55 research outputs found
On the graph limit question of Vera T. S\'os
In the dense graph limit theory, the topology of the set of graphs is defined
by the distribution of the subgraphs spanned by finite number of random
vertices. Vera T. S\'os proposed a question that if we consider only the number
of edges in the spanned subgraphs, then whether it provides an equivalent
definition. We show that the answer is positive on quasirandom graphs, and we
prove a generalization of the statement.Comment: 4 page
Maximum flow is approximable by deterministic constant-time algorithm in sparse networks
We show a deterministic constant-time parallel algorithm for finding an
almost maximum flow in multisource-multitarget networks with bounded degrees
and bounded edge capacities. As a consequence, we show that the value of the
maximum flow over the number of nodes is a testable parameter on these
networks.Comment: 8 page
Independent sets and cuts in large-girth regular graphs
We present a local algorithm producing an independent set of expected size
on large-girth 3-regular graphs and on large-girth
4-regular graphs. We also construct a cut (or bisection or bipartite subgraph)
with edges on large-girth 3-regular graphs. These decrease the gaps
between the best known upper and lower bounds from to , from
to and from to , respectively. We are using
local algorithms, therefore, the method also provides upper bounds for the
fractional coloring numbers of and and fractional edge coloring number . Our algorithms are applications of the technique introduced by Hoppen
and Wormald
Random local algorithms
Consider the problem when we want to construct some structure on a bounded
degree graph, e.g. an almost maximum matching, and we want to decide about each
edge depending only on its constant radius neighbourhood. We show that the
information about the local statistics of the graph does not help here. Namely,
if there exists a random local algorithm which can use any local statistics
about the graph, and produces an almost optimal structure, then the same can be
achieved by a random local algorithm using no statistics.Comment: 9 page
An undecidability result on limits of sparse graphs
Given a set B of finite rooted graphs and a radius r as an input, we prove
that it is undecidable to determine whether there exists a sequence (G_i) of
finite bounded degree graphs such that the rooted r-radius neighbourhood of a
random node of G_i is isomorphic to a rooted graph in B with probability
tending to 1. Our proof implies a similar result for the case where the
sequence (G_i) is replaced by a unimodular random graph.Comment: 6 page
Generalized solution for the Herman Protocol Conjecture
We have a cycle of nodes and there is a token on an odd number of nodes.
At each step, each token independently moves to its clockwise neighbor or stays
at its position with probability . If two tokens arrive to the
same node, then we remove both of them. The process ends when only one token
remains. The question is that for a fixed , which is the initial
configuration that maximizes the expected number of steps . The Herman
Protocol Conjecture says that the -token configuration with distances
and maximizes . We
present a proof of this conjecture not only for but also for
for some function
which method applies for different generalizations of the problem
Efficient Teamwork
Our goal is to solve both problems of adverse selection and moral hazard for
multi-agent projects. In our model, each selected agent can work according to
his private "capability tree". This means a process involving hidden actions,
hidden chance events and hidden costs in a dynamic manner, and providing
contractible consequences which are affecting each other's working process and
the outcome of the project. We will construct a mechanism that induces truthful
revelation of the agents' capability trees and chance events and to follow the
instructions about their hidden decisions. This enables the planner to select
the optimal subset of agents and obtain the efficient joint execution. We will
construct another mechanism that is collusion-resistant but implements an only
approximately efficient outcome. The latter mechanism is widely applicable, and
the major application details will be elaborated.Comment: 51 pages. It contains some colored figures on the first few pages,
but these are readable in black and whit
- …