1,629 research outputs found
Ramanujan Complexes and bounded degree topological expanders
Expander graphs have been a focus of attention in computer science in the
last four decades. In recent years a high dimensional theory of expanders is
emerging. There are several possible generalizations of the theory of expansion
to simplicial complexes, among them stand out coboundary expansion and
topological expanders. It is known that for every d there are unbounded degree
simplicial complexes of dimension d with these properties. However, a major
open problem, formulated by Gromov, is whether bounded degree high dimensional
expanders, according to these definitions, exist for d >= 2. We present an
explicit construction of bounded degree complexes of dimension d = 2 which are
high dimensional expanders. More precisely, our main result says that the
2-skeletons of the 3-dimensional Ramanujan complexes are topological expanders.
Assuming a conjecture of Serre on the congruence subgroup property, infinitely
many of them are also coboundary expanders.Comment: To appear in FOCS 201
Robustness of Randomized Rumour Spreading
In this work we consider three well-studied broadcast protocols: Push, Pull
and Push&Pull. A key property of all these models, which is also an important
reason for their popularity, is that they are presumed to be very robust, since
they are simple, randomized, and, crucially, do not utilize explicitly the
global structure of the underlying graph. While sporadic results exist, there
has been no systematic theoretical treatment quantifying the robustness of
these models. Here we investigate this question with respect to two orthogonal
aspects: (adversarial) modifications of the underlying graph and message
transmission failures.
We explore in particular the following notion of Local Resilience: beginning
with a graph, we investigate up to which fraction of the edges an adversary has
to be allowed to delete at each vertex, so that the protocols need
significantly more rounds to broadcast the information. Our main findings
establish a separation among the three models. It turns out that Pull is robust
with respect to all parameters that we consider. On the other hand, Push may
slow down significantly, even if the adversary is allowed to modify the degrees
of the vertices by an arbitrarily small positive fraction only. Finally,
Push&Pull is robust when no message transmission failures are considered,
otherwise it may be slowed down.
On the technical side, we develop two novel methods for the analysis of
randomized rumour spreading protocols. First, we exploit the notion of
self-bounding functions to facilitate significantly the round-based analysis:
we show that for any graph the variance of the growth of informed vertices is
bounded by its expectation, so that concentration results follow immediately.
Second, in order to control adversarial modifications of the graph we make use
of a powerful tool from extremal graph theory, namely Szemer\`edi's Regularity
Lemma.Comment: version 2: more thorough literature revie
The Peculiar Phase Structure of Random Graph Bisection
The mincut graph bisection problem involves partitioning the n vertices of a
graph into disjoint subsets, each containing exactly n/2 vertices, while
minimizing the number of "cut" edges with an endpoint in each subset. When
considered over sparse random graphs, the phase structure of the graph
bisection problem displays certain familiar properties, but also some
surprises. It is known that when the mean degree is below the critical value of
2 log 2, the cutsize is zero with high probability. We study how the minimum
cutsize increases with mean degree above this critical threshold, finding a new
analytical upper bound that improves considerably upon previous bounds.
Combined with recent results on expander graphs, our bound suggests the unusual
scenario that random graph bisection is replica symmetric up to and beyond the
critical threshold, with a replica symmetry breaking transition possibly taking
place above the threshold. An intriguing algorithmic consequence is that
although the problem is NP-hard, we can find near-optimal cutsizes (whose ratio
to the optimal value approaches 1 asymptotically) in polynomial time for
typical instances near the phase transition.Comment: substantially revised section 2, changed figures 3, 4 and 6, made
minor stylistic changes and added reference
- …