Law of the Iterated Logarithm in G(n, p)

Size: px
Start display at page:

Download "Law of the Iterated Logarithm in G(n, p)"

Transcription

1 Law of the Iterated Logarithm in G(n, p) Austen James Matt Larson Andrew Salmon Yale University 4 August 2016 of the Iterated Logarithm in G(n, p) 4August2016 1/18

2 G(n, p) G(n, p) is a random graph model. of the Iterated Logarithm in G(n, p) 4August2016 2/18

3 G(n, p) G(n, p) is a random graph model. Connect any two vertices with probability p where 0 < p < 1. of the Iterated Logarithm in G(n, p) 4August2016 2/18

4 G(n, p) G(n, p) is a random graph model. Connect any two vertices with probability p where 0 < p < 1. G(n, p) exhibits a number of well-known properties relating to connectivity, coloring, the appearance of certain subgraphs, etc. of the Iterated Logarithm in G(n, p) 4August2016 2/18

5 The Law of Iterated Logarithm The Law of Iterated Logarithm (LIL) is a property of sequences of random variables, similar to the Central Limit Theorem (CLT). of the Iterated Logarithm in G(n, p) 4August2016 3/18

6 The Law of Iterated Logarithm The Law of Iterated Logarithm (LIL) is a property of sequences of random variables, similar to the Central Limit Theorem (CLT). While the CLT involves the convergence to a normal distribution, the LIL examines the greatest deviations from 0. of the Iterated Logarithm in G(n, p) 4August2016 3/18

7 The Law of Iterated Logarithm The Law of Iterated Logarithm (LIL) is a property of sequences of random variables, similar to the Central Limit Theorem (CLT). While the CLT involves the convergence to a normal distribution, the LIL examines the greatest deviations from 0. Theorem (Khinchin (1924) and Kolmogorov (1929)) nx Let S n = T i with T i iid random variables with 0 mean and 1 variance. i=1 apple S P lim sup p n =1 =1 n!1 2n log log n of the Iterated Logarithm in G(n, p) 4August2016 3/18

8 The Law of Iterated Logarithm The Law of Iterated Logarithm (LIL) is a property of sequences of random variables, similar to the Central Limit Theorem (CLT). While the CLT involves the convergence to a normal distribution, the LIL examines the greatest deviations from 0. Theorem (Khinchin (1924) and Kolmogorov (1929)) nx Let S n = T i with T i iid random variables with 0 mean and 1 variance. i=1 apple S P lim sup p n =1 =1 n!1 2n log log n of the Iterated Logarithm in G(n, p) 4August2016 3/18

9 History of the LIL Not true in general without independence. of the Iterated Logarithm in G(n, p) 4August2016 4/18

10 History of the LIL Not true in general without independence s: Random Walks with some conditions of the Iterated Logarithm in G(n, p) 4August2016 4/18

11 History of the LIL Not true in general without independence s: Random Walks with some conditions 1970 s: Martingales of the Iterated Logarithm in G(n, p) 4August2016 4/18

12 History of the LIL Not true in general without independence s: Random Walks with some conditions 1970 s: Martingales 1985: Random Walks with weaker conditions of the Iterated Logarithm in G(n, p) 4August2016 4/18

13 History of the LIL Not true in general without independence s: Random Walks with some conditions 1970 s: Martingales 1985: Random Walks with weaker conditions 2016: Random Variables coming from Random Graphs of the Iterated Logarithm in G(n, p) 4August2016 4/18

14 Central Limit Theorems in Random Graph Counts 1988: Ruciński proves graph counts of small subgraphs are asymptotically normal. of the Iterated Logarithm in G(n, p) 4August2016 5/18

15 Central Limit Theorems in Random Graph Counts 1988: Ruciński proves graph counts of small subgraphs are asymptotically normal. 1994: Janson proves that some spanning graphs, like spanning trees, Hamiltonian cycles, and perfect matchings, are asymptotically log-normal. Janson (1994) Let T n be the number of trees contained in a random graph in G(n, p). log T n n µ n! N(0, 1) of the Iterated Logarithm in G(n, p) 4August2016 5/18

16 Central Limit Theorems in Random Graph Counts 1988: Ruciński proves graph counts of small subgraphs are asymptotically normal. 1994: Janson proves that some spanning graphs, like spanning trees, Hamiltonian cycles, and perfect matchings, are asymptotically log-normal. Janson (1994) Let T n be the number of trees contained in a random graph in G(n, p). log T n n µ n! N(0, 1) µ n (the mean ) is log E[T n ] 1 p p (recall p is the edge probability). of the Iterated Logarithm in G(n, p) 4August2016 5/18

17 Central Limit Theorems in Random Graph Counts 1988: Ruciński proves graph counts of small subgraphs are asymptotically normal. 1994: Janson proves that some spanning graphs, like spanning trees, Hamiltonian cycles, and perfect matchings, are asymptotically log-normal. Janson (1994) Let T n be the number of trees contained in a random graph in G(n, p). log T n n µ n! N(0, 1) µ n (the mean ) is log E[T n ] n (the standard deviation ) is 1 p p q 2(1 p) p (recall p is the edge probability). of the Iterated Logarithm in G(n, p) 4August2016 5/18

18 Amoreprecisestatement Main result Let T n be the numberapple of trees contained in a random graph in G(n, p). log T n µ P lim sup p n =1 =1 n!1 2 log log n n of the Iterated Logarithm in G(n, p) 4August2016 6/18

19 Amoreprecisestatement Main result Let T n be the numberapple of trees contained in a random graph in G(n, p). log T n µ P lim sup p n =1 =1 n!1 2 log log n µ n and n are as in Janson (1994). n of the Iterated Logarithm in G(n, p) 4August2016 6/18

20 Proof Strategy Work with a di erent random graph model, G(n, m) where graphs are drawn uniformly on n vertices under the constraint that they have exactly m edges. of the Iterated Logarithm in G(n, p) 4August2016 7/18

21 Proof Strategy Work with a di erent random graph model, G(n, m) where graphs are drawn uniformly on n vertices under the constraint that they have exactly m edges. If X nm is the number of trees in a random graph from G(n, m), we need to show that, for some conditions: P[X nm KEX nm ] apple n 4 of the Iterated Logarithm in G(n, p) 4August2016 7/18

22 Proof Strategy Work with a di erent random graph model, G(n, m) where graphs are drawn uniformly on n vertices under the constraint that they have exactly m edges. If X nm is the number of trees in a random graph from G(n, m), we need to show that, for some conditions: P[X nm KEX nm ] apple n 4 To prove this concentration lemma, it is enough to show, by Markov s inequality, that EX k nm apple C k (EX nm ) k of the Iterated Logarithm in G(n, p) 4August2016 7/18

23 Proof Strategy Work with a di erent random graph model, G(n, m) where graphs are drawn uniformly on n vertices under the constraint that they have exactly m edges. If X nm is the number of trees in a random graph from G(n, m), we need to show that, for some conditions: P[X nm KEX nm ] apple n 4 To prove this concentration lemma, it is enough to show, by Markov s inequality, that EX k nm apple C k (EX nm ) k Given this, we can prove the upper and lower bound for the limsup term using the Borel-Cantelli lemma. of the Iterated Logarithm in G(n, p) 4August2016 7/18

24 About the Moment EX k nm In G(n, m), the appearance of a (labeled) subgraph only depends on the number of edges that subgraph contains. of the Iterated Logarithm in G(n, p) 4August2016 8/18

25 About the Moment EX k nm In G(n, m), the appearance of a (labeled) subgraph only depends on the number of edges that subgraph contains. So the probability that the union of trees S k i=1 T i is a subgraph of some graph from G(n, m) depends only on the size of the edge overlap. of the Iterated Logarithm in G(n, p) 4August2016 8/18

26 About the Moment EX k nm In G(n, m), the appearance of a (labeled) subgraph only depends on the number of edges that subgraph contains. So the probability that the union of trees S k i=1 T i is a subgraph of some graph from G(n, m) depends only on the size of the edge overlap. If X nm is the number of trees in a random graph with m edges, then the kth moment E X k nm is equal to: h i E Xnm k = X " # [ P T i (T 1,...,T k ) i of the Iterated Logarithm in G(n, p) 4August2016 8/18

27 The Quantity M(a) But it makes more sense to try to group tuples of trees by the number of edges they contain. P k(n 1) e=n 1 P [e (S i T i)] # {(T 1,...,T k ):e( S i T i)=e} of the Iterated Logarithm in G(n, p) 4August2016 9/18

28 The Quantity M(a) But it makes more sense to try to group tuples of trees by the number of edges they contain. P k(n 1) e=n 1 P [e (S i T i)] # {(T 1,...,T k ):e( S i T i)=e} Rewriting in terms of missing edges yields: n 2 k(n 1) + a (k 1)(n 1) X a=0 M(a) m k(n 1) + a n 2 m of the Iterated Logarithm in G(n, p) 4August2016 9/18

29 The Quantity M(a) But it makes more sense to try to group tuples of trees by the number of edges they contain. P k(n 1) e=n 1 P [e (S i T i)] # {(T 1,...,T k ):e( S i T i)=e} Rewriting in terms of missing edges yields: n 2 k(n 1) + a Definition of M(a) (k 1)(n 1) X a=0 M(a) m k(n 1) + a n 2 m M(a) is the number of k-tuples (T 1,...,T k ) of trees on a graph on n labeled vertices such that: Sk e i=1 T i = k(n 1) a of the Iterated Logarithm in G(n, p) 4August2016 9/18

30 M(a) andthecombinatoricsoftrees From Cayley s formula, we know that there are n n 2 total trees on n labeled vertices. Figure: Cayley s formula for n =2, 3, 4, image taken from Wikipedia of the Iterated Logarithm in G(n, p) 4August /18

31 M(a) andthecombinatoricsoftrees From Cayley s formula, we know that there are n n 2 total trees on n labeled vertices. For two random trees, what is the distribution of the size of the edge intersection? Figure: Cayley s formula for n =2, 3, 4, image taken from Wikipedia of the Iterated Logarithm in G(n, p) 4August /18

32 M(a) andthecombinatoricsoftrees From Cayley s formula, we know that there are n n 2 total trees on n labeled vertices. For two random trees, what is the distribution of the size of the edge intersection? For k (uniformly chosen) random trees, how many edges will overlap in total? Figure: Cayley s formula for n =2, 3, 4, image taken from Wikipedia of the Iterated Logarithm in G(n, p) 4August /18

33 Electrical Networks and Spanning Trees We can convert a graph to an electrical network by setting the resistance to 1. of the Iterated Logarithm in G(n, p) 4August /18

34 Electrical Networks and Spanning Trees We can convert a graph to an electrical network by setting the resistance to 1. Spanning tree edge probability (Kircho ) Let T be a spanning tree chosen uniformly from a graph H. Lete be any edge in H. P[e 2 E(T )] = i(e) That is, the probability that this edge is in T is equal to the current traveling along this edge when we inject one amp at one of the endpoints of e and remove one amp from the other endpoint: of the Iterated Logarithm in G(n, p) 4August /18

35 Electrical Networks are Graphs Many laws relating to electrical networks can be formalized more generally using graph theory. of the Iterated Logarithm in G(n, p) 4August /18

36 Electrical Networks are Graphs Many laws relating to electrical networks can be formalized more generally using graph theory. Ohm s law Let ab be an edge in graph G. LetV ab be the voltage di erence across ab and let R ab be the resistance of ab. Then: i(ab) = V ab R ab of the Iterated Logarithm in G(n, p) 4August /18

37 Electrical Networks are Graphs Many laws relating to electrical networks can be formalized more generally using graph theory. Ohm s law Let ab be an edge in graph G. LetV ab be the voltage di erence across ab and let R ab be the resistance of ab. Then: Rayleigh Monotonicity Law i(ab) = V ab R ab Let G, G 0 be graphs such that G G 0. Then for every edge e 2 E(G): i G (e) i G 0(e) of the Iterated Logarithm in G(n, p) 4August /18

38 An iterative construction We need to construct k-tuples random trees with total edge intersection a. of the Iterated Logarithm in G(n, p) 4August /18

39 An iterative construction We need to construct k-tuples random trees with total edge intersection a. Choose some partition (`2,`3,...,`k) suchthat P i `i = a. of the Iterated Logarithm in G(n, p) 4August /18

40 An iterative construction We need to construct k-tuples random trees with total edge intersection a. Choose some partition (`2,`3,...,`k) suchthat P i `i = a. Given a sequence T 1,...,T t 1 of trees, an additional tree T is `t-overlapping if T shares exactly `t edges with S t 1 i=1 T i. of the Iterated Logarithm in G(n, p) 4August /18

41 An iterative construction We need to construct k-tuples random trees with total edge intersection a. Choose some partition (`2,`3,...,`k) suchthat P i `i = a. Given a sequence T 1,...,T t 1 of trees, an additional tree T is `t-overlapping if T shares exactly `t edges with S t 1 i=1 T i. Counting the number of such trees gives us how often our construction can continue. of the Iterated Logarithm in G(n, p) 4August /18

42 Counting `t-overlapping Trees Reduction (Moon, 1967): the maximum degree of random trees is almost always smaller than log n. of the Iterated Logarithm in G(n, p) 4August /18

43 Counting `t-overlapping Trees Reduction (Moon, 1967): the maximum degree of random trees is almost always smaller than log n. Overlapping Tree Lemma Suppose we have chosen trees T 1,...,T t 1 with maximum degree less than log n. LetS be a fixed set of `t edges and call a tree T t `t-overlapping if it only uses precisely the edges in S as well as unused edges not in T 1,...,T t 1. Then the number of `t-overlapping trees is at most 2`t e 2 2t+O(log5 (n)/n) n n 3 `t of the Iterated Logarithm in G(n, p) 4August /18

44 Counting `t-overlapping Trees Reduction (Moon, 1967): the maximum degree of random trees is almost always smaller than log n. Overlapping Tree Lemma Suppose we have chosen trees T 1,...,T t 1 with maximum degree less than log n. LetS be a fixed set of `t edges and call a tree T t `t-overlapping if it only uses precisely the edges in S as well as unused edges not in T 1,...,T t 1. Then the number of `t-overlapping trees is at most 2`t e 2 2t+O(log5 (n)/n) n n 3 `t The results from electrical networks are well-behaved because of the high minimum degree in K n \ S i T i. of the Iterated Logarithm in G(n, p) 4August /18

45 AProperUpperBoundonM(a) foranyk We can get an upper bound on M(a) becauseanytreesthatsatisfy the condition for M(a) contain a procedure of selecting `t-overlapping trees. of the Iterated Logarithm in G(n, p) 4August /18

46 AProperUpperBoundonM(a) foranyk We can get an upper bound on M(a) becauseanytreesthatsatisfy the condition for M(a) contain a procedure of selecting `t-overlapping trees. By summing over all possible partitions P(a), we use the multinomial theorem. of the Iterated Logarithm in G(n, p) 4August /18

47 AProperUpperBoundonM(a) foranyk We can get an upper bound on M(a) becauseanytreesthatsatisfy the condition for M(a) contain a procedure of selecting `t-overlapping trees. By summing over all possible partitions P(a), we use the multinomial theorem. Upper Bound The total number of trees with a edge overlaps is at most: M(a) apple X Y `t-overlapping Trees `2P(a) n k(n 2) e 2(k 2)+O(log 5 (n)/n) 2 k 2 = a! a of the Iterated Logarithm in G(n, p) 4August /18

48 Some Remarks on the Upper Bound For k = o(n), M(a) N k apple e2( k 2) 2 k 2 a! a (1 + o(1)) of the Iterated Logarithm in G(n, p) 4August /18

49 Some Remarks on the Upper Bound For k = o(n), M(a) N k apple e2( k 2) 2 k 2 a! a (1 + o(1)) The upper bound is a Poisson distribution with parameter =2 k 2. of the Iterated Logarithm in G(n, p) 4August /18

50 Some Remarks on the Upper Bound For k = o(n), M(a) N k apple e2( k 2) 2 k 2 a! a (1 + o(1)) The upper bound is a Poisson distribution with parameter =2 k 2. We P can infer convergence to a Poisson distribution because 1 i=0 M(a) must equal the total number of k-tuples of trees. of the Iterated Logarithm in G(n, p) 4August /18

51 The Law of Iterated Logarithm This asymptotic estimate on M(a) is su concentration equality. cient to prove the of the Iterated Logarithm in G(n, p) 4August /18

52 The Law of Iterated Logarithm This asymptotic estimate on M(a) is su concentration equality. cient to prove the Using similar techniques, we also proved the Law of Iterated Logarithm for the appearance of perfect matchings in random graphs in G(n, p). of the Iterated Logarithm in G(n, p) 4August /18

53 Acknowledgements Thanks to MAA Mathfest for hosting. Thanks to Daniel Montealegre for serving as our advisor. Thanks to SUMRY for giving us the opportunity to work on this problem. of the Iterated Logarithm in G(n, p) 4August /18

Discrete Mathematics Course Review 3

Discrete Mathematics Course Review 3 21-228 Discrete Mathematics Course Review 3 This document contains a list of the important definitions and theorems that have been covered thus far in the course. It is not a complete listing of what has

More information

Part II. Graph Theory. Year

Part II. Graph Theory. Year Part II Year 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2017 53 Paper 3, Section II 15H Define the Ramsey numbers R(s, t) for integers s, t 2. Show that R(s, t) exists for all s,

More information

Discrete mathematics , Fall Instructor: prof. János Pach

Discrete mathematics , Fall Instructor: prof. János Pach Discrete mathematics 2016-2017, Fall Instructor: prof. János Pach - covered material - Lecture 1. Counting problems To read: [Lov]: 1.2. Sets, 1.3. Number of subsets, 1.5. Sequences, 1.6. Permutations,

More information

The loop-erased random walk and the uniform spanning tree on the four-dimensional discrete torus

The loop-erased random walk and the uniform spanning tree on the four-dimensional discrete torus The loop-erased random walk and the uniform spanning tree on the four-dimensional discrete torus by Jason Schweinsberg University of California at San Diego Outline of Talk 1. Loop-erased random walk 2.

More information

A greedy, partially optimal proof of the Heine-Borel Theorem

A greedy, partially optimal proof of the Heine-Borel Theorem A greedy, partially optimal proof of the Heine-Borel Theorem James Fennell September 28, 2017 Abstract The Heine-Borel theorem states that any open cover of the closed interval Œa; b contains a finite

More information

Notation Index. Probability notation. (there exists) (such that) Fn-4 B n (Bell numbers) CL-27 s t (equivalence relation) GT-5.

Notation Index. Probability notation. (there exists) (such that) Fn-4 B n (Bell numbers) CL-27 s t (equivalence relation) GT-5. Notation Index (there exists) (for all) Fn-4 Fn-4 (such that) Fn-4 B n (Bell numbers) CL-27 s t (equivalence relation) GT-5 ( n ) k (binomial coefficient) CL-15 ( n m 1,m 2,...) (multinomial coefficient)

More information

Graph theory. Po-Shen Loh. June We begin by collecting some basic facts which can be proved via bare-hands techniques.

Graph theory. Po-Shen Loh. June We begin by collecting some basic facts which can be proved via bare-hands techniques. Graph theory Po-Shen Loh June 013 1 Basic results We begin by collecting some basic facts which can be proved via bare-hands techniques. 1. The sum of all of the degrees is equal to twice the number of

More information

Institute of Operating Systems and Computer Networks Algorithms Group. Network Algorithms. Tutorial 4: Matching and other stuff

Institute of Operating Systems and Computer Networks Algorithms Group. Network Algorithms. Tutorial 4: Matching and other stuff Institute of Operating Systems and Computer Networks Algorithms Group Network Algorithms Tutorial 4: Matching and other stuff Christian Rieck Matching 2 Matching A matching M in a graph is a set of pairwise

More information

Randomized algorithms have several advantages over deterministic ones. We discuss them here:

Randomized algorithms have several advantages over deterministic ones. We discuss them here: CS787: Advanced Algorithms Lecture 6: Randomized Algorithms In this lecture we introduce randomized algorithms. We will begin by motivating the use of randomized algorithms through a few examples. Then

More information

[Ch 6] Set Theory. 1. Basic Concepts and Definitions. 400 lecture note #4. 1) Basics

[Ch 6] Set Theory. 1. Basic Concepts and Definitions. 400 lecture note #4. 1) Basics 400 lecture note #4 [Ch 6] Set Theory 1. Basic Concepts and Definitions 1) Basics Element: ; A is a set consisting of elements x which is in a/another set S such that P(x) is true. Empty set: notated {

More information

5 Graphs

5 Graphs 5 Graphs jacques@ucsd.edu Some of the putnam problems are to do with graphs. They do not assume more than a basic familiarity with the definitions and terminology of graph theory. 5.1 Basic definitions

More information

Understanding Disconnection and Stabilization of Chord

Understanding Disconnection and Stabilization of Chord Understanding Disconnection and Stabilization of Chord Zhongmei Yao Joint work with Dmitri Loguinov Internet Research Lab Department of Computer Science Texas A&M University, College Station, TX 77843

More information

Assignment 5: Solutions

Assignment 5: Solutions Algorithm Design Techniques Assignment 5: Solutions () Port Authority. [This problem is more commonly called the Bin Packing Problem.] (a) Suppose K = 3 and (w, w, w 3, w 4 ) = (,,, ). The optimal solution

More information

1 Better Approximation of the Traveling Salesman

1 Better Approximation of the Traveling Salesman Stanford University CS261: Optimization Handout 4 Luca Trevisan January 13, 2011 Lecture 4 In which we describe a 1.5-approximate algorithm for the Metric TSP, we introduce the Set Cover problem, observe

More information

Math 443/543 Graph Theory Notes

Math 443/543 Graph Theory Notes Math 443/543 Graph Theory Notes David Glickenstein September 3, 2008 1 Introduction We will begin by considering several problems which may be solved using graphs, directed graphs (digraphs), and networks.

More information

CPSC 536N: Randomized Algorithms Term 2. Lecture 10

CPSC 536N: Randomized Algorithms Term 2. Lecture 10 CPSC 536N: Randomized Algorithms 011-1 Term Prof. Nick Harvey Lecture 10 University of British Columbia In the first lecture we discussed the Max Cut problem, which is NP-complete, and we presented a very

More information

Graph Theory Problem Ideas

Graph Theory Problem Ideas Graph Theory Problem Ideas April 15, 017 Note: Please let me know if you have a problem that you would like me to add to the list! 1 Classification Given a degree sequence d 1,...,d n, let N d1,...,d n

More information

Notation Index 9 (there exists) Fn-4 8 (for all) Fn-4 3 (such that) Fn-4 B n (Bell numbers) CL-25 s ο t (equivalence relation) GT-4 n k (binomial coef

Notation Index 9 (there exists) Fn-4 8 (for all) Fn-4 3 (such that) Fn-4 B n (Bell numbers) CL-25 s ο t (equivalence relation) GT-4 n k (binomial coef Notation 9 (there exists) Fn-4 8 (for all) Fn-4 3 (such that) Fn-4 B n (Bell numbers) CL-25 s ο t (equivalence relation) GT-4 n k (binomial coefficient) CL-14 (multinomial coefficient) CL-18 n m 1 ;m 2

More information

HW Graph Theory SOLUTIONS (hbovik) - Q

HW Graph Theory SOLUTIONS (hbovik) - Q 1, Diestel 9.3: An arithmetic progression is an increasing sequence of numbers of the form a, a+d, a+ d, a + 3d.... Van der Waerden s theorem says that no matter how we partition the natural numbers into

More information

CS270 Combinatorial Algorithms & Data Structures Spring Lecture 19:

CS270 Combinatorial Algorithms & Data Structures Spring Lecture 19: CS270 Combinatorial Algorithms & Data Structures Spring 2003 Lecture 19: 4.1.03 Lecturer: Satish Rao Scribes: Kevin Lacker and Bill Kramer Disclaimer: These notes have not been subjected to the usual scrutiny

More information

Graph Theory Day Four

Graph Theory Day Four Graph Theory Day Four February 8, 018 1 Connected Recall from last class, we discussed methods for proving a graph was connected. Our two methods were 1) Based on the definition, given any u, v V(G), there

More information

r=1 The Binomial Theorem. 4 MA095/98G Revision

r=1 The Binomial Theorem. 4 MA095/98G Revision Revision Read through the whole course once Make summary sheets of important definitions and results, you can use the following pages as a start and fill in more yourself Do all assignments again Do the

More information

The number of spanning trees of random 2-trees

The number of spanning trees of random 2-trees The number of spanning trees of random 2-trees Stephan Wagner (joint work with Elmar Teufl) Stellenbosch University AofA 15 Strobl, 8 June, 2015 2-trees 2-trees are constructed recursively: Spanning trees

More information

A synchronizer generates sequences of clock pulses at each node of the network satisfying the condition given by the following definition.

A synchronizer generates sequences of clock pulses at each node of the network satisfying the condition given by the following definition. Chapter 8 Synchronizers So far, we have mainly studied synchronous algorithms because generally, asynchronous algorithms are often more di cult to obtain and it is substantially harder to reason about

More information

HW Graph Theory Name (andrewid) - X. 1: Draw K 7 on a torus with no edge crossings.

HW Graph Theory Name (andrewid) - X. 1: Draw K 7 on a torus with no edge crossings. 1: Draw K 7 on a torus with no edge crossings. A quick calculation reveals that an embedding of K 7 on the torus is a -cell embedding. At that point, it is hard to go wrong if you start drawing C 3 faces,

More information

Math 443/543 Graph Theory Notes

Math 443/543 Graph Theory Notes Math 443/543 Graph Theory Notes David Glickenstein September 8, 2014 1 Introduction We will begin by considering several problems which may be solved using graphs, directed graphs (digraphs), and networks.

More information

4 non-obvious examples/results. 2. The core idea in our probabilistic reformulation

4 non-obvious examples/results. 2. The core idea in our probabilistic reformulation 1. Local weak convergence of graphs/networks Stuff that s obvious when you think about it 4 non-obvious examples/results 2. The core idea in our probabilistic reformulation of special cases of the cavity

More information

Today. Lecture 4: Last time. The EM algorithm. We examine clustering in a little more detail; we went over it a somewhat quickly last time

Today. Lecture 4: Last time. The EM algorithm. We examine clustering in a little more detail; we went over it a somewhat quickly last time Today Lecture 4: We examine clustering in a little more detail; we went over it a somewhat quickly last time The CAD data will return and give us an opportunity to work with curves (!) We then examine

More information

Math Summer 2012

Math Summer 2012 Math 481 - Summer 2012 Final Exam You have one hour and fifty minutes to complete this exam. You are not allowed to use any electronic device. Be sure to give reasonable justification to all your answers.

More information

Computing intersections in a set of line segments: the Bentley-Ottmann algorithm

Computing intersections in a set of line segments: the Bentley-Ottmann algorithm Computing intersections in a set of line segments: the Bentley-Ottmann algorithm Michiel Smid October 14, 2003 1 Introduction In these notes, we introduce a powerful technique for solving geometric problems.

More information

Statistics for a Random Network Design Problem

Statistics for a Random Network Design Problem DIMACS Technical Report 2009-20 September 2009 Statistics for a Random Network Design Problem by Fred J. Rispoli 1 Fred_Rispoli@dowling.edu Steven Cosares cosares@aol.com DIMACS is a collaborative project

More information

Spanning Trees. John Martinez. November 12, 2012

Spanning Trees. John Martinez. November 12, 2012 Spanning Trees John Martinez November 12, 2012 Abstract Following an article of D.R. Shier [S], this paper deals with the formation of spanning trees given the bipartite graph K 2,n. In addition to a more

More information

Graph theory - solutions to problem set 1

Graph theory - solutions to problem set 1 Graph theory - solutions to problem set 1 1. (a) Is C n a subgraph of K n? Exercises (b) For what values of n and m is K n,n a subgraph of K m? (c) For what n is C n a subgraph of K n,n? (a) Yes! (you

More information

HAMILTON CYCLES IN RANDOM LIFTS OF COMPLETE GRAPHS

HAMILTON CYCLES IN RANDOM LIFTS OF COMPLETE GRAPHS HAMILTON CYCLES IN RANDOM LIFTS OF COMPLETE GRAPHS TOMASZ LUCZAK, LUKASZ WITKOWSKI, AND MARCIN WITKOWSKI Abstract. We study asymptotic properties of random lifts a model of random graph introduced by Amit

More information

Matchings. Examples. K n,m, K n, Petersen graph, Q k ; graphs without perfect matching. A maximal matching cannot be enlarged by adding another edge.

Matchings. Examples. K n,m, K n, Petersen graph, Q k ; graphs without perfect matching. A maximal matching cannot be enlarged by adding another edge. Matchings A matching is a set of (non-loop) edges with no shared endpoints. The vertices incident to an edge of a matching M are saturated by M, the others are unsaturated. A perfect matching of G is a

More information

MATH 363 Final Wednesday, April 28. Final exam. You may use lemmas and theorems that were proven in class and on assignments unless stated otherwise.

MATH 363 Final Wednesday, April 28. Final exam. You may use lemmas and theorems that were proven in class and on assignments unless stated otherwise. Final exam This is a closed book exam. No calculators are allowed. Unless stated otherwise, justify all your steps. You may use lemmas and theorems that were proven in class and on assignments unless stated

More information

Discrete Mathematics Lecture 4. Harper Langston New York University

Discrete Mathematics Lecture 4. Harper Langston New York University Discrete Mathematics Lecture 4 Harper Langston New York University Sequences Sequence is a set of (usually infinite number of) ordered elements: a 1, a 2,, a n, Each individual element a k is called a

More information

DO NOT RE-DISTRIBUTE THIS SOLUTION FILE

DO NOT RE-DISTRIBUTE THIS SOLUTION FILE Professor Kindred Math 104, Graph Theory Homework 2 Solutions February 7, 2013 Introduction to Graph Theory, West Section 1.2: 26, 38, 42 Section 1.3: 14, 18 Section 2.1: 26, 29, 30 DO NOT RE-DISTRIBUTE

More information

Symmetric Product Graphs

Symmetric Product Graphs Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 5-20-2015 Symmetric Product Graphs Evan Witz Follow this and additional works at: http://scholarworks.rit.edu/theses

More information

MAS 341: GRAPH THEORY 2016 EXAM SOLUTIONS

MAS 341: GRAPH THEORY 2016 EXAM SOLUTIONS MAS 341: GRAPH THEORY 2016 EXAM SOLUTIONS 1. Question 1 Part i. There are many Hamiltonian cycles; e.g., ABLKJEDFIHGC. We now show that if we remove vertex D, the result G \ {D} is not hamiltonian. Note

More information

Edge-disjoint Spanning Trees in Triangulated Graphs on Surfaces and application to node labeling 1

Edge-disjoint Spanning Trees in Triangulated Graphs on Surfaces and application to node labeling 1 Edge-disjoint Spanning Trees in Triangulated Graphs on Surfaces and application to node labeling 1 Arnaud Labourel a a LaBRI - Universite Bordeaux 1, France Abstract In 1974, Kundu [4] has shown that triangulated

More information

CS261: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem

CS261: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem CS61: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem Tim Roughgarden February 5, 016 1 The Traveling Salesman Problem (TSP) In this lecture we study a famous computational problem,

More information

AXIOMS FOR THE INTEGERS

AXIOMS FOR THE INTEGERS AXIOMS FOR THE INTEGERS BRIAN OSSERMAN We describe the set of axioms for the integers which we will use in the class. The axioms are almost the same as what is presented in Appendix A of the textbook,

More information

Extremal Graph Theory: Turán s Theorem

Extremal Graph Theory: Turán s Theorem Bridgewater State University Virtual Commons - Bridgewater State University Honors Program Theses and Projects Undergraduate Honors Program 5-9-07 Extremal Graph Theory: Turán s Theorem Vincent Vascimini

More information

Lecture 20 : Trees DRAFT

Lecture 20 : Trees DRAFT CS/Math 240: Introduction to Discrete Mathematics 4/12/2011 Lecture 20 : Trees Instructor: Dieter van Melkebeek Scribe: Dalibor Zelený DRAFT Last time we discussed graphs. Today we continue this discussion,

More information

Monochromatic Matchings in the Shadow Graph of Almost Complete Hypergraphs

Monochromatic Matchings in the Shadow Graph of Almost Complete Hypergraphs Ann. Comb. 14 (010 45 49 DOI 10.1007/s0006-010-0058-1 Published online May 5, 010 Springer Basel AG 010 Annals of Combinatorics Monochromatic Matchings in the Shadow Graph of Almost Complete Hypergraphs

More information

Kruskal s MST Algorithm

Kruskal s MST Algorithm Kruskal s MST Algorithm CLRS Chapter 23, DPV Chapter 5 Version of November 5, 2014 Main Topics of This Lecture Kruskal s algorithm Another, but different, greedy MST algorithm Introduction to UNION-FIND

More information

Characterizations of Trees

Characterizations of Trees Characterizations of Trees Lemma Every tree with at least two vertices has at least two leaves. Proof. 1. A connected graph with at least two vertices has an edge. 2. In an acyclic graph, an end point

More information

Outline. CS38 Introduction to Algorithms. Approximation Algorithms. Optimization Problems. Set Cover. Set cover 5/29/2014. coping with intractibility

Outline. CS38 Introduction to Algorithms. Approximation Algorithms. Optimization Problems. Set Cover. Set cover 5/29/2014. coping with intractibility Outline CS38 Introduction to Algorithms Lecture 18 May 29, 2014 coping with intractibility approximation algorithms set cover TSP center selection randomness in algorithms May 29, 2014 CS38 Lecture 18

More information

{ 1} Definitions. 10. Extremal graph theory. Problem definition Paths and cycles Complete subgraphs

{ 1} Definitions. 10. Extremal graph theory. Problem definition Paths and cycles Complete subgraphs Problem definition Paths and cycles Complete subgraphs 10. Extremal graph theory 10.1. Definitions Let us examine the following forbidden subgraph problems: At most how many edges are in a graph of order

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction A Monte Carlo method is a compuational method that uses random numbers to compute (estimate) some quantity of interest. Very often the quantity we want to compute is the mean of

More information

Lecture 2 The k-means clustering problem

Lecture 2 The k-means clustering problem CSE 29: Unsupervised learning Spring 2008 Lecture 2 The -means clustering problem 2. The -means cost function Last time we saw the -center problem, in which the input is a set S of data points and the

More information

Small Survey on Perfect Graphs

Small Survey on Perfect Graphs Small Survey on Perfect Graphs Michele Alberti ENS Lyon December 8, 2010 Abstract This is a small survey on the exciting world of Perfect Graphs. We will see when a graph is perfect and which are families

More information

HW Graph Theory SOLUTIONS (hbovik)

HW Graph Theory SOLUTIONS (hbovik) Diestel 1.3: Let G be a graph containing a cycle C, and assume that G contains a path P of length at least k between two vertices of C. Show that G contains a cycle of length at least k. If C has length

More information

Combinatorics Summary Sheet for Exam 1 Material 2019

Combinatorics Summary Sheet for Exam 1 Material 2019 Combinatorics Summary Sheet for Exam 1 Material 2019 1 Graphs Graph An ordered three-tuple (V, E, F ) where V is a set representing the vertices, E is a set representing the edges, and F is a function

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

WUCT121. Discrete Mathematics. Graphs

WUCT121. Discrete Mathematics. Graphs WUCT121 Discrete Mathematics Graphs WUCT121 Graphs 1 Section 1. Graphs 1.1. Introduction Graphs are used in many fields that require analysis of routes between locations. These areas include communications,

More information

THE LOGIC OF QUANTIFIED STATEMENTS

THE LOGIC OF QUANTIFIED STATEMENTS CHAPTER 3 THE LOGIC OF QUANTIFIED STATEMENTS Copyright Cengage Learning. All rights reserved. SECTION 3.4 Arguments with Quantified Statements Copyright Cengage Learning. All rights reserved. Arguments

More information

Exercise set 2 Solutions

Exercise set 2 Solutions Exercise set 2 Solutions Let H and H be the two components of T e and let F E(T ) consist of the edges of T with one endpoint in V (H), the other in V (H ) Since T is connected, F Furthermore, since T

More information

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition. 18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have

More information

Approximation scheme for the traveling salesman problem

Approximation scheme for the traveling salesman problem Chapter 15 Approximation scheme for the traveling salesman problem 15.1 Multiterminal cut In this chapter, we describe a methodology that can be used for some problems for which the previous chapter s

More information

Some Upper Bounds for Signed Star Domination Number of Graphs. S. Akbari, A. Norouzi-Fard, A. Rezaei, R. Rotabi, S. Sabour.

Some Upper Bounds for Signed Star Domination Number of Graphs. S. Akbari, A. Norouzi-Fard, A. Rezaei, R. Rotabi, S. Sabour. Some Upper Bounds for Signed Star Domination Number of Graphs S. Akbari, A. Norouzi-Fard, A. Rezaei, R. Rotabi, S. Sabour Abstract Let G be a graph with the vertex set V (G) and edge set E(G). A function

More information

Computational Geometry

Computational Geometry Windowing queries Windowing Windowing queries Zoom in; re-center and zoom in; select by outlining Windowing Windowing queries Windowing Windowing queries Given a set of n axis-parallel line segments, preprocess

More information

Graph Theory. 1 Introduction to Graphs. Martin Stynes Department of Mathematics, UCC January 26, 2011

Graph Theory. 1 Introduction to Graphs. Martin Stynes Department of Mathematics, UCC   January 26, 2011 Graph Theory Martin Stynes Department of Mathematics, UCC email: m.stynes@ucc.ie January 26, 2011 1 Introduction to Graphs 1 A graph G = (V, E) is a non-empty set of nodes or vertices V and a (possibly

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

Matching 4/21/2016. Bipartite Matching. 3330: Algorithms. First Try. Maximum Matching. Key Questions. Existence of Perfect Matching

Matching 4/21/2016. Bipartite Matching. 3330: Algorithms. First Try. Maximum Matching. Key Questions. Existence of Perfect Matching Bipartite Matching Matching 3330: Algorithms A graph is bipartite if its vertex set can be partitioned into two subsets A and B so that each edge has one endpoint in A and the other endpoint in B. A B

More information

Introduction to Randomized Algorithms

Introduction to Randomized Algorithms Introduction to Randomized Algorithms Gopinath Mishra Advanced Computing and Microelectronics Unit Indian Statistical Institute Kolkata 700108, India. Organization 1 Introduction 2 Some basic ideas from

More information

Chapter 8. NP-complete problems

Chapter 8. NP-complete problems Chapter 8. NP-complete problems Search problems E cient algorithms We have developed algorithms for I I I I I finding shortest paths in graphs, minimum spanning trees in graphs, matchings in bipartite

More information

Lecture 17. Lower bound for variable-length source codes with error. Coding a sequence of symbols: Rates and scheme (Arithmetic code)

Lecture 17. Lower bound for variable-length source codes with error. Coding a sequence of symbols: Rates and scheme (Arithmetic code) Lecture 17 Agenda for the lecture Lower bound for variable-length source codes with error Coding a sequence of symbols: Rates and scheme (Arithmetic code) Introduction to universal codes 17.1 variable-length

More information

DO NOT RE-DISTRIBUTE THIS SOLUTION FILE

DO NOT RE-DISTRIBUTE THIS SOLUTION FILE Professor Kindred Math 104, Graph Theory Homework 3 Solutions February 14, 2013 Introduction to Graph Theory, West Section 2.1: 37, 62 Section 2.2: 6, 7, 15 Section 2.3: 7, 10, 14 DO NOT RE-DISTRIBUTE

More information

Math 776 Graph Theory Lecture Note 1 Basic concepts

Math 776 Graph Theory Lecture Note 1 Basic concepts Math 776 Graph Theory Lecture Note 1 Basic concepts Lectured by Lincoln Lu Transcribed by Lincoln Lu Graph theory was founded by the great Swiss mathematician Leonhard Euler (1707-178) after he solved

More information

Graphs and Network Flows IE411. Lecture 21. Dr. Ted Ralphs

Graphs and Network Flows IE411. Lecture 21. Dr. Ted Ralphs Graphs and Network Flows IE411 Lecture 21 Dr. Ted Ralphs IE411 Lecture 21 1 Combinatorial Optimization and Network Flows In general, most combinatorial optimization and integer programming problems are

More information

Interleaving Schemes on Circulant Graphs with Two Offsets

Interleaving Schemes on Circulant Graphs with Two Offsets Interleaving Schemes on Circulant raphs with Two Offsets Aleksandrs Slivkins Department of Computer Science Cornell University Ithaca, NY 14853 slivkins@cs.cornell.edu Jehoshua Bruck Department of Electrical

More information

Notes for Lecture 20

Notes for Lecture 20 U.C. Berkeley CS170: Intro to CS Theory Handout N20 Professor Luca Trevisan November 13, 2001 Notes for Lecture 20 1 Duality As it turns out, the max-flow min-cut theorem is a special case of a more general

More information

Cache-Oblivious Traversals of an Array s Pairs

Cache-Oblivious Traversals of an Array s Pairs Cache-Oblivious Traversals of an Array s Pairs Tobias Johnson May 7, 2007 Abstract Cache-obliviousness is a concept first introduced by Frigo et al. in [1]. We follow their model and develop a cache-oblivious

More information

Math 443/543 Graph Theory Notes 2: Transportation problems

Math 443/543 Graph Theory Notes 2: Transportation problems Math 443/543 Graph Theory Notes 2: Transportation problems David Glickenstein September 15, 2014 1 Readings This is based on Chartrand Chapter 3 and Bondy-Murty 18.1, 18.3 (part on Closure of a Graph).

More information

Introduction. I Given a weighted, directed graph G =(V, E) with weight function

Introduction. I Given a weighted, directed graph G =(V, E) with weight function ntroduction Computer Science & Engineering 2/82 Design and Analysis of Algorithms Lecture 06 Single-Source Shortest Paths (Chapter 2) Stephen Scott (Adapted from Vinodchandran N. Variyam) sscott@cse.unl.edu

More information

Coloring Random Graphs

Coloring Random Graphs Coloring Random Graphs A Short and Biased Survey Lefteris M. Kirousis RA Computer Technology Institute and Department of Computer Engineering and Informatics, University of Patras 5th Athens Colloquium

More information

Balls Into Bins Model Occupancy Problems

Balls Into Bins Model Occupancy Problems Balls Into Bins Model Occupancy Problems Assume that m balls are thrown randomly is n bins, i.e., the location of each ball is independently and uniformly chosen at random from the n possibilities. How

More information

Results on the min-sum vertex cover problem

Results on the min-sum vertex cover problem Results on the min-sum vertex cover problem Ralucca Gera, 1 Craig Rasmussen, Pantelimon Stănică 1 Naval Postgraduate School Monterey, CA 9393, USA {rgera, ras, pstanica}@npsedu and Steve Horton United

More information

Partha Sarathi Mandal

Partha Sarathi Mandal MA 515: Introduction to Algorithms & MA353 : Design and Analysis of Algorithms [3-0-0-6] Lecture 39 http://www.iitg.ernet.in/psm/indexing_ma353/y09/index.html Partha Sarathi Mandal psm@iitg.ernet.in Dept.

More information

8.1 Basic notions, facts and techniques

8.1 Basic notions, facts and techniques 8 Infinite Graphs The study of infinite graphs is an attractive, but often neglected, part of graph theory. This chapter aims to give an introduction that starts gently, but then moves on in several directions

More information

Section 3.1: Nonseparable Graphs Cut vertex of a connected graph G: A vertex x G such that G x is not connected. Theorem 3.1, p. 57: Every connected

Section 3.1: Nonseparable Graphs Cut vertex of a connected graph G: A vertex x G such that G x is not connected. Theorem 3.1, p. 57: Every connected Section 3.1: Nonseparable Graphs Cut vertex of a connected graph G: A vertex x G such that G x is not connected. Theorem 3.1, p. 57: Every connected graph G with at least 2 vertices contains at least 2

More information

22 Elementary Graph Algorithms. There are two standard ways to represent a

22 Elementary Graph Algorithms. There are two standard ways to represent a VI Graph Algorithms Elementary Graph Algorithms Minimum Spanning Trees Single-Source Shortest Paths All-Pairs Shortest Paths 22 Elementary Graph Algorithms There are two standard ways to represent a graph

More information

MC 302 GRAPH THEORY 10/1/13 Solutions to HW #2 50 points + 6 XC points

MC 302 GRAPH THEORY 10/1/13 Solutions to HW #2 50 points + 6 XC points MC 0 GRAPH THEORY 0// Solutions to HW # 0 points + XC points ) [CH] p.,..7. This problem introduces an important class of graphs called the hypercubes or k-cubes, Q, Q, Q, etc. I suggest that before you

More information

Dynamically Random Graphs

Dynamically Random Graphs Dynamically Random Graphs Alexis Byers, Wittenberg University Mallory Reed, Earlham College Laura Rucci, Cabrini College Elle VanTilburg, University of Texas-Austin SUMSRI 203 Miami University July 8,

More information

Ma/CS 6b Class 12: Ramsey Theory

Ma/CS 6b Class 12: Ramsey Theory Ma/CS 6b Class 12: Ramsey Theory By Adam Sheffer The Pigeonhole Principle The pigeonhole principle. If n items are put into m containers, such that n > m, then at least one container contains more than

More information

On Universal Cycles of Labeled Graphs

On Universal Cycles of Labeled Graphs On Universal Cycles of Labeled Graphs Greg Brockman Harvard University Cambridge, MA 02138 United States brockman@hcs.harvard.edu Bill Kay University of South Carolina Columbia, SC 29208 United States

More information

PANCYCLICITY WHEN EACH CYCLE CONTAINS k CHORDS

PANCYCLICITY WHEN EACH CYCLE CONTAINS k CHORDS Discussiones Mathematicae Graph Theory xx (xxxx) 1 13 doi:10.7151/dmgt.2106 PANCYCLICITY WHEN EACH CYCLE CONTAINS k CHORDS Vladislav Taranchuk Department of Mathematics and Statistics California State

More information

Partitions and Packings of Complete Geometric Graphs with Plane Spanning Double Stars and Paths

Partitions and Packings of Complete Geometric Graphs with Plane Spanning Double Stars and Paths Partitions and Packings of Complete Geometric Graphs with Plane Spanning Double Stars and Paths Master Thesis Patrick Schnider July 25, 2015 Advisors: Prof. Dr. Emo Welzl, Manuel Wettstein Department of

More information

asymptotic growth rate or order compare two functions, but ignore constant factors, small inputs

asymptotic growth rate or order compare two functions, but ignore constant factors, small inputs Big-Oh 1 asymptotic growth rate or order 2 compare two functions, but ignore constant factors, small inputs asymptotic growth rate or order 2 compare two functions, but ignore constant factors, small inputs

More information

Stanford University CS359G: Graph Partitioning and Expanders Handout 18 Luca Trevisan March 3, 2011

Stanford University CS359G: Graph Partitioning and Expanders Handout 18 Luca Trevisan March 3, 2011 Stanford University CS359G: Graph Partitioning and Expanders Handout 8 Luca Trevisan March 3, 20 Lecture 8 In which we prove properties of expander graphs. Quasirandomness of Expander Graphs Recall that

More information

Open and Closed Sets

Open and Closed Sets Open and Closed Sets Definition: A subset S of a metric space (X, d) is open if it contains an open ball about each of its points i.e., if x S : ɛ > 0 : B(x, ɛ) S. (1) Theorem: (O1) and X are open sets.

More information

What is a minimal spanning tree (MST) and how to find one

What is a minimal spanning tree (MST) and how to find one What is a minimal spanning tree (MST) and how to find one A tree contains a root, the top node. Each node has: One parent Any number of children A spanning tree of a graph is a subgraph that contains all

More information

Maximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube

Maximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube Maximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube Kavish Gandhi April 4, 2015 Abstract A geodesic in the hypercube is the shortest possible path between two vertices. Leader and Long

More information

Approximation Algorithms

Approximation Algorithms Chapter 8 Approximation Algorithms Algorithm Theory WS 2016/17 Fabian Kuhn Approximation Algorithms Optimization appears everywhere in computer science We have seen many examples, e.g.: scheduling jobs

More information

Coloring 3-Colorable Graphs

Coloring 3-Colorable Graphs Coloring -Colorable Graphs Charles Jin April, 015 1 Introduction Graph coloring in general is an etremely easy-to-understand yet powerful tool. It has wide-ranging applications from register allocation

More information

Error Scaling Laws for Linear Optimal Estimation From Relative Measurements Prabir Barooah, Member, IEEE, and João P. Hespanha, Fellow, IEEE

Error Scaling Laws for Linear Optimal Estimation From Relative Measurements Prabir Barooah, Member, IEEE, and João P. Hespanha, Fellow, IEEE IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 12, DECEMBER 2009 5661 Error Scaling Laws for Linear Optimal Estimation From Relative Measurements Prabir Barooah, Member, IEEE, João P. Hespanha,

More information

Math 777 Graph Theory, Spring, 2006 Lecture Note 1 Planar graphs Week 1 Weak 2

Math 777 Graph Theory, Spring, 2006 Lecture Note 1 Planar graphs Week 1 Weak 2 Math 777 Graph Theory, Spring, 006 Lecture Note 1 Planar graphs Week 1 Weak 1 Planar graphs Lectured by Lincoln Lu Definition 1 A drawing of a graph G is a function f defined on V (G) E(G) that assigns

More information

Exchangeability and continuum limits of discrete random structures

Exchangeability and continuum limits of discrete random structures Exchangeability and continuum limits of discrete random structures August 22, 2010 Introduction Probability measures and random variables Exchangeability and de Finetti s theorem Exchangeability and de

More information