-
The total variation distance between high-dimensional Gaussians with the same mean
Authors:
Luc Devroye,
Abbas Mehrabian,
Tommy Reddad
Abstract:
Given two high-dimensional Gaussians with the same mean, we prove a lower and an upper bound for their total variation distance, which are within a constant factor of one another.
Given two high-dimensional Gaussians with the same mean, we prove a lower and an upper bound for their total variation distance, which are within a constant factor of one another.
△ Less
Submitted 22 October, 2023; v1 submitted 19 October, 2018;
originally announced October 2018.
-
The Minimax Learning Rates of Normal and Ising Undirected Graphical Models
Authors:
Luc Devroye,
Abbas Mehrabian,
Tommy Reddad
Abstract:
Let $G$ be an undirected graph with $m$ edges and $d$ vertices. We show that $d$-dimensional Ising models on $G$ can be learned from $n$ i.i.d. samples within expected total variation distance some constant factor of $\min\{1, \sqrt{(m + d)/n}\}$, and that this rate is optimal. We show that the same rate holds for the class of $d$-dimensional multivariate normal undirected graphical models with re…
▽ More
Let $G$ be an undirected graph with $m$ edges and $d$ vertices. We show that $d$-dimensional Ising models on $G$ can be learned from $n$ i.i.d. samples within expected total variation distance some constant factor of $\min\{1, \sqrt{(m + d)/n}\}$, and that this rate is optimal. We show that the same rate holds for the class of $d$-dimensional multivariate normal undirected graphical models with respect to $G$. We also identify the optimal rate of $\min\{1, \sqrt{m/n}\}$ for Ising models with no external magnetic field.
△ Less
Submitted 3 June, 2020; v1 submitted 18 June, 2018;
originally announced June 2018.
-
Some techniques in density estimation
Authors:
Hassan Ashtiani,
Abbas Mehrabian
Abstract:
Density estimation is an interdisciplinary topic at the intersection of statistics, theoretical computer science and machine learning. We review some old and new techniques for bounding the sample complexity of estimating densities of continuous distributions, focusing on the class of mixtures of Gaussians and its subclasses. In particular, we review the main techniques used to prove the new sampl…
▽ More
Density estimation is an interdisciplinary topic at the intersection of statistics, theoretical computer science and machine learning. We review some old and new techniques for bounding the sample complexity of estimating densities of continuous distributions, focusing on the class of mixtures of Gaussians and its subclasses. In particular, we review the main techniques used to prove the new sample complexity bounds for mixtures of Gaussians by Ashtiani, Ben-David, Harvey, Liaw, Mehrabian, and Plan arXiv:1710.05209.
△ Less
Submitted 22 February, 2018; v1 submitted 11 January, 2018;
originally announced January 2018.
-
Near-optimal Sample Complexity Bounds for Robust Learning of Gaussians Mixtures via Compression Schemes
Authors:
Hassan Ashtiani,
Shai Ben-David,
Nick Harvey,
Christopher Liaw,
Abbas Mehrabian,
Yaniv Plan
Abstract:
We prove that $\tildeΘ(k d^2 / \varepsilon^2)$ samples are necessary and sufficient for learning a mixture of $k$ Gaussians in $\mathbb{R}^d$, up to error $\varepsilon$ in total variation distance. This improves both the known upper bounds and lower bounds for this problem. For mixtures of axis-aligned Gaussians, we show that $\tilde{O}(k d / \varepsilon^2)$ samples suffice, matching a known lower…
▽ More
We prove that $\tildeΘ(k d^2 / \varepsilon^2)$ samples are necessary and sufficient for learning a mixture of $k$ Gaussians in $\mathbb{R}^d$, up to error $\varepsilon$ in total variation distance. This improves both the known upper bounds and lower bounds for this problem. For mixtures of axis-aligned Gaussians, we show that $\tilde{O}(k d / \varepsilon^2)$ samples suffice, matching a known lower bound. Moreover, these results hold in the agnostic-learning/robust-estimation setting as well, where the target distribution is only approximately a mixture of Gaussians.
The upper bound is shown using a novel technique for distribution learning based on a notion of `compression.' Any class of distributions that allows such a compression scheme can also be learned with few samples. Moreover, if a class of distributions has such a compression scheme, then so do the classes of products and mixtures of those distributions. The core of our main result is showing that the class of Gaussians in $\mathbb{R}^d$ admits a small-sized compression scheme.
△ Less
Submitted 21 July, 2020; v1 submitted 14 October, 2017;
originally announced October 2017.
-
Notes on Growing a Tree in a Graph
Authors:
Luc Devroye,
Vida Dujmović,
Alan Frieze,
Abbas Mehrabian,
Pat Morin,
Bruce Reed
Abstract:
We study the height of a spanning tree $T$ of a graph $G$ obtained by starting with a single vertex of $G$ and repeatedly selecting, uniformly at random, an edge of $G$ with exactly one endpoint in $T$ and adding this edge to $T$.
We study the height of a spanning tree $T$ of a graph $G$ obtained by starting with a single vertex of $G$ and repeatedly selecting, uniformly at random, an edge of $G$ with exactly one endpoint in $T$ and adding this edge to $T$.
△ Less
Submitted 4 July, 2017; v1 submitted 30 June, 2017;
originally announced July 2017.
-
Tight Load Balancing via Randomized Local Search
Authors:
Petra Berenbrink,
Peter Kling,
Christopher Liaw,
Abbas Mehrabian
Abstract:
We consider the following balls-into-bins process with $n$ bins and $m$ balls: each ball is equipped with a mutually independent exponential clock of rate 1. Whenever a ball's clock rings, the ball samples a random bin and moves there if the number of balls in the sampled bin is smaller than in its current bin. This simple process models a typical load balancing problem where users (balls) seek a…
▽ More
We consider the following balls-into-bins process with $n$ bins and $m$ balls: each ball is equipped with a mutually independent exponential clock of rate 1. Whenever a ball's clock rings, the ball samples a random bin and moves there if the number of balls in the sampled bin is smaller than in its current bin. This simple process models a typical load balancing problem where users (balls) seek a selfish improvement of their assignment to resources (bins). From a game theoretic perspective, this is a randomized approach to the well-known Koutsoupias-Papadimitriou model, while it is known as randomized local search (RLS) in load balancing literature. Up to now, the best bound on the expected time to reach perfect balance was $O\left({(\ln n)}^2+\ln(n)\cdot n^2/m\right)$ due to Ganesh, Lilienthal, Manjunath, Proutiere, and Simatos (Load balancing via random local search in closed and open systems, Queueing Systems, 2012). We improve this to an asymptotically tight $O\left(\ln(n)+n^2/m\right)$. Our analysis is based on the crucial observation that performing "destructive moves" (reversals of RLS moves) cannot decrease the balancing time. This allows us to simplify problem instances and to ignore "inconvenient moves" in the analysis.
△ Less
Submitted 29 June, 2017;
originally announced June 2017.
-
The string of diamonds is nearly tight for rumour spreading
Authors:
Omer Angel,
Abbas Mehrabian,
Yuval Peres
Abstract:
For a rumour spreading protocol, the spread time is defined as the first time that everyone learns the rumour. We compare the synchronous push&pull rumour spreading protocol with its asynchronous variant, and show that for any $n$-vertex graph and any starting vertex, the ratio between their expected spread times is bounded by $O \left({n}^{1/3}{\log^{2/3} n}\right)$. This improves the…
▽ More
For a rumour spreading protocol, the spread time is defined as the first time that everyone learns the rumour. We compare the synchronous push&pull rumour spreading protocol with its asynchronous variant, and show that for any $n$-vertex graph and any starting vertex, the ratio between their expected spread times is bounded by $O \left({n}^{1/3}{\log^{2/3} n}\right)$. This improves the $O(\sqrt n)$ upper bound of Giakkoupis, Nazari, and Woelfel (in Proceedings of ACM Symposium on Principles of Distributed Computing, 2016). Our bound is tight up to a factor of $O(\log n)$, as illustrated by the string of diamonds graph. We also show that if for a pair $α,β$ of real numbers, there exists infinitely many graphs for which the two spread times are $n^α$ and $n^β$ in expectation, then $0\leqα\leq 1$ and $α\leq β\leq \frac13 + \frac23 α$; and we show each such pair $α,β$ is achievable.
△ Less
Submitted 18 July, 2017; v1 submitted 4 April, 2017;
originally announced April 2017.
-
Rumours spread slowly in a small world spatial network
Authors:
Jeannette Janssen,
Abbas Mehrabian
Abstract:
Rumour spreading is a protocol for modelling the spread of information through a network via user-to-user interaction. The Spatial Preferred Attachment (SPA) model is a random graph model for complex networks: vertices are placed in a metric space, and the link probability depends on the metric distance between vertices, and on their degree. We show that the SPA model typically produces graphs tha…
▽ More
Rumour spreading is a protocol for modelling the spread of information through a network via user-to-user interaction. The Spatial Preferred Attachment (SPA) model is a random graph model for complex networks: vertices are placed in a metric space, and the link probability depends on the metric distance between vertices, and on their degree. We show that the SPA model typically produces graphs that have small effective diameter, i.e. $O(\log^2 n)$, while rumour spreading is relatively slow, namely polynomial in $n$.
△ Less
Submitted 5 July, 2016;
originally announced August 2016.
-
A simple tool for bounding the deviation of random matrices on geometric sets
Authors:
Christopher Liaw,
Abbas Mehrabian,
Yaniv Plan,
Roman Vershynin
Abstract:
Let $A$ be an isotropic, sub-gaussian $m \times n$ matrix. We prove that the process $Z_x := \|Ax\|_2 - \sqrt m \|x\|_2$ has sub-gaussian increments. Using this, we show that for any bounded set $T \subseteq \mathbb{R}^n$, the deviation of $\|Ax\|_2$ around its mean is uniformly bounded by the Gaussian complexity of $T$. We also prove a local version of this theorem, which allows for unbounded set…
▽ More
Let $A$ be an isotropic, sub-gaussian $m \times n$ matrix. We prove that the process $Z_x := \|Ax\|_2 - \sqrt m \|x\|_2$ has sub-gaussian increments. Using this, we show that for any bounded set $T \subseteq \mathbb{R}^n$, the deviation of $\|Ax\|_2$ around its mean is uniformly bounded by the Gaussian complexity of $T$. We also prove a local version of this theorem, which allows for unbounded sets. These theorems have various applications, some of which are reviewed in this paper. In particular, we give a new result regarding model selection in the constrained linear model.
△ Less
Submitted 7 June, 2016; v1 submitted 2 March, 2016;
originally announced March 2016.
-
On the push&pull protocol for rumour spreading
Authors:
Huseyin Acan,
Andrea Collevecchio,
Abbas Mehrabian,
Nick Wormald
Abstract:
The asynchronous push&pull protocol, a randomized distributed algorithm for spreading a rumour in a graph $G$, works as follows. Independent Poisson clocks of rate 1 are associated with the vertices of $G$. Initially, one vertex of $G$ knows the rumour. Whenever the clock of a vertex $x$ rings, it calls a random neighbour $y$: if $x$ knows the rumour and $y$ does not, then $x$ tells $y$ the rumour…
▽ More
The asynchronous push&pull protocol, a randomized distributed algorithm for spreading a rumour in a graph $G$, works as follows. Independent Poisson clocks of rate 1 are associated with the vertices of $G$. Initially, one vertex of $G$ knows the rumour. Whenever the clock of a vertex $x$ rings, it calls a random neighbour $y$: if $x$ knows the rumour and $y$ does not, then $x$ tells $y$ the rumour (a push operation), and if $x$ does not know the rumour and $y$ knows it, $y$ tells $x$ the rumour (a pull operation). The average spread time of $G$ is the expected time it takes for all vertices to know the rumour, and the guaranteed spread time of $G$ is the smallest time $t$ such that with probability at least $1-1/n$, after time $t$ all vertices know the rumour. The synchronous variant of this protocol, in which each clock rings precisely at times $1,2,\dots$, has been studied extensively. We prove the following results for any $n$-vertex graph: In either version, the average spread time is at most linear even if only the pull operation is used, and the guaranteed spread time is within a logarithmic factor of the average spread time, so it is $O(n\log n)$. In the asynchronous version, both the average and guaranteed spread times are $Ω(\log n)$. We give examples of graphs illustrating that these bounds are best possible up to constant factors. We also prove theoretical relationships between the guaranteed spread times in the two versions. Firstly, in all graphs the guaranteed spread time in the asynchronous version is within an $O(\log n)$ factor of that in the synchronous version, and this is tight. Next, we find examples of graphs whose asynchronous spread times are logarithmic, but the synchronous versions are polynomially large. Finally, we show for any graph that the ratio of the synchronous spread time to the asynchronous spread time is $O(n^{2/3})$.
△ Less
Submitted 15 September, 2015; v1 submitted 4 November, 2014;
originally announced November 2014.
-
Randomized Rumor Spreading in Poorly Connected Small-World Networks
Authors:
Abbas Mehrabian,
Ali Pourmiri
Abstract:
Push-Pull is a well-studied round-robin rumor spreading protocol defined as follows: initially a node knows a rumor and wants to spread it to all nodes in a network quickly. In each round, every informed node sends the rumor to a random neighbor, and every uninformed node contacts a random neighbor and gets the rumor from her if she knows it. We analyze this protocol on random $k$-trees, a class o…
▽ More
Push-Pull is a well-studied round-robin rumor spreading protocol defined as follows: initially a node knows a rumor and wants to spread it to all nodes in a network quickly. In each round, every informed node sends the rumor to a random neighbor, and every uninformed node contacts a random neighbor and gets the rumor from her if she knows it. We analyze this protocol on random $k$-trees, a class of power law graphs, which are small-world and have large clustering coefficients, built as follows: initially we have a $k$-clique. In every step a new node is born, a random $k$-clique of the current graph is chosen, and the new node is joined to all nodes of the $k$-clique. When $k>1$ is fixed, we show that if initially a random node is aware of the rumor, then with probability $1-o(1)$ after $O\left((\log n)^{1+2/k}\cdot\log\log n\cdot f(n)\right)$ rounds the rumor propagates to $n-o(n)$ nodes, where $n$ is the number of nodes and $f(n)$ is any slowly growing function. Since these graphs have polynomially small conductance, vertex expansion $O(1/n)$ and constant treewidth, these results demonstrate that Push-Pull can be efficient even on poorly connected networks. On the negative side, we prove that with probability $1-o(1)$ the protocol needs at least $Ω\left(n^{(k-1)/(k^2+k-1)}/f^2(n)\right)$ rounds to inform all nodes. This exponential dichotomy between time required for informing almost all and all nodes is striking. Our main contribution is to present, for the first time, a natural class of random graphs in which such a phenomenon can be observed. Our technique for proving the upper bound carries over to a closely related class of graphs, random $k$-Apollonian networks, for which we prove an upper bound of $O\left((\log n)^{c_k}\cdot\log\log n\cdot f(n)\right)$ rounds for informing $n-o(n)$ nodes with probability $1-o(1)$ when $k>2$ is fixed. Here, $c_k=(k^2-3)/(k-1)^2<1 + 2/k$.
△ Less
Submitted 29 October, 2014;
originally announced October 2014.
-
Justifying the small-world phenomenon via random recursive trees
Authors:
Abbas Mehrabian
Abstract:
We present a new technique for proving logarithmic upper bounds for diameters of evolving random graph models, which is based on defining a coupling between random graphs and variants of random recursive trees. The advantage of the technique is three-fold: it is quite simple and provides short proofs, it is applicable to a broad variety of models including those incorporating preferential attachme…
▽ More
We present a new technique for proving logarithmic upper bounds for diameters of evolving random graph models, which is based on defining a coupling between random graphs and variants of random recursive trees. The advantage of the technique is three-fold: it is quite simple and provides short proofs, it is applicable to a broad variety of models including those incorporating preferential attachment, and it provides bounds with small constants. We illustrate this by proving, for the first time, logarithmic upper bounds for the diameters of the following well known models: the forest fire model, the copying model, the PageRank-based selection model, the Aiello-Chung-Lu models, the generalized linear preference model, directed scale-free graphs, the Cooper-Frieze model, and random unordered increasing $k$-trees. Our results shed light on why the small-world phenomenon is observed in so many real-world graphs.
△ Less
Submitted 23 October, 2014;
originally announced October 2014.
-
It's a Small World for Random Surfers
Authors:
Abbas Mehrabian,
Nick Wormald
Abstract:
We prove logarithmic upper bounds for the diameters of the random-surfer Webgraph model and the PageRank-based selection Webgraph model, confirming the small world phenomenon holds for them. In the special case when the generated graph is a tree, we provide close lower and upper bounds for the diameters of both models.
We prove logarithmic upper bounds for the diameters of the random-surfer Webgraph model and the PageRank-based selection Webgraph model, confirming the small world phenomenon holds for them. In the special case when the generated graph is a tree, we provide close lower and upper bounds for the diameters of both models.
△ Less
Submitted 28 April, 2014;
originally announced April 2014.
-
Longest paths in random Apollonian networks and largest $r$-ary subtrees of random $d$-ary recursive trees
Authors:
Andrea Collevecchio,
Abbas Mehrabian,
Nick Wormald
Abstract:
Let $r$ and $d$ be positive integers with $r<d$. Consider a random $d$-ary tree constructed as follows. Start with a single vertex, and in each time-step choose a uniformly random leaf and give it $d$ newly created offspring. Let ${\mathcal T}_t$ be the tree produced after $t$ steps. We show that there exists a fixed $δ<1$ depending on $d$ and $r$ such that almost surely for all large $t$, every…
▽ More
Let $r$ and $d$ be positive integers with $r<d$. Consider a random $d$-ary tree constructed as follows. Start with a single vertex, and in each time-step choose a uniformly random leaf and give it $d$ newly created offspring. Let ${\mathcal T}_t$ be the tree produced after $t$ steps. We show that there exists a fixed $δ<1$ depending on $d$ and $r$ such that almost surely for all large $t$, every $r$-ary subtree of ${\mathcal T}_t$ has less than $t^δ$ vertices.
The proof involves analysis that also yields a related result. Consider the following iterative construction of a random planar triangulation. Start with a triangle embedded in the plane. In each step, choose a bounded face uniformly at random, add a vertex inside that face and join it to the vertices of the face. In this way, one face is destroyed and three new faces are created. After $t$ steps, we obtain a random triangulated plane graph with $t+3$ vertices, which is called a random Apollonian network. We prove that there exists a fixed $δ<1$, such that eventually every path in this graph has length less than $t^δ$, which verifies a conjecture of Cooper and Frieze.
△ Less
Submitted 11 April, 2014; v1 submitted 9 April, 2014;
originally announced April 2014.
-
On the Longest Paths and the Diameter in Random Apollonian Networks
Authors:
Ehsan Ebrahimzadeh,
Linda Farczadi,
Pu Gao,
Abbas Mehrabian,
Cristiane M. Sato,
Nick Wormald,
Jonathan Zung
Abstract:
We consider the following iterative construction of a random planar triangulation. Start with a triangle embedded in the plane. In each step, choose a bounded face uniformly at random, add a vertex inside that face and join it to the vertices of the face. After n-3 steps, we obtain a random triangulated plane graph with n vertices, which is called a Random Apollonian Network (RAN). We show that as…
▽ More
We consider the following iterative construction of a random planar triangulation. Start with a triangle embedded in the plane. In each step, choose a bounded face uniformly at random, add a vertex inside that face and join it to the vertices of the face. After n-3 steps, we obtain a random triangulated plane graph with n vertices, which is called a Random Apollonian Network (RAN). We show that asymptotically almost surely (a.a.s.) every path in a RAN has length o(n), refuting a conjecture of Frieze and Tsourakakis. We also show that a RAN always has a path of length (2n-5)^{log 2/log 3}, and that the expected length of its longest path is Omega(n^0.88). Finally, we prove that a.a.s. the diameter of a RAN is asymptotic to c log n, where c \approx 1.668 is the solution of an explicit equation.
△ Less
Submitted 21 March, 2013;
originally announced March 2013.
-
On the Maximum Density of Graphs with Good Edge-Labellings
Authors:
Abbas Mehrabian,
Dieter Mitsche,
Paweł Prałat
Abstract:
A good edge-labelling of a simple, finite graph is a labelling of its edges with real numbers such that, for every ordered pair of vertices (u,v), there is at most one nondecreasing path from u to v. In this paper we prove that any graph on n vertices that admits a good edge-labelling has at most n log_2(n)/2 edges, and that this bound is tight for infinitely many values of n. Thus we significantl…
▽ More
A good edge-labelling of a simple, finite graph is a labelling of its edges with real numbers such that, for every ordered pair of vertices (u,v), there is at most one nondecreasing path from u to v. In this paper we prove that any graph on n vertices that admits a good edge-labelling has at most n log_2(n)/2 edges, and that this bound is tight for infinitely many values of n. Thus we significantly improve on the previously best known bounds. The main tool of the proof is a combinatorial lemma which might be of independent interest. For every n we also construct an n-vertex graph that admits a good edge-labelling and has n log_2(n)/2 - O(n) edges.
△ Less
Submitted 12 November, 2012;
originally announced November 2012.
-
On the Stretch Factor of Randomly Embedded Random Graphs
Authors:
Abbas Mehrabian,
Nick Wormald
Abstract:
We consider a random graph G(n,p) whose vertex set V has been randomly embedded in the unit square and whose edges are given weight equal to the geometric distance between their end vertices. Then each pair {u,v} of vertices have a distance in the weighted graph, and a Euclidean distance. The stretch factor of the embedded graph is defined as the maximum ratio of these two distances, over all u,v…
▽ More
We consider a random graph G(n,p) whose vertex set V has been randomly embedded in the unit square and whose edges are given weight equal to the geometric distance between their end vertices. Then each pair {u,v} of vertices have a distance in the weighted graph, and a Euclidean distance. The stretch factor of the embedded graph is defined as the maximum ratio of these two distances, over all u,v in V. We give upper and lower bounds on the stretch factor (holding asymptotically almost surely), and show that for p not too close to 0 or 1, these bounds are best possible in a certain sense. Our results imply that the stretch factor is bounded with probability tending to 1 if and only if n(1-p) tends to 0, answering a question of O'Rourke.
△ Less
Submitted 28 May, 2012;
originally announced May 2012.
-
On the density of nearly regular graphs with a good edge-labelling
Authors:
Abbas Mehrabian
Abstract:
A good edge-labelling of a simple graph is a labelling of its edges with real numbers such that, for any ordered pair of vertices (u,v), there is at most one nondecreasing path from u to v. Say a graph is good if it admits a good edge-labelling, and is bad otherwise. Our main result is that any good n-vertex graph whose maximum degree is within a constant factor of its average degree (in particula…
▽ More
A good edge-labelling of a simple graph is a labelling of its edges with real numbers such that, for any ordered pair of vertices (u,v), there is at most one nondecreasing path from u to v. Say a graph is good if it admits a good edge-labelling, and is bad otherwise. Our main result is that any good n-vertex graph whose maximum degree is within a constant factor of its average degree (in particular, any good regular graph) has at most n^{1+o(1)} edges. As a corollary, we show that there are bad graphs with arbitrarily large girth, answering a question of Bode, Farzad and Theis. We also prove that for any Delta, there is a g such that any graph with maximum degree at most Delta and girth at least g is good.
△ Less
Submitted 11 October, 2011;
originally announced October 2011.
-
Cops and Robber Game with a Fast Robber on Expander Graphs and Random Graphs
Authors:
Abbas Mehrabian
Abstract:
We consider a variant of the Cops and Robber game, in which the robber has unbounded speed, i.e. can take any path from her vertex in her turn, but she is not allowed to pass through a vertex occupied by a cop. Let c_{infty}(G) denote the number of cops needed to capture the robber in a graph G in this variant. We characterize graphs G with c_{infty}(G)=1, and give an O(|V(G)|^2) algorithm for the…
▽ More
We consider a variant of the Cops and Robber game, in which the robber has unbounded speed, i.e. can take any path from her vertex in her turn, but she is not allowed to pass through a vertex occupied by a cop. Let c_{infty}(G) denote the number of cops needed to capture the robber in a graph G in this variant. We characterize graphs G with c_{infty}(G)=1, and give an O(|V(G)|^2) algorithm for their detection. We prove a lower bound for c_{infty} of expander graphs, and use it to prove three things. The first is that if np > 4.2 log n then the random graph G = G(n,p) asymptotically almost surely has e1/p < c_{infty}(G) < e2 log (np)/p, for suitable constants e1 and e2. The second is that a fixed-degree random regular graph G with n vertices asymptotically almost surely has c_{infty}(G) = Theta(n). The third is that if G is a Cartesian product of m paths, then n / 4km^2 < c_{infty}(G) < n / k, where n=|V(G)| and k is the number of vertices of the longest path.
△ Less
Submitted 13 May, 2011;
originally announced May 2011.
-
The capture time of grids
Authors:
Abbas Mehrabian
Abstract:
We consider the game of Cops and Robber played on the Cartesian product of two trees. Assuming the players play perfectly, it is shown that if there are two cops in the game, then the length of the game (known as the 2-capture time of the graph) is equal to half the diameter of the graph. In particular, the 2-capture time of the m x n grid is proved to be floor ((m+n-2)/2).
We consider the game of Cops and Robber played on the Cartesian product of two trees. Assuming the players play perfectly, it is shown that if there are two cops in the game, then the length of the game (known as the 2-capture time of the graph) is equal to half the diameter of the graph. In particular, the 2-capture time of the m x n grid is proved to be floor ((m+n-2)/2).
△ Less
Submitted 31 October, 2010; v1 submitted 25 August, 2010;
originally announced August 2010.
-
Cops and Robber Game with a Fast Robber on Interval, Chordal, and Planar Graphs
Authors:
Abbas Mehrabian
Abstract:
We consider a variant of the Cops and Robber game, introduced by Fomin, Golovach, Kratochvil, in which the robber has unbounded speed, i.e. can take any path from her vertex in her turn, but she is not allowed to pass through a vertex occupied by a cop. We study this game on interval graphs, chordal graphs, planar graphs, and hypercube graphs. Let c_{\infty}(G) denote the number of cops needed to…
▽ More
We consider a variant of the Cops and Robber game, introduced by Fomin, Golovach, Kratochvil, in which the robber has unbounded speed, i.e. can take any path from her vertex in her turn, but she is not allowed to pass through a vertex occupied by a cop. We study this game on interval graphs, chordal graphs, planar graphs, and hypercube graphs. Let c_{\infty}(G) denote the number of cops needed to capture the robber in graph G in this variant. We show that if G is an interval graph, then c_{\infty}(G) = O(sqrt(|V(G)|)), and we give a polynomial-time 3-approximation algorithm for finding c_{\infty}(G) in interval graphs. We prove that for every n there exists an n-vertex chordal graph G with c_{\infty}(G) = Omega(n / \log n). Let tw(G) and Delta(G) denote the treewidth and the maximum degree of G, respectively. We prove that for every G, tw(G) + 1 \leq (Delta(G) + 1) c_{\infty}(G). Using this lower bound for c_{\infty}(G), we show two things. The first is that if G is a planar graph (or more generally, if G does not have a fixed apex graph as a minor), then c_{\infty}(G) = Theta(tw(G)). This immediately leads to an O(1)-approximation algorithm for computing c_{\infty} for planar graphs. The second is that if G is the m-hypercube graph, then there exist constants eta1, eta2>0 such that (eta1) 2^m / (m sqrt(m)) \leq c_{\infty}(G) \leq (eta2) 2^m / m.
△ Less
Submitted 16 April, 2011; v1 submitted 25 August, 2010;
originally announced August 2010.
-
Lower Bounds for the Cop Number When the Robber is Fast
Authors:
Abbas Mehrabian
Abstract:
We consider a variant of the Cops and Robbers game where the robber can move t edges at a time, and show that in this variant, the cop number of a d-regular graph with girth larger than 2t+2 is Omega(d^t). By the known upper bounds on the order of cages, this implies that the cop number of a connected n-vertex graph can be as large as Omega(n^{2/3}) if t>1, and Omega(n^{4/5}) if t>3. This improves…
▽ More
We consider a variant of the Cops and Robbers game where the robber can move t edges at a time, and show that in this variant, the cop number of a d-regular graph with girth larger than 2t+2 is Omega(d^t). By the known upper bounds on the order of cages, this implies that the cop number of a connected n-vertex graph can be as large as Omega(n^{2/3}) if t>1, and Omega(n^{4/5}) if t>3. This improves the Omega(n^{(t-3)/(t-2)}) lower bound of Frieze, Krivelevich, and Loh (Variations on Cops and Robbers, J. Graph Theory, 2011) when 1<t<7. We also conjecture a general upper bound O(n^{t/t+1}) for the cop number in this variant, generalizing Meyniel's conjecture.
△ Less
Submitted 10 May, 2011; v1 submitted 10 July, 2010;
originally announced July 2010.