3,013 research outputs found

    Two problems on independent sets in graphs

    Get PDF
    Let it(G)i_t(G) denote the number of independent sets of size tt in a graph GG. Levit and Mandrescu have conjectured that for all bipartite GG the sequence (it(G))t≥0(i_t(G))_{t \geq 0} (the {\em independent set sequence} of GG) is unimodal. We provide evidence for this conjecture by showing that is true for almost all equibipartite graphs. Specifically, we consider the random equibipartite graph G(n,n,p)G(n,n,p), and show that for any fixed p∈(0,1]p\in(0,1] its independent set sequence is almost surely unimodal, and moreover almost surely log-concave except perhaps for a vanishingly small initial segment of the sequence. We obtain similar results for p=Ω~(n−1/2)p=\tilde{\Omega}(n^{-1/2}). We also consider the problem of estimating i(G)=∑t≥0it(G)i(G)=\sum_{t \geq 0} i_t(G) for GG in various families. We give a sharp upper bound on the number of independent sets in an nn-vertex graph with minimum degree δ\delta, for all fixed δ\delta and sufficiently large nn. Specifically, we show that the maximum is achieved uniquely by Kδ,n−δK_{\delta, n-\delta}, the complete bipartite graph with δ\delta vertices in one partition class and n−δn-\delta in the other. We also present a weighted generalization: for all fixed x>0x>0 and δ>0\delta >0, as long as n=n(x,δ)n=n(x,\delta) is large enough, if GG is a graph on nn vertices with minimum degree δ\delta then ∑t≥0it(G)xt≤∑t≥0it(Kδ,n−δ)xt\sum_{t \geq 0} i_t(G)x^t \leq \sum_{t \geq 0} i_t(K_{\delta, n-\delta})x^t with equality if and only if G=Kδ,n−δG=K_{\delta, n-\delta}.Comment: 15 pages. Appeared in Discrete Mathematics in 201

    On the unimodality of independence polynomials of some graphs

    Full text link
    In this paper we study unimodality problems for the independence polynomial of a graph, including unimodality, log-concavity and reality of zeros. We establish recurrence relations and give factorizations of independence polynomials for certain classes of graphs. As applications we settle some unimodality conjectures and problems.Comment: 17 pages, to appear in European Journal of Combinatoric

    Segmentation and classification of individual tree crowns

    Get PDF
    By segmentation and classification of individual tree crowns in high spatial resolution aerial images, information about the forest can be automatically extracted. Segmentation is about finding the individual tree crowns and giving each of them a unique label. Classification, on the other hand, is about recognising the species of the tree. The information of each individual tree in the forest increases the knowledge about the forest which can be useful for managements, biodiversity assessment, etc. Different algorithms for segmenting individual tree crowns are presented and also compared to each other in order to find their strengths and weaknesses. All segmentation algorithms developed in this thesis focus on preserving the shape of the tree crown. Regions, representing the segmented tree crowns, grow according to certain rules from seed points. One method starts from many regions for each tree crown and searches for the region that fits the tree crown best. The other methods start from a set of seed points, representing the locations of the tree crowns, to create the regions. The segmentation result varies from 73 to 95 % correctly segmented visual tree crowns depending on the type of forest and the method. The former value is for a naturally generated mixed forest and the latter for a non-mixed forest. The classification method presented uses shape information of the segments and colour information of the corresponding tree crown in order to decide the species. The classification method classifies 77 % of the visual trees correctly in a naturally generated mixed forest, but on a forest stand level the classification is over 90 %

    Improved Protocols and Hardness Results for the Two-Player Cryptogenography Problem

    Full text link
    The cryptogenography problem, introduced by Brody, Jakobsen, Scheder, and Winkler (ITCS 2014), is to collaboratively leak a piece of information known to only one member of a group (i)~without revealing who was the origin of this information and (ii)~without any private communication, neither during the process nor before. Despite several deep structural results, even the smallest case of leaking one bit of information present at one of two players is not well understood. Brody et al.\ gave a 2-round protocol enabling the two players to succeed with probability 1/31/3 and showed the hardness result that no protocol can give a success probability of more than~3/83/8. In this work, we show that neither bound is tight. Our new hardness result, obtained by a different application of the concavity method used also in the previous work, states that a success probability better than 0.3672 is not possible. Using both theoretical and numerical approaches, we improve the lower bound to 0.33840.3384, that is, give a protocol leading to this success probability. To ease the design of new protocols, we prove an equivalent formulation of the cryptogenography problem as solitaire vector splitting game. Via an automated game tree search, we find good strategies for this game. We then translate the splits that occurred in this strategy into inequalities relating position values and use an LP solver to find an optimal solution for these inequalities. This gives slightly better game values, but more importantly, it gives a more compact representation of the protocol and a way to easily verify the claimed quality of the protocol. These improved bounds, as well as the large sizes and depths of the improved protocols we find, suggests that finding good protocols for the cryptogenography problem as well as understanding their structure are harder than what the simple problem formulation suggests
    • …
    corecore