1,344 research outputs found
The evolution of the cover time
The cover time of a graph is a celebrated example of a parameter that is easy
to approximate using a randomized algorithm, but for which no constant factor
deterministic polynomial time approximation is known. A breakthrough due to
Kahn, Kim, Lovasz and Vu yielded a (log log n)^2 polynomial time approximation.
We refine this upper bound, and show that the resulting bound is sharp and
explicitly computable in random graphs. Cooper and Frieze showed that the cover
time of the largest component of the Erdos-Renyi random graph G(n,c/n) in the
supercritical regime with c>1 fixed, is asymptotic to f(c) n \log^2 n, where
f(c) tends to 1 as c tends to 1. However, our new bound implies that the cover
time for the critical Erdos-Renyi random graph G(n,1/n) has order n, and shows
how the cover time evolves from the critical window to the supercritical phase.
Our general estimate also yields the order of the cover time for a variety of
other concrete graphs, including critical percolation clusters on the Hamming
hypercube {0,1}^n, on high-girth expanders, and on tori Z_n^d for fixed large
d. For the graphs we consider, our results show that the blanket time,
introduced by Winkler and Zuckerman, is within a constant factor of the cover
time. Finally, we prove that for any connected graph, adding an edge can
increase the cover time by at most a factor of 4.Comment: 14 pages, to appear in CP
Query Stability in Monotonic Data-Aware Business Processes [Extended Version]
Organizations continuously accumulate data, often according to some business
processes. If one poses a query over such data for decision support, it is
important to know whether the query is stable, that is, whether the answers
will stay the same or may change in the future because business processes may
add further data. We investigate query stability for conjunctive queries. To
this end, we define a formalism that combines an explicit representation of the
control flow of a process with a specification of how data is read and inserted
into the database. We consider different restrictions of the process model and
the state of the system, such as negation in conditions, cyclic executions,
read access to written data, presence of pending process instances, and the
possibility to start fresh process instances. We identify for which facet
combinations stability of conjunctive queries is decidable and provide
encodings into variants of Datalog that are optimal with respect to the
worst-case complexity of the problem.Comment: This report is the extended version of a paper accepted at the 19th
International Conference on Database Theory (ICDT 2016), March 15-18, 2016 -
Bordeaux, Franc
Steinitz Theorems for Orthogonal Polyhedra
We define a simple orthogonal polyhedron to be a three-dimensional polyhedron
with the topology of a sphere in which three mutually-perpendicular edges meet
at each vertex. By analogy to Steinitz's theorem characterizing the graphs of
convex polyhedra, we find graph-theoretic characterizations of three classes of
simple orthogonal polyhedra: corner polyhedra, which can be drawn by isometric
projection in the plane with only one hidden vertex, xyz polyhedra, in which
each axis-parallel line through a vertex contains exactly one other vertex, and
arbitrary simple orthogonal polyhedra. In particular, the graphs of xyz
polyhedra are exactly the bipartite cubic polyhedral graphs, and every
bipartite cubic polyhedral graph with a 4-connected dual graph is the graph of
a corner polyhedron. Based on our characterizations we find efficient
algorithms for constructing orthogonal polyhedra from their graphs.Comment: 48 pages, 31 figure
Patrolling Grids with a Bit of Memory
We study the following problem in elementary robotics: can a mobile agent
with bits of memory, which is able to sense only locations at Manhattan
distance or less from itself, patrol a -dimensional grid graph? We show
that it is impossible to patrol some grid graphs with bits of memory,
regardless of , and give an exact characterization of those grid graphs that
can be patrolled with bits of memory and visibility range . On the other
hand, we show that, surprisingly, an algorithm exists using bit of memory
and that patrols any -dimensional grid graph
Random Planar Lattices and Integrated SuperBrownian Excursion
In this paper, a surprising connection is described between a specific brand
of random lattices, namely planar quadrangulations, and Aldous' Integrated
SuperBrownian Excursion (ISE). As a consequence, the radius r_n of a random
quadrangulation with n faces is shown to converge, up to scaling, to the width
r=R-L of the support of the one-dimensional ISE. More generally the
distribution of distances to a random vertex in a random quadrangulation is
described in its scaled limit by the random measure ISE shifted to set the
minimum of its support in zero.
The first combinatorial ingredient is an encoding of quadrangulations by
trees embedded in the positive half-line, reminiscent of Cori and Vauquelin's
well labelled trees. The second step relates these trees to embedded (discrete)
trees in the sense of Aldous, via the conjugation of tree principle, an
analogue for trees of Vervaat's construction of the Brownian excursion from the
bridge.
From probability theory, we need a new result of independent interest: the
weak convergence of the encoding of a random embedded plane tree by two contour
walks to the Brownian snake description of ISE.
Our results suggest the existence of a Continuum Random Map describing in
term of ISE the scaled limit of the dynamical triangulations considered in
two-dimensional pure quantum gravity.Comment: 44 pages, 22 figures. Slides and extended abstract version are
available at http://www.loria.fr/~schaeffe/Pub/Diameter/ and
http://www.iecn.u-nancy.fr/~chassain
- …