-
Block partitions in higher dimensions
Authors:
Endre Csóka
Abstract:
Consider a set $X\subseteq \mathbb{R}^d$ which is 1-dense, namely, it intersects every unit ball. We show that we can get from any point to any other point in $\mathbb{R}^d$ in $n$ steps so that the intermediate points are in $X$, and the discrepancy of the step vectors is at most $2\sqrt{2}$, or formally,…
▽ More
Consider a set $X\subseteq \mathbb{R}^d$ which is 1-dense, namely, it intersects every unit ball. We show that we can get from any point to any other point in $\mathbb{R}^d$ in $n$ steps so that the intermediate points are in $X$, and the discrepancy of the step vectors is at most $2\sqrt{2}$, or formally, $$\sup\limits_{\substack{n\in \mathbb{Z}^+,\ t\in \mathbb{R}^d\\ X\text{ is 1-dense}}}\,\, \inf\limits_{\substack{p_1,\ldots, p_{n-1}\in X\\ p_0=\underline{0},\ p_n=t}}\,\, \max\limits_{0\leq i<j<n} \big\|(p_{i+1}-p_i)-(p_{j+1}-p_j)\big\|\leq 2\sqrt{2}.$$
△ Less
Submitted 2 November, 2023; v1 submitted 28 October, 2023;
originally announced October 2023.
-
Finding cliques and dense subgraphs using edge queries
Authors:
Endre Csóka,
András Pongrácz
Abstract:
We consider the problem of finding a large clique in an Erdős--Rényi random graph where we are allowed unbounded computational time but can only query a limited number of edges. Recall that the largest clique in $G \sim G(n,1/2)$ has size roughly $2\log_{2} n$. Let $α_{\star}(δ,\ell)$ be the supremum over $α$ such that there exists an algorithm that makes $n^δ$ queries in total to the adjacency ma…
▽ More
We consider the problem of finding a large clique in an Erdős--Rényi random graph where we are allowed unbounded computational time but can only query a limited number of edges. Recall that the largest clique in $G \sim G(n,1/2)$ has size roughly $2\log_{2} n$. Let $α_{\star}(δ,\ell)$ be the supremum over $α$ such that there exists an algorithm that makes $n^δ$ queries in total to the adjacency matrix of $G$, in a constant $\ell$ number of rounds, and outputs a clique of size $α\log_{2} n$ with high probability. We give improved upper bounds on $α_{\star}(δ,\ell)$ for every $δ\in [1,2)$ and $\ell \geq 3$. We also study analogous questions for finding subgraphs with density at least $η$ for a given $η$, and prove corresponding impossibility results.
△ Less
Submitted 11 July, 2024; v1 submitted 10 October, 2023;
originally announced October 2023.
-
Moser-Tardos Algorithm with small number of random bits
Authors:
Endre Csóka,
Łukasz Grabowski,
András Máthé,
Oleg Pikhurko,
Konstantinos Tyros
Abstract:
We study a variant of the parallel Moser-Tardos Algorithm. We prove that if we restrict attention to a class of problems whose dependency graphs have subexponential growth, then the expected total number of random bits used by the algorithm is constant; in particular, it is independent from the number of variables. This is achieved by using the same random bits to resample variables which are far…
▽ More
We study a variant of the parallel Moser-Tardos Algorithm. We prove that if we restrict attention to a class of problems whose dependency graphs have subexponential growth, then the expected total number of random bits used by the algorithm is constant; in particular, it is independent from the number of variables. This is achieved by using the same random bits to resample variables which are far enough in the dependency graph.
There are two corollaries. First, we obtain a deterministic algorithm for finding a satisfying assignment, which for any class of problems as in the previous paragraph runs in time O(n), where n is the number of variables. Second, we present a Borel version of the Lovász Local Lemma.
△ Less
Submitted 4 March, 2024; v1 submitted 11 March, 2022;
originally announced March 2022.
-
A Robust Efficient Dynamic Mechanism
Authors:
Endre Csóka
Abstract:
Athey and Segal introduced an efficient budget-balanced mechanism for a dynamic stochastic model with quasilinear payoffs and private values, using the solution concept of perfect Bayesian equilibrium. We show that this implementation is not robust in multiple senses, especially for at least 3 agents. For example, we will show a generic setup where all efficient strategy profiles can be eliminated…
▽ More
Athey and Segal introduced an efficient budget-balanced mechanism for a dynamic stochastic model with quasilinear payoffs and private values, using the solution concept of perfect Bayesian equilibrium. We show that this implementation is not robust in multiple senses, especially for at least 3 agents. For example, we will show a generic setup where all efficient strategy profiles can be eliminated by iterative elimination of weakly dominated strategies. Furthermore, this model used strong assumptions about the information of the agents, and the mechanism was not robust to the relaxation of these assumptions. In this paper, we will show a different mechanism that implements efficiency under weaker assumptions and uses the stronger solution concept of ``efficient Nash equilibrium with guaranteed expected payoffs''.
△ Less
Submitted 27 June, 2022; v1 submitted 20 October, 2021;
originally announced October 2021.
-
Towards solving the 7-in-a-row game
Authors:
Domonkos Czifra,
Endre Csóka,
Zsolt Zombori,
Géza Makay
Abstract:
Our paper explores the game theoretic value of the 7-in-a-row game. We reduce the problem to solving a finite board game, which we target using Proof Number Search. We present a number of heuristic improvements to Proof Number Search and examine their effect within the context of this particular game. Although our paper does not solve the 7-in-a-row game, our experiments indicate that we have made…
▽ More
Our paper explores the game theoretic value of the 7-in-a-row game. We reduce the problem to solving a finite board game, which we target using Proof Number Search. We present a number of heuristic improvements to Proof Number Search and examine their effect within the context of this particular game. Although our paper does not solve the 7-in-a-row game, our experiments indicate that we have made significant progress towards it.
△ Less
Submitted 5 July, 2021;
originally announced July 2021.
-
On directed analogues of expander and hyperfinite graph sequences
Authors:
Endre Csóka,
Łukasz Grabowski
Abstract:
We introduce and study analogues of expander and hyperfinite graph sequences in the context of directed acyclic graphs, which we call "extender" and "hypershallow" graph sequences, respectively. Our main result is a probabilistic construction of non-hypershallow graph sequences.
We introduce and study analogues of expander and hyperfinite graph sequences in the context of directed acyclic graphs, which we call "extender" and "hypershallow" graph sequences, respectively. Our main result is a probabilistic construction of non-hypershallow graph sequences.
△ Less
Submitted 19 May, 2021; v1 submitted 19 August, 2020;
originally announced August 2020.
-
Upper bounds for the necklace folding problems
Authors:
Endre Csóka,
Zoltán L. Blázsik,
Zoltán Király,
Dániel Lenger
Abstract:
A necklace can be considered as a cyclic list of $n$ red and $n$ blue beads in an arbitrary order, and the goal is to fold it into two and find a large cross-free matching of pairs of beads of different colors. We give a counterexample for a conjecture about the necklace folding problem, also known as the separated matching problem. The conjecture (given independently by three sets of authors) sta…
▽ More
A necklace can be considered as a cyclic list of $n$ red and $n$ blue beads in an arbitrary order, and the goal is to fold it into two and find a large cross-free matching of pairs of beads of different colors. We give a counterexample for a conjecture about the necklace folding problem, also known as the separated matching problem. The conjecture (given independently by three sets of authors) states that $μ=\frac{2}{3}$, where $μ$ is the ratio of the `covered' beads to the total number of beads.
We refute this conjecture by giving a construction which proves that $μ\le 2 \nolinebreak - \nolinebreak \sqrt 2 < 0.5858$. Our construction also applies to the homogeneous model: when we are matching beads of the same color. Moreover, we also consider the problem where the two color classes not necessarily have the same size.
△ Less
Submitted 26 May, 2020;
originally announced May 2020.
-
Application-oriented mathematical algorithms for group testing
Authors:
Endre Csóka
Abstract:
We have a large number of samples and we want to find the infected ones using as few number of tests as possible. We can use group testing which tells about a small group of people whether at least one of them is infected. Group testing is particularly efficient if the infection rate is low. The goal of this article is to summarize and extend the mathematical knowledge about the most efficient gro…
▽ More
We have a large number of samples and we want to find the infected ones using as few number of tests as possible. We can use group testing which tells about a small group of people whether at least one of them is infected. Group testing is particularly efficient if the infection rate is low. The goal of this article is to summarize and extend the mathematical knowledge about the most efficient group testing algorithms, focusing on real-life applications instead of pure mathematical motivations and approaches.
△ Less
Submitted 5 May, 2020;
originally announced May 2020.
-
Locally common graphs
Authors:
Endre Csóka,
Tamás Hubai,
László Lovász
Abstract:
Goodman proved that the sum of the number of triangles in a graph on $n$ nodes and its complement is at least $n^3/24$; in other words, this sum is minimized, asymptotically, by a random graph with edge density $1/2$. Erdős conjectured that a similar inequality will hold for $K_4$ in place of $K_3$, but this was disproved by Thomason. But an analogous statement does hold for some other graphs, whi…
▽ More
Goodman proved that the sum of the number of triangles in a graph on $n$ nodes and its complement is at least $n^3/24$; in other words, this sum is minimized, asymptotically, by a random graph with edge density $1/2$. Erdős conjectured that a similar inequality will hold for $K_4$ in place of $K_3$, but this was disproved by Thomason. But an analogous statement does hold for some other graphs, which are called {\it common graphs}. A characterization of common graphs seems, however, out of reach.
Franek and Rödl proved that $K_4$ is common in a weaker, local sense. Using the language of graph limits, we study two versions of locally common graphs. We sharpen a result of Jagger, Štovíček and Thomason by showing that no graph containing $K_4$ can be locally common, but prove that all such graphs are weakly locally common. We also show that not all connected graphs are weakly locally common.
△ Less
Submitted 5 December, 2019;
originally announced December 2019.
-
Entropy and expansion
Authors:
Endre Csóka,
Viktor Harangi,
Bálint Virág
Abstract:
Shearer's inequality bounds the sum of joint entropies of random variables in terms of the total joint entropy. We give another lower bound for the same sum in terms of the individual entropies when the variables are functions of independent random seeds. The inequality involves a constant characterizing the expansion properties of the system.
Our results generalize to entropy inequalities used…
▽ More
Shearer's inequality bounds the sum of joint entropies of random variables in terms of the total joint entropy. We give another lower bound for the same sum in terms of the individual entropies when the variables are functions of independent random seeds. The inequality involves a constant characterizing the expansion properties of the system.
Our results generalize to entropy inequalities used in recent work in invariant settings, including the edge-vertex inequality for factor-of-IID processes, Bowen's entropy inequalities, and Bollobás's entropy bounds in random regular graphs.
The proof method yields inequalities for other measures of randomness, including covariance.
As an application, we give upper bounds for independent sets in both finite and infinite graphs.
△ Less
Submitted 21 February, 2020; v1 submitted 23 November, 2018;
originally announced November 2018.
-
Block partitions: an extended view
Authors:
I. Bárány,
E. Csóka,
Gy. Károlyi,
G. Tóth
Abstract:
Given a sequence $S=(s_1,\dots,s_m) \in [0, 1]^m$, a block $B$ of $S$ is a subsequence $B=(s_i,s_{i+1},\dots,s_j)$. The size $b$ of a block $B$ is the sum of its elements. It is proved in [1] that for each positive integer $n$, there is a partition of $S$ into $n$ blocks $B_1, \dots , B_n$ with $|b_i - b_j| \le 1$ for every $i, j$. In this paper, we consider a generalization of the problem in high…
▽ More
Given a sequence $S=(s_1,\dots,s_m) \in [0, 1]^m$, a block $B$ of $S$ is a subsequence $B=(s_i,s_{i+1},\dots,s_j)$. The size $b$ of a block $B$ is the sum of its elements. It is proved in [1] that for each positive integer $n$, there is a partition of $S$ into $n$ blocks $B_1, \dots , B_n$ with $|b_i - b_j| \le 1$ for every $i, j$. In this paper, we consider a generalization of the problem in higher dimensions.
△ Less
Submitted 18 June, 2017;
originally announced June 2017.
-
Borel version of the Local Lemma
Authors:
Endre Csóka,
Łukasz Grabowski,
András Máthé,
Oleg Pikhurko,
Konstantinos Tyros
Abstract:
We prove a Borel version of the local lemma, i.e. we show that, under suitable assumptions, if the set of variables in the local lemma has a structure of a Borel space, then there exists a satisfying assignment which is a Borel function. The main tool which we develop for the proof, which is of independent interest, is a parallel version of the Moser-Tardos algorithm which uses the same random bit…
▽ More
We prove a Borel version of the local lemma, i.e. we show that, under suitable assumptions, if the set of variables in the local lemma has a structure of a Borel space, then there exists a satisfying assignment which is a Borel function. The main tool which we develop for the proof, which is of independent interest, is a parallel version of the Moser-Tardos algorithm which uses the same random bits to resample clauses that are far enough in the dependency graph.
△ Less
Submitted 2 March, 2024; v1 submitted 16 May, 2016;
originally announced May 2016.
-
Independent sets and cuts in large-girth regular graphs
Authors:
Endre Csóka
Abstract:
We present a local algorithm producing an independent set of expected size $0.44533n$ on large-girth 3-regular graphs and $0.40407n$ on large-girth 4-regular graphs. We also construct a cut (or bisection or bipartite subgraph) with $1.34105n$ edges on large-girth 3-regular graphs. These decrease the gaps between the best known upper and lower bounds from $0.0178$ to $0.01$, from $0.0242$ to…
▽ More
We present a local algorithm producing an independent set of expected size $0.44533n$ on large-girth 3-regular graphs and $0.40407n$ on large-girth 4-regular graphs. We also construct a cut (or bisection or bipartite subgraph) with $1.34105n$ edges on large-girth 3-regular graphs. These decrease the gaps between the best known upper and lower bounds from $0.0178$ to $0.01$, from $0.0242$ to $0.0123$ and from $0.0724$ to $0.0616$, respectively. We are using local algorithms, therefore, the method also provides upper bounds for the fractional coloring numbers of $1 / 0.44533 \approx 2.24554$ and $1 / 0.40407 \approx 2.4748$ and fractional edge coloring number $1.5 / 1.34105 \approx 1.1185$. Our algorithms are applications of the technique introduced by Hoppen and Wormald.
△ Less
Submitted 7 February, 2016;
originally announced February 2016.
-
A macro placer algorithm for chip design
Authors:
Endre Csóka,
Attila Deák
Abstract:
There is a set of rectangular macros with given dimensions, and there are wires connecting some pairs (or sets) of them. We have a placement area where these macros should be placed without overlaps in order to minimize the total length of wires. We present a heuristic algorithm which utilizes a special data structure for representing two dimensional stepfunctions. This results in fast integral co…
▽ More
There is a set of rectangular macros with given dimensions, and there are wires connecting some pairs (or sets) of them. We have a placement area where these macros should be placed without overlaps in order to minimize the total length of wires. We present a heuristic algorithm which utilizes a special data structure for representing two dimensional stepfunctions. This results in fast integral computation and function modification over rectangles. Our heuristics, especially our data structure for two-dimensional functions, may be useful in other applications, as well.
△ Less
Submitted 6 September, 2015;
originally announced September 2015.
-
The extremal function for disconnected minors
Authors:
Endre Csóka,
Irene Lo,
Sergey Norin,
Hehui Wu,
Liana Yepremyan
Abstract:
For a graph $H$ let $c(H)$ denote the supremum of $|E(G)|/|V(G)|$ taken over all non-null graphs $G$ not containing $H$ as a minor. We show that $$c(H) \leq \frac{|V(H)|+\mathrm{comp}(H)}{2}-1,$$ when $H$ is a union of cycles, verifying conjectures of Reed and Wood, and Harvey and Wood.
We derive the above result from a theorem which allows us to find two vertex disjoint subgraphs with prescribe…
▽ More
For a graph $H$ let $c(H)$ denote the supremum of $|E(G)|/|V(G)|$ taken over all non-null graphs $G$ not containing $H$ as a minor. We show that $$c(H) \leq \frac{|V(H)|+\mathrm{comp}(H)}{2}-1,$$ when $H$ is a union of cycles, verifying conjectures of Reed and Wood, and Harvey and Wood.
We derive the above result from a theorem which allows us to find two vertex disjoint subgraphs with prescribed densities in a sufficiently dense graph, which might be of independent interest.
△ Less
Submitted 3 September, 2015;
originally announced September 2015.
-
A conjecture about the efficiency of first price mechanisms
Authors:
Endre Csóka
Abstract:
We present different versions of a conjecture which would express that first price mechanisms never work very badly in a very general class of problems. The definitions include most of the problems where there is a principal (seller) who has the right to exclude others from the game. The exact definitions are motivated by the "first price mechanism" in E Cs: "Efficient Teamwork", but the conjectur…
▽ More
We present different versions of a conjecture which would express that first price mechanisms never work very badly in a very general class of problems. The definitions include most of the problems where there is a principal (seller) who has the right to exclude others from the game. The exact definitions are motivated by the "first price mechanism" in E Cs: "Efficient Teamwork", but the conjecture is relevant for most auction problems, e.g. for combinatorial auctions.
△ Less
Submitted 30 August, 2015; v1 submitted 18 April, 2015;
originally announced August 2015.
-
The solution to an open problem for a caching game
Authors:
Endre Csóka,
Thomas Lidbetter
Abstract:
In a caching game introduced by Alpern et al., a Hider who can dig to a total fixed depth normalized to $1$ buries a fixed number of objects among $n$ discrete locations. A Searcher who can dig to a total depth of $h$ searches the locations with the aim of finding all of the hidden objects. If he does so, he wins, otherwise the Hider wins. This zero-sum game is complicated to analyze even for smal…
▽ More
In a caching game introduced by Alpern et al., a Hider who can dig to a total fixed depth normalized to $1$ buries a fixed number of objects among $n$ discrete locations. A Searcher who can dig to a total depth of $h$ searches the locations with the aim of finding all of the hidden objects. If he does so, he wins, otherwise the Hider wins. This zero-sum game is complicated to analyze even for small values of its parameters, and for the case of $2$ hidden objects has been completely solved only when the game is played in up to $3$ locations. For some values of $h$ the solution of the game with $2$ objects hidden in $4$ locations is known, but the solution in the remaining cases was an open question recently highlighted by Fokkink et al. Here we solve the remaining cases of the game with $2$ objects hidden in $4$ locations. We also give some more general results for the game, in particular using a geometrical argument to show that when there are $2$ objects hidden in $n$ locations and $n \rightarrow \infty$, the value of the game is asymptotically equal to $h/n$ for $h \ge n/2$.
△ Less
Submitted 7 December, 2015; v1 submitted 30 July, 2015;
originally announced July 2015.
-
Limit theory of discrete mathematics problems
Authors:
Endre Csóka
Abstract:
We show a general problem-solving tool called limit theory. This is an advanced version of asymptotic analysis of discrete problems when some finite parameter tends to infinity. We will apply it on three closely related problems. Alpern's Caching Game (for 2 nuts) is defined as follows. The hider caches 2 nuts into one or two of $n$ potential holes by digging at most 1 depth in total. The goal of…
▽ More
We show a general problem-solving tool called limit theory. This is an advanced version of asymptotic analysis of discrete problems when some finite parameter tends to infinity. We will apply it on three closely related problems. Alpern's Caching Game (for 2 nuts) is defined as follows. The hider caches 2 nuts into one or two of $n$ potential holes by digging at most 1 depth in total. The goal of the searcher is to find both nuts in a limited time $h$, otherwise the hider wins. We will show that if $h$ and $n/h$ are large enough, then very counterintuitively, any optimal hiding strategy should dig less than 1 in total, with positive probability. We will prove it by defining and analyzing a limit problem. Then we will partially solve the entire problem. We will also have significant progress with two other problems: the Manickam--Miklós--Singhi Conjecture and the Kikuta--Ruckle Conjecture.
△ Less
Submitted 20 June, 2017; v1 submitted 25 May, 2015;
originally announced May 2015.
-
Emergence of bimodality in controlling complex networks
Authors:
Tao Jia,
Yang-Yu Liu,
Endre Csóka,
Márton Pósfai,
Jean-Jacques Slotine,
Albert-László Barabási
Abstract:
Our ability to control complex systems is a fundamental challenge of contemporary science. Recently introduced tools to identify the driver nodes, nodes through which we can achieve full control, predict the existence of multiple control configurations, prompting us to classify each node in a network based on their role in control. Accordingly a node is critical, intermittent or redundant if it ac…
▽ More
Our ability to control complex systems is a fundamental challenge of contemporary science. Recently introduced tools to identify the driver nodes, nodes through which we can achieve full control, predict the existence of multiple control configurations, prompting us to classify each node in a network based on their role in control. Accordingly a node is critical, intermittent or redundant if it acts as a driver node in all, some or none of the control configurations. Here we develop an analytical framework to identify the category of each node, leading to the discovery of two distinct control modes in complex systems: centralized vs distributed control. We predict the control mode for an arbitrary network and show that one can alter it through small structural perturbations. The uncovered bimodality has implications from network security to organizational research and offers new insights into the dynamics and control of complex systems.
△ Less
Submitted 24 May, 2015;
originally announced May 2015.
-
Generalized solution for the Herman Protocol Conjecture
Authors:
Endre Csóka,
Szabolcs Mészáros,
András Pongrácz
Abstract:
The Herman Protocol Conjecture states that the expected time $\mathbb{E}(\mathbf{T})$ of Herman's self-stabilizing algorithm in a system consisting of $N$ identical processes organized in a ring holding several tokens is at most $\frac{4}{27}N^{2}$. We prove the conjecture in its standard unbiased and also in a biased form for discrete processes, and extend the result to further variants where the…
▽ More
The Herman Protocol Conjecture states that the expected time $\mathbb{E}(\mathbf{T})$ of Herman's self-stabilizing algorithm in a system consisting of $N$ identical processes organized in a ring holding several tokens is at most $\frac{4}{27}N^{2}$. We prove the conjecture in its standard unbiased and also in a biased form for discrete processes, and extend the result to further variants where the tokens move via certain Lévy processes. Moreover, we derive a bound on the expected value of $\mathbb{E}(α^{\mathbf{T}})$ for all $1\leq α\leq (1-\varepsilon)^{-1}$ with a specific $\varepsilon>0$. Subject to the correctness of an optimization result that can be demonstrated empirically, all these estimations attain their maximum on the initial state with three tokens distributed equidistantly on the ring of $N$ processes. Such a relation is the symptom of the fact that both $\mathbb{E}(\mathbf{T})$ and $\mathbb{E}(α^{\mathbf{T}})$ are weighted sums of the probabilities $\mathbb{P}(\mathbf{T}\geq t)$.
△ Less
Submitted 30 November, 2022; v1 submitted 27 April, 2015;
originally announced April 2015.
-
On the graph limit question of Vera T. Sós
Authors:
Endre Csóka
Abstract:
In the dense graph limit theory, the topology of the set of graphs is defined by the distribution of the subgraphs spanned by finite number of random vertices. Vera T. Sós proposed a question that if we consider only the number of edges in the spanned subgraphs, then whether it provides an equivalent definition. We show that the answer is positive on quasirandom graphs, and we prove a generalizati…
▽ More
In the dense graph limit theory, the topology of the set of graphs is defined by the distribution of the subgraphs spanned by finite number of random vertices. Vera T. Sós proposed a question that if we consider only the number of edges in the spanned subgraphs, then whether it provides an equivalent definition. We show that the answer is positive on quasirandom graphs, and we prove a generalization of the statement.
△ Less
Submitted 19 August, 2015; v1 submitted 9 April, 2015;
originally announced April 2015.
-
Kőnig's Line Coloring and Vizing's Theorems for Graphings
Authors:
Endre Csóka,
Gabor Lippner,
Oleg Pikhurko
Abstract:
The classical theorem of Vizing states that every graph of maximum degree $d$ admits an edge-coloring with at most $d+1$ colors. Furthermore, as it was earlier shown by Kőnig, $d$ colors suffice if the graph is bipartite.
We investigate the existence of measurable edge-colorings for graphings. A graphing is an analytic generalization of a bounded-degree graph that appears in various areas, such…
▽ More
The classical theorem of Vizing states that every graph of maximum degree $d$ admits an edge-coloring with at most $d+1$ colors. Furthermore, as it was earlier shown by Kőnig, $d$ colors suffice if the graph is bipartite.
We investigate the existence of measurable edge-colorings for graphings. A graphing is an analytic generalization of a bounded-degree graph that appears in various areas, such as sparse graph limits, orbit equivalence theory and measurable group theory. We show that every graphing of maximum degree $d$ admits a measurable edge-coloring with $d + O(\sqrt{d})$ colors; furthermore, if the graphing has no odd cycles, then $d+1$ colors suffice. In fact, if a certain conjecture about finite graphs that strengthens Vizing's theorem is true, then our method will show that $d+1$ colors are always enough.
△ Less
Submitted 21 August, 2016; v1 submitted 8 August, 2014;
originally announced August 2014.
-
Invariant Gaussian processes and independent sets on regular graphs of large girth
Authors:
Endre Csóka,
Balázs Gerencsér,
Viktor Harangi,
Bálint Virág
Abstract:
We prove that every 3-regular, n-vertex simple graph with sufficiently large girth contains an independent set of size at least 0.4361n. (The best known bound is 0.4352n.) In fact, computer simulation suggests that the bound our method provides is about 0.438n.
Our method uses invariant Gaussian processes on the d-regular tree that satisfy the eigenvector equation at each vertex for a certain ei…
▽ More
We prove that every 3-regular, n-vertex simple graph with sufficiently large girth contains an independent set of size at least 0.4361n. (The best known bound is 0.4352n.) In fact, computer simulation suggests that the bound our method provides is about 0.438n.
Our method uses invariant Gaussian processes on the d-regular tree that satisfy the eigenvector equation at each vertex for a certain eigenvalue λ. We show that such processes can be approximated by i.i.d. factors provided that $|λ| \leq 2\sqrt{d-1}$. We then use these approximations for $λ= -2\sqrt{d-1}$ to produce factor of i.i.d. independent sets on regular trees.
△ Less
Submitted 17 May, 2013;
originally announced May 2013.
-
Invariant random matchings in Cayley graphs
Authors:
Endre Csoka,
Gabor Lippner
Abstract:
We prove that any non-amenable Cayley graph admits a factor of IID perfect matching. We also show that any connected d-regular vertex tran- sitive graph admits a perfect matching. The two results together imply that every Cayley graph admits an invariant random perfect matching. A key step in the proof is a result on graphings that also applies to finite graphs. The finite version says that for an…
▽ More
We prove that any non-amenable Cayley graph admits a factor of IID perfect matching. We also show that any connected d-regular vertex tran- sitive graph admits a perfect matching. The two results together imply that every Cayley graph admits an invariant random perfect matching. A key step in the proof is a result on graphings that also applies to finite graphs. The finite version says that for any partial matching of a finite regular graph that is a good expander, one can always find an augmenting path whose length is poly-logarithmic in one over the ratio of unmatched vertices.
△ Less
Submitted 11 November, 2012;
originally announced November 2012.
-
Core percolation on complex networks
Authors:
Yang-Yu Liu,
Endre Csóka,
Haijun Zhou,
Márton Pósfai
Abstract:
As a fundamental structural transition in complex networks, core percolation is related to a wide range of important problems. Yet, previous theoretical studies of core percolation have been focusing on the classical Erdős-Rényi random networks with Poisson degree distribution, which are quite unlike many real-world networks with scale-free or fat-tailed degree distributions. Here we show that cor…
▽ More
As a fundamental structural transition in complex networks, core percolation is related to a wide range of important problems. Yet, previous theoretical studies of core percolation have been focusing on the classical Erdős-Rényi random networks with Poisson degree distribution, which are quite unlike many real-world networks with scale-free or fat-tailed degree distributions. Here we show that core percolation can be analytically studied for complex networks with arbitrary degree distributions. We derive the condition for core percolation and find that purely scale-free networks have no core for any degree exponents. We show that for undirected networks if core percolation occurs then it is always continuous while for directed networks it becomes discontinuous when the in- and out-degree distributions are different. We also apply our theory to real-world directed networks and find, surprisingly, that they often have much larger core sizes as compared to random models. These findings would help us better understand the interesting interplay between the structural and dynamical properties of complex networks.
△ Less
Submitted 15 June, 2012; v1 submitted 12 June, 2012;
originally announced June 2012.
-
Positive graphs
Authors:
Omar Antolín Camarena,
Endre Csóka,
Tamás Hubai,
Gábor Lippner,
László Lovász
Abstract:
We study "positive" graphs that have a nonnegative homomorphism number into every edge-weighted graph (where the edgeweights may be negative). We conjecture that all positive graphs can be obtained by taking two copies of an arbitrary simple graph and gluing them together along an independent set of nodes. We prove the conjecture for various classes of graphs including all trees. We prove a number…
▽ More
We study "positive" graphs that have a nonnegative homomorphism number into every edge-weighted graph (where the edgeweights may be negative). We conjecture that all positive graphs can be obtained by taking two copies of an arbitrary simple graph and gluing them together along an independent set of nodes. We prove the conjecture for various classes of graphs including all trees. We prove a number of properties of positive graphs, including the fact that they have a homomorphic image which has at least half the original number of nodes but in which every edge has an even number of pre-images. The results, combined with a computer program, imply that the conjecture is true for all graphs up to 9 nodes.
△ Less
Submitted 29 January, 2014; v1 submitted 29 May, 2012;
originally announced May 2012.
-
Variants of local algorithms on sparse graphs
Authors:
Endre Csóka
Abstract:
Suppose we want to construct some structure on a bounded-degree graph, e.g., an almost maximum matching, and we want to decide about each edge depending only on its constant-radius neighborhood. We examine and compare the strengths of different extensions of these local algorithms. A common extension is to use preprocessing, which means that we can make some calculation about the whole graph, and…
▽ More
Suppose we want to construct some structure on a bounded-degree graph, e.g., an almost maximum matching, and we want to decide about each edge depending only on its constant-radius neighborhood. We examine and compare the strengths of different extensions of these local algorithms. A common extension is to use preprocessing, which means that we can make some calculation about the whole graph, and each local decision can also depend on this calculation. In this paper, we show that preprocessing is needless: if a nearly optimal local algorithm uses preprocessing, then the same can be achieved by a local algorithm without preprocessing, but with a global randomization.
△ Less
Submitted 2 November, 2023; v1 submitted 7 February, 2012;
originally announced February 2012.
-
An undecidability result on limits of sparse graphs
Authors:
Endre Csóka
Abstract:
Given a set B of finite rooted graphs and a radius r as an input, we prove that it is undecidable to determine whether there exists a sequence (G_i) of finite bounded degree graphs such that the rooted r-radius neighbourhood of a random node of G_i is isomorphic to a rooted graph in B with probability tending to 1. Our proof implies a similar result for the case where the sequence (G_i) is replace…
▽ More
Given a set B of finite rooted graphs and a radius r as an input, we prove that it is undecidable to determine whether there exists a sequence (G_i) of finite bounded degree graphs such that the rooted r-radius neighbourhood of a random node of G_i is isomorphic to a rooted graph in B with probability tending to 1. Our proof implies a similar result for the case where the sequence (G_i) is replaced by a unimodular random graph.
△ Less
Submitted 7 February, 2012; v1 submitted 24 August, 2011;
originally announced August 2011.
-
Local algorithms for the maximum flow and minimum cut in bounded-degree networks
Authors:
Endre Csóka,
András Pongrácz
Abstract:
We show a deterministic constant-time local algorithm for constructing an approximately maximum flow and minimum fractional cut in multisource-multitarget networks with bounded degrees and bounded edge capacities. Locality means that the decision we make about each edge only depends on its constant radius neighborhood. We show two applications of the algorithms: one is related to the Aldous-Lyons…
▽ More
We show a deterministic constant-time local algorithm for constructing an approximately maximum flow and minimum fractional cut in multisource-multitarget networks with bounded degrees and bounded edge capacities. Locality means that the decision we make about each edge only depends on its constant radius neighborhood. We show two applications of the algorithms: one is related to the Aldous-Lyons Conjecture, and the other is about approximating the neighborhood distribution of graphs by bounded-size graphs. The scope of our results can be extended to unimodular random graphs and networks. As a corollary, we generalize the Maximum Flow Minimum Cut Theorem to unimodular random flow networks.
△ Less
Submitted 2 November, 2023; v1 submitted 4 May, 2010;
originally announced May 2010.
-
Efficient Teamwork
Authors:
Endre Csóka
Abstract:
Our goal is to solve both problems of adverse selection and moral hazard for multi-agent projects. In our model, each selected agent can work according to his private "capability tree". This means a process involving hidden actions, hidden chance events and hidden costs in a dynamic manner, and providing contractible consequences which are affecting each other's working process and the outcome of…
▽ More
Our goal is to solve both problems of adverse selection and moral hazard for multi-agent projects. In our model, each selected agent can work according to his private "capability tree". This means a process involving hidden actions, hidden chance events and hidden costs in a dynamic manner, and providing contractible consequences which are affecting each other's working process and the outcome of the project. We will construct a mechanism that induces truthful revelation of the agents' capability trees and chance events and to follow the instructions about their hidden decisions. This enables the planner to select the optimal subset of agents and obtain the efficient joint execution. We will construct another mechanism that is collusion-resistant but implements an only approximately efficient outcome. The latter mechanism is widely applicable, and the major application details will be elaborated.
△ Less
Submitted 10 January, 2018; v1 submitted 6 February, 2006;
originally announced February 2006.