-
Matching Correlated Inhomogeneous Random Graphs using the $k$-core Estimator
Authors:
Miklós Z. Rácz,
Anirudh Sridhar
Abstract:
We consider the task of estimating the latent vertex correspondence between two edge-correlated random graphs with generic, inhomogeneous structure. We study the so-called \emph{$k$-core estimator}, which outputs a vertex correspondence that induces a large, common subgraph of both graphs which has minimum degree at least $k$. We derive sufficient conditions under which the $k$-core estimator exac…
▽ More
We consider the task of estimating the latent vertex correspondence between two edge-correlated random graphs with generic, inhomogeneous structure. We study the so-called \emph{$k$-core estimator}, which outputs a vertex correspondence that induces a large, common subgraph of both graphs which has minimum degree at least $k$. We derive sufficient conditions under which the $k$-core estimator exactly or partially recovers the latent vertex correspondence. Finally, we specialize our general framework to derive new results on exact and partial recovery in correlated stochastic block models, correlated Chung-Lu graphs, and correlated random geometric graphs.
△ Less
Submitted 10 February, 2023;
originally announced February 2023.
-
Average-case and smoothed analysis of graph isomorphism
Authors:
Julia Gaudio,
Miklós Z. Rácz,
Anirudh Sridhar
Abstract:
We propose a simple and efficient local algorithm for graph isomorphism which succeeds for a large class of sparse graphs. This algorithm produces a low-depth canonical labeling, which is a labeling of the vertices of the graph that identifies its isomorphism class using vertices' local neighborhoods.
Prior work by Czajka and Pandurangan showed that the degree profile of a vertex (i.e., the sort…
▽ More
We propose a simple and efficient local algorithm for graph isomorphism which succeeds for a large class of sparse graphs. This algorithm produces a low-depth canonical labeling, which is a labeling of the vertices of the graph that identifies its isomorphism class using vertices' local neighborhoods.
Prior work by Czajka and Pandurangan showed that the degree profile of a vertex (i.e., the sorted list of the degrees of its neighbors) gives a canonical labeling with high probability when $n p_n = ω( \log^{4}(n) / \log \log n )$ (and $p_{n} \leq 1/2$); subsequently, Mossel and Ross showed that the same holds when $n p_n = ω( \log^{2}(n) )$. We first show that their analysis essentially cannot be improved: we prove that when $n p_n = o( \log^{2}(n) / (\log \log n)^{3} )$, with high probability there exist distinct vertices with isomorphic $2$-neighborhoods. Our first main result is a positive counterpart to this, showing that $3$-neighborhoods give a canonical labeling when $n p_n \geq (1+δ) \log n$ (and $p_n \leq 1/2$); this improves a recent result of Ding, Ma, Wu, and Xu, completing the picture above the connectivity threshold.
Our second main result is a smoothed analysis of graph isomorphism, showing that for a large class of deterministic graphs, a small random perturbation ensures that $3$-neighborhoods give a canonical labeling with high probability. While the worst-case complexity of graph isomorphism is still unknown, this shows that graph isomorphism has polynomial smoothed complexity.
△ Less
Submitted 18 September, 2023; v1 submitted 29 November, 2022;
originally announced November 2022.
-
Towards Consensus: Reducing Polarization by Perturbing Social Networks
Authors:
Miklos Z. Racz,
Daniel E. Rigobon
Abstract:
This paper studies how a centralized planner can modify the structure of a social or information network to reduce polarization. First, polarization is found to be highly dependent on degree and structural properties of the network -- including the well-known isoperimetric number (i.e., Cheeger constant). We then formulate the planner's problem under full information, and motivate disagreement-see…
▽ More
This paper studies how a centralized planner can modify the structure of a social or information network to reduce polarization. First, polarization is found to be highly dependent on degree and structural properties of the network -- including the well-known isoperimetric number (i.e., Cheeger constant). We then formulate the planner's problem under full information, and motivate disagreement-seeking and coordinate descent heuristics. A novel setting for the planner in which the population's innate opinions are adversarially chosen is introduced, and shown to be equivalent to maximization of the Laplacian's spectral gap. We prove bounds for the effectiveness of a strategy that adds edges between vertices on opposite sides of the cut induced by the spectral gap's eigenvector. Finally, these strategies are evaluated on six real-world and synthetic networks. In several networks, we find that polarization can be significantly reduced through the addition of a small number of edges.
△ Less
Submitted 20 December, 2022; v1 submitted 17 June, 2022;
originally announced June 2022.
-
Exact Community Recovery in Correlated Stochastic Block Models
Authors:
Julia Gaudio,
Miklos Z. Racz,
Anirudh Sridhar
Abstract:
We consider the problem of learning latent community structure from multiple correlated networks. We study edge-correlated stochastic block models with two balanced communities, focusing on the regime where the average degree is logarithmic in the number of vertices. Our main result derives the precise information-theoretic threshold for exact community recovery using multiple correlated graphs. T…
▽ More
We consider the problem of learning latent community structure from multiple correlated networks. We study edge-correlated stochastic block models with two balanced communities, focusing on the regime where the average degree is logarithmic in the number of vertices. Our main result derives the precise information-theoretic threshold for exact community recovery using multiple correlated graphs. This threshold captures the interplay between the community recovery and graph matching tasks. In particular, we uncover and characterize a region of the parameter space where exact community recovery is possible using multiple correlated graphs, even though (1) this is information-theoretically impossible using a single graph and (2) exact graph matching is also information-theoretically impossible. In this regime, we develop a novel algorithm that carefully synthesizes algorithms from the community recovery and graph matching literatures.
△ Less
Submitted 29 March, 2022;
originally announced March 2022.
-
A probabilistic view of latent space graphs and phase transitions
Authors:
Suqi Liu,
Miklos Z. Racz
Abstract:
We study random graphs with latent geometric structure, where the probability of each edge depends on the underlying random positions corresponding to the two endpoints. We focus on the setting where this conditional probability is a general monotone increasing function of the inner product of two vectors; such a function can naturally be viewed as the cumulative distribution function of some inde…
▽ More
We study random graphs with latent geometric structure, where the probability of each edge depends on the underlying random positions corresponding to the two endpoints. We focus on the setting where this conditional probability is a general monotone increasing function of the inner product of two vectors; such a function can naturally be viewed as the cumulative distribution function of some independent random variable. We consider a one-parameter family of random graphs, characterized by the variance of this random variable, that smoothly interpolates between a random dot product graph and an Erdős--Rényi random graph. We prove phase transitions of detecting geometry in these graphs, in terms of the dimension of the underlying geometric space and the variance parameter of the conditional probability. When the dimension is high or the variance is large, the graph is similar to an Erdős--Rényi graph with the same edge density that does not possess geometry; in other parameter regimes, there is a computationally efficient signed triangle statistic that distinguishes them. The proofs make use of information-theoretic inequalities and concentration of measure phenomena.
△ Less
Submitted 29 October, 2021;
originally announced October 2021.
-
Correlated Stochastic Block Models: Exact Graph Matching with Applications to Recovering Communities
Authors:
Miklos Z. Racz,
Anirudh Sridhar
Abstract:
We consider the task of learning latent community structure from multiple correlated networks. First, we study the problem of learning the latent vertex correspondence between two edge-correlated stochastic block models, focusing on the regime where the average degree is logarithmic in the number of vertices. We derive the precise information-theoretic threshold for exact recovery: above the thres…
▽ More
We consider the task of learning latent community structure from multiple correlated networks. First, we study the problem of learning the latent vertex correspondence between two edge-correlated stochastic block models, focusing on the regime where the average degree is logarithmic in the number of vertices. We derive the precise information-theoretic threshold for exact recovery: above the threshold there exists an estimator that outputs the true correspondence with probability close to 1, while below it no estimator can recover the true correspondence with probability bounded away from 0. As an application of our results, we show how one can exactly recover the latent communities using multiple correlated graphs in parameter regimes where it is information-theoretically impossible to do so using just a single graph.
△ Less
Submitted 14 July, 2021;
originally announced July 2021.
-
Phase transition in noisy high-dimensional random geometric graphs
Authors:
Suqi Liu,
Miklos Z. Racz
Abstract:
We study the problem of detecting latent geometric structure in random graphs. To this end, we consider the soft high-dimensional random geometric graph $\mathcal{G}(n,p,d,q)$, where each of the $n$ vertices corresponds to an independent random point distributed uniformly on the sphere $\mathbb{S}^{d-1}$, and the probability that two vertices are connected by an edge is a decreasing function of th…
▽ More
We study the problem of detecting latent geometric structure in random graphs. To this end, we consider the soft high-dimensional random geometric graph $\mathcal{G}(n,p,d,q)$, where each of the $n$ vertices corresponds to an independent random point distributed uniformly on the sphere $\mathbb{S}^{d-1}$, and the probability that two vertices are connected by an edge is a decreasing function of the Euclidean distance between the points. The probability of connection is parametrized by $q \in [0,1]$, with smaller $q$ corresponding to weaker dependence on the geometry; this can also be interpreted as the level of noise in the geometric graph. In particular, the model smoothly interpolates between the spherical hard random geometric graph $\mathcal{G}(n,p,d)$ (corresponding to $q = 1$) and the Erdős-Rényi model $\mathcal{G}(n,p)$ (corresponding to $q = 0$). We focus on the dense regime (i.e., $p$ is a constant).
We show that if $nq \to 0$ or $d \gg n^{3} q^{2}$, then geometry is lost: $\mathcal{G}(n,p,d,q)$ is asymptotically indistinguishable from $\mathcal{G}(n,p)$. On the other hand, if $d \ll n^{3} q^{6}$, then the signed triangle statistic provides an asymptotically powerful test for detecting geometry. These results generalize those of Bubeck, Ding, Eldan, and Rácz (2016) for $\mathcal{G}(n,p,d)$, and give quantitative bounds on how the noise level affects the dimension threshold for losing geometry. We also prove analogous results under a related but different distributional assumption, and we further explore generalizations of signed triangles in order to understand the intermediate regime left open by our results.
△ Less
Submitted 28 March, 2021;
originally announced March 2021.
-
Tree trace reconstruction using subtraces
Authors:
Tatiana Brailovskaya,
Miklós Z. Rácz
Abstract:
Tree trace reconstruction aims to learn the binary node labels of a tree, given independent samples of the tree passed through an appropriately defined deletion channel. In recent work, Davies, Rácz, and Rashtchian used combinatorial methods to show that $\exp(\mathcal{O}(k \log_{k} n))$ samples suffice to reconstruct a complete $k$-ary tree with $n$ nodes with high probability. We provide an alte…
▽ More
Tree trace reconstruction aims to learn the binary node labels of a tree, given independent samples of the tree passed through an appropriately defined deletion channel. In recent work, Davies, Rácz, and Rashtchian used combinatorial methods to show that $\exp(\mathcal{O}(k \log_{k} n))$ samples suffice to reconstruct a complete $k$-ary tree with $n$ nodes with high probability. We provide an alternative proof of this result, which allows us to generalize it to a broader class of tree topologies and deletion models. In our proofs, we introduce the notion of a subtrace, which enables us to connect with and generalize recent mean-based complex analytic algorithms for string trace reconstruction.
△ Less
Submitted 2 February, 2021;
originally announced February 2021.
-
Approximate Trace Reconstruction
Authors:
Sami Davies,
Miklos Z. Racz,
Cyrus Rashtchian,
Benjamin G. Schiffer
Abstract:
In the usual trace reconstruction problem, the goal is to exactly reconstruct an unknown string of length $n$ after it passes through a deletion channel many times independently, producing a set of traces (i.e., random subsequences of the string). We consider the relaxed problem of approximate reconstruction. Here, the goal is to output a string that is close to the original one in edit distance w…
▽ More
In the usual trace reconstruction problem, the goal is to exactly reconstruct an unknown string of length $n$ after it passes through a deletion channel many times independently, producing a set of traces (i.e., random subsequences of the string). We consider the relaxed problem of approximate reconstruction. Here, the goal is to output a string that is close to the original one in edit distance while using much fewer traces than is needed for exact reconstruction. We present several algorithms that can approximately reconstruct strings that belong to certain classes, where the estimate is within $n/\mathrm{polylog}(n)$ edit distance, and where we only use $\mathrm{polylog}(n)$ traces (or sometimes just a single trace). These classes contain strings that require a linear number of traces for exact reconstruction and which are quite different from a typical random string. From a technical point of view, our algorithms approximately reconstruct consecutive substrings of the unknown string by aligning dense regions of traces and using a run of a suitable length to approximate each region. To complement our algorithms, we present a general black-box lower bound for approximate reconstruction, building on a lower bound for distinguishing between two candidate input strings in the worst case. In particular, this shows that approximating to within $n^{1/3 - δ}$ edit distance requires $n^{1 + 3δ/2}/\mathrm{polylog}(n)$ traces for $0< δ< 1/3$ in the worst case.
△ Less
Submitted 16 December, 2020; v1 submitted 11 December, 2020;
originally announced December 2020.
-
Batch Optimization for DNA Synthesis
Authors:
Konstantin Makarychev,
Miklos Z. Racz,
Cyrus Rashtchian,
Sergey Yekhanin
Abstract:
Large pools of synthetic DNA molecules have been recently used to reliably store significant volumes of digital data. While DNA as a storage medium has enormous potential because of its high storage density, its practical use is currently severely limited because of the high cost and low throughput of available DNA synthesis technologies. We study the role of batch optimization in reducing the cos…
▽ More
Large pools of synthetic DNA molecules have been recently used to reliably store significant volumes of digital data. While DNA as a storage medium has enormous potential because of its high storage density, its practical use is currently severely limited because of the high cost and low throughput of available DNA synthesis technologies. We study the role of batch optimization in reducing the cost of large scale DNA synthesis, which translates to the following algorithmic task. Given a large pool $\mathcal{S}$ of random quaternary strings of fixed length, partition $\mathcal{S}$ into batches in a way that minimizes the sum of the lengths of the shortest common supersequences across batches. We introduce two ideas for batch optimization that both improve (in different ways) upon a naive baseline: (1) using both $(ACGT)^{*}$ and its reverse $(TGCA)^{*}$ as reference strands, and batching appropriately, and (2) batching via the quantiles of an appropriate ordering of the strands. We also prove asymptotically matching lower bounds on the cost of DNA synthesis, showing that one cannot improve upon these two ideas. Our results uncover a surprising separation between two cases that naturally arise in the context of DNA data storage: the asymptotic cost savings of batch optimization are significantly greater in the case where strings in $\mathcal{S}$ do not contain repeats of the same character (homopolymers), as compared to the case where strings in $\mathcal{S}$ are unconstrained.
△ Less
Submitted 23 February, 2021; v1 submitted 29 November, 2020;
originally announced November 2020.
-
Rumor source detection with multiple observations under adaptive diffusions
Authors:
Miklos Z. Racz,
Jacob Richey
Abstract:
Recent work, motivated by anonymous messaging platforms, has introduced adaptive diffusion protocols which can obfuscate the source of a rumor: a "snapshot adversary" with access to the subgraph of "infected" nodes can do no better than randomly guessing the entity of the source node. What happens if the adversary has access to multiple independent snapshots? We study this question when the underl…
▽ More
Recent work, motivated by anonymous messaging platforms, has introduced adaptive diffusion protocols which can obfuscate the source of a rumor: a "snapshot adversary" with access to the subgraph of "infected" nodes can do no better than randomly guessing the entity of the source node. What happens if the adversary has access to multiple independent snapshots? We study this question when the underlying graph is the infinite $d$-regular tree. We show that (1) a weak form of source obfuscation is still possible in the case of two independent snapshots, but (2) already with three observations there is a simple algorithm that finds the rumor source with constant probability, regardless of the adaptive diffusion protocol. We also characterize the tradeoff between local spreading and source obfuscation for adaptive diffusion protocols (under a single snapshot). These results raise questions about the robustness of anonymity guarantees when spreading information in social networks.
△ Less
Submitted 19 June, 2020;
originally announced June 2020.
-
Correlated randomly growing graphs
Authors:
Miklos Z. Racz,
Anirudh Sridhar
Abstract:
We introduce a new model of correlated randomly growing graphs and study the fundamental questions of detecting correlation and estimating aspects of the correlated structure. The model is simple and starts with any model of randomly growing graphs, such as uniform attachment (UA) or preferential attachment (PA). Given such a model, a pair of graphs $(G_1, G_2)$ is grown in two stages: until time…
▽ More
We introduce a new model of correlated randomly growing graphs and study the fundamental questions of detecting correlation and estimating aspects of the correlated structure. The model is simple and starts with any model of randomly growing graphs, such as uniform attachment (UA) or preferential attachment (PA). Given such a model, a pair of graphs $(G_1, G_2)$ is grown in two stages: until time $t_{\star}$ they are grown together (i.e., $G_1 = G_2$), after which they grow independently according to the underlying growth model.
We show that whenever the seed graph has an influence in the underlying graph growth model---this has been shown for PA and UA trees and is conjectured to hold broadly---then correlation can be detected in this model, even if the graphs are grown together for just a single time step. We also give a general sufficient condition (which holds for PA and UA trees) under which detection is possible with probability going to $1$ as $t_{\star} \to \infty$. Finally, we show for PA and UA trees that the amount of correlation, measured by $t_{\star}$, can be estimated with vanishing relative error as $t_{\star} \to \infty$.
△ Less
Submitted 28 April, 2020;
originally announced April 2020.
-
Network disruption: maximizing disagreement and polarization in social networks
Authors:
Mayee F. Chen,
Miklos Z. Racz
Abstract:
Recent years have seen a marked increase in the spread of misinformation, a phenomenon which has been accelerated and amplified by social media such as Facebook and Twitter. While some actors spread misinformation to push a specific agenda, it has also been widely documented that others aim to simply disrupt the network by increasing disagreement and polarization across the network and thereby des…
▽ More
Recent years have seen a marked increase in the spread of misinformation, a phenomenon which has been accelerated and amplified by social media such as Facebook and Twitter. While some actors spread misinformation to push a specific agenda, it has also been widely documented that others aim to simply disrupt the network by increasing disagreement and polarization across the network and thereby destabilizing society. Popular social networks are also vulnerable to large-scale attacks. Motivated by this reality, we introduce a simple model of network disruption where an adversary can take over a limited number of user profiles in a social network with the aim of maximizing disagreement and/or polarization in the network.
We investigate this model both theoretically and empirically. We show that the adversary will always change the opinion of a taken-over profile to an extreme in order to maximize disruption. We also prove that an adversary can increase disagreement / polarization at most linearly in the number of user profiles it takes over. Furthermore, we present a detailed empirical study of several natural algorithms for the adversary on both synthetic networks and real world (Reddit and Twitter) data sets. These show that even simple, unsophisticated heuristics, such as targeting centrists, can disrupt a network effectively, causing a large increase in disagreement / polarization. Studying the problem of network disruption through the lens of an adversary thus highlights the seriousness of the problem.
△ Less
Submitted 9 April, 2020; v1 submitted 18 March, 2020;
originally announced March 2020.
-
Finding a planted clique by adaptive probing
Authors:
Miklós Z. Rácz,
Benjamin Schiffer
Abstract:
We consider a variant of the planted clique problem where we are allowed unbounded computational time but can only investigate a small part of the graph by adaptive edge queries. We determine (up to logarithmic factors) the number of queries necessary both for detecting the presence of a planted clique and for finding the planted clique.
Specifically, let $G \sim G(n,1/2,k)$ be a random graph on…
▽ More
We consider a variant of the planted clique problem where we are allowed unbounded computational time but can only investigate a small part of the graph by adaptive edge queries. We determine (up to logarithmic factors) the number of queries necessary both for detecting the presence of a planted clique and for finding the planted clique.
Specifically, let $G \sim G(n,1/2,k)$ be a random graph on $n$ vertices with a planted clique of size $k$. We show that no algorithm that makes at most $q = o(n^2 / k^2 + n)$ adaptive queries to the adjacency matrix of $G$ is likely to find the planted clique. On the other hand, when $k \geq (2+ε) \log_2 n$ there exists a simple algorithm (with unbounded computational power) that finds the planted clique with high probability by making $q = O( (n^2 / k^2) \log^2 n + n \log n)$ adaptive queries. For detection, the additive $n$ term is not necessary: the number of queries needed to detect the presence of a planted clique is $n^2 / k^2$ (up to logarithmic factors).
△ Less
Submitted 23 July, 2020; v1 submitted 28 March, 2019;
originally announced March 2019.
-
Reconstructing Trees from Traces
Authors:
Sami Davies,
Miklos Z. Racz,
Cyrus Rashtchian
Abstract:
We study the problem of learning a node-labeled tree given independent traces from an appropriately defined deletion channel. This problem, tree trace reconstruction, generalizes string trace reconstruction, which corresponds to the tree being a path. For many classes of trees, including complete trees and spiders, we provide algorithms that reconstruct the labels using only a polynomial number of…
▽ More
We study the problem of learning a node-labeled tree given independent traces from an appropriately defined deletion channel. This problem, tree trace reconstruction, generalizes string trace reconstruction, which corresponds to the tree being a path. For many classes of trees, including complete trees and spiders, we provide algorithms that reconstruct the labels using only a polynomial number of traces. This exhibits a stark contrast to known results on string trace reconstruction, which require exponentially many traces, and where a central open problem is to determine whether a polynomial number of traces suffice. Our techniques combine novel combinatorial and complex analytic methods.
△ Less
Submitted 18 September, 2020; v1 submitted 13 February, 2019;
originally announced February 2019.
-
Finding cliques using few probes
Authors:
Uriel Feige,
David Gamarnik,
Joe Neeman,
Miklós Z. Rácz,
Prasad Tetali
Abstract:
Consider algorithms with unbounded computation time that probe the entries of the adjacency matrix of an $n$ vertex graph, and need to output a clique. We show that if the input graph is drawn at random from $G_{n,\frac{1}{2}}$ (and hence is likely to have a clique of size roughly $2\log n$), then for every $δ< 2$ and constant $\ell$, there is an $α< 2$ (that may depend on $δ$ and $\ell$) such tha…
▽ More
Consider algorithms with unbounded computation time that probe the entries of the adjacency matrix of an $n$ vertex graph, and need to output a clique. We show that if the input graph is drawn at random from $G_{n,\frac{1}{2}}$ (and hence is likely to have a clique of size roughly $2\log n$), then for every $δ< 2$ and constant $\ell$, there is an $α< 2$ (that may depend on $δ$ and $\ell$) such that no algorithm that makes $n^δ$ probes in $\ell$ rounds is likely (over the choice of the random graph) to output a clique of size larger than $α\log n$.
△ Less
Submitted 18 September, 2018;
originally announced September 2018.
-
How fragile are information cascades?
Authors:
Yuval Peres,
Miklos Z. Racz,
Allan Sly,
Izabella Stuhl
Abstract:
It is well known that sequential decision making may lead to information cascades. That is, when agents make decisions based on their private information, as well as observing the actions of those before them, then it might be rational to ignore their private signal and imitate the action of previous individuals. If the individuals are choosing between a right and a wrong state, and the initial ac…
▽ More
It is well known that sequential decision making may lead to information cascades. That is, when agents make decisions based on their private information, as well as observing the actions of those before them, then it might be rational to ignore their private signal and imitate the action of previous individuals. If the individuals are choosing between a right and a wrong state, and the initial actions are wrong, then the whole cascade will be wrong. This issue is due to the fact that cascades can be based on very little information.
We show that if agents occasionally disregard the actions of others and base their action only on their private information, then wrong cascades can be avoided. Moreover, we study the optimal asymptotic rate at which the error probability at time $t$ can go to zero. The optimal policy is for the player at time $t$ to follow their private information with probability $p_{t} = c/t$, leading to a learning rate of $c'/t$, where the constants $c$ and $c'$ are explicit.
△ Less
Submitted 21 February, 2018; v1 submitted 10 November, 2017;
originally announced November 2017.
-
Optimal control for diffusions on graphs
Authors:
Laura Florescu,
Yuval Peres,
Miklos Z. Racz
Abstract:
Starting from a unit mass on a vertex of a graph, we investigate the minimum number of "\emph{controlled diffusion}" steps needed to transport a constant mass $p$ outside of the ball of radius $n$. In a step of a controlled diffusion process we may select any vertex with positive mass and topple its mass equally to its neighbors. Our initial motivation comes from the maximum overhang question in o…
▽ More
Starting from a unit mass on a vertex of a graph, we investigate the minimum number of "\emph{controlled diffusion}" steps needed to transport a constant mass $p$ outside of the ball of radius $n$. In a step of a controlled diffusion process we may select any vertex with positive mass and topple its mass equally to its neighbors. Our initial motivation comes from the maximum overhang question in one dimension, but the more general case arises from optimal mass transport problems.
On $\mathbb{Z}^{d}$ we show that $Θ( n^{d+2} )$ steps are necessary and sufficient to transport the mass. We also give sharp bounds on the comb graph and $d$-ary trees. Furthermore, we consider graphs where simple random walk has positive speed and entropy and which satisfy Shannon's theorem, and show that the minimum number of controlled diffusion steps is $\exp{( n \cdot h / \ell ( 1 + o(1) ))}$, where $h$ is the Avez asymptotic entropy and $\ell$ is the speed of random walk. As examples, we give precise results on Galton-Watson trees and the product of trees $\mathbb{T}_d \times \mathbb{T}_k$.
△ Less
Submitted 29 March, 2017;
originally announced March 2017.
-
A smooth transition from Wishart to GOE
Authors:
Miklos Z. Racz,
Jacob Richey
Abstract:
It is well known that an $n \times n$ Wishart matrix with $d$ degrees of freedom is close to the appropriately centered and scaled Gaussian Orthogonal Ensemble (GOE) if $d$ is large enough. Recent work of Bubeck, Ding, Eldan, and Racz, and independently Jiang and Li, shows that the transition happens when $d = Θ( n^{3} )$. Here we consider this critical window and explicitly compute the total vari…
▽ More
It is well known that an $n \times n$ Wishart matrix with $d$ degrees of freedom is close to the appropriately centered and scaled Gaussian Orthogonal Ensemble (GOE) if $d$ is large enough. Recent work of Bubeck, Ding, Eldan, and Racz, and independently Jiang and Li, shows that the transition happens when $d = Θ( n^{3} )$. Here we consider this critical window and explicitly compute the total variation distance between the Wishart and GOE matrices when $d / n^{3} \to c \in (0, \infty)$. This shows, in particular, that the phase transition from Wishart to GOE is smooth.
△ Less
Submitted 17 November, 2016;
originally announced November 2016.
-
Basic models and questions in statistical network analysis
Authors:
Miklos Z. Racz,
Sébastien Bubeck
Abstract:
Extracting information from large graphs has become an important statistical problem since network data is now common in various fields. In this minicourse we will investigate the most natural statistical questions for three canonical probabilistic models of networks: (i) community detection in the stochastic block model, (ii) finding the embedding of a random geometric graph, and (iii) finding th…
▽ More
Extracting information from large graphs has become an important statistical problem since network data is now common in various fields. In this minicourse we will investigate the most natural statistical questions for three canonical probabilistic models of networks: (i) community detection in the stochastic block model, (ii) finding the embedding of a random geometric graph, and (iii) finding the original vertex in a preferential attachment tree. Along the way we will cover many interesting topics in probability theory such as Pólya urns, large deviation theory, concentration of measure in high dimension, entropic central limit theorems, and more.
△ Less
Submitted 12 September, 2016;
originally announced September 2016.
-
Finite-size corrections to scaling of the magnetization distribution in the $2d$ $XY$-model at zero temperature
Authors:
G. Palma,
F. Niedermayer,
Z. Rácz,
A. Riveros,
D. Zambrano
Abstract:
The zero-temperature, classical $XY$-model on an $L \times L$ square-lattice is studied by exploring the distribution $Φ_L(y)$ of its centered and normalized magnetization $y$ in the large $L$ limit. An integral representation of the cumulant generating function, known from earlier works, is used for the numerical evaluation of $Φ_L(y)$, and the limit distribution…
▽ More
The zero-temperature, classical $XY$-model on an $L \times L$ square-lattice is studied by exploring the distribution $Φ_L(y)$ of its centered and normalized magnetization $y$ in the large $L$ limit. An integral representation of the cumulant generating function, known from earlier works, is used for the numerical evaluation of $Φ_L(y)$, and the limit distribution $Φ_{L \rightarrow \infty} (y) = Φ_0(y)$ is obtained with high precision. The two leading finite-size corrections $Φ_L (y) -Φ_0 (y) \approx a_1(L)\, Φ_1(y) + a_2(L)\,Φ_2(y)$ are also extracted both from numerics and from analytic calculations. We find that the amplitude $a_1(L)$ scales as $\ln(L/L_0) /L^2$ and the shape correction function $Φ_1 (y)$ can be expressed through the low-order derivatives of the limit distribution, $Φ_1 (y) = [\,y\, Φ_0 (y) + Φ'_0 (y)\,]'$. The second finite-size correction has an amplitude $a_2(L)\propto 1/L^2$ and one finds that $a_2\,Φ_2(y) \ll a_1 \,Φ_1(y)$ already for small system size ($L> 10$). We illustrate the feasibility of observing the calculated finite-size corrections by performing simulations of the $XY$-model at low temperatures, including $T = 0$.
△ Less
Submitted 4 April, 2016;
originally announced April 2016.
-
Sequence assembly from corrupted shotgun reads
Authors:
Shirshendu Ganguly,
Elchanan Mossel,
Miklos Z. Racz
Abstract:
The prevalent technique for DNA sequencing consists of two main steps: shotgun sequencing, where many randomly located fragments, called reads, are extracted from the overall sequence, followed by an assembly algorithm that aims to reconstruct the original sequence. There are many different technologies that generate the reads: widely-used second-generation methods create short reads with low erro…
▽ More
The prevalent technique for DNA sequencing consists of two main steps: shotgun sequencing, where many randomly located fragments, called reads, are extracted from the overall sequence, followed by an assembly algorithm that aims to reconstruct the original sequence. There are many different technologies that generate the reads: widely-used second-generation methods create short reads with low error rates, while emerging third-generation methods create long reads with high error rates. Both error rates and error profiles differ among methods, so reconstruction algorithms are often tailored to specific shotgun sequencing technologies. As these methods change over time, a fundamental question is whether there exist reconstruction algorithms which are robust, i.e., which perform well under a wide range of error distributions.
Here we study this question of sequence assembly from corrupted reads. We make no assumption on the types of errors in the reads, but only assume a bound on their magnitude. More precisely, for each read we assume that instead of receiving the true read with no errors, we receive a corrupted read which has edit distance at most $ε$ times the length of the read from the true read. We show that if the reads are long enough and there are sufficiently many of them, then approximate reconstruction is possible: we construct a simple algorithm such that for almost all original sequences the output of the algorithm is a sequence whose edit distance from the original one is at most $O(ε)$ times the length of the original sequence.
△ Less
Submitted 26 January, 2016;
originally announced January 2016.
-
Beta-gamma tail asymptotics
Authors:
Jim Pitman,
Miklos Z. Racz
Abstract:
We compute the tail asymptotics of the product of a beta random variable and a generalized gamma random variable which are independent and have general parameters. A special case of these asymptotics were proved and used in a recent work of Bubeck, Mossel, and Rácz in order to determine the tail asymptotics of the maximum degree of the preferential attachment tree. The proof presented here is simp…
▽ More
We compute the tail asymptotics of the product of a beta random variable and a generalized gamma random variable which are independent and have general parameters. A special case of these asymptotics were proved and used in a recent work of Bubeck, Mossel, and Rácz in order to determine the tail asymptotics of the maximum degree of the preferential attachment tree. The proof presented here is simpler and highlights why these asymptotics hold.
△ Less
Submitted 8 September, 2015;
originally announced September 2015.
-
Braess's paradox for the spectral gap in random graphs and delocalization of eigenvectors
Authors:
Ronen Eldan,
Miklós Rácz,
Tselil Schramm
Abstract:
We study how the spectral gap of the normalized Laplacian of a random graph changes when an edge is added to or removed from the graph. There are known examples of graphs where, perhaps counterintuitively, adding an edge can decrease the spectral gap, a phenomenon that is analogous to Braess's paradox in traffic networks. We show that this is often the case in random graphs in a strong sense. More…
▽ More
We study how the spectral gap of the normalized Laplacian of a random graph changes when an edge is added to or removed from the graph. There are known examples of graphs where, perhaps counterintuitively, adding an edge can decrease the spectral gap, a phenomenon that is analogous to Braess's paradox in traffic networks. We show that this is often the case in random graphs in a strong sense. More precisely, we show that for typical instances of Erdős-Rényi random graphs $G(n,p)$ with constant edge density $p \in (0,1)$, the addition of a random edge will decrease the spectral gap with positive probability, strictly bounded away from zero. To do this, we prove a new delocalization result for eigenvectors of the Laplacian of $G(n,p)$, which might be of independent interest.
△ Less
Submitted 20 June, 2015; v1 submitted 28 April, 2015;
originally announced April 2015.
-
Testing for high-dimensional geometry in random graphs
Authors:
Sébastien Bubeck,
Jian Ding,
Ronen Eldan,
Miklós Rácz
Abstract:
We study the problem of detecting the presence of an underlying high-dimensional geometric structure in a random graph. Under the null hypothesis, the observed graph is a realization of an Erdős-Rényi random graph $G(n,p)$. Under the alternative, the graph is generated from the $G(n,p,d)$ model, where each vertex corresponds to a latent independent random vector uniformly distributed on the sphere…
▽ More
We study the problem of detecting the presence of an underlying high-dimensional geometric structure in a random graph. Under the null hypothesis, the observed graph is a realization of an Erdős-Rényi random graph $G(n,p)$. Under the alternative, the graph is generated from the $G(n,p,d)$ model, where each vertex corresponds to a latent independent random vector uniformly distributed on the sphere $\mathbb{S}^{d-1}$, and two vertices are connected if the corresponding latent vectors are close enough. In the dense regime (i.e., $p$ is a constant), we propose a near-optimal and computationally efficient testing procedure based on a new quantity which we call signed triangles. The proof of the detection lower bound is based on a new bound on the total variation distance between a Wishart matrix and an appropriately normalized GOE matrix. In the sparse regime, we make a conjecture for the optimal detection boundary. We conclude the paper with some preliminary steps on the problem of estimating the dimension in $G(n,p,d)$.
△ Less
Submitted 21 November, 2015; v1 submitted 20 November, 2014;
originally announced November 2014.
-
From trees to seeds: on the inference of the seed from large trees in the uniform attachment model
Authors:
Sébastien Bubeck,
Ronen Eldan,
Elchanan Mossel,
Miklós Z. Rácz
Abstract:
We study the influence of the seed in random trees grown according to the uniform attachment model, also known as uniform random recursive trees. We show that different seeds lead to different distributions of limiting trees from a total variation point of view. To do this, we construct statistics that measure, in a certain well-defined sense, global "balancedness" properties of such trees. Our pa…
▽ More
We study the influence of the seed in random trees grown according to the uniform attachment model, also known as uniform random recursive trees. We show that different seeds lead to different distributions of limiting trees from a total variation point of view. To do this, we construct statistics that measure, in a certain well-defined sense, global "balancedness" properties of such trees. Our paper follows recent results on the same question for the preferential attachment model.
△ Less
Submitted 20 October, 2014; v1 submitted 26 September, 2014;
originally announced September 2014.
-
Can one hear the shape of a population history?
Authors:
Junhyong Kim,
Elchanan Mossel,
Miklós Z. Rácz,
Nathan Ross
Abstract:
Reconstructing past population size from present day genetic data is a major goal of population genetics. Recent empirical studies infer population size history using coalescent-based models applied to a small number of individuals. Here we provide tight bounds on the amount of exact coalescence time data needed to recover the population size history of a single, panmictic population at a certain…
▽ More
Reconstructing past population size from present day genetic data is a major goal of population genetics. Recent empirical studies infer population size history using coalescent-based models applied to a small number of individuals. Here we provide tight bounds on the amount of exact coalescence time data needed to recover the population size history of a single, panmictic population at a certain level of accuracy. In practice, coalescence times are estimated from sequence data and so our lower bounds should be taken as rather conservative.
△ Less
Submitted 29 September, 2014; v1 submitted 11 February, 2014;
originally announced February 2014.
-
On the influence of the seed graph in the preferential attachment model
Authors:
Sébastien Bubeck,
Elchanan Mossel,
Miklós Z. Rácz
Abstract:
We study the influence of the seed graph in the preferential attachment model, focusing on the case of trees. We first show that the seed has no effect from a weak local limit point of view. On the other hand, we conjecture that different seeds lead to different distributions of limiting trees from a total variation point of view. We take a first step in proving this conjecture by showing that see…
▽ More
We study the influence of the seed graph in the preferential attachment model, focusing on the case of trees. We first show that the seed has no effect from a weak local limit point of view. On the other hand, we conjecture that different seeds lead to different distributions of limiting trees from a total variation point of view. We take a first step in proving this conjecture by showing that seeds with different degree profiles lead to different limiting distributions for the (appropriately normalized) maximum degree, implying that such seeds lead to different (in total variation) limiting trees.
△ Less
Submitted 28 March, 2014; v1 submitted 20 January, 2014;
originally announced January 2014.
-
Helices in the wake of precipitation fronts
Authors:
Shibi Thomas,
Istvan Lagzi,
Ferenc Molnar Jr,
Zoltan Racz
Abstract:
A theoretical study of the emergence of helices in the wake of precipitation fronts is presented. The precipitation dynamics is described by the Cahn-Hilliard equation and the fronts are obtained by quenching the system into a linearly unstable state. Confining the process onto the surface of a cylinder and using the pulled-front formalism, our analytical calculations show that there are front sol…
▽ More
A theoretical study of the emergence of helices in the wake of precipitation fronts is presented. The precipitation dynamics is described by the Cahn-Hilliard equation and the fronts are obtained by quenching the system into a linearly unstable state. Confining the process onto the surface of a cylinder and using the pulled-front formalism, our analytical calculations show that there are front solutions that propagate into the unstable state and leave behind a helical structure. We find that helical patterns emerge only if the radius of the cylinder R is larger than a critical value R>R_c, in agreement with recent experiments.
△ Less
Submitted 30 August, 2013;
originally announced August 2013.
-
Coexistence in preferential attachment networks
Authors:
Tonći Antunović,
Elchanan Mossel,
Miklos Z. Racz
Abstract:
We introduce a new model of competition on growing networks. This extends the preferential attachment model, with the key property that node choices evolve simultaneously with the network. When a new node joins the network, it chooses neighbours by preferential attachment, and selects its type based on the number of initial neighbours of each type. The model is analysed in detail, and in particula…
▽ More
We introduce a new model of competition on growing networks. This extends the preferential attachment model, with the key property that node choices evolve simultaneously with the network. When a new node joins the network, it chooses neighbours by preferential attachment, and selects its type based on the number of initial neighbours of each type. The model is analysed in detail, and in particular, we determine the possible proportions of the various types in the limit of large networks. An important qualitative feature we find is that, in contrast to many current theoretical models, often several competitors will coexist. This matches empirical observations in many real-world networks.
△ Less
Submitted 25 November, 2015; v1 submitted 10 July, 2013;
originally announced July 2013.
-
Probability of the emergence of helical precipitation patterns in the wake of reaction-diffusion fronts
Authors:
Shibi Thomas,
Istvan Lagzi,
Ferenc Molnar Jr,
Zoltan Racz
Abstract:
Helical and helicoidal precipitation patterns emerging in the wake of reaction-diffusion fronts are studied. In our experiments, these chiral structures arise with well-defined probabilities P_H controlled by conditions such as e.g., the initial concentration of the reagents. We develop a model which describes the observed experimental trends. The results suggest that P_H is determined by a delica…
▽ More
Helical and helicoidal precipitation patterns emerging in the wake of reaction-diffusion fronts are studied. In our experiments, these chiral structures arise with well-defined probabilities P_H controlled by conditions such as e.g., the initial concentration of the reagents. We develop a model which describes the observed experimental trends. The results suggest that P_H is determined by a delicate interplay among the time and length scales related to the front and to the unstable precipitation modes and, furthermore, the noise amplitude also plays a quantifiable role.
△ Less
Submitted 20 February, 2013;
originally announced February 2013.
-
Multidimensional sticky Brownian motions as limits of exclusion processes
Authors:
Miklós Z. Rácz,
Mykhaylo Shkolnikov
Abstract:
We study exclusion processes on the integer lattice in which particles change their velocities due to stickiness. Specifically, whenever two or more particles occupy adjacent sites, they stick together for an extended period of time, and the entire particle system is slowed down until the ``collision'' is resolved. We show that under diffusive scaling of space and time such processes converge to w…
▽ More
We study exclusion processes on the integer lattice in which particles change their velocities due to stickiness. Specifically, whenever two or more particles occupy adjacent sites, they stick together for an extended period of time, and the entire particle system is slowed down until the ``collision'' is resolved. We show that under diffusive scaling of space and time such processes converge to what one might refer to as a sticky reflected Brownian motion in the wedge. The latter behaves as a Brownian motion with constant drift vector and diffusion matrix in the interior of the wedge, and reflects at the boundary of the wedge after spending an instant of time there. In particular, this leads to a natural multidimensional generalization of sticky Brownian motion on the half-line, which is of interest in both queuing theory and stochastic portfolio theory. For instance, this can model a market, which experiences a slowdown due to a major event (such as a court trial between some of the largest firms in the market) deciding about the new market leader.
△ Less
Submitted 26 May, 2015; v1 submitted 11 February, 2013;
originally announced February 2013.
-
Full counting statistics in a propagating quantum front and random matrix spectra
Authors:
Viktor Eisler,
Zoltan Racz
Abstract:
One-dimensional free fermions are studied with emphasis on propagating fronts emerging from a step initial condition. The probability distribution of the number of particles at the edge of the front is determined exactly. It is found that the full counting statistics coincides with the eigenvalue statistics of the edge spectrum of matrices from the Gaussian unitary ensemble. The correspondence est…
▽ More
One-dimensional free fermions are studied with emphasis on propagating fronts emerging from a step initial condition. The probability distribution of the number of particles at the edge of the front is determined exactly. It is found that the full counting statistics coincides with the eigenvalue statistics of the edge spectrum of matrices from the Gaussian unitary ensemble. The correspondence established between the random matrix eigenvalues and the particle positions yields the order statistics of the right-most particles in the front and, furthermore, it implies their subdiffusive spreading.
△ Less
Submitted 19 November, 2012; v1 submitted 10 November, 2012;
originally announced November 2012.
-
A Smooth Transition from Powerlessness to Absolute Power
Authors:
Elchanan Mossel,
Ariel D. Procaccia,
Miklos Z. Racz
Abstract:
We study the phase transition of the coalitional manipulation problem for generalized scoring rules. Previously it has been shown that, under some conditions on the distribution of votes, if the number of manipulators is $o(\sqrt{n})$, where $n$ is the number of voters, then the probability that a random profile is manipulable by the coalition goes to zero as the number of voters goes to infinity,…
▽ More
We study the phase transition of the coalitional manipulation problem for generalized scoring rules. Previously it has been shown that, under some conditions on the distribution of votes, if the number of manipulators is $o(\sqrt{n})$, where $n$ is the number of voters, then the probability that a random profile is manipulable by the coalition goes to zero as the number of voters goes to infinity, whereas if the number of manipulators is $ω(\sqrt{n})$, then the probability that a random profile is manipulable goes to one. Here we consider the critical window, where a coalition has size $c\sqrt{n}$, and we show that as $c$ goes from zero to infinity, the limiting probability that a random profile is manipulable goes from zero to one in a smooth fashion, i.e., there is a smooth phase transition between the two regimes. This result analytically validates recent empirical results, and suggests that deciding the coalitional manipulation problem may be of limited computational hardness in practice.
△ Less
Submitted 15 November, 2013; v1 submitted 9 May, 2012;
originally announced May 2012.
-
Distribution of Maximal Luminosity of Galaxies in the Sloan Digital Sky Survey
Authors:
M. Taghizadeh-Popp,
K. Ozogany,
Z. Racz,
E. Regoes,
A. S. Szalay
Abstract:
Extreme value statistics (EVS) is applied to the distribution of galaxy luminosities in the Sloan Digital Sky Survey (SDSS). We analyze the DR8 Main Galaxy Sample (MGS), as well as the Luminous Red Galaxies (LRG). Maximal luminosities are sampled from batches consisting of elongated pencil beams in the radial direction of sight. For the MGS, results suggest a small and positive tail index $ξ$, eff…
▽ More
Extreme value statistics (EVS) is applied to the distribution of galaxy luminosities in the Sloan Digital Sky Survey (SDSS). We analyze the DR8 Main Galaxy Sample (MGS), as well as the Luminous Red Galaxies (LRG). Maximal luminosities are sampled from batches consisting of elongated pencil beams in the radial direction of sight. For the MGS, results suggest a small and positive tail index $ξ$, effectively ruling out the possibility of having a finite maximum cutoff luminosity, and implying that the luminosity distribution function may decay as a power law at the high luminosity end. Assuming, however, $ξ=0$, a non-parametric comparison of the maximal luminosities with the Fisher-Tippett-Gumbel distribution (limit distribution for variables distributed by the Schechter fit) indicates a good agreement provided uncertainties arising both from the finite batch size and from the batch size distribution are accounted for. For a volume limited sample of LRGs, results show that they can be described as being the extremes of a luminosity distribution with an exponentially decaying tail, provided the uncertainties related to batch-size distribution are taken care of.
△ Less
Submitted 21 September, 2012; v1 submitted 31 March, 2012;
originally announced April 2012.
-
A quantitative Gibbard-Satterthwaite theorem without neutrality
Authors:
Elchanan Mossel,
Miklos Z. Racz
Abstract:
Recently, quantitative versions of the Gibbard-Satterthwaite theorem were proven for $k=3$ alternatives by Friedgut, Kalai, Keller and Nisan and for neutral functions on $k \geq 4$ alternatives by Isaksson, Kindler and Mossel.
We prove a quantitative version of the Gibbard-Satterthwaite theorem for general social choice functions for any number $k \geq 3$ of alternatives. In particular we show t…
▽ More
Recently, quantitative versions of the Gibbard-Satterthwaite theorem were proven for $k=3$ alternatives by Friedgut, Kalai, Keller and Nisan and for neutral functions on $k \geq 4$ alternatives by Isaksson, Kindler and Mossel.
We prove a quantitative version of the Gibbard-Satterthwaite theorem for general social choice functions for any number $k \geq 3$ of alternatives. In particular we show that for a social choice function $f$ on $k \geq 3$ alternatives and $n$ voters, which is $ε$-far from the family of nonmanipulable functions, a uniformly chosen voter profile is manipulable with probability at least inverse polynomial in $n$, $k$, and $ε^{-1}$.
Removing the neutrality assumption of previous theorems is important for multiple reasons. For one, it is known that there is a conflict between anonymity and neutrality, and since most common voting rules are anonymous, they cannot always be neutral. Second, virtual elections are used in many applications in artificial intelligence, where there are often restrictions on the outcome of the election, and so neutrality is not a natural assumption in these situations.
Ours is a unified proof which in particular covers all previous cases established before. The proof crucially uses reverse hypercontractivity in addition to several ideas from the two previous proofs. Much of the work is devoted to understanding functions of a single voter, and in particular we also prove a quantitative Gibbard-Satterthwaite theorem for one voter.
△ Less
Submitted 29 March, 2012; v1 submitted 26 October, 2011;
originally announced October 2011.
-
Order statistics of 1/f^α signals
Authors:
N. R. Moloney,
K. Ozogany,
Z. Racz
Abstract:
Order statistics of periodic, Gaussian noise with 1/f^α power spectrum is investigated. Using simulations and phenomenological arguments, we find three scaling regimes for the average gap d_k=<x_k-x_{k+1}> between the k-th and (k+1)-st largest values of the signal. The result d_k ~ 1/k known for independent, identically distributed variables remains valid for 0<α<1. Nontrivial, α-dependent scaling…
▽ More
Order statistics of periodic, Gaussian noise with 1/f^α power spectrum is investigated. Using simulations and phenomenological arguments, we find three scaling regimes for the average gap d_k=<x_k-x_{k+1}> between the k-th and (k+1)-st largest values of the signal. The result d_k ~ 1/k known for independent, identically distributed variables remains valid for 0<α<1. Nontrivial, α-dependent scaling exponents d_k ~ k^{(α-3)/2} emerge for 1<α<5 and, finally, α-independent scaling, d_k ~ k is obtained for α>5. The spectra of average ordered values ε_k=<x_1-x_k> ~ k^β is also examined. The exponent β is derived from the gap scaling as well as by relating ε_k to the density of near extreme states. Known results for the density of near extreme states combined with scaling suggest that β(α=2)=1/2, β(4)=3/2, and beta(infinity)=2 are exact values. We also show that parallels can be drawn between ε_k and the quantum mechanical spectra of a particle in power-law potentials.
△ Less
Submitted 25 September, 2011;
originally announced September 2011.
-
Modeling Flocks and Prices: Jum** Particles with an Attractive Interaction (shortened version)
Authors:
Marton Balazs,
Miklos Z. Racz,
Balint Toth
Abstract:
We introduce and investigate a new model of a finite number of particles jum** forward on the real line. The jump lengths are independent of everything, but the jump rate of each particle depends on the relative position of the particle compared to the center of mass of the system. The rates are higher for those left behind, and lower for those ahead of the center of mass, providing an attractiv…
▽ More
We introduce and investigate a new model of a finite number of particles jum** forward on the real line. The jump lengths are independent of everything, but the jump rate of each particle depends on the relative position of the particle compared to the center of mass of the system. The rates are higher for those left behind, and lower for those ahead of the center of mass, providing an attractive interaction kee** the particles together. We prove that in the fluid limit, as the number of particles goes to infinity, the evolution of the system is described by a mean field equation that exhibits traveling wave solutions. A connection to extreme value statistics is also provided.
△ Less
Submitted 1 July, 2012; v1 submitted 11 August, 2011;
originally announced August 2011.
-
Modeling Flocks and Prices: Jum** Particles with an Attractive Interaction
Authors:
Marton Balazs,
Miklos Z. Racz,
Balint Toth
Abstract:
We introduce and investigate a new model of a finite number of particles jum** forward on the real line. The jump lengths are independent of everything, but the jump rate of each particle depends on the relative position of the particle compared to the center of mass of the system. The rates are higher for those left behind, and lower for those ahead of the center of mass, providing an attractiv…
▽ More
We introduce and investigate a new model of a finite number of particles jum** forward on the real line. The jump lengths are independent of everything, but the jump rate of each particle depends on the relative position of the particle compared to the center of mass of the system. The rates are higher for those left behind, and lower for those ahead of the center of mass, providing an attractive interaction kee** the particles together. We prove that in the fluid limit, as the number of particles goes to infinity, the evolution of the system is described by a mean field equation that exhibits traveling wave solutions. A connection to extreme value statistics is also provided.
△ Less
Submitted 27 June, 2012; v1 submitted 17 July, 2011;
originally announced July 2011.
-
Casimir effect in the nonequilibrium steady-state of a quantum spin chain
Authors:
Diego Luis Gonzalez Cabrera,
Zoltan Racz,
Frederic van Wijland
Abstract:
We present a fully microscopics-based calculation of the Casimir effect in a nonequilibrium system, namely an energy flux driven quantum XX chain. The force between the walls (transverse-field impurities) is calculated in a nonequilibrium steady state which is prepared by letting the system evolve from an initial state with the two halves of the chain prepared at equilibrium at different temperatu…
▽ More
We present a fully microscopics-based calculation of the Casimir effect in a nonequilibrium system, namely an energy flux driven quantum XX chain. The force between the walls (transverse-field impurities) is calculated in a nonequilibrium steady state which is prepared by letting the system evolve from an initial state with the two halves of the chain prepared at equilibrium at different temperatures. The steady state emerging in the large-time limit is homogeneous but carries an energy flux. The Casimir force in this nonequilibrium state is calculated analytically in the limit when the transverse fields are small. We find that the the Casimir force range is reduced compared to the equilibrium case, and suggest that the reason for this is the reduction of fluctuations in the flux carrying steady state.
△ Less
Submitted 22 April, 2010;
originally announced April 2010.
-
Renormalization group theory for finite-size scaling in extreme statistics
Authors:
G. Gyorgyi,
N. R. Moloney,
K. Ozogany,
Z. Racz,
M. Droz
Abstract:
We present a renormalization group (RG) approach to explain universal features of extreme statistics, applied here to independent, identically distributed variables. The outlines of the theory have been described in a previous Letter, the main result being that finite-size shape corrections to the limit distribution can be obtained from a linearization of the RG transformation near a fixed point,…
▽ More
We present a renormalization group (RG) approach to explain universal features of extreme statistics, applied here to independent, identically distributed variables. The outlines of the theory have been described in a previous Letter, the main result being that finite-size shape corrections to the limit distribution can be obtained from a linearization of the RG transformation near a fixed point, leading to the computation of stable perturbations as eigenfunctions. Here we show details of the RG theory which exhibit remarkable similarities to the RG known in statistical physics. Besides the fixed points explaining universality, and the least stable eigendirections accounting for convergence rates and shape corrections, the similarities include marginally stable perturbations which turn out to be generic for the Fisher-Tippett-Gumbel class. Distribution functions containing unstable perturbations are also considered. We find that, after a transitory divergence, they return to the universal fixed line at the same or at a different point depending on the type of perturbation.
△ Less
Submitted 5 April, 2010;
originally announced April 2010.
-
Coarsening of Precipitation Patterns in a Moving Reaction-Diffusion Front
Authors:
A. Volford,
I. Lagzi,
F. Molnar Jr,
Z. Racz
Abstract:
Precipitation patterns emerging in a 2D moving front are investigated on the example of NaOH diffusing into a gel containing AlCl_3. The time evolution of the precipitate Al(OH)_3 can be observed since the precipitate redissolves in the excess outer electrolyte NaOH and thus it exists only in a narrow, optically accessible region of the reaction front. The patterns display self-similar coarsenin…
▽ More
Precipitation patterns emerging in a 2D moving front are investigated on the example of NaOH diffusing into a gel containing AlCl_3. The time evolution of the precipitate Al(OH)_3 can be observed since the precipitate redissolves in the excess outer electrolyte NaOH and thus it exists only in a narrow, optically accessible region of the reaction front. The patterns display self-similar coarsening with a characteristic length, xi(t), increasing with time t as xi(t) ~ t^(1/2). A theory based on Cahn-Hilliard phase-separation dynamics including dissolution is shown to yield agreement with the experiments.
△ Less
Submitted 10 November, 2009;
originally announced November 2009.
-
Width of reaction zones in A + B -> C type reaction-diffusion processes: Effects of an electric current
Authors:
Kirsten Martens,
Michel Droz,
Zoltan Rácz
Abstract:
We investigate the effects of an electric current on the width of a stationary reaction zone in an irreversible A^- + B^+ -> C reaction-diffusion process. The ion dynamics of the electrolytes A = (A^+, A^-) and B = (B^+, B^-) is described by reaction-diffusion equations obeying local electroneutrality, and the stationary state is obtained by employing reservoirs of fixed electrolyte concentratio…
▽ More
We investigate the effects of an electric current on the width of a stationary reaction zone in an irreversible A^- + B^+ -> C reaction-diffusion process. The ion dynamics of the electrolytes A = (A^+, A^-) and B = (B^+, B^-) is described by reaction-diffusion equations obeying local electroneutrality, and the stationary state is obtained by employing reservoirs of fixed electrolyte concentrations at the opposite ends of a finite domain. We find that the width of the reaction zone decreases when the current drives the reacting ions towards the reaction zone while it increases in the opposite case. The linear response of the width to the current is estimated by develo** a phenomenological theory based on conservation laws, and on electroneutrality. The theory is found to reproduce numerical solutions to a good accuracy.
△ Less
Submitted 13 July, 2009; v1 submitted 16 March, 2009;
originally announced March 2009.
-
Encoding information into precipitation structures
Authors:
Kirsten Martens,
Ioana Bena,
Michel Droz,
Zoltan Racz
Abstract:
Material design at submicron scales would be profoundly affected if the formation of precipitation patterns could be easily controlled. It would allow the direct building of bulk structures, in contrast to traditional techniques which consist of removing material in order to create patterns. Here, we discuss an extension of our recent proposal of using electrical currents to control precipitatio…
▽ More
Material design at submicron scales would be profoundly affected if the formation of precipitation patterns could be easily controlled. It would allow the direct building of bulk structures, in contrast to traditional techniques which consist of removing material in order to create patterns. Here, we discuss an extension of our recent proposal of using electrical currents to control precipitation bands which emerge in the wake of reaction fronts in A^{+} + B^{-} -> C reaction-diffusion processes. Our main result, based on simulating the reaction-diffusion-precipitation equations, is that the dynamics of the charged agents can be guided by an appropriately designed time-dependent electric current so that, in addition to the control of the band spacing, the width of the precipitation bands can also be tuned. This makes straightforward the encoding of information into precipitation patterns and, as an amusing example, we demonstrate the feasibility by showing how to encode a musical rhythm.
△ Less
Submitted 28 October, 2008;
originally announced October 2008.
-
Designer Patterns: Flexible Control of Precipitation through Electric Currents
Authors:
Ioana Bena,
Michel Droz,
Istvan Lagzi,
Kirsten Martens,
Zoltan Racz,
Andras Volford
Abstract:
Precipitation patterns generated by A^{+}+B^{-} --> C type reaction-diffusion processes are studied. It is shown both theoretically and experimentally that the patterns can be controlled by an appropriately designed, time-dependent electric current in the system. We describe examples of current dynamics yielding periodic bands of prescribed wavelength, as well as more complicated structures. The…
▽ More
Precipitation patterns generated by A^{+}+B^{-} --> C type reaction-diffusion processes are studied. It is shown both theoretically and experimentally that the patterns can be controlled by an appropriately designed, time-dependent electric current in the system. We describe examples of current dynamics yielding periodic bands of prescribed wavelength, as well as more complicated structures. The pattern control is demonstrated experimentally on the reaction-diffusion-precipitation process 2AgNO_3+K_2Cr_2O_7 --> Ag_2Cr_2O_7+2KNO_3 taking place in a gel.
△ Less
Submitted 19 February, 2008;
originally announced February 2008.
-
Finite-size scaling in extreme statistics
Authors:
G. Gyorgyi,
N. R. Moloney,
K. Ozogany,
Z. Racz
Abstract:
We study the convergence and shape correction to the limit distributions of extreme values due to the finite size (FS) of data sets. A renormalization method is introduced for the case of independent, identically distributed (iid) variables, showing that the iid universality classes are subdivided according to the exponent of the FS convergence, which determines the leading order FS shape correc…
▽ More
We study the convergence and shape correction to the limit distributions of extreme values due to the finite size (FS) of data sets. A renormalization method is introduced for the case of independent, identically distributed (iid) variables, showing that the iid universality classes are subdivided according to the exponent of the FS convergence, which determines the leading order FS shape correction function as well. We find that, for the correlated systems of subcritical percolation and 1/f^alpha stationary (alpha<1) noise, the iid shape correction compares favorably to simulations. Furthermore, for the strongly correlated regime (alpha>1) of 1/f^alpha noise, the shape correction is obtained in terms of the limit distribution itself.
△ Less
Submitted 24 December, 2007;
originally announced December 2007.
-
Extreme statistics for time series: Distribution of the maximum relative to the initial value
Authors:
T. W. Burkhardt,
G. Gyorgyi,
N. R. Moloney,
Z. Racz
Abstract:
The extreme statistics of time signals is studied when the maximum is measured from the initial value. In the case of independent, identically distributed (iid) variables, we classify the limiting distribution of the maximum according to the properties of the parent distribution from which the variables are drawn. Then we turn to correlated periodic Gaussian signals with a 1/f^alpha power spectr…
▽ More
The extreme statistics of time signals is studied when the maximum is measured from the initial value. In the case of independent, identically distributed (iid) variables, we classify the limiting distribution of the maximum according to the properties of the parent distribution from which the variables are drawn. Then we turn to correlated periodic Gaussian signals with a 1/f^alpha power spectrum and study the distribution of the maximum relative height with respect to the initial height (MRH_I). The exact MRH_I distribution is derived for alpha=0 (iid variables), alpha=2 (random walk), alpha=4 (random acceleration), and alpha=infinity (single sinusoidal mode). For other, intermediate values of alpha, the distribution is determined from simulations. We find that the MRH_I distribution is markedly different from the previously studied distribution of the maximum height relative to the average height for all alpha. The two main distinguishing features of the MRH_I distribution are the much larger weight for small relative heights and the divergence at zero height for alpha>3. We also demonstrate that the boundary conditions affect the shape of the distribution by presenting exact results for some non-periodic boundary conditions. Finally, we show that, for signals arising from time-translationally invariant distributions, the density of near extreme states is the same as the MRH_I distribution. This is used in develo** a scaling theory for the threshold singularities of the two distributions.
△ Less
Submitted 18 July, 2007;
originally announced July 2007.
-
Guiding-fields for phase-separation: Controlling Liesegang patterns
Authors:
Tibor Antal,
Ioana Bena,
Michel Droz,
Kirsten Martens,
Zoltan Racz
Abstract:
Liesegang patterns emerge from precipitation processes and may be used to build bulk structures at submicron lengthscales. Thus they have significant potential for technological applications provided adequate methods of control can be devised. Here we describe a simple, physically realizable pattern-control based on the notion of driven precipitation, meaning that the phase-separation is governe…
▽ More
Liesegang patterns emerge from precipitation processes and may be used to build bulk structures at submicron lengthscales. Thus they have significant potential for technological applications provided adequate methods of control can be devised. Here we describe a simple, physically realizable pattern-control based on the notion of driven precipitation, meaning that the phase-separation is governed by a guiding field such as, for example, a temperature or a pH field. The phase-separation is modeled through a non-autonomous Cahn-Hilliard equation whose spinodal is determined by the evolving guiding field. Control over the dynamics of the spinodal gives control over the velocity of the instability front which separates the stable and unstable regions of the system. Since the wavelength of the pattern is largely determined by this velocity, the distance between successive precipitation bands becomes controllable. We demonstrate the above ideas by numerical studies of a 1D system with diffusive guiding field. We find that the results can be accurately described by employing a linear stability analysis (pulled-front theory) for determining the velocity -- local-wavelength relationship. From the perspective of the Liesegang theory, our results indicate that the so-called revert patterns may be naturally generated by diffusive guiding fields.
△ Less
Submitted 12 August, 2007; v1 submitted 5 June, 2007;
originally announced June 2007.
-
Complex motion of precipitation bands
Authors:
Istvan Lagzi,
Peter Papai,
Zoltan Racz
Abstract:
Formation and dynamics of an Al(OH)_3 precipitation ring is studied by diffusing NaOH into a gel containing AlCl_3. Limited feeding of the outer electrolyte (NaOH) is found to yield an intricate ring-dynamics which involves stop** and reversal of the direction of motion of the precipitation ring, and evolution into stationary multi-ring structures. A model of the ring-dynamics is developed by…
▽ More
Formation and dynamics of an Al(OH)_3 precipitation ring is studied by diffusing NaOH into a gel containing AlCl_3. Limited feeding of the outer electrolyte (NaOH) is found to yield an intricate ring-dynamics which involves stop** and reversal of the direction of motion of the precipitation ring, and evolution into stationary multi-ring structures. A model of the ring-dynamics is developed by combining a phase separation scenario for the precipitation with the redissolution (complex formation) of the precipitate in the excess of the outer electrolyte.
△ Less
Submitted 1 December, 2006;
originally announced December 2006.
-
Maximal height statistics for 1/f^alpha signals
Authors:
G. Gyorgyi,
N. R. Moloney,
K. Ozogany,
Z. Racz
Abstract:
Numerical and analytical results are presented for the maximal relative height distribution of stationary periodic Gaussian signals (one dimensional interfaces) displaying a 1/f^alpha power spectrum. For 0<alpha<1 (regime of decaying correlations), we observe that the mathematically established limiting distribution (Fisher-Tippett-Gumbel distribution) is approached extremely slowly as the sampl…
▽ More
Numerical and analytical results are presented for the maximal relative height distribution of stationary periodic Gaussian signals (one dimensional interfaces) displaying a 1/f^alpha power spectrum. For 0<alpha<1 (regime of decaying correlations), we observe that the mathematically established limiting distribution (Fisher-Tippett-Gumbel distribution) is approached extremely slowly as the sample size increases. The convergence is rapid for alpha>1 (regime of strong correlations) and a highly accurate picture gallery of distribution functions can be constructed numerically. Analytical results can be obtained in the limit alpha -> infinity and, for large alpha, by perturbation expansion. Furthermore, using path integral techniques we derive a trace formula for the distribution function, valid for alpha=2n even integer.
From the latter we extract the small argument asymptote of the distribution function whose analytic continuation to arbitrary alpha > 1 is found to be in agreement with simulations. Comparison of the extreme and roughness statistics of the interfaces reveals similarities in both the small and large argument asymptotes of the distribution functions.
△ Less
Submitted 17 October, 2006;
originally announced October 2006.