79 research outputs found
Cycles in Random Bipartite Graphs
In this paper we study cycles in random bipartite graph . We prove
that if , then a.a.s. satisfies the following. Every
subgraph with more than edges contains a
cycle of length for all even . Our theorem
complements a previous result on bipancyclicity, and is closely related to a
recent work of Lee and Samotij.Comment: 8 pages, 2 figure
Generating random graphs in biased Maker-Breaker games
We present a general approach connecting biased Maker-Breaker games and
problems about local resilience in random graphs. We utilize this approach to
prove new results and also to derive some known results about biased
Maker-Breaker games. In particular, we show that for
, Maker can build a pancyclic graph (that is, a graph
that contains cycles of every possible length) while playing a game on
. As another application, we show that for , playing a game on , Maker can build a graph which
contains copies of all spanning trees having maximum degree with
a bare path of linear length (a bare path in a tree is a path with all
interior vertices of degree exactly two in )
The number of Hamiltonian decompositions of regular graphs
A Hamilton cycle in a graph is a cycle passing through every vertex
of . A Hamiltonian decomposition of is a partition of its edge
set into disjoint Hamilton cycles. One of the oldest results in graph theory is
Walecki's theorem from the 19th century, showing that a complete graph on
an odd number of vertices has a Hamiltonian decomposition. This result was
recently greatly extended by K\"{u}hn and Osthus. They proved that every
-regular -vertex graph with even degree for some fixed
has a Hamiltonian decomposition, provided is sufficiently
large. In this paper we address the natural question of estimating ,
the number of such decompositions of . Our main result is that
. In particular, the number of Hamiltonian
decompositions of is
Robustness of Randomized Rumour Spreading
In this work we consider three well-studied broadcast protocols: Push, Pull
and Push&Pull. A key property of all these models, which is also an important
reason for their popularity, is that they are presumed to be very robust, since
they are simple, randomized, and, crucially, do not utilize explicitly the
global structure of the underlying graph. While sporadic results exist, there
has been no systematic theoretical treatment quantifying the robustness of
these models. Here we investigate this question with respect to two orthogonal
aspects: (adversarial) modifications of the underlying graph and message
transmission failures.
We explore in particular the following notion of Local Resilience: beginning
with a graph, we investigate up to which fraction of the edges an adversary has
to be allowed to delete at each vertex, so that the protocols need
significantly more rounds to broadcast the information. Our main findings
establish a separation among the three models. It turns out that Pull is robust
with respect to all parameters that we consider. On the other hand, Push may
slow down significantly, even if the adversary is allowed to modify the degrees
of the vertices by an arbitrarily small positive fraction only. Finally,
Push&Pull is robust when no message transmission failures are considered,
otherwise it may be slowed down.
On the technical side, we develop two novel methods for the analysis of
randomized rumour spreading protocols. First, we exploit the notion of
self-bounding functions to facilitate significantly the round-based analysis:
we show that for any graph the variance of the growth of informed vertices is
bounded by its expectation, so that concentration results follow immediately.
Second, in order to control adversarial modifications of the graph we make use
of a powerful tool from extremal graph theory, namely Szemer\`edi's Regularity
Lemma.Comment: version 2: more thorough literature revie
Random subgraphs make identification affordable
An identifying code of a graph is a dominating set which uniquely determines
all the vertices by their neighborhood within the code. Whereas graphs with
large minimum degree have small domination number, this is not the case for the
identifying code number (the size of a smallest identifying code), which indeed
is not even a monotone parameter with respect to graph inclusion.
We show that every graph with vertices, maximum degree
and minimum degree , for some
constant , contains a large spanning subgraph which admits an identifying
code with size . In particular, if
, then has a dense spanning subgraph with identifying
code , namely, of asymptotically optimal size. The
subgraph we build is created using a probabilistic approach, and we use an
interplay of various random methods to analyze it. Moreover we show that the
result is essentially best possible, both in terms of the number of deleted
edges and the size of the identifying code
- …