-
Hilbert Functions and Low-Degree Randomness Extractors
Authors:
Alexander Golovnev,
Zeyu Guo,
Pooya Hatami,
Satyajeet Nagargoje,
Chao Yan
Abstract:
For $S\subseteq \mathbb{F}^n$, consider the linear space of restrictions of degree-$d$ polynomials to $S$. The Hilbert function of $S$, denoted $\mathrm{h}_S(d,\mathbb{F})$, is the dimension of this space. We obtain a tight lower bound on the smallest value of the Hilbert function of subsets $S$ of arbitrary finite grids in $\mathbb{F}^n$ with a fixed size $|S|$. We achieve this by proving that th…
▽ More
For $S\subseteq \mathbb{F}^n$, consider the linear space of restrictions of degree-$d$ polynomials to $S$. The Hilbert function of $S$, denoted $\mathrm{h}_S(d,\mathbb{F})$, is the dimension of this space. We obtain a tight lower bound on the smallest value of the Hilbert function of subsets $S$ of arbitrary finite grids in $\mathbb{F}^n$ with a fixed size $|S|$. We achieve this by proving that this value coincides with a combinatorial quantity, namely the smallest number of low Hamming weight points in a down-closed set of size $|S|$.
Understanding the smallest values of Hilbert functions is closely related to the study of degree-$d$ closure of sets, a notion introduced by Nie and Wang (Journal of Combinatorial Theory, Series A, 2015). We use bounds on the Hilbert function to obtain a tight bound on the size of degree-$d$ closures of subsets of $\mathbb{F}_q^n$, which answers a question posed by Doron, Ta-Shma, and Tell (Computational Complexity, 2022).
We use the bounds on the Hilbert function and degree-$d$ closure of sets to prove that a random low-degree polynomial is an extractor for samplable randomness sources. Most notably, we prove the existence of low-degree extractors and dispersers for sources generated by constant-degree polynomials and polynomial-size circuits. Until recently, even the existence of arbitrary deterministic extractors for such sources was not known.
△ Less
Submitted 16 May, 2024;
originally announced May 2024.
-
No Complete Problem for Constant-Cost Randomized Communication
Authors:
Yuting Fang,
Lianna Hambardzumyan,
Nathaniel Harms,
Pooya Hatami
Abstract:
We prove that the class of communication problems with public-coin randomized constant-cost protocols, called $BPP^0$, does not contain a complete problem. In other words, there is no randomized constant-cost problem $Q \in BPP^0$, such that all other problems $P \in BPP^0$ can be computed by a constant-cost deterministic protocol with access to an oracle for $Q$. We also show that the $k$-Hamming…
▽ More
We prove that the class of communication problems with public-coin randomized constant-cost protocols, called $BPP^0$, does not contain a complete problem. In other words, there is no randomized constant-cost problem $Q \in BPP^0$, such that all other problems $P \in BPP^0$ can be computed by a constant-cost deterministic protocol with access to an oracle for $Q$. We also show that the $k$-Hamming Distance problems form an infinite hierarchy within $BPP^0$. Previously, it was known only that Equality is not complete for $BPP^0$. We introduce a new technique, using Ramsey theory, that can prove lower bounds against arbitrary oracles in $BPP^0$, and more generally, we show that $k$-Hamming Distance matrices cannot be expressed as a Boolean combination of any constant number of matrices which forbid large Greater-Than subproblems.
△ Less
Submitted 31 March, 2024;
originally announced April 2024.
-
Structure in Communication Complexity and Constant-Cost Complexity Classes
Authors:
Hamed Hatami,
Pooya Hatami
Abstract:
Several theorems and conjectures in communication complexity state or speculate that the complexity of a matrix in a given communication model is controlled by a related analytic or algebraic matrix parameter, e.g., rank, sign-rank, discrepancy, etc. The forward direction is typically easy as the structural implications of small complexity often imply a bound on some matrix parameter. The challeng…
▽ More
Several theorems and conjectures in communication complexity state or speculate that the complexity of a matrix in a given communication model is controlled by a related analytic or algebraic matrix parameter, e.g., rank, sign-rank, discrepancy, etc. The forward direction is typically easy as the structural implications of small complexity often imply a bound on some matrix parameter. The challenge lies in establishing the reverse direction, which requires understanding the structure of Boolean matrices for which a given matrix parameter is small or large. We will discuss several research directions that align with this overarching theme.
△ Less
Submitted 25 January, 2024;
originally announced January 2024.
-
Online Learning and Disambiguations of Partial Concept Classes
Authors:
Tsun-Ming Cheung,
Hamed Hatami,
Pooya Hatami,
Kaave Hosseini
Abstract:
In a recent article, Alon, Hanneke, Holzman, and Moran (FOCS '21) introduced a unifying framework to study the learnability of classes of partial concepts. One of the central questions studied in their work is whether the learnability of a partial concept class is always inherited from the learnability of some ``extension'' of it to a total concept class.
They showed this is not the case for PAC…
▽ More
In a recent article, Alon, Hanneke, Holzman, and Moran (FOCS '21) introduced a unifying framework to study the learnability of classes of partial concepts. One of the central questions studied in their work is whether the learnability of a partial concept class is always inherited from the learnability of some ``extension'' of it to a total concept class.
They showed this is not the case for PAC learning but left the problem open for the stronger notion of online learnability.
We resolve this problem by constructing a class of partial concepts that is online learnable, but no extension of it to a class of total concepts is online learnable (or even PAC learnable).
△ Less
Submitted 30 March, 2023;
originally announced March 2023.
-
The Implicit Graph Conjecture is False
Authors:
Hamed Hatami,
Pooya Hatami
Abstract:
An efficient implicit representation of an $n$-vertex graph $G$ in a family $\mathcal{F}$ of graphs assigns to each vertex of $G$ a binary code of length $O(\log n)$ so that the adjacency between every pair of vertices can be determined only as a function of their codes. This function can depend on the family but not on the individual graph. Every family of graphs admitting such a representation c…
▽ More
An efficient implicit representation of an $n$-vertex graph $G$ in a family $\mathcal{F}$ of graphs assigns to each vertex of $G$ a binary code of length $O(\log n)$ so that the adjacency between every pair of vertices can be determined only as a function of their codes. This function can depend on the family but not on the individual graph. Every family of graphs admitting such a representation contains at most $2^{O(n\log(n))}$ graphs on $n$ vertices, and thus has at most factorial speed of growth.
The Implicit Graph Conjecture states that, conversely, every hereditary graph family with at most factorial speed of growth admits an efficient implicit representation. We refute this conjecture by establishing the existence of hereditary graph families with factorial speed of growth that require codes of length $n^{Ω(1)}$.
△ Less
Submitted 13 December, 2021; v1 submitted 25 November, 2021;
originally announced November 2021.
-
A counter-example to the probabilistic universal graph conjecture via randomized communication complexity
Authors:
Lianna Hambardzumyan,
Hamed Hatami,
Pooya Hatami
Abstract:
We refute the Probabilistic Universal Graph Conjecture of Harms, Wild, and Zamaraev, which states that a hereditary graph property admits a constant-size probabilistic universal graph if and only if it is stable and has at most factorial speed.
Our counter-example follows from the existence of a sequence of $n \times n$ Boolean matrices $M_n$, such that their public-coin randomized communication…
▽ More
We refute the Probabilistic Universal Graph Conjecture of Harms, Wild, and Zamaraev, which states that a hereditary graph property admits a constant-size probabilistic universal graph if and only if it is stable and has at most factorial speed.
Our counter-example follows from the existence of a sequence of $n \times n$ Boolean matrices $M_n$, such that their public-coin randomized communication complexity tends to infinity, while the randomized communication complexity of every $\sqrt{n}\times \sqrt{n}$ submatrix of $M_n$ is bounded by a universal constant.
△ Less
Submitted 8 December, 2021; v1 submitted 19 November, 2021;
originally announced November 2021.
-
Biasing Boolean Functions and Collective Coin-Flip** Protocols over Arbitrary Product Distributions
Authors:
Yuval Filmus,
Lianna Hambardzumyan,
Hamed Hatami,
Pooya Hatami,
David Zuckerman
Abstract:
The seminal result of Kahn, Kalai and Linial shows that a coalition of $O(\frac{n}{\log n})$ players can bias the outcome of any Boolean function $\{0,1\}^n \to \{0,1\}$ with respect to the uniform measure. We extend their result to arbitrary product measures on $\{0,1\}^n$, by combining their argument with a completely different argument that handles very biased coordinates.
We view this result…
▽ More
The seminal result of Kahn, Kalai and Linial shows that a coalition of $O(\frac{n}{\log n})$ players can bias the outcome of any Boolean function $\{0,1\}^n \to \{0,1\}$ with respect to the uniform measure. We extend their result to arbitrary product measures on $\{0,1\}^n$, by combining their argument with a completely different argument that handles very biased coordinates.
We view this result as a step towards proving a conjecture of Friedgut, which states that Boolean functions on the continuous cube $[0,1]^n$ (or, equivalently, on $\{1,\dots,n\}^n$) can be biased using coalitions of $o(n)$ players. This is the first step taken in this direction since Friedgut proposed the conjecture in 2004.
Russell, Saks and Zuckerman extended the result of Kahn, Kalai and Linial to multi-round protocols, showing that when the number of rounds is $o(\log^* n)$, a coalition of $o(n)$ players can bias the outcome with respect to the uniform measure. We extend this result as well to arbitrary product measures on $\{0,1\}^n$.
The argument of Russell et al. relies on the fact that a coalition of $o(n)$ players can boost the expectation of any Boolean function from $ε$ to $1-ε$ with respect to the uniform measure. This fails for general product distributions, as the example of the AND function with respect to $μ_{1-1/n}$ shows. Instead, we use a novel boosting argument alongside a generalization of our first result to arbitrary finite ranges.
△ Less
Submitted 20 February, 2019;
originally announced February 2019.
-
On Multilinear Forms: Bias, Correlation, and Tensor Rank
Authors:
Abhishek Bhrushundi,
Prahladh Harsha,
Pooya Hatami,
Swastik Kopparty,
Mrinal Kumar
Abstract:
In this paper, we prove new relations between the bias of multilinear forms, the correlation between multilinear forms and lower degree polynomials, and the rank of tensors over $GF(2)= \{0,1\}$. We show the following results for multilinear forms and tensors.
1. Correlation bounds : We show that a random $d$-linear form has exponentially low correlation with low-degree polynomials. More precise…
▽ More
In this paper, we prove new relations between the bias of multilinear forms, the correlation between multilinear forms and lower degree polynomials, and the rank of tensors over $GF(2)= \{0,1\}$. We show the following results for multilinear forms and tensors.
1. Correlation bounds : We show that a random $d$-linear form has exponentially low correlation with low-degree polynomials. More precisely, for $d \ll 2^{o(k)}$, we show that a random $d$-linear form $f(X_1,X_2, \dots, X_d) : \left(GF(2)^{k}\right)^d \rightarrow GF(2)$ has correlation $2^{-k(1-o(1))}$ with any polynomial of degree at most $d/10$. This result is proved by giving near-optimal bounds on the bias of random $d$-linear form, which is in turn proved by giving near-optimal bounds on the probability that a random rank-$t$ $d$-linear form is identically zero.
2. Tensor-rank vs Bias : We show that if a $d$-dimensional tensor has small rank, then the bias of the associated $d$-linear form is large. More precisely, given any $d$-dimensional tensor $$T :\underbrace{[k]\times \ldots [k]}_{\text{$d$ times}}\to GF(2)$$ of rank at most $t$, the bias of the associated $d$-linear form $$f_T(X_1,\ldots,X_d) := \sum_{(i_1,\dots,i_d) \in [k]^d} T(i_1,i_2,\ldots, i_d) X_{1,i_1}\cdot X_{1,i_2}\cdots X_{d,i_d}$$ is at least $\left(1-\frac1{2^{d-1}}\right)^t$.
The above bias vs tensor-rank connection suggests a natural approach to proving nontrivial tensor-rank lower bounds for $d=3$. In particular, we use this approach to prove that the finite field multiplication tensor has tensor rank at least $3.52 k$ matching the best known lower bound for any explicit tensor in three dimensions over $GF(2)$.
△ Less
Submitted 24 April, 2018; v1 submitted 24 April, 2018;
originally announced April 2018.
-
An Asymptotically Tight Bound on the Number of Relevant Variables in a Bounded Degree Boolean Function
Authors:
John Chiarelli,
Pooya Hatami,
Michael Saks
Abstract:
We prove that there is a constant $C\leq 6.614$ such that every Boolean function of degree at most $d$ (as a polynomial over $\mathbb{R}$) is a $C\cdot 2^d$-junta, i.e. it depends on at most $C\cdot 2^d$ variables. This improves the $d\cdot 2^{d-1}$ upper bound of Nisan and Szegedy [Computational Complexity 4 (1994)]. Our proof uses a new weighting scheme where we assign weights to variables based…
▽ More
We prove that there is a constant $C\leq 6.614$ such that every Boolean function of degree at most $d$ (as a polynomial over $\mathbb{R}$) is a $C\cdot 2^d$-junta, i.e. it depends on at most $C\cdot 2^d$ variables. This improves the $d\cdot 2^{d-1}$ upper bound of Nisan and Szegedy [Computational Complexity 4 (1994)]. Our proof uses a new weighting scheme where we assign weights to variables based on the highest degree monomial they appear on.
The bound of $C\cdot 2^d$ is tight up to the constant $C$ as a lower bound of $2^d-1$ is achieved by a read-once decision tree of depth $d$. We slightly improve the lower bound by constructing, for each positive integer $d$, a function of degree $d$ with $3\cdot 2^{d-1}-2$ relevant variables. A similar construction was independently observed by Shinkar and Tal.
△ Less
Submitted 19 November, 2018; v1 submitted 25 January, 2018;
originally announced January 2018.
-
Low-Sensitivity Functions from Unambiguous Certificates
Authors:
Shalev Ben-David,
Pooya Hatami,
Avishay Tal
Abstract:
We provide new query complexity separations against sensitivity for total Boolean functions: a power $3$ separation between deterministic (and even randomized or quantum) query complexity and sensitivity, and a power $2.22$ separation between certificate complexity and sensitivity. We get these separations by using a new connection between sensitivity and a seemingly unrelated measure called one-s…
▽ More
We provide new query complexity separations against sensitivity for total Boolean functions: a power $3$ separation between deterministic (and even randomized or quantum) query complexity and sensitivity, and a power $2.22$ separation between certificate complexity and sensitivity. We get these separations by using a new connection between sensitivity and a seemingly unrelated measure called one-sided unambiguous certificate complexity ($UC_{min}$). We also show that $UC_{min}$ is lower-bounded by fractional block sensitivity, which means we cannot use these techniques to get a super-quadratic separation between $bs(f)$ and $s(f)$. We also provide a quadratic separation between the tree-sensitivity and decision tree complexity of Boolean functions, disproving a conjecture of Gopalan, Servedio, Tal, and Wigderson (CCC 2016).
Along the way, we give a power $1.22$ separation between certificate complexity and one-sided unambiguous certificate complexity, improving the power $1.128$ separation due to Göös (FOCS 2015). As a consequence, we obtain an improved $Ω(\log^{1.22} n)$ lower-bound on the co-nondeterministic communication complexity of the Clique vs. Independent Set problem.
△ Less
Submitted 15 November, 2017; v1 submitted 23 May, 2016;
originally announced May 2016.
-
Algorithmic regularity for polynomials and applications
Authors:
Arnab Bhattacharyya,
Pooya Hatami,
Madhur Tulsiani
Abstract:
In analogy with the regularity lemma of Szemerédi, regularity lemmas for polynomials shown by Green and Tao (Contrib. Discrete Math. 2009) and by Kaufman and Lovett (FOCS 2008) modify a given collection of polynomials \calF = {P_1,...,P_m} to a new collection \calF' so that the polynomials in \calF' are "pseudorandom". These lemmas have various applications, such as (special cases) of Reed-Muller…
▽ More
In analogy with the regularity lemma of Szemerédi, regularity lemmas for polynomials shown by Green and Tao (Contrib. Discrete Math. 2009) and by Kaufman and Lovett (FOCS 2008) modify a given collection of polynomials \calF = {P_1,...,P_m} to a new collection \calF' so that the polynomials in \calF' are "pseudorandom". These lemmas have various applications, such as (special cases) of Reed-Muller testing and worst-case to average-case reductions for polynomials. However, the transformation from \calF to \calF' is not algorithmic for either regularity lemma. We define new notions of regularity for polynomials, which are analogous to the above, but which allow for an efficient algorithm to compute the pseudorandom collection \calF'. In particular, when the field is of high characteristic, in polynomial time, we can refine \calF into \calF' where every nonzero linear combination of polynomials in \calF' has desirably small Gowers norm.
Using the algorithmic regularity lemmas, we show that if a polynomial P of degree d is within (normalized) Hamming distance 1-1/|F| -\eps of some unknown polynomial of degree k over a prime field F (for k < d < |F|), then there is an efficient algorithm for finding a degree-k polynomial Q, which is within distance 1-1/|F| -ηof P, for some ηdepending on \eps. This can be thought of as decoding the Reed-Muller code of order k beyond the list decoding radius (finding one close codeword), when the received word P itself is a polynomial of degree d (with k < d < |F|).
We also obtain an algorithmic version of the worst-case to average-case reductions by Kaufman and Lovett. They show that if a polynomial of degree d can be weakly approximated by a polynomial of lower degree, then it can be computed exactly using a collection of polynomials of degree at most d-1. We give an efficient (randomized) algorithm to find this collection.
△ Less
Submitted 13 November, 2013;
originally announced November 2013.
-
Distance-Sensitive Property Testing Lower Bounds
Authors:
Joshua Brody,
Pooya Hatami
Abstract:
In this paper, we consider several property testing problems and ask how the query complexity depends on the distance parameter $\eps$. We achieve new lower bounds in this setting for the problems of testing whether a function is monotone and testing whether the function has low Fourier degree. For monotonicity testing, our lower bound matches the recent upper bound of Chakrabarty and Seshadhri.
In this paper, we consider several property testing problems and ask how the query complexity depends on the distance parameter $\eps$. We achieve new lower bounds in this setting for the problems of testing whether a function is monotone and testing whether the function has low Fourier degree. For monotonicity testing, our lower bound matches the recent upper bound of Chakrabarty and Seshadhri.
△ Less
Submitted 26 August, 2013; v1 submitted 24 April, 2013;
originally announced April 2013.
-
An Arithmetic Analogue of Fox's Triangle Removal Argument
Authors:
Pooya Hatami,
Sushant Sachdeva,
Madhur Tulsiani
Abstract:
We give an arithmetic version of the recent proof of the triangle removal lemma by Fox [Fox11], for the group $\mathbb{F}_2^n$.
A triangle in $\mathbb{F}_2^n$ is a triple $(x,y,z)$ such that $x+y+z = 0$. The triangle removal lemma for $\mathbb{F}_2^n$ states that for every $ε> 0$ there is a $δ> 0$, such that if a subset $A$ of $\mathbb{F}_2^n$ requires the removal of at least $ε\cdot 2^n$ elemen…
▽ More
We give an arithmetic version of the recent proof of the triangle removal lemma by Fox [Fox11], for the group $\mathbb{F}_2^n$.
A triangle in $\mathbb{F}_2^n$ is a triple $(x,y,z)$ such that $x+y+z = 0$. The triangle removal lemma for $\mathbb{F}_2^n$ states that for every $ε> 0$ there is a $δ> 0$, such that if a subset $A$ of $\mathbb{F}_2^n$ requires the removal of at least $ε\cdot 2^n$ elements to make it triangle-free, then it must contain at least $δ\cdot 2^{2n}$ triangles. This problem was first studied by Green [Gre05] who proved a lower bound on $δ$ using an arithmetic regularity lemma. Regularity based lower bounds for triangle removal in graphs were recently improved by Fox and we give a direct proof of an analogous improvement for triangle removal in $\mathbb{F}_2^n$.
The improved lower bound was already known to follow (for triangle-removal in all groups), using Fox's removal lemma for directed cycles and a reduction by Král, Serra and Vena [KSV09] (see [Fox11,CF13]). The purpose of this note is to provide a direct Fourier-analytic proof for the group $\mathbb{F}_2^n.$
△ Less
Submitted 1 February, 2016; v1 submitted 17 April, 2013;
originally announced April 2013.
-
Every locally characterized affine-invariant property is testable
Authors:
Arnab Bhattacharyya,
Eldar Fischer,
Hamed Hatami,
Pooya Hatami,
Shachar Lovett
Abstract:
Let F = F_p for any fixed prime p >= 2. An affine-invariant property is a property of functions on F^n that is closed under taking affine transformations of the domain. We prove that all affine-invariant property having local characterizations are testable. In fact, we show a proximity-oblivious test for any such property P, meaning that there is a test that, given an input function f, makes a con…
▽ More
Let F = F_p for any fixed prime p >= 2. An affine-invariant property is a property of functions on F^n that is closed under taking affine transformations of the domain. We prove that all affine-invariant property having local characterizations are testable. In fact, we show a proximity-oblivious test for any such property P, meaning that there is a test that, given an input function f, makes a constant number of queries to f, always accepts if f satisfies P, and rejects with positive probability if the distance between f and P is nonzero. More generally, we show that any affine-invariant property that is closed under taking restrictions to subspaces and has bounded complexity is testable.
We also prove that any property that can be described as the property of decomposing into a known structure of low-degree polynomials is locally characterized and is, hence, testable. For example, whether a function is a product of two degree-d polynomials, whether a function splits into a product of d linear polynomials, and whether a function has low rank are all examples of degree-structural properties and are therefore locally characterized.
Our results depend on a new Gowers inverse theorem by Tao and Ziegler for low characteristic fields that decomposes any polynomial with large Gowers norm into a function of low-degree non-classical polynomials. We establish a new equidistribution result for high rank non-classical polynomials that drives the proofs of both the testability results and the local characterization of degree-structural properties.
△ Less
Submitted 17 January, 2013; v1 submitted 16 December, 2012;
originally announced December 2012.
-
Lower Bounds on Testing Functions of Low Fourier Degree
Authors:
Pooya Hatami
Abstract:
We consider the problem of testing whether a Boolean function has Fourier degree $\leq k$ or it is $ε$-far from any Boolean function with Fourier degree $\leq k$. We improve the known lower bound of $Ω(k)$ \cite{BBM11,CGM10}, to $Ω(k/\sqrtε)$. The lower bound uses the recently discovered connections between property testing and communication complexity by Blais \textit{et. al.} \cite{BBM11}
We consider the problem of testing whether a Boolean function has Fourier degree $\leq k$ or it is $ε$-far from any Boolean function with Fourier degree $\leq k$. We improve the known lower bound of $Ω(k)$ \cite{BBM11,CGM10}, to $Ω(k/\sqrtε)$. The lower bound uses the recently discovered connections between property testing and communication complexity by Blais \textit{et. al.} \cite{BBM11}
△ Less
Submitted 24 August, 2013; v1 submitted 15 February, 2012;
originally announced February 2012.
-
Variations on the Sensitivity Conjecture
Authors:
Pooya Hatami,
Raghav Kulkarni,
Denis Pankratov
Abstract:
We present a selection of known as well as new variants of the Sensitivity Conjecture and point out some weaker versions that are also open.
We present a selection of known as well as new variants of the Sensitivity Conjecture and point out some weaker versions that are also open.
△ Less
Submitted 1 November, 2010;
originally announced November 2010.
-
On The Signed Edge Domination Number of Graphs
Authors:
Saeed Akbari,
Sadegh Bolouki,
Pooya Hatami,
Milad Siami
Abstract:
Let $γ'_s(G)$ be the signed edge domination number of G. In 2006, Xu conjectured that: for any $2$-connected graph G of order $ n (n \geq 2),$ $γ'_s(G)\geq 1$. In this article we show that this conjecture is not true. More precisely, we show that for any positive integer $m$, there exists an $m$-connected graph $G$ such that $ γ'_s(G)\leq -\frac{m}{6}|V(G)|.$ Also for every two natural numbers…
▽ More
Let $γ'_s(G)$ be the signed edge domination number of G. In 2006, Xu conjectured that: for any $2$-connected graph G of order $ n (n \geq 2),$ $γ'_s(G)\geq 1$. In this article we show that this conjecture is not true. More precisely, we show that for any positive integer $m$, there exists an $m$-connected graph $G$ such that $ γ'_s(G)\leq -\frac{m}{6}|V(G)|.$ Also for every two natural numbers $m$ and $n$, we determine $γ'_s(K_{m,n})$, where $K_{m,n}$ is the complete bipartite graph with part sizes $m$ and $n$.
△ Less
Submitted 19 August, 2010;
originally announced August 2010.
-
An approximation algorithm for the total cover problem
Authors:
Pooya Hatami
Abstract:
We introduce a $2$-approximation algorithm for the minimum total covering number problem.
We introduce a $2$-approximation algorithm for the minimum total covering number problem.
△ Less
Submitted 19 August, 2010;
originally announced August 2010.
-
On minimum vertex cover of generalized Petersen graphs
Authors:
Babak Behsaz,
Pooya Hatami,
Ebadollah S. Mahmoodian
Abstract:
For natural numbers $n$ and $k$ ($n > 2k$), a generalized Petersen graph $P(n,k)$, is defined by vertex set $\lbrace u_i,v_i\rbrace$ and edge set $\lbrace u_iu_{i+1},u_iv_i,v_iv_{i+k}\rbrace$; where $i = 1,2,\dots,n$ and subscripts are reduced modulo $n$. Here first, we characterize minimum vertex covers in generalized Petersen graphs. Second, we present a lower bound and some upper bounds for…
▽ More
For natural numbers $n$ and $k$ ($n > 2k$), a generalized Petersen graph $P(n,k)$, is defined by vertex set $\lbrace u_i,v_i\rbrace$ and edge set $\lbrace u_iu_{i+1},u_iv_i,v_iv_{i+k}\rbrace$; where $i = 1,2,\dots,n$ and subscripts are reduced modulo $n$. Here first, we characterize minimum vertex covers in generalized Petersen graphs. Second, we present a lower bound and some upper bounds for $β(P(n,k))$, the size of minimum vertex cover of $P(n,k)$. Third, in some cases, we determine the exact values of $β(P(n,k))$. Our conjecture is that $β(P(n,k)) \le n + \lceil\frac{n}{5}\rceil$, for all $n$ and $k$.
△ Less
Submitted 19 August, 2010;
originally announced August 2010.