102 research outputs found

    Cycles in Random Bipartite Graphs

    Full text link
    In this paper we study cycles in random bipartite graph G(n,n,p)G(n,n,p). We prove that if p≫nβˆ’2/3p\gg n^{-2/3}, then G(n,n,p)G(n,n,p) a.a.s. satisfies the following. Every subgraph Gβ€²βŠ‚G(n,n,p)G'\subset G(n,n,p) with more than (1+o(1))n2p/2(1+o(1))n^2p/2 edges contains a cycle of length tt for all even t∈[4,(1+o(1))n/30]t\in[4,(1+o(1))n/30]. Our theorem complements a previous result on bipancyclicity, and is closely related to a recent work of Lee and Samotij.Comment: 8 pages, 2 figure

    Trace Formulae and Spectral Statistics for Discrete Laplacians on Regular Graphs (II)

    Full text link
    Following the derivation of the trace formulae in the first paper in this series, we establish here a connection between the spectral statistics of random regular graphs and the predictions of Random Matrix Theory (RMT). This follows from the known Poisson distribution of cycle counts in regular graphs, in the limit that the cycle periods are kept constant and the number of vertices increases indefinitely. The result is analogous to the so called "diagonal approximation" in Quantum Chaos. We also show that by assuming that the spectral correlations are given by RMT to all orders, we can compute the leading deviations from the Poisson distribution for cycle counts. We provide numerical evidence which supports this conjecture.Comment: 15 pages, 5 figure

    Exchangeable pairs, switchings, and random regular graphs

    Full text link
    We consider the distribution of cycle counts in a random regular graph, which is closely linked to the graph's spectral properties. We broaden the asymptotic regime in which the cycle counts are known to be approximately Poisson, and we give an explicit bound in total variation distance for the approximation. Using this result, we calculate limiting distributions of linear eigenvalue functionals for random regular graphs. Previous results on the distribution of cycle counts by McKay, Wormald, and Wysocka (2004) used the method of switchings, a combinatorial technique for asymptotic enumeration. Our proof uses Stein's method of exchangeable pairs and demonstrates an interesting connection between the two techniques.Comment: Very minor changes; 23 page

    Strong Secrecy for Erasure Wiretap Channels

    Full text link
    We show that duals of certain low-density parity-check (LDPC) codes, when used in a standard coset coding scheme, provide strong secrecy over the binary erasure wiretap channel (BEWC). This result hinges on a stopping set analysis of ensembles of LDPC codes with block length nn and girth β‰₯2k\geq 2k, for some kβ‰₯2k \geq 2. We show that if the minimum left degree of the ensemble is lminl_\mathrm{min}, the expected probability of block error is \calO(\frac{1}{n^{\lceil l_\mathrm{min} k /2 \rceil - k}}) when the erasure probability Ο΅<Ο΅ef\epsilon < \epsilon_\mathrm{ef}, where Ο΅ef\epsilon_\mathrm{ef} depends on the degree distribution of the ensemble. As long as lmin>2l_\mathrm{min} > 2 and k>2k > 2, the dual of this LDPC code provides strong secrecy over a BEWC of erasure probability greater than 1βˆ’Ο΅ef1 - \epsilon_\mathrm{ef}.Comment: Submitted to the Information Theory Workship (ITW) 2010, Dubli

    Approximating max-min linear programs with local algorithms

    Full text link
    A local algorithm is a distributed algorithm where each node must operate solely based on the information that was available at system startup within a constant-size neighbourhood of the node. We study the applicability of local algorithms to max-min LPs where the objective is to maximise min⁑kβˆ‘vckvxv\min_k \sum_v c_{kv} x_v subject to βˆ‘vaivxv≀1\sum_v a_{iv} x_v \le 1 for each ii and xvβ‰₯0x_v \ge 0 for each vv. Here ckvβ‰₯0c_{kv} \ge 0, aivβ‰₯0a_{iv} \ge 0, and the support sets Vi={v:aiv>0}V_i = \{v : a_{iv} > 0 \}, Vk={v:ckv>0}V_k = \{v : c_{kv}>0 \}, Iv={i:aiv>0}I_v = \{i : a_{iv} > 0 \} and Kv={k:ckv>0}K_v = \{k : c_{kv} > 0 \} have bounded size. In the distributed setting, each agent vv is responsible for choosing the value of xvx_v, and the communication network is a hypergraph H\mathcal{H} where the sets VkV_k and ViV_i constitute the hyperedges. We present inapproximability results for a wide range of structural assumptions; for example, even if ∣Vi∣|V_i| and ∣Vk∣|V_k| are bounded by some constants larger than 2, there is no local approximation scheme. To contrast the negative results, we present a local approximation algorithm which achieves good approximation ratios if we can bound the relative growth of the vertex neighbourhoods in H\mathcal{H}.Comment: 16 pages, 2 figure
    • …
    corecore