Contagious sets in random graphs

Slides:



Advertisements
Similar presentations
Lower Bounds for Additive Spanners, Emulators, and More David P. Woodruff MIT and Tsinghua University To appear in FOCS, 2006.
Advertisements

Long cycles, short cycles, min-degree subgraphs, and feedback arc sets in Eulerian digraphs Raphael Yuster joint work with Asaf Shapira Eilat 2012.
Jennifer Tour Chayes Joint work with N. Berger, C. Borgs, A. Ganesh, A. Saberi, D. B. Wilson Controlling the Spread of Viruses on Power-Law Networks.
Circuit and Communication Complexity. Karchmer – Wigderson Games Given The communication game G f : Alice getss.t. f(x)=1 Bob getss.t. f(y)=0 Goal: Find.
Incremental Linear Programming Linear programming involves finding a solution to the constraints, one that maximizes the given linear function of variables.
On the Density of a Graph and its Blowup Raphael Yuster Joint work with Asaf Shapira.
Theory of Computing Lecture 3 MAS 714 Hartmut Klauck.
Heuristics for the Hidden Clique Problem Robert Krauthgamer (IBM Almaden) Joint work with Uri Feige (Weizmann)
Approximating Average Parameters of Graphs Oded Goldreich, Weizmann Institute Dana Ron, Tel Aviv University.
On the Spread of Viruses on the Internet Noam Berger Joint work with C. Borgs, J.T. Chayes and A. Saberi.
1 List Coloring and Euclidean Ramsey Theory TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A Noga Alon, Tel Aviv.
Online Ramsey Games in Random Graphs Reto Spöhel Joint work with Martin Marciniszyn and Angelika Steger.
Why almost all k-colorable graphs are easy A. Coja-Oghlan, M. Krivelevich, D. Vilenchik.
Graph Sparsifiers by Edge-Connectivity and Random Spanning Trees Nick Harvey University of Waterloo Department of Combinatorics and Optimization Joint.
Online Ramsey Games in Random Graphs Reto Spöhel Joint work with Martin Marciniszyn and Angelika Steger.
A general approximation technique for constrained forest problems Michael X. Goemans & David P. Williamson Presented by: Yonatan Elhanani & Yuval Cohen.
Increasing graph connectivity from 1 to 2 Guy Kortsarz Joint work with Even and Nutov.
Frugal Path Mechanisms by Aaron Archer and Eva Tardos Presented by Ron Lavi at the seminar: “Topics on the border of CS, Game theory, and Economics” CS.
Is the following graph Hamiltonian- connected from vertex v? a). Yes b). No c). I have absolutely no idea v.
Message Passing for the Coloring Problem: Gallager Meets Alon and Kahale Sonny Ben-Shimon and Dan Vilenchik Tel Aviv University AofA June, 2007 TexPoint.
Online Vertex Colorings of Random Graphs Without Monochromatic Subgraphs Reto Spöhel, ETH Zurich Joint work with Martin Marciniszyn.
1 On the Benefits of Adaptivity in Property Testing of Dense Graphs Joint work with Mira Gonen Dana Ron Tel-Aviv University.
1 Algorithmic Aspects in Property Testing of Dense Graphs Oded Goldreich – Weizmann Institute Dana Ron - Tel-Aviv University.
Expanders Eliyahu Kiperwasser. What is it? Expanders are graphs with no small cuts. The later gives several unique traits to such graph, such as: – High.
May 7 th, 2006 On the distribution of edges in random regular graphs Sonny Ben-Shimon and Michael Krivelevich.
Finding a maximum independent set in a sparse random graph Uriel Feige and Eran Ofek.
Explosive Percolation: Defused and Reignited Henning Thomas (joint with Konstantinos Panagiotou, Reto Spöhel and Angelika Steger) TexPoint fonts used in.
1 Refined Search Tree Technique for Dominating Set on Planar Graphs Jochen Alber, Hongbing Fan, Michael R. Fellows, Henning Fernau, Rolf Niedermeier, Fran.
Packing Element-Disjoint Steiner Trees Mohammad R. Salavatipour Department of Computing Science University of Alberta Joint with Joseph Cheriyan Department.
Online Ramsey Games in Random Graphs Reto Spöhel, ETH Zürich Joint work with Martin Marciniszyn and Angelika Steger.
Graph Sparsifiers Nick Harvey University of British Columbia Based on joint work with Isaac Fung, and independent work of Ramesh Hariharan & Debmalya Panigrahi.
Small subgraphs in the Achlioptas process Reto Spöhel, ETH Zürich Joint work with Torsten Mütze and Henning Thomas TexPoint fonts used in EMF. Read the.
Online Vertex-Coloring Games in Random Graphs Reto Spöhel (joint work with Martin Marciniszyn; appeared at SODA ’07)
Edge-disjoint induced subgraphs with given minimum degree Raphael Yuster 2012.
An Efficient Algorithm for Enumerating Pseudo Cliques Dec/18/2007 ISAAC, Sendai Takeaki Uno National Institute of Informatics & The Graduate University.
Testing the independence number of hypergraphs
1 Decomposition into bipartite graphs with minimum degree 1. Raphael Yuster.
Introduction to Graph Theory
Why almost all satisfiable k - CNF formulas are easy? Danny Vilenchik Joint work with A. Coja-Oghlan and M. Krivelevich.
Avoiding small subgraphs in the Achlioptas process Torsten Mütze, ETH Zürich Joint work with Reto Spöhel and Henning Thomas TexPoint fonts used in EMF.
Theory of Computing Lecture 12 MAS 714 Hartmut Klauck.
CHAPTER SIX T HE P ROBABILISTIC M ETHOD M1 Zhang Cong 2011/Nov/28.
PROBABILITY AND COMPUTING RANDOMIZED ALGORITHMS AND PROBABILISTIC ANALYSIS CHAPTER 1 IWAMA and ITO Lab. M1 Sakaidani Hikaru 1.
Theory of Computational Complexity Probability and Computing Chapter Hikaru Inada Iwama and Ito lab M1.
Stochastic Streams: Sample Complexity vs. Space Complexity
New Characterizations in Turnstile Streams with Applications
Dana Ron Tel Aviv University
What is the next line of the proof?
From dense to sparse and back again: On testing graph properties (and some properties of Oded)
Reconstruction on trees and Phylogeny 1
Chapter 5. Optimal Matchings
Positional Games and Randomness
NP-Completeness Yin Tat Lee
Additive Combinatorics and its Applications in Theoretical CS
Enumerating Distances Using Spanners of Bounded Degree
Constrained Bipartite Vertex Cover: The Easy Kernel is Essentially Tight Bart M. P. Jansen June 4th, WORKER 2015, Nordfjordeid, Norway.
Depth Estimation via Sampling
Randomized Algorithms CS648
Analysis of Algorithms
Matrix Martingales in Randomized Numerical Linear Algebra
The Curve Merger (Dvir & Widgerson, 2008)
Haim Kaplan and Uri Zwick
On the effect of randomness on planted 3-coloring models
CSE332: Data Abstractions Lecture 18: Minimum Spanning Trees
The Byzantine Secretary Problem
Testing k-colorability
Pan Peng (University of Vienna, Austria)
CSE 373: Data Structures and Algorithms
Locality In Distributed Graph Algorithms
Presentation transcript:

Contagious sets in random graphs Michael Krivelevich Tel Aviv University Joint work with: Uri Feige, Daniel Reichman Dedicated to Gerard Cohen on the occasion of his 2 6 th birthday Has probably nothing to do with his scientific (or other) activities…

Me and Gerard… wrote three (nice!) papers together; didn’t learn much coding theory from the guy (unfortunately…) didn’t learn much French from the guy spent quite some time in his company in Paris and Tel Aviv (fortunately…) Has been big fun - so far…

Basic setting 𝑉 Initial seed 𝐺=(𝑉,𝐸) – graph, 𝑟≥1 –integer (=threshold) Iterative process: 𝐴 0 ⊆𝑉 – initial seed ∀𝑖≥1: 𝐴 𝑖 ≔ 𝐴 𝑖−1 ∪{𝑣∈𝑉∖ 𝐴 𝑖−1 :𝑑 𝑣, 𝐴 𝑖−1 ≥𝑟} [= adding vertices having ≥𝑟 neighbors in the current set] 𝐴 0 = 𝑖≥0 𝐴 𝑖 Def: 𝐴 0 is contagious if 𝐴 0 =𝑉 𝑉 𝐴 0 𝐴 1 𝐴 2 Initial seed

Extremal function, bootstrap percolation Def.: 𝑚 𝐺,𝑟 =min{ 𝐴 0 : 𝐴 0 is contagious} - well defined: 𝑉 =𝑉 Alternative/more common terminology: - bootstrap percolation with threshold 𝑟 (more later)

Random vs Clever Typical scenario for bootstrap percolation: 𝐴 0 ⊆𝑉 – a random 𝑚-subset of 𝑉 𝐺 Pr 𝐴 0 =𝑉 ? Typical size of 𝐴 0 ? min {𝑚: 𝐴 0 ⊆ 𝑅 𝑉⟹ typically 𝐴 0 =𝑉}? Here: different, allow to choose the initial seed optimally/in a sophisticated way - does make a difference (see later)

General bounds 𝑟=1 – not very interesting… ∀𝑣∈ 𝐴 0 – infects its connected component ⟹𝑚 𝐺,1 = # of connected components of 𝐺 Assume from now on: 𝑟≥2 mostly concentrate on: 𝑟=2 𝐴 2 𝐴 1 𝑣

General bounds (cont.) Th: Reichman ′ 12 : 𝑚 𝐺,𝑟 ≤ 𝑣∈𝑉 min 1, 𝑟 𝑑 𝑣 +1 Conclusion: 𝐺- 𝑑-regular, 𝑛 vertices, 𝑟≤𝑑+1 ⟹m 𝐺,𝑟 ≤ 𝑟𝑛 𝑑+1 Tight: 𝐺:= disjoint cliques of size 𝑑+1 Need: 𝑟 vertices in every clique 𝐾 𝑑+1 𝑟 vertices

General bounds (cont.) Proof: (similar to Caro-Wei’s proof of Turán’s Theorem) Notation: 𝑁 𝑣 =𝑣∪𝑁(𝑣) – closed neighborhood of 𝑣 Assume 𝑉 𝐺 ={1,…,𝑛} For a permutation 𝜎:𝑉→[𝑛], 𝑖≥1 define: 𝐿 𝑖 :={𝑣:𝑣 is #𝑖 in 𝑁 𝑣 under 𝜎} - 𝑖th layer under 𝜎

General bounds (cont.) Claim: ∀ 𝜎, the set 𝐴 0 := 𝐴 0 𝜎 = 𝑖≤𝑟 𝐿 𝑖 is contagious. Proof: If not, let 𝑣 be the 1st (according to 𝜎) vertex not infected by 𝐴 0 . 𝑣∉ 𝐴 0 ⇒ 𝑣 has ≥𝑟 neighbors before it in 𝜎. Then 𝑣 gets infected – contradiction. ∎

General bounds (cont.) Now: choose 𝜎 uniformly at random Recall: 𝐴 0 = 𝐴 0 𝜎 = 𝑖≤𝑟 𝐿 𝑖 ∀𝑣∈𝑉, ℙ 𝑣∈ 𝐴 0 = 𝑟 𝑑 𝑣 +1 , 𝑑 𝑣 ≥𝑟 1, otherwise ⇒ by linearity of expectation 𝔼 𝐴 0 = 𝑣∈𝑉 min 1, 𝑟 𝑑 𝑣 +1 ⇒ there exists a contagious set of at most this size. ∎

Can do much better for nice graphs… From now on, fix 𝑟=2 (similar results for larger constant 𝑟) ∃ graphs 𝐺 with 𝑚 𝐺,2 =2 For “nice” graphs can expect better results: Coja-Oghlan, Feige, K., Reichman (SODA’15): 𝐺 - 𝑑-regular on 𝑛 vertices 𝑔𝑖𝑟𝑡ℎ 𝐺 ≥2 ln ln 𝑑⟹ 𝑚 𝐺,2 =𝑂 𝑛 𝑑 2 no 𝐶 4 ⟹𝑚 𝐺,2 =𝑂 𝑛 𝑑 7/4 𝑔𝑖𝑟𝑡ℎ 𝐺 ≥7⟹ 𝑚 𝐺,2 =𝑂 𝑛 log 𝑑 𝑑 2 𝜆 𝐺 =𝑂( 𝑑 )⟹ 𝑂 𝑛 𝑑 2 no 𝐶 4 , 𝜆 𝐺 ≤ 1−𝜖 𝑑 ⟹𝑂 𝑛 log 𝑑 𝜖 2 𝑑 2 for “nice” graphs of degrees close to 𝑑 can expect 𝑚 𝐺,2 to be around 𝑂 𝑛 𝑑 2

Contagious sets in random graphs Q.: 𝐺∼𝐺 𝑛,𝑝 , 𝑟=2 Typical value of 𝑚 𝐺,2 ? Remarks: Easy to see: 𝑝≫ 1 𝑛 ⟹ whp two vertices have 𝜔(1) common neighb.+propagation ⟹ whp 𝑚 𝐺,2 =2 2. 𝐺 does not have to be connected ⟹𝑝≥ 𝐶 𝑛

Typical set in a random graph Janson, Łuczak, Turova, Vallier’12: 𝐺∼𝐺 𝑛,𝑝 𝐴 0 = a fixed set of size 𝑚 Q.: How large should be 𝑚= 𝑚 2 (𝑛,𝑝) so that whp 𝐴 0 =[𝑛]? typical scenario for bootstrap percolation Assume: 1. 𝑝≪ 1 𝑛 2. 𝑝≥ ln 𝑛+ ln ln 𝑛+𝜔(1) 𝑛 (to ensure: whp 𝛿 𝐺 ≥2)

Typical set in a random graph (cont.) JŁTV: solved the problem completely, found the threshold for having 𝐴 0 =[𝑛] Answer: 𝑎 𝑛 𝑑 2 𝑑≔𝑛𝑝 Intuition: 𝐺∼𝐺 𝑛,𝑝 𝐴 0 ⊆ 𝑛 , 𝐴 0 =𝑚 – seed Expose edges between 𝐴 0 and the rest 𝐵 1 ≔ 𝑣∉ 𝐴 0 :𝑑 𝑣, 𝐴 0 ≥2 – will be infected immediately 𝔼 𝐵 1 ≈𝑛 𝑚 2 𝑝 2 If 𝐵 1 ≫| 𝐴 0 |⟹ situation improves, snowballing… ⟹ enough to take 𝑚= 𝑐𝑛 𝑑 2

Our result Th.: 𝐺∼𝐺 𝑛,𝑝 , 𝐶 𝑛 ≤𝑝 𝑛 ≤ 𝑐 log log 𝑛 1/2 𝑛 ⋅ log 𝑛 , 𝑑≔𝑛𝑝 ⟹ whp 𝑚 𝐺,2 =Θ 𝑛 𝑑 2 log 𝑑 cf.: [JŁTV] for a typical set need Θ 𝑛 𝑑 2 vertices in the seed ⟹ clever is (somewhat) better than random + similar improvement for a general 𝑟≥2.

Proof idea – lower bound If 𝐴 0 ⊆[𝑛], 𝐴 0 =𝑚, satisfies: 𝐴 0 =[𝑛] Then: ∃ sequence of vertices 𝜎= 𝑣 1 ,…, 𝑣 𝑛−𝑚 , 𝑑 𝑣 𝑖 , 𝐴 0 ∪ 𝑣 1 ,…, 𝑣 𝑖−1 ≥2 (=protocol of infection spread) Then: for 𝑀≥𝑚, 𝐴 0 ∪{ 𝑣 1 ,…, 𝑣 𝑀−𝑚 } has ≥2 𝑀−𝑚 edges Find: 𝑀 for which whp in 𝐺∼𝐺 𝑛,𝑝 : no set 𝐴, 𝐴 =𝑀, 𝑒 𝐴 ≥2 𝑀−𝑚 (simple union bound)

Proof idea – upper bound 𝐶 0 = 𝜖 𝑑 𝑛 𝑑 2 - initial seed (part) Expose edges between 𝐶 0 and 𝑉∖ 𝐶 0 𝐵 ≔𝑁 𝐶 0 , expose 𝐺[𝐵] 𝐶 1 ≔ “large” components of 𝐺[𝐵] (size ≥ 𝑠 1 ) Observe: adding to 𝐶 0 one vertex per each component of 𝐶 1 infects all of 𝐶 1 ⟹≤ | 𝐶 1 | 𝑠 1 additional vertices to be added to the initial seed Now: all of 𝐶 1 is infected 𝐶 1 𝐶 0 𝐵

Proof idea – upper bound (cont.) Now: Iterate - till reach 𝐶𝑛 𝑑 2 infected vertices ⟹apply [JŁTV] to infect most of the graph Collect few uninfected vertices (if any) (recall – possibly 𝐺 is not connected/𝛿 𝐺 <2). ∎

Infecting everybody with minimal resources Q.: For which value of 𝑝(𝑛) have typically: 𝑚 𝐺,2 =2, 𝐺∼𝐺(𝑛,𝑝) ? Th.: The threshold probability 𝑝(𝑛) in 𝐺(𝑛,𝑝) for 𝑚 𝐺,2 =2 is: 𝑝 𝑛 =Θ 1 (𝑛 log 𝑛) 1/2 . + similar result for a general 𝑟≥2.

Open questions Sharper estimates for 𝑚 𝐺,𝑟 ? infection time min {𝑡: 𝐴 𝑡 =𝑉} ? Results for other models of random graphs?

Happy birthday Gerard! Time to start thinking of International Draughts… (And then off to Go…)