1. Let d N, c R +, and let G n be an n-vertex d-regular graph. Suppose that vertices of G n are selected independently with probability p, where

More information

n Boolean variables: x 1, x 2,...,x n 2 {true,false} conjunctive normal form:

n Boolean variables: x 1, x 2,...,x n 2 {true,false} conjunctive normal form: Advanced Algorithms k-sat n Boolean variables: x 1, x 2,...,x n 2 {true,false} conjunctive normal form: k-cnf = C 1 ^C 2 ^ ^C m Is φ satisfiable? m clauses: C 1,C 2,...,C m each clause C i = `i1 _ `i2

More information

The cover time of sparse random graphs.

The cover time of sparse random graphs. The cover time of sparse random graphs Colin Cooper Alan Frieze May 29, 2005 Abstract We study the cover time of a random walk on graphs G G n,p when p = c n, c > 1 We prove that whp the cover time is

More information

25 Minimum bandwidth: Approximation via volume respecting embeddings

25 Minimum bandwidth: Approximation via volume respecting embeddings 25 Minimum bandwidth: Approximation via volume respecting embeddings We continue the study of Volume respecting embeddings. In the last lecture, we motivated the use of volume respecting embeddings by

More information

Lecture 15. Theory of random processes Part III: Poisson random processes. Harrison H. Barrett University of Arizona

Lecture 15. Theory of random processes Part III: Poisson random processes. Harrison H. Barrett University of Arizona Lecture 15 Theory of random processes Part III: Poisson random processes Harrison H. Barrett University of Arizona 1 OUTLINE Poisson and independence Poisson and rarity; binomial selection Poisson point

More information

CS 6820 Fall 2014 Lectures, October 3-20, 2014

CS 6820 Fall 2014 Lectures, October 3-20, 2014 Analysis of Algorithms Linear Programming Notes CS 6820 Fall 2014 Lectures, October 3-20, 2014 1 Linear programming The linear programming (LP) problem is the following optimization problem. We are given

More information

Lecture 2: Rumor Spreading (2)

Lecture 2: Rumor Spreading (2) Alea Meeting, Munich, February 2016 Lecture 2: Rumor Spreading (2) Benjamin Doerr, LIX, École Polytechnique, Paris-Saclay Outline: Reminder last lecture and an answer to Kosta s question Definition: Rumor

More information

Solution Week 68 (12/29/03) Tower of circles

Solution Week 68 (12/29/03) Tower of circles Solution Week 68 (/9/03) Tower of circles Let the bottom circle have radius, and let the second circle have radius r. From the following figure, we have sin β = r, where β α/. () + r α r r -r β = α/ In

More information

Lecture 6. Today we shall use graph entropy to improve the obvious lower bound on good hash functions.

Lecture 6. Today we shall use graph entropy to improve the obvious lower bound on good hash functions. CSE533: Information Theory in Computer Science September 8, 010 Lecturer: Anup Rao Lecture 6 Scribe: Lukas Svec 1 A lower bound for perfect hash functions Today we shall use graph entropy to improve the

More information

Sharp threshold functions for random intersection graphs via a coupling method.

Sharp threshold functions for random intersection graphs via a coupling method. Sharp threshold functions for random intersection graphs via a coupling method. Katarzyna Rybarczyk Faculty of Mathematics and Computer Science, Adam Mickiewicz University, 60 769 Poznań, Poland kryba@amu.edu.pl

More information

Generating all subsets of a finite set with disjoint unions

Generating all subsets of a finite set with disjoint unions Generating all subsets of a finite set with disjoint unions David Ellis, Benny Sudakov May 011 Abstract If X is an n-element set, we call a family G PX a k-generator for X if every x X can be expressed

More information

Probabilistic Proofs of Existence of Rare Events. Noga Alon

Probabilistic Proofs of Existence of Rare Events. Noga Alon Probabilistic Proofs of Existence of Rare Events Noga Alon Department of Mathematics Sackler Faculty of Exact Sciences Tel Aviv University Ramat-Aviv, Tel Aviv 69978 ISRAEL 1. The Local Lemma In a typical

More information

Two-coloring random hypergraphs

Two-coloring random hypergraphs Two-coloring random hypergraphs Dimitris Achlioptas Jeong Han Kim Michael Krivelevich Prasad Tetali December 17, 1999 Technical Report MSR-TR-99-99 Microsoft Research Microsoft Corporation One Microsoft

More information

4F5: Advanced Communications and Coding Handout 2: The Typical Set, Compression, Mutual Information

4F5: Advanced Communications and Coding Handout 2: The Typical Set, Compression, Mutual Information 4F5: Advanced Communications and Coding Handout 2: The Typical Set, Compression, Mutual Information Ramji Venkataramanan Signal Processing and Communications Lab Department of Engineering ramji.v@eng.cam.ac.uk

More information

Edge-disjoint induced subgraphs with given minimum degree

Edge-disjoint induced subgraphs with given minimum degree Edge-disjoint induced subgraphs with given minimum degree Raphael Yuster Department of Mathematics University of Haifa Haifa 31905, Israel raphy@math.haifa.ac.il Submitted: Nov 9, 01; Accepted: Feb 5,

More information

CPSC 536N: Randomized Algorithms Term 2. Lecture 9

CPSC 536N: Randomized Algorithms Term 2. Lecture 9 CPSC 536N: Randomized Algorithms 2011-12 Term 2 Prof. Nick Harvey Lecture 9 University of British Columbia 1 Polynomial Identity Testing In the first lecture we discussed the problem of testing equality

More information

Homomorphism Testing

Homomorphism Testing Homomorphism Shpilka & Wigderson, 2006 Daniel Shahaf Tel-Aviv University January 2009 Table of Contents 1 2 3 1 / 26 Algebra Definitions 1 Algebra Definitions 2 / 26 Groups Algebra Definitions Definition

More information

arxiv: v1 [math.st] 1 Nov 2017

arxiv: v1 [math.st] 1 Nov 2017 ASSESSING THE RELIABILITY POLYNOMIAL BASED ON PERCOLATION THEORY arxiv:1711.00303v1 [math.st] 1 Nov 2017 SAJADI, FARKHONDEH A. Department of Statistics, University of Isfahan, Isfahan 81744,Iran; f.sajadi@sci.ui.ac.ir

More information

SPIN SYSTEMS: HARDNESS OF APPROXIMATE COUNTING VIA PHASE TRANSITIONS

SPIN SYSTEMS: HARDNESS OF APPROXIMATE COUNTING VIA PHASE TRANSITIONS SPIN SYSTEMS: HARDNESS OF APPROXIMATE COUNTING VIA PHASE TRANSITIONS Andreas Galanis Joint work with: Jin-Yi Cai Leslie Ann Goldberg Heng Guo Mark Jerrum Daniel Štefankovič Eric Vigoda The Power of Randomness

More information

Solving Random Satisfiable 3CNF Formulas in Expected Polynomial Time

Solving Random Satisfiable 3CNF Formulas in Expected Polynomial Time Solving Random Satisfiable 3CNF Formulas in Expected Polynomial Time Michael Krivelevich and Dan Vilenchik Tel-Aviv University Solving Random Satisfiable 3CNF Formulas in Expected Polynomial Time p. 1/2

More information

CSE 312 Final Review: Section AA

CSE 312 Final Review: Section AA CSE 312 TAs December 8, 2011 General Information General Information Comprehensive Midterm General Information Comprehensive Midterm Heavily weighted toward material after the midterm Pre-Midterm Material

More information

Clique is hard on average for regular resolution

Clique is hard on average for regular resolution Clique is hard on average for regular resolution Ilario Bonacina, UPC Barcelona Tech July 27, 2018 Oxford Complexity Day Talk based on a joint work with: A. Atserias S. de Rezende J. Nordstro m M. Lauria

More information

Randomized Algorithms III Min Cut

Randomized Algorithms III Min Cut Chapter 11 Randomized Algorithms III Min Cut CS 57: Algorithms, Fall 01 October 1, 01 11.1 Min Cut 11.1.1 Problem Definition 11. Min cut 11..0.1 Min cut G = V, E): undirected graph, n vertices, m edges.

More information

SHORT PATHS IN 3-UNIFORM QUASI-RANDOM HYPERGRAPHS. Joanna Polcyn. Department of Discrete Mathematics Adam Mickiewicz University

SHORT PATHS IN 3-UNIFORM QUASI-RANDOM HYPERGRAPHS. Joanna Polcyn. Department of Discrete Mathematics Adam Mickiewicz University Discussiones Mathematicae Graph Theory 24 (2004 ) 469 484 SHORT PATHS IN 3-UNIFORM QUASI-RANDOM HYPERGRAPHS Joanna Polcyn Department of Discrete Mathematics Adam Mickiewicz University Poznań e-mail: joaska@amu.edu.pl

More information

THE STRANGE LOGIC OF RANDOM GRAPHS. Joel Spencer. Courant Institute

THE STRANGE LOGIC OF RANDOM GRAPHS. Joel Spencer. Courant Institute WoLLIC 2005 THE STRANGE LOGIC OF RANDOM GRAPHS Joel Spencer Courant Institute 1 What is a Graph? Vertex Set V Edge Set E of {v, w} V Equivalently: Areflexive Symmetric Relation Write: v w Read: v, w are

More information

Example 1. The sample space of an experiment where we flip a pair of coins is denoted by:

Example 1. The sample space of an experiment where we flip a pair of coins is denoted by: Chapter 8 Probability 8. Preliminaries Definition (Sample Space). A Sample Space, Ω, is the set of all possible outcomes of an experiment. Such a sample space is considered discrete if Ω has finite cardinality.

More information

Randomized Load Balancing:The Power of 2 Choices

Randomized Load Balancing:The Power of 2 Choices Randomized Load Balancing: The Power of 2 Choices June 3, 2010 Balls and Bins Problem We have m balls that are thrown into n bins, the location of each ball chosen independently and uniformly at random

More information

Umans Complexity Theory Lectures

Umans Complexity Theory Lectures Umans Complexity Theory Lectures Lecture 8: Introduction to Randomized Complexity: - Randomized complexity classes, - Error reduction, - in P/poly - Reingold s Undirected Graph Reachability in RL Randomized

More information

11.1 Set Cover ILP formulation of set cover Deterministic rounding

11.1 Set Cover ILP formulation of set cover Deterministic rounding CS787: Advanced Algorithms Lecture 11: Randomized Rounding, Concentration Bounds In this lecture we will see some more examples of approximation algorithms based on LP relaxations. This time we will use

More information

Part I: Discrete Math.

Part I: Discrete Math. Part I: Discrete Math. 1. Propositions. 10 points. 3/3/4 (a) The following statement expresses the fact that there is a smallest number in the natural numbers, ( y N) ( x N) (y x). Write a statement that

More information

Independent sets and repeated degrees

Independent sets and repeated degrees Independent sets repeated degrees B. Bollobás A.D. Scott Department of Pure Mathematics Mathematical Statistics, University of Cambridge, 16 Mill Lane, Cambridge, CB2 1SB, Engl. Department of Mathematics,

More information

k-regular subgraphs near the k-core threshold of a random graph

k-regular subgraphs near the k-core threshold of a random graph -regular subgraphs near the -core threshold of a random graph Dieter Mitsche Michael Molloy Pawe l Pra lat April 5, 208 Abstract We prove that G n,p=c/n w.h.p. has a -regular subgraph if c is at least

More information

1. Introduction Given k 2, a k-uniform hypergraph (in short, k-graph) consists of a vertex set V and an edge set E ( V

1. Introduction Given k 2, a k-uniform hypergraph (in short, k-graph) consists of a vertex set V and an edge set E ( V MINIMUM VERTEX DEGREE THRESHOLD FOR C 4-TILING JIE HAN AND YI ZHAO Abstract. We prove that the vertex degree threshold for tiling C4 (the - uniform hypergraph with four vertices and two triples in a -uniform

More information

Cryptography and Security Midterm Exam

Cryptography and Security Midterm Exam Cryptography and Security Midterm Exam Serge Vaudenay 23.11.2017 duration: 1h45 no documents allowed, except one 2-sided sheet of handwritten notes a pocket calculator is allowed communication devices

More information

P is the class of problems for which there are algorithms that solve the problem in time O(n k ) for some constant k.

P is the class of problems for which there are algorithms that solve the problem in time O(n k ) for some constant k. Complexity Theory Problems are divided into complexity classes. Informally: So far in this course, almost all algorithms had polynomial running time, i.e., on inputs of size n, worst-case running time

More information

Distinct edge weights on graphs

Distinct edge weights on graphs of Distinct edge weights on University of California-San Diego mtait@math.ucsd.edu Joint work with Jacques Verstraëte November 4, 2014 (UCSD) of November 4, 2014 1 / 46 Overview of 1 2 3 Product-injective

More information

U.C. Berkeley Better-than-Worst-Case Analysis Handout 3 Luca Trevisan May 24, 2018

U.C. Berkeley Better-than-Worst-Case Analysis Handout 3 Luca Trevisan May 24, 2018 U.C. Berkeley Better-than-Worst-Case Analysis Handout 3 Luca Trevisan May 24, 2018 Lecture 3 In which we show how to find a planted clique in a random graph. 1 Finding a Planted Clique We will analyze

More information