Law of the Iterated Logarithm in G(n, p)
|
|
- Liliana Baldwin
- 5 years ago
- Views:
Transcription
1 Law of the Iterated Logarithm in G(n, p) Austen James Matt Larson Andrew Salmon Yale University 4 August 2016 of the Iterated Logarithm in G(n, p) 4August2016 1/18
2 G(n, p) G(n, p) is a random graph model. of the Iterated Logarithm in G(n, p) 4August2016 2/18
3 G(n, p) G(n, p) is a random graph model. Connect any two vertices with probability p where 0 < p < 1. of the Iterated Logarithm in G(n, p) 4August2016 2/18
4 G(n, p) G(n, p) is a random graph model. Connect any two vertices with probability p where 0 < p < 1. G(n, p) exhibits a number of well-known properties relating to connectivity, coloring, the appearance of certain subgraphs, etc. of the Iterated Logarithm in G(n, p) 4August2016 2/18
5 The Law of Iterated Logarithm The Law of Iterated Logarithm (LIL) is a property of sequences of random variables, similar to the Central Limit Theorem (CLT). of the Iterated Logarithm in G(n, p) 4August2016 3/18
6 The Law of Iterated Logarithm The Law of Iterated Logarithm (LIL) is a property of sequences of random variables, similar to the Central Limit Theorem (CLT). While the CLT involves the convergence to a normal distribution, the LIL examines the greatest deviations from 0. of the Iterated Logarithm in G(n, p) 4August2016 3/18
7 The Law of Iterated Logarithm The Law of Iterated Logarithm (LIL) is a property of sequences of random variables, similar to the Central Limit Theorem (CLT). While the CLT involves the convergence to a normal distribution, the LIL examines the greatest deviations from 0. Theorem (Khinchin (1924) and Kolmogorov (1929)) nx Let S n = T i with T i iid random variables with 0 mean and 1 variance. i=1 apple S P lim sup p n =1 =1 n!1 2n log log n of the Iterated Logarithm in G(n, p) 4August2016 3/18
8 The Law of Iterated Logarithm The Law of Iterated Logarithm (LIL) is a property of sequences of random variables, similar to the Central Limit Theorem (CLT). While the CLT involves the convergence to a normal distribution, the LIL examines the greatest deviations from 0. Theorem (Khinchin (1924) and Kolmogorov (1929)) nx Let S n = T i with T i iid random variables with 0 mean and 1 variance. i=1 apple S P lim sup p n =1 =1 n!1 2n log log n of the Iterated Logarithm in G(n, p) 4August2016 3/18
9 History of the LIL Not true in general without independence. of the Iterated Logarithm in G(n, p) 4August2016 4/18
10 History of the LIL Not true in general without independence s: Random Walks with some conditions of the Iterated Logarithm in G(n, p) 4August2016 4/18
11 History of the LIL Not true in general without independence s: Random Walks with some conditions 1970 s: Martingales of the Iterated Logarithm in G(n, p) 4August2016 4/18
12 History of the LIL Not true in general without independence s: Random Walks with some conditions 1970 s: Martingales 1985: Random Walks with weaker conditions of the Iterated Logarithm in G(n, p) 4August2016 4/18
13 History of the LIL Not true in general without independence s: Random Walks with some conditions 1970 s: Martingales 1985: Random Walks with weaker conditions 2016: Random Variables coming from Random Graphs of the Iterated Logarithm in G(n, p) 4August2016 4/18
14 Central Limit Theorems in Random Graph Counts 1988: Ruciński proves graph counts of small subgraphs are asymptotically normal. of the Iterated Logarithm in G(n, p) 4August2016 5/18
15 Central Limit Theorems in Random Graph Counts 1988: Ruciński proves graph counts of small subgraphs are asymptotically normal. 1994: Janson proves that some spanning graphs, like spanning trees, Hamiltonian cycles, and perfect matchings, are asymptotically log-normal. Janson (1994) Let T n be the number of trees contained in a random graph in G(n, p). log T n n µ n! N(0, 1) of the Iterated Logarithm in G(n, p) 4August2016 5/18
16 Central Limit Theorems in Random Graph Counts 1988: Ruciński proves graph counts of small subgraphs are asymptotically normal. 1994: Janson proves that some spanning graphs, like spanning trees, Hamiltonian cycles, and perfect matchings, are asymptotically log-normal. Janson (1994) Let T n be the number of trees contained in a random graph in G(n, p). log T n n µ n! N(0, 1) µ n (the mean ) is log E[T n ] 1 p p (recall p is the edge probability). of the Iterated Logarithm in G(n, p) 4August2016 5/18
17 Central Limit Theorems in Random Graph Counts 1988: Ruciński proves graph counts of small subgraphs are asymptotically normal. 1994: Janson proves that some spanning graphs, like spanning trees, Hamiltonian cycles, and perfect matchings, are asymptotically log-normal. Janson (1994) Let T n be the number of trees contained in a random graph in G(n, p). log T n n µ n! N(0, 1) µ n (the mean ) is log E[T n ] n (the standard deviation ) is 1 p p q 2(1 p) p (recall p is the edge probability). of the Iterated Logarithm in G(n, p) 4August2016 5/18
18 Amoreprecisestatement Main result Let T n be the numberapple of trees contained in a random graph in G(n, p). log T n µ P lim sup p n =1 =1 n!1 2 log log n n of the Iterated Logarithm in G(n, p) 4August2016 6/18
19 Amoreprecisestatement Main result Let T n be the numberapple of trees contained in a random graph in G(n, p). log T n µ P lim sup p n =1 =1 n!1 2 log log n µ n and n are as in Janson (1994). n of the Iterated Logarithm in G(n, p) 4August2016 6/18
20 Proof Strategy Work with a di erent random graph model, G(n, m) where graphs are drawn uniformly on n vertices under the constraint that they have exactly m edges. of the Iterated Logarithm in G(n, p) 4August2016 7/18
21 Proof Strategy Work with a di erent random graph model, G(n, m) where graphs are drawn uniformly on n vertices under the constraint that they have exactly m edges. If X nm is the number of trees in a random graph from G(n, m), we need to show that, for some conditions: P[X nm KEX nm ] apple n 4 of the Iterated Logarithm in G(n, p) 4August2016 7/18
22 Proof Strategy Work with a di erent random graph model, G(n, m) where graphs are drawn uniformly on n vertices under the constraint that they have exactly m edges. If X nm is the number of trees in a random graph from G(n, m), we need to show that, for some conditions: P[X nm KEX nm ] apple n 4 To prove this concentration lemma, it is enough to show, by Markov s inequality, that EX k nm apple C k (EX nm ) k of the Iterated Logarithm in G(n, p) 4August2016 7/18
23 Proof Strategy Work with a di erent random graph model, G(n, m) where graphs are drawn uniformly on n vertices under the constraint that they have exactly m edges. If X nm is the number of trees in a random graph from G(n, m), we need to show that, for some conditions: P[X nm KEX nm ] apple n 4 To prove this concentration lemma, it is enough to show, by Markov s inequality, that EX k nm apple C k (EX nm ) k Given this, we can prove the upper and lower bound for the limsup term using the Borel-Cantelli lemma. of the Iterated Logarithm in G(n, p) 4August2016 7/18
24 About the Moment EX k nm In G(n, m), the appearance of a (labeled) subgraph only depends on the number of edges that subgraph contains. of the Iterated Logarithm in G(n, p) 4August2016 8/18
25 About the Moment EX k nm In G(n, m), the appearance of a (labeled) subgraph only depends on the number of edges that subgraph contains. So the probability that the union of trees S k i=1 T i is a subgraph of some graph from G(n, m) depends only on the size of the edge overlap. of the Iterated Logarithm in G(n, p) 4August2016 8/18
26 About the Moment EX k nm In G(n, m), the appearance of a (labeled) subgraph only depends on the number of edges that subgraph contains. So the probability that the union of trees S k i=1 T i is a subgraph of some graph from G(n, m) depends only on the size of the edge overlap. If X nm is the number of trees in a random graph with m edges, then the kth moment E X k nm is equal to: h i E Xnm k = X " # [ P T i (T 1,...,T k ) i of the Iterated Logarithm in G(n, p) 4August2016 8/18
27 The Quantity M(a) But it makes more sense to try to group tuples of trees by the number of edges they contain. P k(n 1) e=n 1 P [e (S i T i)] # {(T 1,...,T k ):e( S i T i)=e} of the Iterated Logarithm in G(n, p) 4August2016 9/18
28 The Quantity M(a) But it makes more sense to try to group tuples of trees by the number of edges they contain. P k(n 1) e=n 1 P [e (S i T i)] # {(T 1,...,T k ):e( S i T i)=e} Rewriting in terms of missing edges yields: n 2 k(n 1) + a (k 1)(n 1) X a=0 M(a) m k(n 1) + a n 2 m of the Iterated Logarithm in G(n, p) 4August2016 9/18
29 The Quantity M(a) But it makes more sense to try to group tuples of trees by the number of edges they contain. P k(n 1) e=n 1 P [e (S i T i)] # {(T 1,...,T k ):e( S i T i)=e} Rewriting in terms of missing edges yields: n 2 k(n 1) + a Definition of M(a) (k 1)(n 1) X a=0 M(a) m k(n 1) + a n 2 m M(a) is the number of k-tuples (T 1,...,T k ) of trees on a graph on n labeled vertices such that: Sk e i=1 T i = k(n 1) a of the Iterated Logarithm in G(n, p) 4August2016 9/18
30 M(a) andthecombinatoricsoftrees From Cayley s formula, we know that there are n n 2 total trees on n labeled vertices. Figure: Cayley s formula for n =2, 3, 4, image taken from Wikipedia of the Iterated Logarithm in G(n, p) 4August /18
31 M(a) andthecombinatoricsoftrees From Cayley s formula, we know that there are n n 2 total trees on n labeled vertices. For two random trees, what is the distribution of the size of the edge intersection? Figure: Cayley s formula for n =2, 3, 4, image taken from Wikipedia of the Iterated Logarithm in G(n, p) 4August /18
32 M(a) andthecombinatoricsoftrees From Cayley s formula, we know that there are n n 2 total trees on n labeled vertices. For two random trees, what is the distribution of the size of the edge intersection? For k (uniformly chosen) random trees, how many edges will overlap in total? Figure: Cayley s formula for n =2, 3, 4, image taken from Wikipedia of the Iterated Logarithm in G(n, p) 4August /18
33 Electrical Networks and Spanning Trees We can convert a graph to an electrical network by setting the resistance to 1. of the Iterated Logarithm in G(n, p) 4August /18
34 Electrical Networks and Spanning Trees We can convert a graph to an electrical network by setting the resistance to 1. Spanning tree edge probability (Kircho ) Let T be a spanning tree chosen uniformly from a graph H. Lete be any edge in H. P[e 2 E(T )] = i(e) That is, the probability that this edge is in T is equal to the current traveling along this edge when we inject one amp at one of the endpoints of e and remove one amp from the other endpoint: of the Iterated Logarithm in G(n, p) 4August /18
35 Electrical Networks are Graphs Many laws relating to electrical networks can be formalized more generally using graph theory. of the Iterated Logarithm in G(n, p) 4August /18
36 Electrical Networks are Graphs Many laws relating to electrical networks can be formalized more generally using graph theory. Ohm s law Let ab be an edge in graph G. LetV ab be the voltage di erence across ab and let R ab be the resistance of ab. Then: i(ab) = V ab R ab of the Iterated Logarithm in G(n, p) 4August /18
37 Electrical Networks are Graphs Many laws relating to electrical networks can be formalized more generally using graph theory. Ohm s law Let ab be an edge in graph G. LetV ab be the voltage di erence across ab and let R ab be the resistance of ab. Then: Rayleigh Monotonicity Law i(ab) = V ab R ab Let G, G 0 be graphs such that G G 0. Then for every edge e 2 E(G): i G (e) i G 0(e) of the Iterated Logarithm in G(n, p) 4August /18
38 An iterative construction We need to construct k-tuples random trees with total edge intersection a. of the Iterated Logarithm in G(n, p) 4August /18
39 An iterative construction We need to construct k-tuples random trees with total edge intersection a. Choose some partition (`2,`3,...,`k) suchthat P i `i = a. of the Iterated Logarithm in G(n, p) 4August /18
40 An iterative construction We need to construct k-tuples random trees with total edge intersection a. Choose some partition (`2,`3,...,`k) suchthat P i `i = a. Given a sequence T 1,...,T t 1 of trees, an additional tree T is `t-overlapping if T shares exactly `t edges with S t 1 i=1 T i. of the Iterated Logarithm in G(n, p) 4August /18
41 An iterative construction We need to construct k-tuples random trees with total edge intersection a. Choose some partition (`2,`3,...,`k) suchthat P i `i = a. Given a sequence T 1,...,T t 1 of trees, an additional tree T is `t-overlapping if T shares exactly `t edges with S t 1 i=1 T i. Counting the number of such trees gives us how often our construction can continue. of the Iterated Logarithm in G(n, p) 4August /18
42 Counting `t-overlapping Trees Reduction (Moon, 1967): the maximum degree of random trees is almost always smaller than log n. of the Iterated Logarithm in G(n, p) 4August /18
43 Counting `t-overlapping Trees Reduction (Moon, 1967): the maximum degree of random trees is almost always smaller than log n. Overlapping Tree Lemma Suppose we have chosen trees T 1,...,T t 1 with maximum degree less than log n. LetS be a fixed set of `t edges and call a tree T t `t-overlapping if it only uses precisely the edges in S as well as unused edges not in T 1,...,T t 1. Then the number of `t-overlapping trees is at most 2`t e 2 2t+O(log5 (n)/n) n n 3 `t of the Iterated Logarithm in G(n, p) 4August /18
44 Counting `t-overlapping Trees Reduction (Moon, 1967): the maximum degree of random trees is almost always smaller than log n. Overlapping Tree Lemma Suppose we have chosen trees T 1,...,T t 1 with maximum degree less than log n. LetS be a fixed set of `t edges and call a tree T t `t-overlapping if it only uses precisely the edges in S as well as unused edges not in T 1,...,T t 1. Then the number of `t-overlapping trees is at most 2`t e 2 2t+O(log5 (n)/n) n n 3 `t The results from electrical networks are well-behaved because of the high minimum degree in K n \ S i T i. of the Iterated Logarithm in G(n, p) 4August /18
45 AProperUpperBoundonM(a) foranyk We can get an upper bound on M(a) becauseanytreesthatsatisfy the condition for M(a) contain a procedure of selecting `t-overlapping trees. of the Iterated Logarithm in G(n, p) 4August /18
46 AProperUpperBoundonM(a) foranyk We can get an upper bound on M(a) becauseanytreesthatsatisfy the condition for M(a) contain a procedure of selecting `t-overlapping trees. By summing over all possible partitions P(a), we use the multinomial theorem. of the Iterated Logarithm in G(n, p) 4August /18
47 AProperUpperBoundonM(a) foranyk We can get an upper bound on M(a) becauseanytreesthatsatisfy the condition for M(a) contain a procedure of selecting `t-overlapping trees. By summing over all possible partitions P(a), we use the multinomial theorem. Upper Bound The total number of trees with a edge overlaps is at most: M(a) apple X Y `t-overlapping Trees `2P(a) n k(n 2) e 2(k 2)+O(log 5 (n)/n) 2 k 2 = a! a of the Iterated Logarithm in G(n, p) 4August /18
48 Some Remarks on the Upper Bound For k = o(n), M(a) N k apple e2( k 2) 2 k 2 a! a (1 + o(1)) of the Iterated Logarithm in G(n, p) 4August /18
49 Some Remarks on the Upper Bound For k = o(n), M(a) N k apple e2( k 2) 2 k 2 a! a (1 + o(1)) The upper bound is a Poisson distribution with parameter =2 k 2. of the Iterated Logarithm in G(n, p) 4August /18
50 Some Remarks on the Upper Bound For k = o(n), M(a) N k apple e2( k 2) 2 k 2 a! a (1 + o(1)) The upper bound is a Poisson distribution with parameter =2 k 2. We P can infer convergence to a Poisson distribution because 1 i=0 M(a) must equal the total number of k-tuples of trees. of the Iterated Logarithm in G(n, p) 4August /18
51 The Law of Iterated Logarithm This asymptotic estimate on M(a) is su concentration equality. cient to prove the of the Iterated Logarithm in G(n, p) 4August /18
52 The Law of Iterated Logarithm This asymptotic estimate on M(a) is su concentration equality. cient to prove the Using similar techniques, we also proved the Law of Iterated Logarithm for the appearance of perfect matchings in random graphs in G(n, p). of the Iterated Logarithm in G(n, p) 4August /18
53 Acknowledgements Thanks to MAA Mathfest for hosting. Thanks to Daniel Montealegre for serving as our advisor. Thanks to SUMRY for giving us the opportunity to work on this problem. of the Iterated Logarithm in G(n, p) 4August /18
Discrete Mathematics Course Review 3
21-228 Discrete Mathematics Course Review 3 This document contains a list of the important definitions and theorems that have been covered thus far in the course. It is not a complete listing of what has
More informationPart II. Graph Theory. Year
Part II Year 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2017 53 Paper 3, Section II 15H Define the Ramsey numbers R(s, t) for integers s, t 2. Show that R(s, t) exists for all s,
More informationDiscrete mathematics , Fall Instructor: prof. János Pach
Discrete mathematics 2016-2017, Fall Instructor: prof. János Pach - covered material - Lecture 1. Counting problems To read: [Lov]: 1.2. Sets, 1.3. Number of subsets, 1.5. Sequences, 1.6. Permutations,
More informationThe loop-erased random walk and the uniform spanning tree on the four-dimensional discrete torus
The loop-erased random walk and the uniform spanning tree on the four-dimensional discrete torus by Jason Schweinsberg University of California at San Diego Outline of Talk 1. Loop-erased random walk 2.
More informationA greedy, partially optimal proof of the Heine-Borel Theorem
A greedy, partially optimal proof of the Heine-Borel Theorem James Fennell September 28, 2017 Abstract The Heine-Borel theorem states that any open cover of the closed interval Œa; b contains a finite
More informationNotation Index. Probability notation. (there exists) (such that) Fn-4 B n (Bell numbers) CL-27 s t (equivalence relation) GT-5.
Notation Index (there exists) (for all) Fn-4 Fn-4 (such that) Fn-4 B n (Bell numbers) CL-27 s t (equivalence relation) GT-5 ( n ) k (binomial coefficient) CL-15 ( n m 1,m 2,...) (multinomial coefficient)
More informationGraph theory. Po-Shen Loh. June We begin by collecting some basic facts which can be proved via bare-hands techniques.
Graph theory Po-Shen Loh June 013 1 Basic results We begin by collecting some basic facts which can be proved via bare-hands techniques. 1. The sum of all of the degrees is equal to twice the number of
More informationInstitute of Operating Systems and Computer Networks Algorithms Group. Network Algorithms. Tutorial 4: Matching and other stuff
Institute of Operating Systems and Computer Networks Algorithms Group Network Algorithms Tutorial 4: Matching and other stuff Christian Rieck Matching 2 Matching A matching M in a graph is a set of pairwise
More informationRandomized algorithms have several advantages over deterministic ones. We discuss them here:
CS787: Advanced Algorithms Lecture 6: Randomized Algorithms In this lecture we introduce randomized algorithms. We will begin by motivating the use of randomized algorithms through a few examples. Then
More information[Ch 6] Set Theory. 1. Basic Concepts and Definitions. 400 lecture note #4. 1) Basics
400 lecture note #4 [Ch 6] Set Theory 1. Basic Concepts and Definitions 1) Basics Element: ; A is a set consisting of elements x which is in a/another set S such that P(x) is true. Empty set: notated {
More information5 Graphs
5 Graphs jacques@ucsd.edu Some of the putnam problems are to do with graphs. They do not assume more than a basic familiarity with the definitions and terminology of graph theory. 5.1 Basic definitions
More informationUnderstanding Disconnection and Stabilization of Chord
Understanding Disconnection and Stabilization of Chord Zhongmei Yao Joint work with Dmitri Loguinov Internet Research Lab Department of Computer Science Texas A&M University, College Station, TX 77843
More informationAssignment 5: Solutions
Algorithm Design Techniques Assignment 5: Solutions () Port Authority. [This problem is more commonly called the Bin Packing Problem.] (a) Suppose K = 3 and (w, w, w 3, w 4 ) = (,,, ). The optimal solution
More information1 Better Approximation of the Traveling Salesman
Stanford University CS261: Optimization Handout 4 Luca Trevisan January 13, 2011 Lecture 4 In which we describe a 1.5-approximate algorithm for the Metric TSP, we introduce the Set Cover problem, observe
More informationMath 443/543 Graph Theory Notes
Math 443/543 Graph Theory Notes David Glickenstein September 3, 2008 1 Introduction We will begin by considering several problems which may be solved using graphs, directed graphs (digraphs), and networks.
More informationCPSC 536N: Randomized Algorithms Term 2. Lecture 10
CPSC 536N: Randomized Algorithms 011-1 Term Prof. Nick Harvey Lecture 10 University of British Columbia In the first lecture we discussed the Max Cut problem, which is NP-complete, and we presented a very
More informationGraph Theory Problem Ideas
Graph Theory Problem Ideas April 15, 017 Note: Please let me know if you have a problem that you would like me to add to the list! 1 Classification Given a degree sequence d 1,...,d n, let N d1,...,d n
More informationNotation Index 9 (there exists) Fn-4 8 (for all) Fn-4 3 (such that) Fn-4 B n (Bell numbers) CL-25 s ο t (equivalence relation) GT-4 n k (binomial coef
Notation 9 (there exists) Fn-4 8 (for all) Fn-4 3 (such that) Fn-4 B n (Bell numbers) CL-25 s ο t (equivalence relation) GT-4 n k (binomial coefficient) CL-14 (multinomial coefficient) CL-18 n m 1 ;m 2
More informationHW Graph Theory SOLUTIONS (hbovik) - Q
1, Diestel 9.3: An arithmetic progression is an increasing sequence of numbers of the form a, a+d, a+ d, a + 3d.... Van der Waerden s theorem says that no matter how we partition the natural numbers into
More informationCS270 Combinatorial Algorithms & Data Structures Spring Lecture 19:
CS270 Combinatorial Algorithms & Data Structures Spring 2003 Lecture 19: 4.1.03 Lecturer: Satish Rao Scribes: Kevin Lacker and Bill Kramer Disclaimer: These notes have not been subjected to the usual scrutiny
More informationGraph Theory Day Four
Graph Theory Day Four February 8, 018 1 Connected Recall from last class, we discussed methods for proving a graph was connected. Our two methods were 1) Based on the definition, given any u, v V(G), there
More informationr=1 The Binomial Theorem. 4 MA095/98G Revision
Revision Read through the whole course once Make summary sheets of important definitions and results, you can use the following pages as a start and fill in more yourself Do all assignments again Do the
More informationThe number of spanning trees of random 2-trees
The number of spanning trees of random 2-trees Stephan Wagner (joint work with Elmar Teufl) Stellenbosch University AofA 15 Strobl, 8 June, 2015 2-trees 2-trees are constructed recursively: Spanning trees
More informationA synchronizer generates sequences of clock pulses at each node of the network satisfying the condition given by the following definition.
Chapter 8 Synchronizers So far, we have mainly studied synchronous algorithms because generally, asynchronous algorithms are often more di cult to obtain and it is substantially harder to reason about
More informationHW Graph Theory Name (andrewid) - X. 1: Draw K 7 on a torus with no edge crossings.
1: Draw K 7 on a torus with no edge crossings. A quick calculation reveals that an embedding of K 7 on the torus is a -cell embedding. At that point, it is hard to go wrong if you start drawing C 3 faces,
More informationMath 443/543 Graph Theory Notes
Math 443/543 Graph Theory Notes David Glickenstein September 8, 2014 1 Introduction We will begin by considering several problems which may be solved using graphs, directed graphs (digraphs), and networks.
More information4 non-obvious examples/results. 2. The core idea in our probabilistic reformulation
1. Local weak convergence of graphs/networks Stuff that s obvious when you think about it 4 non-obvious examples/results 2. The core idea in our probabilistic reformulation of special cases of the cavity
More informationToday. Lecture 4: Last time. The EM algorithm. We examine clustering in a little more detail; we went over it a somewhat quickly last time
Today Lecture 4: We examine clustering in a little more detail; we went over it a somewhat quickly last time The CAD data will return and give us an opportunity to work with curves (!) We then examine
More informationMath Summer 2012
Math 481 - Summer 2012 Final Exam You have one hour and fifty minutes to complete this exam. You are not allowed to use any electronic device. Be sure to give reasonable justification to all your answers.
More informationComputing intersections in a set of line segments: the Bentley-Ottmann algorithm
Computing intersections in a set of line segments: the Bentley-Ottmann algorithm Michiel Smid October 14, 2003 1 Introduction In these notes, we introduce a powerful technique for solving geometric problems.
More informationStatistics for a Random Network Design Problem
DIMACS Technical Report 2009-20 September 2009 Statistics for a Random Network Design Problem by Fred J. Rispoli 1 Fred_Rispoli@dowling.edu Steven Cosares cosares@aol.com DIMACS is a collaborative project
More informationSpanning Trees. John Martinez. November 12, 2012
Spanning Trees John Martinez November 12, 2012 Abstract Following an article of D.R. Shier [S], this paper deals with the formation of spanning trees given the bipartite graph K 2,n. In addition to a more
More informationGraph theory - solutions to problem set 1
Graph theory - solutions to problem set 1 1. (a) Is C n a subgraph of K n? Exercises (b) For what values of n and m is K n,n a subgraph of K m? (c) For what n is C n a subgraph of K n,n? (a) Yes! (you
More informationHAMILTON CYCLES IN RANDOM LIFTS OF COMPLETE GRAPHS
HAMILTON CYCLES IN RANDOM LIFTS OF COMPLETE GRAPHS TOMASZ LUCZAK, LUKASZ WITKOWSKI, AND MARCIN WITKOWSKI Abstract. We study asymptotic properties of random lifts a model of random graph introduced by Amit
More informationMatchings. Examples. K n,m, K n, Petersen graph, Q k ; graphs without perfect matching. A maximal matching cannot be enlarged by adding another edge.
Matchings A matching is a set of (non-loop) edges with no shared endpoints. The vertices incident to an edge of a matching M are saturated by M, the others are unsaturated. A perfect matching of G is a
More informationMATH 363 Final Wednesday, April 28. Final exam. You may use lemmas and theorems that were proven in class and on assignments unless stated otherwise.
Final exam This is a closed book exam. No calculators are allowed. Unless stated otherwise, justify all your steps. You may use lemmas and theorems that were proven in class and on assignments unless stated
More informationDiscrete Mathematics Lecture 4. Harper Langston New York University
Discrete Mathematics Lecture 4 Harper Langston New York University Sequences Sequence is a set of (usually infinite number of) ordered elements: a 1, a 2,, a n, Each individual element a k is called a
More informationDO NOT RE-DISTRIBUTE THIS SOLUTION FILE
Professor Kindred Math 104, Graph Theory Homework 2 Solutions February 7, 2013 Introduction to Graph Theory, West Section 1.2: 26, 38, 42 Section 1.3: 14, 18 Section 2.1: 26, 29, 30 DO NOT RE-DISTRIBUTE
More informationSymmetric Product Graphs
Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 5-20-2015 Symmetric Product Graphs Evan Witz Follow this and additional works at: http://scholarworks.rit.edu/theses
More informationMAS 341: GRAPH THEORY 2016 EXAM SOLUTIONS
MAS 341: GRAPH THEORY 2016 EXAM SOLUTIONS 1. Question 1 Part i. There are many Hamiltonian cycles; e.g., ABLKJEDFIHGC. We now show that if we remove vertex D, the result G \ {D} is not hamiltonian. Note
More informationEdge-disjoint Spanning Trees in Triangulated Graphs on Surfaces and application to node labeling 1
Edge-disjoint Spanning Trees in Triangulated Graphs on Surfaces and application to node labeling 1 Arnaud Labourel a a LaBRI - Universite Bordeaux 1, France Abstract In 1974, Kundu [4] has shown that triangulated
More informationCS261: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem
CS61: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem Tim Roughgarden February 5, 016 1 The Traveling Salesman Problem (TSP) In this lecture we study a famous computational problem,
More informationAXIOMS FOR THE INTEGERS
AXIOMS FOR THE INTEGERS BRIAN OSSERMAN We describe the set of axioms for the integers which we will use in the class. The axioms are almost the same as what is presented in Appendix A of the textbook,
More informationExtremal Graph Theory: Turán s Theorem
Bridgewater State University Virtual Commons - Bridgewater State University Honors Program Theses and Projects Undergraduate Honors Program 5-9-07 Extremal Graph Theory: Turán s Theorem Vincent Vascimini
More informationLecture 20 : Trees DRAFT
CS/Math 240: Introduction to Discrete Mathematics 4/12/2011 Lecture 20 : Trees Instructor: Dieter van Melkebeek Scribe: Dalibor Zelený DRAFT Last time we discussed graphs. Today we continue this discussion,
More informationMonochromatic Matchings in the Shadow Graph of Almost Complete Hypergraphs
Ann. Comb. 14 (010 45 49 DOI 10.1007/s0006-010-0058-1 Published online May 5, 010 Springer Basel AG 010 Annals of Combinatorics Monochromatic Matchings in the Shadow Graph of Almost Complete Hypergraphs
More informationKruskal s MST Algorithm
Kruskal s MST Algorithm CLRS Chapter 23, DPV Chapter 5 Version of November 5, 2014 Main Topics of This Lecture Kruskal s algorithm Another, but different, greedy MST algorithm Introduction to UNION-FIND
More informationCharacterizations of Trees
Characterizations of Trees Lemma Every tree with at least two vertices has at least two leaves. Proof. 1. A connected graph with at least two vertices has an edge. 2. In an acyclic graph, an end point
More informationOutline. CS38 Introduction to Algorithms. Approximation Algorithms. Optimization Problems. Set Cover. Set cover 5/29/2014. coping with intractibility
Outline CS38 Introduction to Algorithms Lecture 18 May 29, 2014 coping with intractibility approximation algorithms set cover TSP center selection randomness in algorithms May 29, 2014 CS38 Lecture 18
More information{ 1} Definitions. 10. Extremal graph theory. Problem definition Paths and cycles Complete subgraphs
Problem definition Paths and cycles Complete subgraphs 10. Extremal graph theory 10.1. Definitions Let us examine the following forbidden subgraph problems: At most how many edges are in a graph of order
More informationChapter 1. Introduction
Chapter 1 Introduction A Monte Carlo method is a compuational method that uses random numbers to compute (estimate) some quantity of interest. Very often the quantity we want to compute is the mean of
More informationLecture 2 The k-means clustering problem
CSE 29: Unsupervised learning Spring 2008 Lecture 2 The -means clustering problem 2. The -means cost function Last time we saw the -center problem, in which the input is a set S of data points and the
More informationSmall Survey on Perfect Graphs
Small Survey on Perfect Graphs Michele Alberti ENS Lyon December 8, 2010 Abstract This is a small survey on the exciting world of Perfect Graphs. We will see when a graph is perfect and which are families
More informationHW Graph Theory SOLUTIONS (hbovik)
Diestel 1.3: Let G be a graph containing a cycle C, and assume that G contains a path P of length at least k between two vertices of C. Show that G contains a cycle of length at least k. If C has length
More informationCombinatorics Summary Sheet for Exam 1 Material 2019
Combinatorics Summary Sheet for Exam 1 Material 2019 1 Graphs Graph An ordered three-tuple (V, E, F ) where V is a set representing the vertices, E is a set representing the edges, and F is a function
More informationTheorem 2.9: nearest addition algorithm
There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used
More informationWUCT121. Discrete Mathematics. Graphs
WUCT121 Discrete Mathematics Graphs WUCT121 Graphs 1 Section 1. Graphs 1.1. Introduction Graphs are used in many fields that require analysis of routes between locations. These areas include communications,
More informationTHE LOGIC OF QUANTIFIED STATEMENTS
CHAPTER 3 THE LOGIC OF QUANTIFIED STATEMENTS Copyright Cengage Learning. All rights reserved. SECTION 3.4 Arguments with Quantified Statements Copyright Cengage Learning. All rights reserved. Arguments
More informationExercise set 2 Solutions
Exercise set 2 Solutions Let H and H be the two components of T e and let F E(T ) consist of the edges of T with one endpoint in V (H), the other in V (H ) Since T is connected, F Furthermore, since T
More informationMatching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.
18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have
More informationApproximation scheme for the traveling salesman problem
Chapter 15 Approximation scheme for the traveling salesman problem 15.1 Multiterminal cut In this chapter, we describe a methodology that can be used for some problems for which the previous chapter s
More informationSome Upper Bounds for Signed Star Domination Number of Graphs. S. Akbari, A. Norouzi-Fard, A. Rezaei, R. Rotabi, S. Sabour.
Some Upper Bounds for Signed Star Domination Number of Graphs S. Akbari, A. Norouzi-Fard, A. Rezaei, R. Rotabi, S. Sabour Abstract Let G be a graph with the vertex set V (G) and edge set E(G). A function
More informationComputational Geometry
Windowing queries Windowing Windowing queries Zoom in; re-center and zoom in; select by outlining Windowing Windowing queries Windowing Windowing queries Given a set of n axis-parallel line segments, preprocess
More informationGraph Theory. 1 Introduction to Graphs. Martin Stynes Department of Mathematics, UCC January 26, 2011
Graph Theory Martin Stynes Department of Mathematics, UCC email: m.stynes@ucc.ie January 26, 2011 1 Introduction to Graphs 1 A graph G = (V, E) is a non-empty set of nodes or vertices V and a (possibly
More information3 No-Wait Job Shops with Variable Processing Times
3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select
More informationMatching 4/21/2016. Bipartite Matching. 3330: Algorithms. First Try. Maximum Matching. Key Questions. Existence of Perfect Matching
Bipartite Matching Matching 3330: Algorithms A graph is bipartite if its vertex set can be partitioned into two subsets A and B so that each edge has one endpoint in A and the other endpoint in B. A B
More informationIntroduction to Randomized Algorithms
Introduction to Randomized Algorithms Gopinath Mishra Advanced Computing and Microelectronics Unit Indian Statistical Institute Kolkata 700108, India. Organization 1 Introduction 2 Some basic ideas from
More informationChapter 8. NP-complete problems
Chapter 8. NP-complete problems Search problems E cient algorithms We have developed algorithms for I I I I I finding shortest paths in graphs, minimum spanning trees in graphs, matchings in bipartite
More informationLecture 17. Lower bound for variable-length source codes with error. Coding a sequence of symbols: Rates and scheme (Arithmetic code)
Lecture 17 Agenda for the lecture Lower bound for variable-length source codes with error Coding a sequence of symbols: Rates and scheme (Arithmetic code) Introduction to universal codes 17.1 variable-length
More informationDO NOT RE-DISTRIBUTE THIS SOLUTION FILE
Professor Kindred Math 104, Graph Theory Homework 3 Solutions February 14, 2013 Introduction to Graph Theory, West Section 2.1: 37, 62 Section 2.2: 6, 7, 15 Section 2.3: 7, 10, 14 DO NOT RE-DISTRIBUTE
More informationMath 776 Graph Theory Lecture Note 1 Basic concepts
Math 776 Graph Theory Lecture Note 1 Basic concepts Lectured by Lincoln Lu Transcribed by Lincoln Lu Graph theory was founded by the great Swiss mathematician Leonhard Euler (1707-178) after he solved
More informationGraphs and Network Flows IE411. Lecture 21. Dr. Ted Ralphs
Graphs and Network Flows IE411 Lecture 21 Dr. Ted Ralphs IE411 Lecture 21 1 Combinatorial Optimization and Network Flows In general, most combinatorial optimization and integer programming problems are
More informationInterleaving Schemes on Circulant Graphs with Two Offsets
Interleaving Schemes on Circulant raphs with Two Offsets Aleksandrs Slivkins Department of Computer Science Cornell University Ithaca, NY 14853 slivkins@cs.cornell.edu Jehoshua Bruck Department of Electrical
More informationNotes for Lecture 20
U.C. Berkeley CS170: Intro to CS Theory Handout N20 Professor Luca Trevisan November 13, 2001 Notes for Lecture 20 1 Duality As it turns out, the max-flow min-cut theorem is a special case of a more general
More informationCache-Oblivious Traversals of an Array s Pairs
Cache-Oblivious Traversals of an Array s Pairs Tobias Johnson May 7, 2007 Abstract Cache-obliviousness is a concept first introduced by Frigo et al. in [1]. We follow their model and develop a cache-oblivious
More informationMath 443/543 Graph Theory Notes 2: Transportation problems
Math 443/543 Graph Theory Notes 2: Transportation problems David Glickenstein September 15, 2014 1 Readings This is based on Chartrand Chapter 3 and Bondy-Murty 18.1, 18.3 (part on Closure of a Graph).
More informationIntroduction. I Given a weighted, directed graph G =(V, E) with weight function
ntroduction Computer Science & Engineering 2/82 Design and Analysis of Algorithms Lecture 06 Single-Source Shortest Paths (Chapter 2) Stephen Scott (Adapted from Vinodchandran N. Variyam) sscott@cse.unl.edu
More informationColoring Random Graphs
Coloring Random Graphs A Short and Biased Survey Lefteris M. Kirousis RA Computer Technology Institute and Department of Computer Engineering and Informatics, University of Patras 5th Athens Colloquium
More informationBalls Into Bins Model Occupancy Problems
Balls Into Bins Model Occupancy Problems Assume that m balls are thrown randomly is n bins, i.e., the location of each ball is independently and uniformly chosen at random from the n possibilities. How
More informationResults on the min-sum vertex cover problem
Results on the min-sum vertex cover problem Ralucca Gera, 1 Craig Rasmussen, Pantelimon Stănică 1 Naval Postgraduate School Monterey, CA 9393, USA {rgera, ras, pstanica}@npsedu and Steve Horton United
More informationPartha Sarathi Mandal
MA 515: Introduction to Algorithms & MA353 : Design and Analysis of Algorithms [3-0-0-6] Lecture 39 http://www.iitg.ernet.in/psm/indexing_ma353/y09/index.html Partha Sarathi Mandal psm@iitg.ernet.in Dept.
More information8.1 Basic notions, facts and techniques
8 Infinite Graphs The study of infinite graphs is an attractive, but often neglected, part of graph theory. This chapter aims to give an introduction that starts gently, but then moves on in several directions
More informationSection 3.1: Nonseparable Graphs Cut vertex of a connected graph G: A vertex x G such that G x is not connected. Theorem 3.1, p. 57: Every connected
Section 3.1: Nonseparable Graphs Cut vertex of a connected graph G: A vertex x G such that G x is not connected. Theorem 3.1, p. 57: Every connected graph G with at least 2 vertices contains at least 2
More information22 Elementary Graph Algorithms. There are two standard ways to represent a
VI Graph Algorithms Elementary Graph Algorithms Minimum Spanning Trees Single-Source Shortest Paths All-Pairs Shortest Paths 22 Elementary Graph Algorithms There are two standard ways to represent a graph
More informationMC 302 GRAPH THEORY 10/1/13 Solutions to HW #2 50 points + 6 XC points
MC 0 GRAPH THEORY 0// Solutions to HW # 0 points + XC points ) [CH] p.,..7. This problem introduces an important class of graphs called the hypercubes or k-cubes, Q, Q, Q, etc. I suggest that before you
More informationDynamically Random Graphs
Dynamically Random Graphs Alexis Byers, Wittenberg University Mallory Reed, Earlham College Laura Rucci, Cabrini College Elle VanTilburg, University of Texas-Austin SUMSRI 203 Miami University July 8,
More informationMa/CS 6b Class 12: Ramsey Theory
Ma/CS 6b Class 12: Ramsey Theory By Adam Sheffer The Pigeonhole Principle The pigeonhole principle. If n items are put into m containers, such that n > m, then at least one container contains more than
More informationOn Universal Cycles of Labeled Graphs
On Universal Cycles of Labeled Graphs Greg Brockman Harvard University Cambridge, MA 02138 United States brockman@hcs.harvard.edu Bill Kay University of South Carolina Columbia, SC 29208 United States
More informationPANCYCLICITY WHEN EACH CYCLE CONTAINS k CHORDS
Discussiones Mathematicae Graph Theory xx (xxxx) 1 13 doi:10.7151/dmgt.2106 PANCYCLICITY WHEN EACH CYCLE CONTAINS k CHORDS Vladislav Taranchuk Department of Mathematics and Statistics California State
More informationPartitions and Packings of Complete Geometric Graphs with Plane Spanning Double Stars and Paths
Partitions and Packings of Complete Geometric Graphs with Plane Spanning Double Stars and Paths Master Thesis Patrick Schnider July 25, 2015 Advisors: Prof. Dr. Emo Welzl, Manuel Wettstein Department of
More informationasymptotic growth rate or order compare two functions, but ignore constant factors, small inputs
Big-Oh 1 asymptotic growth rate or order 2 compare two functions, but ignore constant factors, small inputs asymptotic growth rate or order 2 compare two functions, but ignore constant factors, small inputs
More informationStanford University CS359G: Graph Partitioning and Expanders Handout 18 Luca Trevisan March 3, 2011
Stanford University CS359G: Graph Partitioning and Expanders Handout 8 Luca Trevisan March 3, 20 Lecture 8 In which we prove properties of expander graphs. Quasirandomness of Expander Graphs Recall that
More informationOpen and Closed Sets
Open and Closed Sets Definition: A subset S of a metric space (X, d) is open if it contains an open ball about each of its points i.e., if x S : ɛ > 0 : B(x, ɛ) S. (1) Theorem: (O1) and X are open sets.
More informationWhat is a minimal spanning tree (MST) and how to find one
What is a minimal spanning tree (MST) and how to find one A tree contains a root, the top node. Each node has: One parent Any number of children A spanning tree of a graph is a subgraph that contains all
More informationMaximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube
Maximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube Kavish Gandhi April 4, 2015 Abstract A geodesic in the hypercube is the shortest possible path between two vertices. Leader and Long
More informationApproximation Algorithms
Chapter 8 Approximation Algorithms Algorithm Theory WS 2016/17 Fabian Kuhn Approximation Algorithms Optimization appears everywhere in computer science We have seen many examples, e.g.: scheduling jobs
More informationColoring 3-Colorable Graphs
Coloring -Colorable Graphs Charles Jin April, 015 1 Introduction Graph coloring in general is an etremely easy-to-understand yet powerful tool. It has wide-ranging applications from register allocation
More informationError Scaling Laws for Linear Optimal Estimation From Relative Measurements Prabir Barooah, Member, IEEE, and João P. Hespanha, Fellow, IEEE
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 12, DECEMBER 2009 5661 Error Scaling Laws for Linear Optimal Estimation From Relative Measurements Prabir Barooah, Member, IEEE, João P. Hespanha,
More informationMath 777 Graph Theory, Spring, 2006 Lecture Note 1 Planar graphs Week 1 Weak 2
Math 777 Graph Theory, Spring, 006 Lecture Note 1 Planar graphs Week 1 Weak 1 Planar graphs Lectured by Lincoln Lu Definition 1 A drawing of a graph G is a function f defined on V (G) E(G) that assigns
More informationExchangeability and continuum limits of discrete random structures
Exchangeability and continuum limits of discrete random structures August 22, 2010 Introduction Probability measures and random variables Exchangeability and de Finetti s theorem Exchangeability and de
More information