-
Matching Correlated Inhomogeneous Random Graphs using the $k$-core Estimator
Authors:
Miklós Z. Rácz,
Anirudh Sridhar
Abstract:
We consider the task of estimating the latent vertex correspondence between two edge-correlated random graphs with generic, inhomogeneous structure. We study the so-called \emph{$k$-core estimator}, which outputs a vertex correspondence that induces a large, common subgraph of both graphs which has minimum degree at least $k$. We derive sufficient conditions under which the $k$-core estimator exac…
▽ More
We consider the task of estimating the latent vertex correspondence between two edge-correlated random graphs with generic, inhomogeneous structure. We study the so-called \emph{$k$-core estimator}, which outputs a vertex correspondence that induces a large, common subgraph of both graphs which has minimum degree at least $k$. We derive sufficient conditions under which the $k$-core estimator exactly or partially recovers the latent vertex correspondence. Finally, we specialize our general framework to derive new results on exact and partial recovery in correlated stochastic block models, correlated Chung-Lu graphs, and correlated random geometric graphs.
△ Less
Submitted 10 February, 2023;
originally announced February 2023.
-
Average-case and smoothed analysis of graph isomorphism
Authors:
Julia Gaudio,
Miklós Z. Rácz,
Anirudh Sridhar
Abstract:
We propose a simple and efficient local algorithm for graph isomorphism which succeeds for a large class of sparse graphs. This algorithm produces a low-depth canonical labeling, which is a labeling of the vertices of the graph that identifies its isomorphism class using vertices' local neighborhoods.
Prior work by Czajka and Pandurangan showed that the degree profile of a vertex (i.e., the sort…
▽ More
We propose a simple and efficient local algorithm for graph isomorphism which succeeds for a large class of sparse graphs. This algorithm produces a low-depth canonical labeling, which is a labeling of the vertices of the graph that identifies its isomorphism class using vertices' local neighborhoods.
Prior work by Czajka and Pandurangan showed that the degree profile of a vertex (i.e., the sorted list of the degrees of its neighbors) gives a canonical labeling with high probability when $n p_n = ω( \log^{4}(n) / \log \log n )$ (and $p_{n} \leq 1/2$); subsequently, Mossel and Ross showed that the same holds when $n p_n = ω( \log^{2}(n) )$. We first show that their analysis essentially cannot be improved: we prove that when $n p_n = o( \log^{2}(n) / (\log \log n)^{3} )$, with high probability there exist distinct vertices with isomorphic $2$-neighborhoods. Our first main result is a positive counterpart to this, showing that $3$-neighborhoods give a canonical labeling when $n p_n \geq (1+δ) \log n$ (and $p_n \leq 1/2$); this improves a recent result of Ding, Ma, Wu, and Xu, completing the picture above the connectivity threshold.
Our second main result is a smoothed analysis of graph isomorphism, showing that for a large class of deterministic graphs, a small random perturbation ensures that $3$-neighborhoods give a canonical labeling with high probability. While the worst-case complexity of graph isomorphism is still unknown, this shows that graph isomorphism has polynomial smoothed complexity.
△ Less
Submitted 18 September, 2023; v1 submitted 29 November, 2022;
originally announced November 2022.
-
Towards Consensus: Reducing Polarization by Perturbing Social Networks
Authors:
Miklos Z. Racz,
Daniel E. Rigobon
Abstract:
This paper studies how a centralized planner can modify the structure of a social or information network to reduce polarization. First, polarization is found to be highly dependent on degree and structural properties of the network -- including the well-known isoperimetric number (i.e., Cheeger constant). We then formulate the planner's problem under full information, and motivate disagreement-see…
▽ More
This paper studies how a centralized planner can modify the structure of a social or information network to reduce polarization. First, polarization is found to be highly dependent on degree and structural properties of the network -- including the well-known isoperimetric number (i.e., Cheeger constant). We then formulate the planner's problem under full information, and motivate disagreement-seeking and coordinate descent heuristics. A novel setting for the planner in which the population's innate opinions are adversarially chosen is introduced, and shown to be equivalent to maximization of the Laplacian's spectral gap. We prove bounds for the effectiveness of a strategy that adds edges between vertices on opposite sides of the cut induced by the spectral gap's eigenvector. Finally, these strategies are evaluated on six real-world and synthetic networks. In several networks, we find that polarization can be significantly reduced through the addition of a small number of edges.
△ Less
Submitted 20 December, 2022; v1 submitted 17 June, 2022;
originally announced June 2022.
-
Exact Community Recovery in Correlated Stochastic Block Models
Authors:
Julia Gaudio,
Miklos Z. Racz,
Anirudh Sridhar
Abstract:
We consider the problem of learning latent community structure from multiple correlated networks. We study edge-correlated stochastic block models with two balanced communities, focusing on the regime where the average degree is logarithmic in the number of vertices. Our main result derives the precise information-theoretic threshold for exact community recovery using multiple correlated graphs. T…
▽ More
We consider the problem of learning latent community structure from multiple correlated networks. We study edge-correlated stochastic block models with two balanced communities, focusing on the regime where the average degree is logarithmic in the number of vertices. Our main result derives the precise information-theoretic threshold for exact community recovery using multiple correlated graphs. This threshold captures the interplay between the community recovery and graph matching tasks. In particular, we uncover and characterize a region of the parameter space where exact community recovery is possible using multiple correlated graphs, even though (1) this is information-theoretically impossible using a single graph and (2) exact graph matching is also information-theoretically impossible. In this regime, we develop a novel algorithm that carefully synthesizes algorithms from the community recovery and graph matching literatures.
△ Less
Submitted 29 March, 2022;
originally announced March 2022.
-
A probabilistic view of latent space graphs and phase transitions
Authors:
Suqi Liu,
Miklos Z. Racz
Abstract:
We study random graphs with latent geometric structure, where the probability of each edge depends on the underlying random positions corresponding to the two endpoints. We focus on the setting where this conditional probability is a general monotone increasing function of the inner product of two vectors; such a function can naturally be viewed as the cumulative distribution function of some inde…
▽ More
We study random graphs with latent geometric structure, where the probability of each edge depends on the underlying random positions corresponding to the two endpoints. We focus on the setting where this conditional probability is a general monotone increasing function of the inner product of two vectors; such a function can naturally be viewed as the cumulative distribution function of some independent random variable. We consider a one-parameter family of random graphs, characterized by the variance of this random variable, that smoothly interpolates between a random dot product graph and an Erdős--Rényi random graph. We prove phase transitions of detecting geometry in these graphs, in terms of the dimension of the underlying geometric space and the variance parameter of the conditional probability. When the dimension is high or the variance is large, the graph is similar to an Erdős--Rényi graph with the same edge density that does not possess geometry; in other parameter regimes, there is a computationally efficient signed triangle statistic that distinguishes them. The proofs make use of information-theoretic inequalities and concentration of measure phenomena.
△ Less
Submitted 29 October, 2021;
originally announced October 2021.
-
Correlated Stochastic Block Models: Exact Graph Matching with Applications to Recovering Communities
Authors:
Miklos Z. Racz,
Anirudh Sridhar
Abstract:
We consider the task of learning latent community structure from multiple correlated networks. First, we study the problem of learning the latent vertex correspondence between two edge-correlated stochastic block models, focusing on the regime where the average degree is logarithmic in the number of vertices. We derive the precise information-theoretic threshold for exact recovery: above the thres…
▽ More
We consider the task of learning latent community structure from multiple correlated networks. First, we study the problem of learning the latent vertex correspondence between two edge-correlated stochastic block models, focusing on the regime where the average degree is logarithmic in the number of vertices. We derive the precise information-theoretic threshold for exact recovery: above the threshold there exists an estimator that outputs the true correspondence with probability close to 1, while below it no estimator can recover the true correspondence with probability bounded away from 0. As an application of our results, we show how one can exactly recover the latent communities using multiple correlated graphs in parameter regimes where it is information-theoretically impossible to do so using just a single graph.
△ Less
Submitted 14 July, 2021;
originally announced July 2021.
-
Phase transition in noisy high-dimensional random geometric graphs
Authors:
Suqi Liu,
Miklos Z. Racz
Abstract:
We study the problem of detecting latent geometric structure in random graphs. To this end, we consider the soft high-dimensional random geometric graph $\mathcal{G}(n,p,d,q)$, where each of the $n$ vertices corresponds to an independent random point distributed uniformly on the sphere $\mathbb{S}^{d-1}$, and the probability that two vertices are connected by an edge is a decreasing function of th…
▽ More
We study the problem of detecting latent geometric structure in random graphs. To this end, we consider the soft high-dimensional random geometric graph $\mathcal{G}(n,p,d,q)$, where each of the $n$ vertices corresponds to an independent random point distributed uniformly on the sphere $\mathbb{S}^{d-1}$, and the probability that two vertices are connected by an edge is a decreasing function of the Euclidean distance between the points. The probability of connection is parametrized by $q \in [0,1]$, with smaller $q$ corresponding to weaker dependence on the geometry; this can also be interpreted as the level of noise in the geometric graph. In particular, the model smoothly interpolates between the spherical hard random geometric graph $\mathcal{G}(n,p,d)$ (corresponding to $q = 1$) and the Erdős-Rényi model $\mathcal{G}(n,p)$ (corresponding to $q = 0$). We focus on the dense regime (i.e., $p$ is a constant).
We show that if $nq \to 0$ or $d \gg n^{3} q^{2}$, then geometry is lost: $\mathcal{G}(n,p,d,q)$ is asymptotically indistinguishable from $\mathcal{G}(n,p)$. On the other hand, if $d \ll n^{3} q^{6}$, then the signed triangle statistic provides an asymptotically powerful test for detecting geometry. These results generalize those of Bubeck, Ding, Eldan, and Rácz (2016) for $\mathcal{G}(n,p,d)$, and give quantitative bounds on how the noise level affects the dimension threshold for losing geometry. We also prove analogous results under a related but different distributional assumption, and we further explore generalizations of signed triangles in order to understand the intermediate regime left open by our results.
△ Less
Submitted 28 March, 2021;
originally announced March 2021.
-
Tree trace reconstruction using subtraces
Authors:
Tatiana Brailovskaya,
Miklós Z. Rácz
Abstract:
Tree trace reconstruction aims to learn the binary node labels of a tree, given independent samples of the tree passed through an appropriately defined deletion channel. In recent work, Davies, Rácz, and Rashtchian used combinatorial methods to show that $\exp(\mathcal{O}(k \log_{k} n))$ samples suffice to reconstruct a complete $k$-ary tree with $n$ nodes with high probability. We provide an alte…
▽ More
Tree trace reconstruction aims to learn the binary node labels of a tree, given independent samples of the tree passed through an appropriately defined deletion channel. In recent work, Davies, Rácz, and Rashtchian used combinatorial methods to show that $\exp(\mathcal{O}(k \log_{k} n))$ samples suffice to reconstruct a complete $k$-ary tree with $n$ nodes with high probability. We provide an alternative proof of this result, which allows us to generalize it to a broader class of tree topologies and deletion models. In our proofs, we introduce the notion of a subtrace, which enables us to connect with and generalize recent mean-based complex analytic algorithms for string trace reconstruction.
△ Less
Submitted 2 February, 2021;
originally announced February 2021.
-
Approximate Trace Reconstruction
Authors:
Sami Davies,
Miklos Z. Racz,
Cyrus Rashtchian,
Benjamin G. Schiffer
Abstract:
In the usual trace reconstruction problem, the goal is to exactly reconstruct an unknown string of length $n$ after it passes through a deletion channel many times independently, producing a set of traces (i.e., random subsequences of the string). We consider the relaxed problem of approximate reconstruction. Here, the goal is to output a string that is close to the original one in edit distance w…
▽ More
In the usual trace reconstruction problem, the goal is to exactly reconstruct an unknown string of length $n$ after it passes through a deletion channel many times independently, producing a set of traces (i.e., random subsequences of the string). We consider the relaxed problem of approximate reconstruction. Here, the goal is to output a string that is close to the original one in edit distance while using much fewer traces than is needed for exact reconstruction. We present several algorithms that can approximately reconstruct strings that belong to certain classes, where the estimate is within $n/\mathrm{polylog}(n)$ edit distance, and where we only use $\mathrm{polylog}(n)$ traces (or sometimes just a single trace). These classes contain strings that require a linear number of traces for exact reconstruction and which are quite different from a typical random string. From a technical point of view, our algorithms approximately reconstruct consecutive substrings of the unknown string by aligning dense regions of traces and using a run of a suitable length to approximate each region. To complement our algorithms, we present a general black-box lower bound for approximate reconstruction, building on a lower bound for distinguishing between two candidate input strings in the worst case. In particular, this shows that approximating to within $n^{1/3 - δ}$ edit distance requires $n^{1 + 3δ/2}/\mathrm{polylog}(n)$ traces for $0< δ< 1/3$ in the worst case.
△ Less
Submitted 16 December, 2020; v1 submitted 11 December, 2020;
originally announced December 2020.
-
Batch Optimization for DNA Synthesis
Authors:
Konstantin Makarychev,
Miklos Z. Racz,
Cyrus Rashtchian,
Sergey Yekhanin
Abstract:
Large pools of synthetic DNA molecules have been recently used to reliably store significant volumes of digital data. While DNA as a storage medium has enormous potential because of its high storage density, its practical use is currently severely limited because of the high cost and low throughput of available DNA synthesis technologies. We study the role of batch optimization in reducing the cos…
▽ More
Large pools of synthetic DNA molecules have been recently used to reliably store significant volumes of digital data. While DNA as a storage medium has enormous potential because of its high storage density, its practical use is currently severely limited because of the high cost and low throughput of available DNA synthesis technologies. We study the role of batch optimization in reducing the cost of large scale DNA synthesis, which translates to the following algorithmic task. Given a large pool $\mathcal{S}$ of random quaternary strings of fixed length, partition $\mathcal{S}$ into batches in a way that minimizes the sum of the lengths of the shortest common supersequences across batches. We introduce two ideas for batch optimization that both improve (in different ways) upon a naive baseline: (1) using both $(ACGT)^{*}$ and its reverse $(TGCA)^{*}$ as reference strands, and batching appropriately, and (2) batching via the quantiles of an appropriate ordering of the strands. We also prove asymptotically matching lower bounds on the cost of DNA synthesis, showing that one cannot improve upon these two ideas. Our results uncover a surprising separation between two cases that naturally arise in the context of DNA data storage: the asymptotic cost savings of batch optimization are significantly greater in the case where strings in $\mathcal{S}$ do not contain repeats of the same character (homopolymers), as compared to the case where strings in $\mathcal{S}$ are unconstrained.
△ Less
Submitted 23 February, 2021; v1 submitted 29 November, 2020;
originally announced November 2020.
-
Rumor source detection with multiple observations under adaptive diffusions
Authors:
Miklos Z. Racz,
Jacob Richey
Abstract:
Recent work, motivated by anonymous messaging platforms, has introduced adaptive diffusion protocols which can obfuscate the source of a rumor: a "snapshot adversary" with access to the subgraph of "infected" nodes can do no better than randomly guessing the entity of the source node. What happens if the adversary has access to multiple independent snapshots? We study this question when the underl…
▽ More
Recent work, motivated by anonymous messaging platforms, has introduced adaptive diffusion protocols which can obfuscate the source of a rumor: a "snapshot adversary" with access to the subgraph of "infected" nodes can do no better than randomly guessing the entity of the source node. What happens if the adversary has access to multiple independent snapshots? We study this question when the underlying graph is the infinite $d$-regular tree. We show that (1) a weak form of source obfuscation is still possible in the case of two independent snapshots, but (2) already with three observations there is a simple algorithm that finds the rumor source with constant probability, regardless of the adaptive diffusion protocol. We also characterize the tradeoff between local spreading and source obfuscation for adaptive diffusion protocols (under a single snapshot). These results raise questions about the robustness of anonymity guarantees when spreading information in social networks.
△ Less
Submitted 19 June, 2020;
originally announced June 2020.
-
Correlated randomly growing graphs
Authors:
Miklos Z. Racz,
Anirudh Sridhar
Abstract:
We introduce a new model of correlated randomly growing graphs and study the fundamental questions of detecting correlation and estimating aspects of the correlated structure. The model is simple and starts with any model of randomly growing graphs, such as uniform attachment (UA) or preferential attachment (PA). Given such a model, a pair of graphs $(G_1, G_2)$ is grown in two stages: until time…
▽ More
We introduce a new model of correlated randomly growing graphs and study the fundamental questions of detecting correlation and estimating aspects of the correlated structure. The model is simple and starts with any model of randomly growing graphs, such as uniform attachment (UA) or preferential attachment (PA). Given such a model, a pair of graphs $(G_1, G_2)$ is grown in two stages: until time $t_{\star}$ they are grown together (i.e., $G_1 = G_2$), after which they grow independently according to the underlying growth model.
We show that whenever the seed graph has an influence in the underlying graph growth model---this has been shown for PA and UA trees and is conjectured to hold broadly---then correlation can be detected in this model, even if the graphs are grown together for just a single time step. We also give a general sufficient condition (which holds for PA and UA trees) under which detection is possible with probability going to $1$ as $t_{\star} \to \infty$. Finally, we show for PA and UA trees that the amount of correlation, measured by $t_{\star}$, can be estimated with vanishing relative error as $t_{\star} \to \infty$.
△ Less
Submitted 28 April, 2020;
originally announced April 2020.
-
Network disruption: maximizing disagreement and polarization in social networks
Authors:
Mayee F. Chen,
Miklos Z. Racz
Abstract:
Recent years have seen a marked increase in the spread of misinformation, a phenomenon which has been accelerated and amplified by social media such as Facebook and Twitter. While some actors spread misinformation to push a specific agenda, it has also been widely documented that others aim to simply disrupt the network by increasing disagreement and polarization across the network and thereby des…
▽ More
Recent years have seen a marked increase in the spread of misinformation, a phenomenon which has been accelerated and amplified by social media such as Facebook and Twitter. While some actors spread misinformation to push a specific agenda, it has also been widely documented that others aim to simply disrupt the network by increasing disagreement and polarization across the network and thereby destabilizing society. Popular social networks are also vulnerable to large-scale attacks. Motivated by this reality, we introduce a simple model of network disruption where an adversary can take over a limited number of user profiles in a social network with the aim of maximizing disagreement and/or polarization in the network.
We investigate this model both theoretically and empirically. We show that the adversary will always change the opinion of a taken-over profile to an extreme in order to maximize disruption. We also prove that an adversary can increase disagreement / polarization at most linearly in the number of user profiles it takes over. Furthermore, we present a detailed empirical study of several natural algorithms for the adversary on both synthetic networks and real world (Reddit and Twitter) data sets. These show that even simple, unsophisticated heuristics, such as targeting centrists, can disrupt a network effectively, causing a large increase in disagreement / polarization. Studying the problem of network disruption through the lens of an adversary thus highlights the seriousness of the problem.
△ Less
Submitted 9 April, 2020; v1 submitted 18 March, 2020;
originally announced March 2020.
-
Finding a planted clique by adaptive probing
Authors:
Miklós Z. Rácz,
Benjamin Schiffer
Abstract:
We consider a variant of the planted clique problem where we are allowed unbounded computational time but can only investigate a small part of the graph by adaptive edge queries. We determine (up to logarithmic factors) the number of queries necessary both for detecting the presence of a planted clique and for finding the planted clique.
Specifically, let $G \sim G(n,1/2,k)$ be a random graph on…
▽ More
We consider a variant of the planted clique problem where we are allowed unbounded computational time but can only investigate a small part of the graph by adaptive edge queries. We determine (up to logarithmic factors) the number of queries necessary both for detecting the presence of a planted clique and for finding the planted clique.
Specifically, let $G \sim G(n,1/2,k)$ be a random graph on $n$ vertices with a planted clique of size $k$. We show that no algorithm that makes at most $q = o(n^2 / k^2 + n)$ adaptive queries to the adjacency matrix of $G$ is likely to find the planted clique. On the other hand, when $k \geq (2+ε) \log_2 n$ there exists a simple algorithm (with unbounded computational power) that finds the planted clique with high probability by making $q = O( (n^2 / k^2) \log^2 n + n \log n)$ adaptive queries. For detection, the additive $n$ term is not necessary: the number of queries needed to detect the presence of a planted clique is $n^2 / k^2$ (up to logarithmic factors).
△ Less
Submitted 23 July, 2020; v1 submitted 28 March, 2019;
originally announced March 2019.
-
Reconstructing Trees from Traces
Authors:
Sami Davies,
Miklos Z. Racz,
Cyrus Rashtchian
Abstract:
We study the problem of learning a node-labeled tree given independent traces from an appropriately defined deletion channel. This problem, tree trace reconstruction, generalizes string trace reconstruction, which corresponds to the tree being a path. For many classes of trees, including complete trees and spiders, we provide algorithms that reconstruct the labels using only a polynomial number of…
▽ More
We study the problem of learning a node-labeled tree given independent traces from an appropriately defined deletion channel. This problem, tree trace reconstruction, generalizes string trace reconstruction, which corresponds to the tree being a path. For many classes of trees, including complete trees and spiders, we provide algorithms that reconstruct the labels using only a polynomial number of traces. This exhibits a stark contrast to known results on string trace reconstruction, which require exponentially many traces, and where a central open problem is to determine whether a polynomial number of traces suffice. Our techniques combine novel combinatorial and complex analytic methods.
△ Less
Submitted 18 September, 2020; v1 submitted 13 February, 2019;
originally announced February 2019.
-
Finding cliques using few probes
Authors:
Uriel Feige,
David Gamarnik,
Joe Neeman,
Miklós Z. Rácz,
Prasad Tetali
Abstract:
Consider algorithms with unbounded computation time that probe the entries of the adjacency matrix of an $n$ vertex graph, and need to output a clique. We show that if the input graph is drawn at random from $G_{n,\frac{1}{2}}$ (and hence is likely to have a clique of size roughly $2\log n$), then for every $δ< 2$ and constant $\ell$, there is an $α< 2$ (that may depend on $δ$ and $\ell$) such tha…
▽ More
Consider algorithms with unbounded computation time that probe the entries of the adjacency matrix of an $n$ vertex graph, and need to output a clique. We show that if the input graph is drawn at random from $G_{n,\frac{1}{2}}$ (and hence is likely to have a clique of size roughly $2\log n$), then for every $δ< 2$ and constant $\ell$, there is an $α< 2$ (that may depend on $δ$ and $\ell$) such that no algorithm that makes $n^δ$ probes in $\ell$ rounds is likely (over the choice of the random graph) to output a clique of size larger than $α\log n$.
△ Less
Submitted 18 September, 2018;
originally announced September 2018.
-
How fragile are information cascades?
Authors:
Yuval Peres,
Miklos Z. Racz,
Allan Sly,
Izabella Stuhl
Abstract:
It is well known that sequential decision making may lead to information cascades. That is, when agents make decisions based on their private information, as well as observing the actions of those before them, then it might be rational to ignore their private signal and imitate the action of previous individuals. If the individuals are choosing between a right and a wrong state, and the initial ac…
▽ More
It is well known that sequential decision making may lead to information cascades. That is, when agents make decisions based on their private information, as well as observing the actions of those before them, then it might be rational to ignore their private signal and imitate the action of previous individuals. If the individuals are choosing between a right and a wrong state, and the initial actions are wrong, then the whole cascade will be wrong. This issue is due to the fact that cascades can be based on very little information.
We show that if agents occasionally disregard the actions of others and base their action only on their private information, then wrong cascades can be avoided. Moreover, we study the optimal asymptotic rate at which the error probability at time $t$ can go to zero. The optimal policy is for the player at time $t$ to follow their private information with probability $p_{t} = c/t$, leading to a learning rate of $c'/t$, where the constants $c$ and $c'$ are explicit.
△ Less
Submitted 21 February, 2018; v1 submitted 10 November, 2017;
originally announced November 2017.
-
Optimal control for diffusions on graphs
Authors:
Laura Florescu,
Yuval Peres,
Miklos Z. Racz
Abstract:
Starting from a unit mass on a vertex of a graph, we investigate the minimum number of "\emph{controlled diffusion}" steps needed to transport a constant mass $p$ outside of the ball of radius $n$. In a step of a controlled diffusion process we may select any vertex with positive mass and topple its mass equally to its neighbors. Our initial motivation comes from the maximum overhang question in o…
▽ More
Starting from a unit mass on a vertex of a graph, we investigate the minimum number of "\emph{controlled diffusion}" steps needed to transport a constant mass $p$ outside of the ball of radius $n$. In a step of a controlled diffusion process we may select any vertex with positive mass and topple its mass equally to its neighbors. Our initial motivation comes from the maximum overhang question in one dimension, but the more general case arises from optimal mass transport problems.
On $\mathbb{Z}^{d}$ we show that $Θ( n^{d+2} )$ steps are necessary and sufficient to transport the mass. We also give sharp bounds on the comb graph and $d$-ary trees. Furthermore, we consider graphs where simple random walk has positive speed and entropy and which satisfy Shannon's theorem, and show that the minimum number of controlled diffusion steps is $\exp{( n \cdot h / \ell ( 1 + o(1) ))}$, where $h$ is the Avez asymptotic entropy and $\ell$ is the speed of random walk. As examples, we give precise results on Galton-Watson trees and the product of trees $\mathbb{T}_d \times \mathbb{T}_k$.
△ Less
Submitted 29 March, 2017;
originally announced March 2017.
-
A smooth transition from Wishart to GOE
Authors:
Miklos Z. Racz,
Jacob Richey
Abstract:
It is well known that an $n \times n$ Wishart matrix with $d$ degrees of freedom is close to the appropriately centered and scaled Gaussian Orthogonal Ensemble (GOE) if $d$ is large enough. Recent work of Bubeck, Ding, Eldan, and Racz, and independently Jiang and Li, shows that the transition happens when $d = Θ( n^{3} )$. Here we consider this critical window and explicitly compute the total vari…
▽ More
It is well known that an $n \times n$ Wishart matrix with $d$ degrees of freedom is close to the appropriately centered and scaled Gaussian Orthogonal Ensemble (GOE) if $d$ is large enough. Recent work of Bubeck, Ding, Eldan, and Racz, and independently Jiang and Li, shows that the transition happens when $d = Θ( n^{3} )$. Here we consider this critical window and explicitly compute the total variation distance between the Wishart and GOE matrices when $d / n^{3} \to c \in (0, \infty)$. This shows, in particular, that the phase transition from Wishart to GOE is smooth.
△ Less
Submitted 17 November, 2016;
originally announced November 2016.
-
Basic models and questions in statistical network analysis
Authors:
Miklos Z. Racz,
Sébastien Bubeck
Abstract:
Extracting information from large graphs has become an important statistical problem since network data is now common in various fields. In this minicourse we will investigate the most natural statistical questions for three canonical probabilistic models of networks: (i) community detection in the stochastic block model, (ii) finding the embedding of a random geometric graph, and (iii) finding th…
▽ More
Extracting information from large graphs has become an important statistical problem since network data is now common in various fields. In this minicourse we will investigate the most natural statistical questions for three canonical probabilistic models of networks: (i) community detection in the stochastic block model, (ii) finding the embedding of a random geometric graph, and (iii) finding the original vertex in a preferential attachment tree. Along the way we will cover many interesting topics in probability theory such as Pólya urns, large deviation theory, concentration of measure in high dimension, entropic central limit theorems, and more.
△ Less
Submitted 12 September, 2016;
originally announced September 2016.
-
Sequence assembly from corrupted shotgun reads
Authors:
Shirshendu Ganguly,
Elchanan Mossel,
Miklos Z. Racz
Abstract:
The prevalent technique for DNA sequencing consists of two main steps: shotgun sequencing, where many randomly located fragments, called reads, are extracted from the overall sequence, followed by an assembly algorithm that aims to reconstruct the original sequence. There are many different technologies that generate the reads: widely-used second-generation methods create short reads with low erro…
▽ More
The prevalent technique for DNA sequencing consists of two main steps: shotgun sequencing, where many randomly located fragments, called reads, are extracted from the overall sequence, followed by an assembly algorithm that aims to reconstruct the original sequence. There are many different technologies that generate the reads: widely-used second-generation methods create short reads with low error rates, while emerging third-generation methods create long reads with high error rates. Both error rates and error profiles differ among methods, so reconstruction algorithms are often tailored to specific shotgun sequencing technologies. As these methods change over time, a fundamental question is whether there exist reconstruction algorithms which are robust, i.e., which perform well under a wide range of error distributions.
Here we study this question of sequence assembly from corrupted reads. We make no assumption on the types of errors in the reads, but only assume a bound on their magnitude. More precisely, for each read we assume that instead of receiving the true read with no errors, we receive a corrupted read which has edit distance at most $ε$ times the length of the read from the true read. We show that if the reads are long enough and there are sufficiently many of them, then approximate reconstruction is possible: we construct a simple algorithm such that for almost all original sequences the output of the algorithm is a sequence whose edit distance from the original one is at most $O(ε)$ times the length of the original sequence.
△ Less
Submitted 26 January, 2016;
originally announced January 2016.
-
Beta-gamma tail asymptotics
Authors:
Jim Pitman,
Miklos Z. Racz
Abstract:
We compute the tail asymptotics of the product of a beta random variable and a generalized gamma random variable which are independent and have general parameters. A special case of these asymptotics were proved and used in a recent work of Bubeck, Mossel, and Rácz in order to determine the tail asymptotics of the maximum degree of the preferential attachment tree. The proof presented here is simp…
▽ More
We compute the tail asymptotics of the product of a beta random variable and a generalized gamma random variable which are independent and have general parameters. A special case of these asymptotics were proved and used in a recent work of Bubeck, Mossel, and Rácz in order to determine the tail asymptotics of the maximum degree of the preferential attachment tree. The proof presented here is simpler and highlights why these asymptotics hold.
△ Less
Submitted 8 September, 2015;
originally announced September 2015.
-
Braess's paradox for the spectral gap in random graphs and delocalization of eigenvectors
Authors:
Ronen Eldan,
Miklós Rácz,
Tselil Schramm
Abstract:
We study how the spectral gap of the normalized Laplacian of a random graph changes when an edge is added to or removed from the graph. There are known examples of graphs where, perhaps counterintuitively, adding an edge can decrease the spectral gap, a phenomenon that is analogous to Braess's paradox in traffic networks. We show that this is often the case in random graphs in a strong sense. More…
▽ More
We study how the spectral gap of the normalized Laplacian of a random graph changes when an edge is added to or removed from the graph. There are known examples of graphs where, perhaps counterintuitively, adding an edge can decrease the spectral gap, a phenomenon that is analogous to Braess's paradox in traffic networks. We show that this is often the case in random graphs in a strong sense. More precisely, we show that for typical instances of Erdős-Rényi random graphs $G(n,p)$ with constant edge density $p \in (0,1)$, the addition of a random edge will decrease the spectral gap with positive probability, strictly bounded away from zero. To do this, we prove a new delocalization result for eigenvectors of the Laplacian of $G(n,p)$, which might be of independent interest.
△ Less
Submitted 20 June, 2015; v1 submitted 28 April, 2015;
originally announced April 2015.
-
Testing for high-dimensional geometry in random graphs
Authors:
Sébastien Bubeck,
Jian Ding,
Ronen Eldan,
Miklós Rácz
Abstract:
We study the problem of detecting the presence of an underlying high-dimensional geometric structure in a random graph. Under the null hypothesis, the observed graph is a realization of an Erdős-Rényi random graph $G(n,p)$. Under the alternative, the graph is generated from the $G(n,p,d)$ model, where each vertex corresponds to a latent independent random vector uniformly distributed on the sphere…
▽ More
We study the problem of detecting the presence of an underlying high-dimensional geometric structure in a random graph. Under the null hypothesis, the observed graph is a realization of an Erdős-Rényi random graph $G(n,p)$. Under the alternative, the graph is generated from the $G(n,p,d)$ model, where each vertex corresponds to a latent independent random vector uniformly distributed on the sphere $\mathbb{S}^{d-1}$, and two vertices are connected if the corresponding latent vectors are close enough. In the dense regime (i.e., $p$ is a constant), we propose a near-optimal and computationally efficient testing procedure based on a new quantity which we call signed triangles. The proof of the detection lower bound is based on a new bound on the total variation distance between a Wishart matrix and an appropriately normalized GOE matrix. In the sparse regime, we make a conjecture for the optimal detection boundary. We conclude the paper with some preliminary steps on the problem of estimating the dimension in $G(n,p,d)$.
△ Less
Submitted 21 November, 2015; v1 submitted 20 November, 2014;
originally announced November 2014.
-
From trees to seeds: on the inference of the seed from large trees in the uniform attachment model
Authors:
Sébastien Bubeck,
Ronen Eldan,
Elchanan Mossel,
Miklós Z. Rácz
Abstract:
We study the influence of the seed in random trees grown according to the uniform attachment model, also known as uniform random recursive trees. We show that different seeds lead to different distributions of limiting trees from a total variation point of view. To do this, we construct statistics that measure, in a certain well-defined sense, global "balancedness" properties of such trees. Our pa…
▽ More
We study the influence of the seed in random trees grown according to the uniform attachment model, also known as uniform random recursive trees. We show that different seeds lead to different distributions of limiting trees from a total variation point of view. To do this, we construct statistics that measure, in a certain well-defined sense, global "balancedness" properties of such trees. Our paper follows recent results on the same question for the preferential attachment model.
△ Less
Submitted 20 October, 2014; v1 submitted 26 September, 2014;
originally announced September 2014.
-
Can one hear the shape of a population history?
Authors:
Junhyong Kim,
Elchanan Mossel,
Miklós Z. Rácz,
Nathan Ross
Abstract:
Reconstructing past population size from present day genetic data is a major goal of population genetics. Recent empirical studies infer population size history using coalescent-based models applied to a small number of individuals. Here we provide tight bounds on the amount of exact coalescence time data needed to recover the population size history of a single, panmictic population at a certain…
▽ More
Reconstructing past population size from present day genetic data is a major goal of population genetics. Recent empirical studies infer population size history using coalescent-based models applied to a small number of individuals. Here we provide tight bounds on the amount of exact coalescence time data needed to recover the population size history of a single, panmictic population at a certain level of accuracy. In practice, coalescence times are estimated from sequence data and so our lower bounds should be taken as rather conservative.
△ Less
Submitted 29 September, 2014; v1 submitted 11 February, 2014;
originally announced February 2014.
-
On the influence of the seed graph in the preferential attachment model
Authors:
Sébastien Bubeck,
Elchanan Mossel,
Miklós Z. Rácz
Abstract:
We study the influence of the seed graph in the preferential attachment model, focusing on the case of trees. We first show that the seed has no effect from a weak local limit point of view. On the other hand, we conjecture that different seeds lead to different distributions of limiting trees from a total variation point of view. We take a first step in proving this conjecture by showing that see…
▽ More
We study the influence of the seed graph in the preferential attachment model, focusing on the case of trees. We first show that the seed has no effect from a weak local limit point of view. On the other hand, we conjecture that different seeds lead to different distributions of limiting trees from a total variation point of view. We take a first step in proving this conjecture by showing that seeds with different degree profiles lead to different limiting distributions for the (appropriately normalized) maximum degree, implying that such seeds lead to different (in total variation) limiting trees.
△ Less
Submitted 28 March, 2014; v1 submitted 20 January, 2014;
originally announced January 2014.
-
V1117 Her: A Herbig Ae star at high Galactic latitude?
Authors:
M. Kun,
M. Rácz,
L. Szabados
Abstract:
We examine the long-term light curve, optical spectrum, spectral energy distribution, and Galactic location of V1117 Her in order to establish its nature. V1117 Her is most probably a young intermediate-mass star whose cyclic brightness dimmings are caused by changing circumstellar dust structures.
We examine the long-term light curve, optical spectrum, spectral energy distribution, and Galactic location of V1117 Her in order to establish its nature. V1117 Her is most probably a young intermediate-mass star whose cyclic brightness dimmings are caused by changing circumstellar dust structures.
△ Less
Submitted 9 January, 2014;
originally announced January 2014.
-
Coexistence in preferential attachment networks
Authors:
Tonći Antunović,
Elchanan Mossel,
Miklos Z. Racz
Abstract:
We introduce a new model of competition on growing networks. This extends the preferential attachment model, with the key property that node choices evolve simultaneously with the network. When a new node joins the network, it chooses neighbours by preferential attachment, and selects its type based on the number of initial neighbours of each type. The model is analysed in detail, and in particula…
▽ More
We introduce a new model of competition on growing networks. This extends the preferential attachment model, with the key property that node choices evolve simultaneously with the network. When a new node joins the network, it chooses neighbours by preferential attachment, and selects its type based on the number of initial neighbours of each type. The model is analysed in detail, and in particular, we determine the possible proportions of the various types in the limit of large networks. An important qualitative feature we find is that, in contrast to many current theoretical models, often several competitors will coexist. This matches empirical observations in many real-world networks.
△ Less
Submitted 25 November, 2015; v1 submitted 10 July, 2013;
originally announced July 2013.
-
Multidimensional sticky Brownian motions as limits of exclusion processes
Authors:
Miklós Z. Rácz,
Mykhaylo Shkolnikov
Abstract:
We study exclusion processes on the integer lattice in which particles change their velocities due to stickiness. Specifically, whenever two or more particles occupy adjacent sites, they stick together for an extended period of time, and the entire particle system is slowed down until the ``collision'' is resolved. We show that under diffusive scaling of space and time such processes converge to w…
▽ More
We study exclusion processes on the integer lattice in which particles change their velocities due to stickiness. Specifically, whenever two or more particles occupy adjacent sites, they stick together for an extended period of time, and the entire particle system is slowed down until the ``collision'' is resolved. We show that under diffusive scaling of space and time such processes converge to what one might refer to as a sticky reflected Brownian motion in the wedge. The latter behaves as a Brownian motion with constant drift vector and diffusion matrix in the interior of the wedge, and reflects at the boundary of the wedge after spending an instant of time there. In particular, this leads to a natural multidimensional generalization of sticky Brownian motion on the half-line, which is of interest in both queuing theory and stochastic portfolio theory. For instance, this can model a market, which experiences a slowdown due to a major event (such as a court trial between some of the largest firms in the market) deciding about the new market leader.
△ Less
Submitted 26 May, 2015; v1 submitted 11 February, 2013;
originally announced February 2013.
-
A Smooth Transition from Powerlessness to Absolute Power
Authors:
Elchanan Mossel,
Ariel D. Procaccia,
Miklos Z. Racz
Abstract:
We study the phase transition of the coalitional manipulation problem for generalized scoring rules. Previously it has been shown that, under some conditions on the distribution of votes, if the number of manipulators is $o(\sqrt{n})$, where $n$ is the number of voters, then the probability that a random profile is manipulable by the coalition goes to zero as the number of voters goes to infinity,…
▽ More
We study the phase transition of the coalitional manipulation problem for generalized scoring rules. Previously it has been shown that, under some conditions on the distribution of votes, if the number of manipulators is $o(\sqrt{n})$, where $n$ is the number of voters, then the probability that a random profile is manipulable by the coalition goes to zero as the number of voters goes to infinity, whereas if the number of manipulators is $ω(\sqrt{n})$, then the probability that a random profile is manipulable goes to one. Here we consider the critical window, where a coalition has size $c\sqrt{n}$, and we show that as $c$ goes from zero to infinity, the limiting probability that a random profile is manipulable goes from zero to one in a smooth fashion, i.e., there is a smooth phase transition between the two regimes. This result analytically validates recent empirical results, and suggests that deciding the coalitional manipulation problem may be of limited computational hardness in practice.
△ Less
Submitted 15 November, 2013; v1 submitted 9 May, 2012;
originally announced May 2012.
-
A quantitative Gibbard-Satterthwaite theorem without neutrality
Authors:
Elchanan Mossel,
Miklos Z. Racz
Abstract:
Recently, quantitative versions of the Gibbard-Satterthwaite theorem were proven for $k=3$ alternatives by Friedgut, Kalai, Keller and Nisan and for neutral functions on $k \geq 4$ alternatives by Isaksson, Kindler and Mossel.
We prove a quantitative version of the Gibbard-Satterthwaite theorem for general social choice functions for any number $k \geq 3$ of alternatives. In particular we show t…
▽ More
Recently, quantitative versions of the Gibbard-Satterthwaite theorem were proven for $k=3$ alternatives by Friedgut, Kalai, Keller and Nisan and for neutral functions on $k \geq 4$ alternatives by Isaksson, Kindler and Mossel.
We prove a quantitative version of the Gibbard-Satterthwaite theorem for general social choice functions for any number $k \geq 3$ of alternatives. In particular we show that for a social choice function $f$ on $k \geq 3$ alternatives and $n$ voters, which is $ε$-far from the family of nonmanipulable functions, a uniformly chosen voter profile is manipulable with probability at least inverse polynomial in $n$, $k$, and $ε^{-1}$.
Removing the neutrality assumption of previous theorems is important for multiple reasons. For one, it is known that there is a conflict between anonymity and neutrality, and since most common voting rules are anonymous, they cannot always be neutral. Second, virtual elections are used in many applications in artificial intelligence, where there are often restrictions on the outcome of the election, and so neutrality is not a natural assumption in these situations.
Ours is a unified proof which in particular covers all previous cases established before. The proof crucially uses reverse hypercontractivity in addition to several ideas from the two previous proofs. Much of the work is devoted to understanding functions of a single voter, and in particular we also prove a quantitative Gibbard-Satterthwaite theorem for one voter.
△ Less
Submitted 29 March, 2012; v1 submitted 26 October, 2011;
originally announced October 2011.
-
Modeling Flocks and Prices: Jum** Particles with an Attractive Interaction (shortened version)
Authors:
Marton Balazs,
Miklos Z. Racz,
Balint Toth
Abstract:
We introduce and investigate a new model of a finite number of particles jum** forward on the real line. The jump lengths are independent of everything, but the jump rate of each particle depends on the relative position of the particle compared to the center of mass of the system. The rates are higher for those left behind, and lower for those ahead of the center of mass, providing an attractiv…
▽ More
We introduce and investigate a new model of a finite number of particles jum** forward on the real line. The jump lengths are independent of everything, but the jump rate of each particle depends on the relative position of the particle compared to the center of mass of the system. The rates are higher for those left behind, and lower for those ahead of the center of mass, providing an attractive interaction kee** the particles together. We prove that in the fluid limit, as the number of particles goes to infinity, the evolution of the system is described by a mean field equation that exhibits traveling wave solutions. A connection to extreme value statistics is also provided.
△ Less
Submitted 1 July, 2012; v1 submitted 11 August, 2011;
originally announced August 2011.
-
Modeling Flocks and Prices: Jum** Particles with an Attractive Interaction
Authors:
Marton Balazs,
Miklos Z. Racz,
Balint Toth
Abstract:
We introduce and investigate a new model of a finite number of particles jum** forward on the real line. The jump lengths are independent of everything, but the jump rate of each particle depends on the relative position of the particle compared to the center of mass of the system. The rates are higher for those left behind, and lower for those ahead of the center of mass, providing an attractiv…
▽ More
We introduce and investigate a new model of a finite number of particles jum** forward on the real line. The jump lengths are independent of everything, but the jump rate of each particle depends on the relative position of the particle compared to the center of mass of the system. The rates are higher for those left behind, and lower for those ahead of the center of mass, providing an attractive interaction kee** the particles together. We prove that in the fluid limit, as the number of particles goes to infinity, the evolution of the system is described by a mean field equation that exhibits traveling wave solutions. A connection to extreme value statistics is also provided.
△ Less
Submitted 27 June, 2012; v1 submitted 17 July, 2011;
originally announced July 2011.
-
A peculiar young eruptive star in the dark cloud Lynds 1340
Authors:
M. Kun,
E. Szegedi-Elek,
A. Moór,
P. Ábrahám,
J. A. Acosta-Pulido,
D. Apai,
J. Kelemen,
A. Pál,
M. Rácz,
Zs. Regály,
R. Szakáts,
N. Szalai,
A. Szing
Abstract:
We conducted a long-term optical photometric and spectroscopic monitoring of the strongly variable, accreting young sun-like star [KOS94] HA11, associated with the dark cloud Lynds 1340, that exhibited large amplitude (5-6 magnitudes in the I_C band) brightness variations on 2-3 years timescales, flat spectral energy distribution (SED), and extremely strong (300 < EW/Angstrom < 900) H alpha emissi…
▽ More
We conducted a long-term optical photometric and spectroscopic monitoring of the strongly variable, accreting young sun-like star [KOS94] HA11, associated with the dark cloud Lynds 1340, that exhibited large amplitude (5-6 magnitudes in the I_C band) brightness variations on 2-3 years timescales, flat spectral energy distribution (SED), and extremely strong (300 < EW/Angstrom < 900) H alpha emission. In this Letter we describe the basic properties of the star, derived from our observations between 1999 and 2011, and put into context the observed phenomena. The observed variations in the emission spectra, near-infrared colors, and SED suggest that [KOS94] HA11 (spectral type: K7--M0) is an eruptive young star, possibly similar in nature to V1647 Ori: its large-scale photometric variations are governed by variable accretion rate, associated with variations in the inner disk structure. The star recently has undergone strong and rapid brightness variations, thus its further observations may offer a rare opportunity for studying structural and chemical rearrangements of the inner disk, induced by variable central luminosity.
△ Less
Submitted 13 April, 2011;
originally announced April 2011.
-
Inner disc rearrangement revealed by dramatic brightness variations in the young star PV Cep
Authors:
M. Kun,
E. Szegedi-Elek,
A. Moór,
Á. Kóspál,
P. Ábrahám,
D. Apai,
Z. T. Kiss,
P. Klagyivik,
T. Yu. Magakian,
Gy. Mező,
T. A. Movsessian,
A. Pál,
M. Rácz,
J. Rogers
Abstract:
Young Sun-like stars at the beginning of the pre-main sequence (PMS) evolution are surrounded by accretion discs and remnant protostellar envelopes. Photometric and spectroscopic variations of these stars are driven by interactions of the star with the disc. Time scales and wavelength dependence of the variability carry information on the physical mechanisms behind these interactions. We conducted…
▽ More
Young Sun-like stars at the beginning of the pre-main sequence (PMS) evolution are surrounded by accretion discs and remnant protostellar envelopes. Photometric and spectroscopic variations of these stars are driven by interactions of the star with the disc. Time scales and wavelength dependence of the variability carry information on the physical mechanisms behind these interactions. We conducted multi-epoch, multi-wavelength study of PV Cep, a strongly variable, accreting PMS star. By combining our own observations from 2004-2010 with archival and literature data, we show that PV Cep started a spectacular fading in 2005, reaching an I_C-band amplitude of 4 mag. Analysis of variation of the optical and infrared fluxes, colour indices, and emission line fluxes suggests that the photometric decline in 2005-2009 resulted from an interplay between variable accretion and circumstellar extinction: since the central luminosity of the system is dominated by accretion, a modest drop in the accretion rate could induce the drastic restructuring of the inner disc. Dust condensation in the inner disc region might have resulted in the enhancement of the circumstellar extinction.
△ Less
Submitted 12 March, 2011; v1 submitted 12 January, 2011;
originally announced January 2011.
-
The first year of SN 2004dj in NGC 2403
Authors:
J. Vinko,
K. Takats,
K. Sarneczky,
Gy. M. Szabo,
Sz. Meszaros,
R. Csorvasi,
T. Szalai,
A. Gaspar,
A. Pal,
Sz. Csizmadia,
A. Kospal,
M. Racz,
M. Kun,
B. Csak,
G. Furesz,
H. DeBond,
J. Grunhut,
J. Thomson,
S. Mochnacki,
T. Koktay
Abstract:
New BVRI photometry and optical spectroscopy of the Type IIp supernova 2004dj in NGC 2403, obtained during the first year since discovery, are presented. The progenitor cluster, Sandage 96, is also detected on pre-explosion frames. The light curve indicates that the explosion occured about 30 days before discovery, and the plateau phase lasted about +110 \pm 20 days after that. The plateau-phase…
▽ More
New BVRI photometry and optical spectroscopy of the Type IIp supernova 2004dj in NGC 2403, obtained during the first year since discovery, are presented. The progenitor cluster, Sandage 96, is also detected on pre-explosion frames. The light curve indicates that the explosion occured about 30 days before discovery, and the plateau phase lasted about +110 \pm 20 days after that. The plateau-phase spectra have been modelled with the SYNOW spectral synthesis code using H, NaI, TiII, ScII, FeII and BaII lines. The SN distance is inferred from the Expanding Photosphere Method and the Standard Candle Method applicable for SNe IIp. They resulted in distances that are consistent with each other as well as earlier Cepheid- and Tully-Fisher distances. The average distance, D = 3.47 \pm 0.29 Mpc is proposed for SN 2004dj and NGC 2403. The nickel mass produced by the explosion is estimated as 0.02 \pm 0.01 M_o. The SED of the progenitor cluster is reanalysed by fitting population synthesis models to our observed BVRI data supplemented by U and JKH magnitudes from the literature. The chi^2-minimization revealed a possible "young" solution with cluster age T_{cl} = 8 Myr, and an "old" solution with T_{cl} = 20 - 30 Myr. The "young" solution would imply a progenitor mass M > 20 M_o, which is higher than the previously detected progenitor masses for Type II SNe.
△ Less
Submitted 11 April, 2006;
originally announced April 2006.
-
The rapid fading of V1647 Orionis: the sudden end of a FUor-type eruption?
Authors:
A. Kospal,
P. Abraham,
J. Acosta-Pulido,
Sz. Csizmadia,
M. Eredics,
M. Kun,
M. Racz
Abstract:
V1647 Ori is a young eruptive star, which went into outburst at the end of 2003. Since then, the object is gradually fading. In October 2005, however, V1647 Ori started a very rapid fading, approximately 1 mag/month in I_C as opposed to 0.1 mag/month previously. According to the colour changes, the rapid fading is not caused by increasing extinction, which suggests that the observed brightness c…
▽ More
V1647 Ori is a young eruptive star, which went into outburst at the end of 2003. Since then, the object is gradually fading. In October 2005, however, V1647 Ori started a very rapid fading, approximately 1 mag/month in I_C as opposed to 0.1 mag/month previously. According to the colour changes, the rapid fading is not caused by increasing extinction, which suggests that the observed brightness changes are intrinsic. Supposing that the fading rate remains unchanged, the star will return to the pre-outburst state by mid-December 2005.
△ Less
Submitted 25 November, 2005;
originally announced November 2005.
-
The 2004--2006 outburst and environment of V1647 Ori
Authors:
J. A. Acosta-Pulido,
M. Kun,
P. Abraham,
A. Kospal,
Sz. Csizmadia,
L. L. Kiss,
A. Moor,
L. Szabados,
J. M. Benko,
R. Barrena Delgado,
M. Charcos-Llorens,
M. Eredics,
Z. T. Kiss,
A. Manchado,
M. Racz,
C. Ramos-Almeida,
P. Szekely,
M. J. Vidal-Nunez
Abstract:
(Abridged) We studied the brightness and spectral evolution of the young eruptive star V1647 Ori during its recent outburst in the period 2004 February - 2006 Sep. We performed a photometric follow-up in the bands V, R_C, I_C, J, H, K_s as well as visible and near-IR spectroscopy. The main results are as follows: The brightness of V1647 Ori stayed more than 4 mag above the pre-outburst level unt…
▽ More
(Abridged) We studied the brightness and spectral evolution of the young eruptive star V1647 Ori during its recent outburst in the period 2004 February - 2006 Sep. We performed a photometric follow-up in the bands V, R_C, I_C, J, H, K_s as well as visible and near-IR spectroscopy. The main results are as follows: The brightness of V1647 Ori stayed more than 4 mag above the pre-outburst level until 2005 October when it started a rapid fading. In the high state we found a periodic component in the optical light curves with a period of 56 days. The delay between variations of the star and variations in the brightness of clump of nearby nebulosity corresponds to an angle of 61+/-14 degrees between the axis of the nebula and the line of sight. A steady decrease of HI emission line fluxes could be observed. In 2006 May, in the quiescent phase, the HeI 1.083 line was observed in emission, contrary to its deep blueshifted absorption observed during the outburst. The J-H and H-K_s color maps of the infrared nebula reveal an envelope around the star. The color distribution of the infrared nebula suggests reddening of the scattered light inside a thick circumstellar disk. We show that the observed properties of V1647 Ori could be interpreted in the framework of the thermal instability models of Bell et al. (1995). V1647 Ori might belong to a new class of young eruptive stars, defined by relatively short timescales, recurrent outbursts, modest increase in bolometric luminosity and accretion rate, and an evolutionary state earlier than that of typical EXors.
△ Less
Submitted 10 January, 2007; v1 submitted 24 August, 2004;
originally announced August 2004.