-
Does elastic stress modify the equilibrium corner angle?
Authors:
Weiqi Wang,
Brian J. Spencer
Abstract:
We consider the influence of elasticity and anisotropic surface energy on the energy-minimizing shape of a two-dimensional void under biaxial loading. In particular, we consider void shapes with corners for which the strain energy density is singular at the corner. The elasticity problem is formulated as a boundary integral equation using complex potentials. By incorporating the asymptotic behavio…
▽ More
We consider the influence of elasticity and anisotropic surface energy on the energy-minimizing shape of a two-dimensional void under biaxial loading. In particular, we consider void shapes with corners for which the strain energy density is singular at the corner. The elasticity problem is formulated as a boundary integral equation using complex potentials. By incorporating the asymptotic behavior of the singular elastic fields at corners of the void, we develop a numerical spectral method for determining the stress for a class of arbitrary void shapes and corner angles. We minimize the total energy of surface energy and elastic potential energy using calculus of variations to obtain an Euler-Lagrange equation on the boundary that is coupled to the elastic field. The shape of the void boundary is determined using a numerical spectral method that simultaneously determines the equilibrium void shape and singular elastic fields. Our results show that the precise corner angles that minimize the total energy are not affected by the presence of the singular elastic fields. However, the stress singularity on the void surface at the corner must be balanced by a singularity in the curvature at the corner that effectively changes the macroscopic geometry of the shape and effectively changes the apparent corner angle. These results reconcile the apparent contradiction regarding the effect of elasticity on equilibrium corner angles in the results of Srolovitz and Davis (2001) and Siegel, Miksis and Voorhees (2004), and identify an important nontrivial singular behavior associated with corners on free-boundary elasticity problems.
△ Less
Submitted 7 April, 2022; v1 submitted 5 February, 2022;
originally announced February 2022.
-
Numerical solution for the stress near a hole with corners in an infinite plate under biaxial loading
Authors:
Weiqi Wang,
Brian J. Spencer
Abstract:
We consider the elastic stress near a hole with corners in an infinite plate under biaxial stress. The elasticity problem is formulated using complex Goursat functions, resulting in a set of singular integro-differential equations on the boundary. The resulting boundary integral equations are solved numerically using a Chebyshev collocation method which is augmented by a fractional power term, der…
▽ More
We consider the elastic stress near a hole with corners in an infinite plate under biaxial stress. The elasticity problem is formulated using complex Goursat functions, resulting in a set of singular integro-differential equations on the boundary. The resulting boundary integral equations are solved numerically using a Chebyshev collocation method which is augmented by a fractional power term, derived by asymptotic analysis of the corner region, to resolve stress singularities at corners of the hole. We apply our numerical method to the test case of the hole formed by two partially-overlap** circles, which can include either a corner pointing into the solid or a corner pointing out of the solid. Our numerical results recover the exact stress on the boundary to within relative error $10^{-3}$ for modest computational effort.
△ Less
Submitted 20 October, 2020; v1 submitted 9 February, 2020;
originally announced February 2020.
-
On-Line Balancing of Random Inputs
Authors:
Nikhil Bansal,
Joel H. Spencer
Abstract:
We consider an online vector balancing game where vectors $v_t$, chosen uniformly at random in $\{-1,+1\}^n$, arrive over time and a sign $x_t \in \{-1,+1\}$ must be picked immediately upon the arrival of $v_t$. The goal is to minimize the $L^\infty$ norm of the signed sum $\sum_t x_t v_t$. We give an online strategy for picking the signs $x_t$ that has value $O(n^{1/2})$ with high probability. Up…
▽ More
We consider an online vector balancing game where vectors $v_t$, chosen uniformly at random in $\{-1,+1\}^n$, arrive over time and a sign $x_t \in \{-1,+1\}$ must be picked immediately upon the arrival of $v_t$. The goal is to minimize the $L^\infty$ norm of the signed sum $\sum_t x_t v_t$. We give an online strategy for picking the signs $x_t$ that has value $O(n^{1/2})$ with high probability. Up to constants, this is the best possible even when the vectors are given in advance.
△ Less
Submitted 12 July, 2020; v1 submitted 16 March, 2019;
originally announced March 2019.
-
Chan-Vese Reformulation for Selective Image Segmentation
Authors:
Michael Roberts,
Jack Spencer
Abstract:
Selective segmentation involves incorporating user input to partition an image into foreground and background, by discriminating between objects of a similar type. Typically, such methods involve introducing additional constraints to generic segmentation approaches. However, we show that this is often inconsistent with respect to common assumptions about the image. The proposed method introduces a…
▽ More
Selective segmentation involves incorporating user input to partition an image into foreground and background, by discriminating between objects of a similar type. Typically, such methods involve introducing additional constraints to generic segmentation approaches. However, we show that this is often inconsistent with respect to common assumptions about the image. The proposed method introduces a new fitting term that is more useful in practice than the Chan-Vese framework. In particular, the idea is to define a term that allows for the background to consist of multiple regions of inhomogeneity. We provide comparitive experimental results to alternative approaches to demonstrate the advantages of the proposed method, broadening the possible application of these methods.
△ Less
Submitted 5 July, 2019; v1 submitted 21 November, 2018;
originally announced November 2018.
-
A Restricted-Domain Dual Formulation for Two-Phase Image Segmentation
Authors:
Jack Spencer
Abstract:
In two-phase image segmentation, convex relaxation has allowed global minimisers to be computed for a variety of data fitting terms. Many efficient approaches exist to compute a solution quickly. However, we consider whether the nature of the data fitting in this formulation allows for reasonable assumptions to be made about the solution that can improve the computational performance further. In p…
▽ More
In two-phase image segmentation, convex relaxation has allowed global minimisers to be computed for a variety of data fitting terms. Many efficient approaches exist to compute a solution quickly. However, we consider whether the nature of the data fitting in this formulation allows for reasonable assumptions to be made about the solution that can improve the computational performance further. In particular, we employ a well known dual formulation of this problem and solve the corresponding equations in a restricted domain. We present experimental results that explore the dependence of the solution on this restriction and quantify imrovements in the computational performance. This approach can be extended to analogous methods simply and could provide an efficient alternative for problems of this type.
△ Less
Submitted 30 July, 2018;
originally announced July 2018.
-
Preferential Attachment When Stable
Authors:
Svante Janson,
Subhabrata Sen,
Joel Spencer
Abstract:
We study an urn process with two urns, initialized with a ball each. Balls are added sequentially, the urn being chosen independently with probability proportional to the $α^{th}$ power $(α>1)$ of the existing number of balls. We study the (rare) event that the urn compositions are balanced after the addition of $2n-2$ new balls. We derive precise asymptotics of the probability of this event by em…
▽ More
We study an urn process with two urns, initialized with a ball each. Balls are added sequentially, the urn being chosen independently with probability proportional to the $α^{th}$ power $(α>1)$ of the existing number of balls. We study the (rare) event that the urn compositions are balanced after the addition of $2n-2$ new balls. We derive precise asymptotics of the probability of this event by embedding the process in continuous time. Quite surprisingly, a fine control on this probability may be leveraged to derive a lower tail Large Deviation Principle (LDP) for $L = \sum_{i=1}^{n} \frac{S_i^2}{i^2}$, where $\{S_n : n \geq 0\}$ is a simple symmetric random walk started at zero. We provide an alternate proof of the LDP via coupling to Brownian motion, and subsequent derivation of the LDP for a continuous time analogue of $L$. Finally, we turn our attention back to the urn process conditioned to be balanced, and provide a functional limit law describing the trajectory of the urn process.
△ Less
Submitted 27 May, 2018;
originally announced May 2018.
-
Second order logic on random rooted trees
Authors:
Alexander E. Holroyd,
Avi Levy,
Moumanti Podder,
Joel Spencer
Abstract:
We address questions of logic and expressibility in the context of random rooted trees. Infiniteness of a rooted tree is not expressible as a first order sentence, but is expressible as an existential monadic second order sentence (EMSO). On the other hand, finiteness is not expressible as an EMSO. For a broad class of random tree models, including Galton-Watson trees with offspring distributions…
▽ More
We address questions of logic and expressibility in the context of random rooted trees. Infiniteness of a rooted tree is not expressible as a first order sentence, but is expressible as an existential monadic second order sentence (EMSO). On the other hand, finiteness is not expressible as an EMSO. For a broad class of random tree models, including Galton-Watson trees with offspring distributions that have full support, we prove the stronger statement that finiteness does not agree up to a null set with any EMSO. We construct a finite tree and a non-null set of infinite trees that cannot be distinguished from each other by any EMSO of given parameters. This is proved via set-pebble Ehrenfeucht games (where an initial colouring round is followed by a given number of pebble rounds).
△ Less
Submitted 19 June, 2017;
originally announced June 2017.
-
Galton-Watson Probability Contraction
Authors:
Moumanti Podder,
Joel Spencer
Abstract:
We are concerned with exploring the probabilities of first order statements for Galton-Watson trees with $Poisson(c)$ offspring distribution. Fixing a positive integer $k$, we exploit the $k$-move Ehrenfeucht game on rooted trees for this purpose. Let $Σ$, indexed by $1 \leq j \leq m$, denote the finite set of equivalence classes arising out of this game, and $D$ the set of all probability distrib…
▽ More
We are concerned with exploring the probabilities of first order statements for Galton-Watson trees with $Poisson(c)$ offspring distribution. Fixing a positive integer $k$, we exploit the $k$-move Ehrenfeucht game on rooted trees for this purpose. Let $Σ$, indexed by $1 \leq j \leq m$, denote the finite set of equivalence classes arising out of this game, and $D$ the set of all probability distributions over $Σ$. Let $x_{j}(c)$ denote the true probability of the class $j \in Σ$ under $Poisson(c)$ regime, and $\vec{x}(c)$ the true probability vector over all the equivalence classes. Then we are able to define a natural recursion function $Γ$, and a map $Ψ= Ψ_{c}: D \rightarrow D$ such that $\vec{x}(c)$ is a fixed point of $Ψ_{c}$, and starting with any distribution $\vec{x} \in D$, we converge to this fixed point via $Ψ$ because it is a contraction. We show this both for $c \leq 1$ and $c > 1$, though the techniques for these two ranges are quite different.
△ Less
Submitted 7 January, 2016; v1 submitted 23 December, 2015;
originally announced December 2015.
-
First Order Probabilities For Galton-Watson Trees
Authors:
Joel Spencer,
Moumanti Podder
Abstract:
In the regime of Galton-Watson trees, first order logic statements are roughly equivalent to examining the presence of specific finite subtrees. We consider the space of all trees with Poisson offspring distribution and show that such finite subtrees will be almost surely present when the tree is infinite. Introducing the notion of universal trees, we show that all first order sentences of quantif…
▽ More
In the regime of Galton-Watson trees, first order logic statements are roughly equivalent to examining the presence of specific finite subtrees. We consider the space of all trees with Poisson offspring distribution and show that such finite subtrees will be almost surely present when the tree is infinite. Introducing the notion of universal trees, we show that all first order sentences of quantifier depth $k$ depend only on local neighbourhoods of the root of sufficiently large radius depending on $k$. We compute the probabilities of these neighbourhoods conditioned on the tree being infinite. We give an almost sure theory for infinite trees.
△ Less
Submitted 5 December, 2016; v1 submitted 29 October, 2015;
originally announced October 2015.
-
Heat diffusion with frozen boundary
Authors:
Laura Florescu,
Shirshendu Ganguly,
Yuval Peres,
Joel Spencer
Abstract:
Consider "Frozen Random Walk" on $\mathbb{Z}$: $n$ particles start at the origin. At any discrete time, the leftmost and rightmost $\lfloor{\frac{n}{4}}\rfloor$ particles are "frozen" and do not move. The rest of the particles in the "bulk" independently jump to the left and right uniformly. The goal of this note is to understand the limit of this process under scaling of mass and time. To this en…
▽ More
Consider "Frozen Random Walk" on $\mathbb{Z}$: $n$ particles start at the origin. At any discrete time, the leftmost and rightmost $\lfloor{\frac{n}{4}}\rfloor$ particles are "frozen" and do not move. The rest of the particles in the "bulk" independently jump to the left and right uniformly. The goal of this note is to understand the limit of this process under scaling of mass and time. To this end we study the following deterministic mass splitting process: start with mass $1$ at the origin. At each step the extreme quarter mass on each side is "frozen". The remaining "free" mass in the center evolves according to the discrete heat equation. We establish diffusive behavior of this mass evolution and identify the scaling limit under the assumption of its existence. It is natural to expect the limit to be a truncated Gaussian. A naive guess for the truncation point might be the $1/4$ quantile points on either side of the origin. We show that this is not the case and it is in fact determined by the evolution of the second moment of the mass distribution.
△ Less
Submitted 30 March, 2015;
originally announced March 2015.
-
Queuing with future information
Authors:
Joel Spencer,
Madhu Sudan,
Kuang Xu
Abstract:
We study an admissions control problem, where a queue with service rate $1-p$ receives incoming jobs at rate $λ\in(1-p,1)$, and the decision maker is allowed to redirect away jobs up to a rate of $p$, with the objective of minimizing the time-average queue length. We show that the amount of information about the future has a significant impact on system performance, in the heavy-traffic regime. Wh…
▽ More
We study an admissions control problem, where a queue with service rate $1-p$ receives incoming jobs at rate $λ\in(1-p,1)$, and the decision maker is allowed to redirect away jobs up to a rate of $p$, with the objective of minimizing the time-average queue length. We show that the amount of information about the future has a significant impact on system performance, in the heavy-traffic regime. When the future is unknown, the optimal average queue length diverges at rate $\sim\log_{1/(1-p)}\frac{1}{1-λ}$, as $λ\to 1$. In sharp contrast, when all future arrival and service times are revealed beforehand, the optimal average queue length converges to a finite constant, $(1-p)/p$, as $λ\to1$. We further show that the finite limit of $(1-p)/p$ can be achieved using only a finite lookahead window starting from the current time frame, whose length scales as $\mathcal{O}(\log\frac{1}{1-λ})$, as $λ\to1$. This leads to the conjecture of an interesting duality between queuing delay and the amount of information about the future.
△ Less
Submitted 2 July, 2014; v1 submitted 3 November, 2012;
originally announced November 2012.
-
On the length of a random minimum spanning tree
Authors:
Colin Cooper,
Alan Frieze,
Nate Ince,
Svante Janson,
Joel Spencer
Abstract:
We study the expected value of the length $L_n$ of the minimum spanning tree of the complete graph $K_n$ when each edge $e$ is given an independent uniform $[0,1]$ edge weight. We sharpen the result of Frieze \cite{F1} that $\lim_{n\to\infty}\E(L_n)=\z(3)$ and show that $\E(L_n)=\z(3)+\frac{c_1}{n}+\frac{c_2+o(1)}{n^{4/3}}$ where $c_1,c_2$ are explicitly defined constants.
We study the expected value of the length $L_n$ of the minimum spanning tree of the complete graph $K_n$ when each edge $e$ is given an independent uniform $[0,1]$ edge weight. We sharpen the result of Frieze \cite{F1} that $\lim_{n\to\infty}\E(L_n)=\z(3)$ and show that $\E(L_n)=\z(3)+\frac{c_1}{n}+\frac{c_2+o(1)}{n^{4/3}}$ where $c_1,c_2$ are explicitly defined constants.
△ Less
Submitted 9 March, 2013; v1 submitted 25 August, 2012;
originally announced August 2012.
-
The Bohman-Frieze Process Near Criticality
Authors:
Mihyun Kang,
Will Perkins,
Joel Spencer
Abstract:
The Erdős-Rényi process begins with an empty graph on n vertices and edges are added randomly one at a time to a graph. A classical result of Erdős and Rényi states that the Erdős-Rényi process undergoes a phase transition, which takes place when the number of edges reaches n/2 (we say at time 1) and a giant component emerges. Since this seminal work of Erdős and Rényi, various random graph models…
▽ More
The Erdős-Rényi process begins with an empty graph on n vertices and edges are added randomly one at a time to a graph. A classical result of Erdős and Rényi states that the Erdős-Rényi process undergoes a phase transition, which takes place when the number of edges reaches n/2 (we say at time 1) and a giant component emerges. Since this seminal work of Erdős and Rényi, various random graph models have been introduced and studied. In this paper we study the so-called Bohman-Frieze process, a simple modification of the Erdős-Rényi process. The Bohman-Frieze process begins with an empty graph on n vertices. At each step two random edges are present and if the first edge would join two isolated vertices, it is added to a graph; otherwise the second edge is added. We present several new results on the phase transition of the Bohman-Frieze random graph process. We show that the Bohman-Frieze process has a qualitatively similar phase transition to the Erdős-Rényi process in terms of the size and structure of the components near the critical point. We prove that all components at time t_c-\eps (that is, when the number of edges are (t_c-\eps) n/2) are trees or unicyclic components and that the largest component is of size Ω(\eps^{-2} \log n). Further, at t_c + \eps, all components apart from the giant component are trees or unicyclic and the size of the second-largest component is Θ(\eps^{-2} \log n). Each of these results corresponds to an analogous well-known result for the Erdős-Rényi process. Our methods include combinatorial arguments and a combination of the differential equation method for random processes with singularity analysis of generating functions which satisfy quasi-linear partial differential equations.
△ Less
Submitted 15 May, 2012; v1 submitted 2 June, 2011;
originally announced June 2011.
-
Deterministic Random Walks on Regular Trees
Authors:
Joshua Cooper,
Benjamin Doerr,
Tobias Friedrich,
Joel Spencer
Abstract:
Jim Propp's rotor router model is a deterministic analogue of a random walk on a graph. Instead of distributing chips randomly, each vertex serves its neighbors in a fixed order.
Cooper and Spencer (Comb. Probab. Comput. (2006)) show a remarkable similarity of both models. If an (almost) arbitrary population of chips is placed on the vertices of a grid $\Z^d$ and does a simultaneous walk in the…
▽ More
Jim Propp's rotor router model is a deterministic analogue of a random walk on a graph. Instead of distributing chips randomly, each vertex serves its neighbors in a fixed order.
Cooper and Spencer (Comb. Probab. Comput. (2006)) show a remarkable similarity of both models. If an (almost) arbitrary population of chips is placed on the vertices of a grid $\Z^d$ and does a simultaneous walk in the Propp model, then at all times and on each vertex, the number of chips on this vertex deviates from the expected number the random walk would have gotten there by at most a constant. This constant is independent of the starting configuration and the order in which each vertex serves its neighbors.
This result raises the question if all graphs do have this property. With quite some effort, we are now able to answer this question negatively. For the graph being an infinite $k$-ary tree ($k \ge 3$), we show that for any deviation $D$ there is an initial configuration of chips such that after running the Propp model for a certain time there is a vertex with at least $D$ more chips than expected in the random walk model. However, to achieve a deviation of $D$ it is necessary that at least $\exp(Ω(D^2))$ vertices contribute by being occupied by a number of chips not divisible by $k$ at a certain time.
△ Less
Submitted 7 June, 2010;
originally announced June 2010.
-
Phase transitions for modified Erdös-Rényi processes
Authors:
Svante Janson,
Joel Spencer
Abstract:
A fundamental and very well studied region of the Erdös-Rényi process is the phase transition at n/2 edges in which a giant component suddenly appears. We examine the process beginning with an initial graph. We further examine the Bohman-Frieze process in which edges between isolated vertices are more likely. While the positions of the phase transitions vary, the three processes belong, roughly sp…
▽ More
A fundamental and very well studied region of the Erdös-Rényi process is the phase transition at n/2 edges in which a giant component suddenly appears. We examine the process beginning with an initial graph. We further examine the Bohman-Frieze process in which edges between isolated vertices are more likely. While the positions of the phase transitions vary, the three processes belong, roughly speaking, to the same universality class. In particular, the growth of the giant component in the barely supercritical region is linear in all cases.
△ Less
Submitted 25 May, 2010;
originally announced May 2010.
-
The second largest component in the supercritical 2D Hamming graph
Authors:
Remco van der Hofstad,
Malwina J. Luczak,
Joel Spencer
Abstract:
The 2-dimensional Hamming graph H(2,n) consists of the $n^2$ vertices $(i,j)$, $1\leq i,j\leq n$, two vertices being adjacent when they share a common coordinate. We examine random subgraphs of H(2,n) in percolation with edge probability $p$, so that the average degree $2(n-1)p=1+ε$. Previous work by van der Hofstad and Luczak had shown that in the barely supercritical region…
▽ More
The 2-dimensional Hamming graph H(2,n) consists of the $n^2$ vertices $(i,j)$, $1\leq i,j\leq n$, two vertices being adjacent when they share a common coordinate. We examine random subgraphs of H(2,n) in percolation with edge probability $p$, so that the average degree $2(n-1)p=1+ε$. Previous work by van der Hofstad and Luczak had shown that in the barely supercritical region $n^{-2/3}\ln^{1/3}n\ll ε\ll 1$ the largest component has size $\sim 2εn$. Here we show that the second largest component has size close to $ε^{-2}$, so that the dominant component has emerged. This result also suggests that a {\it discrete duality principle} might hold, whereby, after removing the largest connected component in the supercritical regime, the remaining random subgraphs behave as in the subcritical regime.
△ Less
Submitted 5 January, 2009; v1 submitted 10 January, 2008;
originally announced January 2008.
-
Deterministic Random Walks on the Integers
Authors:
Joshua Cooper,
Benjamin Doerr,
Joel Spencer,
Gabor Tardos
Abstract:
Jim Propp's P-machine, also known as the "rotor router model" is a simple deterministic process that simulates a random walk on a graph. Instead of distributing chips to randomly chosen neighbors, it serves the neighbors in a fixed order.
We investigate how well this process simulates a random walk. For the graph being the infinite path, we show that, independent of the starting configuration,…
▽ More
Jim Propp's P-machine, also known as the "rotor router model" is a simple deterministic process that simulates a random walk on a graph. Instead of distributing chips to randomly chosen neighbors, it serves the neighbors in a fixed order.
We investigate how well this process simulates a random walk. For the graph being the infinite path, we show that, independent of the starting configuration, at each time and on each vertex, the number of chips on this vertex deviates from the expected number of chips in the random walk model by at most a constant c_1, which is approximately 2.29. For intervals of length L, this improves to a difference of O(log L), for the L_2 average of a contiguous set of intervals even to O(sqrt{log L}). All these bounds are tight.
△ Less
Submitted 14 February, 2006;
originally announced February 2006.
-
Avoiding defeat in a balls-in-bins process with feedback
Authors:
Roberto Oliveira,
Joel Spencer
Abstract:
Imagine that there are two bins to which balls are added sequentially, and each incoming ball joins a bin with probability proportional to the p-th power of the number of balls already there. A general result says that if p>1/2, there almost surely is some bin that will have more balls than the other at all large enough times, a property that we call eventual leadership.
In this paper, we comp…
▽ More
Imagine that there are two bins to which balls are added sequentially, and each incoming ball joins a bin with probability proportional to the p-th power of the number of balls already there. A general result says that if p>1/2, there almost surely is some bin that will have more balls than the other at all large enough times, a property that we call eventual leadership.
In this paper, we compute the asymptotics of the probability that bin 1 eventually leads when the total initial number of balls $t$ is large and bin 1 has a fraction α<1/2 of the balls; in fact, this probability is \exp(c_p(α)t + O{t^{2/3}}) for some smooth, strictly negative function c_p. Moreover, we show that conditioned on this unlikely event, the fraction of balls in the first bin can be well-approximated by the solution to a certain ordinary differential equation.
△ Less
Submitted 1 November, 2005; v1 submitted 30 October, 2005;
originally announced October 2005.
-
Connectivity transitions in networks with super-linear preferential attachment
Authors:
Roberto Oliveira,
Joel Spencer
Abstract:
We analyze an evolving network model of Krapivsky and Redner in which new nodes arrive sequentially, each connecting to a previously existing node b with probability proportional to the p-th power of the in-degree of b. We restrict to the super-linear case p>1. When 1+1/k< p \leq 1 + 1/(k-1) the structure of the final countable tree is determined. There is a finite tree T with distinguished v (w…
▽ More
We analyze an evolving network model of Krapivsky and Redner in which new nodes arrive sequentially, each connecting to a previously existing node b with probability proportional to the p-th power of the in-degree of b. We restrict to the super-linear case p>1. When 1+1/k< p \leq 1 + 1/(k-1) the structure of the final countable tree is determined. There is a finite tree T with distinguished v (which has a limiting distribution) on which is "glued" a specific infinite tree. v has an infinite number of children, an infinite number of which have k-1 children, and there are only a finite number of nodes (possibly only v) with k or more children. Our basic technique is to embed the discrete process in a continuous time process using exponential random variables, a technique that has previously been employed in the study of balls-in-bins processes with feedback.
△ Less
Submitted 20 October, 2005;
originally announced October 2005.
-
First Order Definability of Trees and Sparse Random Graphs
Authors:
Tom Bohman,
Alan Frieze,
Tomasz Luczak,
Oleg Pikhurko,
Clifford Smyth,
Joel Spencer,
Oleg Verbitsky
Abstract:
Let D(G) be the smallest quantifier depth of a first order formula which is true for a graph G but false for any other non-isomorphic graph. This can be viewed as a measure for the first order descriptive complexity of G.
We will show that almost surely D(G)=Θ(\ln n/\ln\ln n), where G is a random tree of order n or the giant component of a random graph G(n,c/n) with constant c>1. These results…
▽ More
Let D(G) be the smallest quantifier depth of a first order formula which is true for a graph G but false for any other non-isomorphic graph. This can be viewed as a measure for the first order descriptive complexity of G.
We will show that almost surely D(G)=Θ(\ln n/\ln\ln n), where G is a random tree of order n or the giant component of a random graph G(n,c/n) with constant c>1. These results rely on computing the maximum of D(T) for a tree T of order n and maximum degree l, so we study this problem as well.
△ Less
Submitted 15 June, 2005;
originally announced June 2005.
-
A point process describing the component sizes in the critical window of the random graph evolution
Authors:
Svante Janson,
Joel Spencer
Abstract:
We study a point process describing the asymptotic behavior of sizes of the largest components of the random graph G(n,p) in the critical window p=n^{-1}+lambda n^{-4/3}. In particular, we show that this point process has a surprising rigidity. Fluctuations in the large values will be balanced by opposite fluctuations in the small values such that the sum of the values larger than a small epsilo…
▽ More
We study a point process describing the asymptotic behavior of sizes of the largest components of the random graph G(n,p) in the critical window p=n^{-1}+lambda n^{-4/3}. In particular, we show that this point process has a surprising rigidity. Fluctuations in the large values will be balanced by opposite fluctuations in the small values such that the sum of the values larger than a small epsilon is almost constant.
△ Less
Submitted 25 May, 2005;
originally announced May 2005.
-
Counting Connected Graphs Asymptotically
Authors:
Remco van der Hofstad,
Joel Spencer
Abstract:
We find the asymptotic number of connected graphs with $k$ vertices and $k-1+l$ edges when $k,l$ approach infinity, reproving a result of Bender, Canfield and McKay. We use the {\em probabilistic method}, analyzing breadth-first search on the random graph $G(k,p)$ for an appropriate edge probability $p$. Central is analysis of a random walk with fixed beginning and end which is tilted to the lef…
▽ More
We find the asymptotic number of connected graphs with $k$ vertices and $k-1+l$ edges when $k,l$ approach infinity, reproving a result of Bender, Canfield and McKay. We use the {\em probabilistic method}, analyzing breadth-first search on the random graph $G(k,p)$ for an appropriate edge probability $p$. Central is analysis of a random walk with fixed beginning and end which is tilted to the left.
△ Less
Submitted 28 February, 2005;
originally announced February 2005.
-
Definitions with no quantifier alternation
Authors:
Oleg Pikhurko,
Joel Spencer,
Oleg Verbitsky
Abstract:
Let $D(G)$ be the minimum quantifier depth of a first order sentence $Φ$ that defines a graph $G$ up to isomorphism. Let $D_0(G)$ be the version of $D(G)$ where we do not allow quantifier alternations in $Φ$. Define $q_0(n)$ to be the minimum of $D_0(G)$ over all graphs $G$ of order $n$. We prove that for all $n$ we have $\log^*n-\log^*\log^*n-1\le q_0(n)\le \log^*n+22$, where $\log^*n$ is equal…
▽ More
Let $D(G)$ be the minimum quantifier depth of a first order sentence $Φ$ that defines a graph $G$ up to isomorphism. Let $D_0(G)$ be the version of $D(G)$ where we do not allow quantifier alternations in $Φ$. Define $q_0(n)$ to be the minimum of $D_0(G)$ over all graphs $G$ of order $n$. We prove that for all $n$ we have $\log^*n-\log^*\log^*n-1\le q_0(n)\le \log^*n+22$, where $\log^*n$ is equal to the minimum number of iterations of the binary logarithm needed to bring $n$ to 1 or below. The upper bound is obtained by constructing special graphs with modular decomposition of very small depth.
△ Less
Submitted 22 December, 2005; v1 submitted 17 May, 2004;
originally announced May 2004.
-
Simulating a Random Walk with Constant Error
Authors:
Joshua N. Cooper,
Joel Spencer
Abstract:
We analyze Jim Propp's P-machine, a simple deterministic process that simulates a random walk on $Z^d$ to within a constant. The proof of the error bound relies on several estimates in the theory of simple random walks and some careful summing. We mention three intriguing conjectures concerning sign-changes and unimodality of functions in the linear span of $\{p(\cdot,x) : x \in Z^d\}$, where…
▽ More
We analyze Jim Propp's P-machine, a simple deterministic process that simulates a random walk on $Z^d$ to within a constant. The proof of the error bound relies on several estimates in the theory of simple random walks and some careful summing. We mention three intriguing conjectures concerning sign-changes and unimodality of functions in the linear span of $\{p(\cdot,x) : x \in Z^d\}$, where $p(n,x)$ is the probability that a walk beginning from the origin arrives at $x$ at time $n$.
△ Less
Submitted 12 April, 2004; v1 submitted 19 February, 2004;
originally announced February 2004.
-
Succinct Definitions in the First Order Theory of Graphs
Authors:
Oleg Pikhurko,
Joel Spencer,
Oleg Verbitsky
Abstract:
We say that a first order sentence A defines a graph G if A is true on G but false on any graph non-isomorphic to G. Let L(G) (resp. D(G)) denote the minimum length (resp. quantifier rank) of a such sentence. We define the succinctness function s(n) (resp. its variant q(n)) to be the minimum L(G) (resp. D(G)) over all graphs on n vertices.
We prove that s(n) and q(n) may be so small that for n…
▽ More
We say that a first order sentence A defines a graph G if A is true on G but false on any graph non-isomorphic to G. Let L(G) (resp. D(G)) denote the minimum length (resp. quantifier rank) of a such sentence. We define the succinctness function s(n) (resp. its variant q(n)) to be the minimum L(G) (resp. D(G)) over all graphs on n vertices.
We prove that s(n) and q(n) may be so small that for no general recursive function f we can have f(s(n))\ge n for all n. However, for the function q^*(n)=\max_{i\le n}q(i), which is the least monotone nondecreasing function bounding q(n) from above, we have q^*(n)=(1+o(1))\log^*n, where \log^*n equals the minimum number of iterations of the binary logarithm sufficient to lower n below 1.
We show an upper bound q(n)<\log^*n+5 even under the restriction of the class of graphs to trees. Under this restriction, for q(n) we also have a matching lower bound.
We show a relationship D(G)\ge(1-o(1))\log^*L(G) and prove, using the upper bound for q(n), that this relationship is tight.
For a non-negative integer a, let D_a(G) and q_a(n) denote the analogs of D(G) and q(n) for defining formulas in the negation normal form with at most a quantifier alternations in any sequence of nested quantifiers. We show a superrecursive gap between D_0(G) and D_3(G) and hence between D_0(G) and D(G). Despite it, for q_0(n) we still have a kind of log-star upper bound: q_0(n)\le2\log^*n+O(1) for infinitely many n.
△ Less
Submitted 30 March, 2004; v1 submitted 22 January, 2004;
originally announced January 2004.
-
How Complex are Random Graphs in First Order Logic?
Authors:
Jeong Han Kim,
Oleg Pikhurko,
Joel Spencer,
Oleg Verbitsky
Abstract:
It is not hard to write a first order formula which is true for a given graph G but is false for any graph not isomorphic to G. The smallest number $(G) of nested quantifiers in a such formula can serve as a measure for the ``first order complexity'' of G.
Here, this parameter is studied for random graphs. We determine it asymptotically when the edge probability p is constant; in fact, D(G) is…
▽ More
It is not hard to write a first order formula which is true for a given graph G but is false for any graph not isomorphic to G. The smallest number $(G) of nested quantifiers in a such formula can serve as a measure for the ``first order complexity'' of G.
Here, this parameter is studied for random graphs. We determine it asymptotically when the edge probability p is constant; in fact, D(G) is of order log n then. For very sparse graphs its magnitude is Θ(n). On the other hand, for certain (carefully chosen) values of p the parameter D(G) can drop down to the very slow growing function log^* n, the inverse of the tower-function. The general picture, however, is still a mystery.
△ Less
Submitted 19 January, 2004;
originally announced January 2004.
-
Random subgraphs of finite graphs: III. The phase transition for the $n$-cube
Authors:
Christian Borgs,
Jennifer T. Chayes,
Remco van der Hofstad,
Gordon Slade,
Joel Spencer
Abstract:
We study random subgraphs of the $n$-cube $\{0,1\}^n$, where nearest-neighbor edges are occupied with probability $p$. Let $p_c(n)$ be the value of $p$ for which the expected cluster size of a fixed vertex attains the value $λ2^{n/3}$, where $λ$ is a small positive constant. Let $ε=n(p-p_c(n))$. In two previous papers, we showed that the largest cluster inside a scaling window given by…
▽ More
We study random subgraphs of the $n$-cube $\{0,1\}^n$, where nearest-neighbor edges are occupied with probability $p$. Let $p_c(n)$ be the value of $p$ for which the expected cluster size of a fixed vertex attains the value $λ2^{n/3}$, where $λ$ is a small positive constant. Let $ε=n(p-p_c(n))$. In two previous papers, we showed that the largest cluster inside a scaling window given by $|ε|=Θ(2^{-n/3})$ is of size $Θ(2^{2n/3})$, below this scaling window it is at most $2(\log2) nε^{-2}$, and above this scaling window it is at most $O(ε2^n)$. In this paper, we prove that for $p - p_c(n) \geq e^{-cn^{1/3}}$ the size of the largest cluster is at least $Θ(ε2^n)$, which is of the same order as the upper bound. This provides an understanding of the phase transition that goes far beyond that obtained by previous authors. The proof is based on a method that has come to be known as ``sprinkling,'' and relies heavily on the specific geometry of the $n$-cube.
△ Less
Submitted 8 January, 2004;
originally announced January 2004.
-
Random subgraphs of finite graphs: II. The lace expansion and the triangle condition
Authors:
Christian Borgs,
Jennifer T. Chayes,
Remco van der Hofstad,
Gordon Slade,
Joel Spencer
Abstract:
In a previous paper, we defined a version of the percolation triangle condition that is suitable for the analysis of bond percolation on a finite connected transitive graph, and showed that this triangle condition implies that the percolation phase transition has many features in common with the phase transition on the complete graph. In this paper, we use a new and simplified approach to the la…
▽ More
In a previous paper, we defined a version of the percolation triangle condition that is suitable for the analysis of bond percolation on a finite connected transitive graph, and showed that this triangle condition implies that the percolation phase transition has many features in common with the phase transition on the complete graph. In this paper, we use a new and simplified approach to the lace expansion to prove quite generally that for finite graphs that are tori the triangle condition for percolation is implied by a certain triangle condition for simple random walks on the graph.
The latter is readily verified for several graphs with vertex set $\{0,1,..., r-1\}^n$, including the Hamming cube on an alphabet of $r$ letters (the $n$-cube, for $r=2$), the $n$-dimensional torus with nearest-neighbor bonds and $n$ sufficiently large, and the $n$-dimensional torus with $n>6$ and sufficiently spread-out (long range) bonds. The conclusions of our previous paper thus apply to the percolation phase transition for each of the above examples.
△ Less
Submitted 8 January, 2004;
originally announced January 2004.
-
Random subgraphs of finite graphs: I. The scaling window under the triangle condition
Authors:
Christian Borgs,
Jennifer T. Chayes,
Remco van der Hofstad,
Gordon Slade,
Joel Spencer
Abstract:
We study random subgraphs of an arbitrary finite connected transitive graph $\mathbb G$ obtained by independently deleting edges with probability $1-p$. Let $V$ be the number of vertices in $\mathbb G$, and let $Ω$ be their degree. We define the critical threshold $p_c=p_c(\mathbb G,λ)$ to be the value of $p$ for which the expected cluster size of a fixed vertex attains the value $λV^{1/3}$, whe…
▽ More
We study random subgraphs of an arbitrary finite connected transitive graph $\mathbb G$ obtained by independently deleting edges with probability $1-p$. Let $V$ be the number of vertices in $\mathbb G$, and let $Ω$ be their degree. We define the critical threshold $p_c=p_c(\mathbb G,λ)$ to be the value of $p$ for which the expected cluster size of a fixed vertex attains the value $λV^{1/3}$, where $λ$ is fixed and positive. We show that for any such model, there is a phase transition at $p_c$ analogous to the phase transition for the random graph, provided that a quantity called the triangle diagram is sufficiently small at the threshold $p_c$. In particular, we show that the largest cluster inside a scaling window of size $|p-p_c|=Θ(\cn^{-1}V^{-1/3})$ is of size $Θ(V^{2/3})$, while below this scaling window, it is much smaller, of order $O(ε^{-2}\log(Vε^3))$, with $ε=\cn(p_c-p)$. We also obtain an upper bound $O(\cn(p-p_c)V)$ for the expected size of the largest cluster above the window. In addition, we define and analyze the percolation probability above the window and show that it is of order $Θ(\cn(p-p_c))$. Among the models for which the triangle diagram is small enough to allow us to draw these conclusions are the random graph, the $n$-cube and certain Hamming cubes, as well as the spread-out $n$-dimensional torus for $n>6$.
△ Less
Submitted 8 January, 2004;
originally announced January 2004.
-
Packing Ferrers Shapes
Authors:
Noga Alon,
Miklós Bóna,
Joel Spencer
Abstract:
Answering a question of Wilf, we show that if $n$ is sufficiently large, then one cannot cover an $n \times p(n)$ rectangle using each of the $p(n)$ distinct Ferrers shapes of size $n$ exactly once. Moreover, the maximum number of pairwise distinct, non-overlap** Ferrers shapes that can be packed in such a rectangle is only $Θ(p(n)/ \log n).$
Answering a question of Wilf, we show that if $n$ is sufficiently large, then one cannot cover an $n \times p(n)$ rectangle using each of the $p(n)$ distinct Ferrers shapes of size $n$ exactly once. Moreover, the maximum number of pairwise distinct, non-overlap** Ferrers shapes that can be packed in such a rectangle is only $Θ(p(n)/ \log n).$
△ Less
Submitted 11 December, 1998;
originally announced December 1998.
-
Uniformly distributed distances: A geometric application of Jansen's inequality
Authors:
János Pach,
Joel Spencer
Abstract:
Let $d_1\leq d_2\leq\ldots\leq d_{n\choose 2}$ denote the distances determined by $n$ points in the plane. It is shown that $\min\sum_i (d_{i+1}-d_i)^2=O(n^{-6/7})$, where the minimum is taken over all point sets with minimal distance $d_1 \geq 1$. This bound is asymptotically tight.
Let $d_1\leq d_2\leq\ldots\leq d_{n\choose 2}$ denote the distances determined by $n$ points in the plane. It is shown that $\min\sum_i (d_{i+1}-d_i)^2=O(n^{-6/7})$, where the minimum is taken over all point sets with minimal distance $d_1 \geq 1$. This bound is asymptotically tight.
△ Less
Submitted 9 May, 1996;
originally announced May 1996.
-
Asymptotically optimal covering designs
Authors:
Daniel Gordon,
Greg Kuperberg,
Oren Patashnik,
Joel Spencer
Abstract:
A (v,k,t) covering design, or covering, is a family of k-subsets, called blocks, chosen from a v-set, such that each t-subset is contained in at least one of the blocks. The number of blocks is the covering's size}, and the minimum size of such a covering is denoted by C(v,k,t). It is easy to see that a covering must contain at least (v choose t)/(k choose t) blocks, and in 1985 Rödl [European J…
▽ More
A (v,k,t) covering design, or covering, is a family of k-subsets, called blocks, chosen from a v-set, such that each t-subset is contained in at least one of the blocks. The number of blocks is the covering's size}, and the minimum size of such a covering is denoted by C(v,k,t). It is easy to see that a covering must contain at least (v choose t)/(k choose t) blocks, and in 1985 Rödl [European J. Combin. 5 (1985), 69-78] proved a long-standing conjecture of Erdős and Hanani [Publ. Math. Debrecen 10 (1963), 10-13] that for fixed k and t, coverings of size (v choose t)/(k choose t) (1+o(1)) exist (as v \to \infty).
An earlier paper by the first three authors [J. Combin. Des. 3 (1995), 269-284] gave new methods for constructing good coverings, and gave tables of upper bounds on C(v,k,t) for small v, k, and t. The present paper shows that two of those constructions are asymptotically optimal: For fixed k and t, the size of the coverings constructed matches Rödl's bound. The paper also makes the o(1) error bound explicit, and gives some evidence for a much stronger bound.
△ Less
Submitted 9 November, 1995;
originally announced November 1995.
-
Random sparse unary predicates
Authors:
Saharon Shelah,
Joel Spencer
Abstract:
The main result is the following
Theorem: Let p=p(n) be such that p(n) in [0,1] for all n and either p(n)<< n^{-1} or for some positive integer k, n^{-1/k}<< p(n)<< n^{-1/(k+1)} or for all epsilon >0, n^{- epsilon}<< p(n) and n^{- epsilon}<< 1-p(n) or for some positive integer k, n^{-1/k}<< 1-p(n)<< n^{-1/(k+1)} or 1-p(n)<< n^{-1}. Then p(n) satisfies the Zero-One Law for circular unary predic…
▽ More
The main result is the following
Theorem: Let p=p(n) be such that p(n) in [0,1] for all n and either p(n)<< n^{-1} or for some positive integer k, n^{-1/k}<< p(n)<< n^{-1/(k+1)} or for all epsilon >0, n^{- epsilon}<< p(n) and n^{- epsilon}<< 1-p(n) or for some positive integer k, n^{-1/k}<< 1-p(n)<< n^{-1/(k+1)} or 1-p(n)<< n^{-1}. Then p(n) satisfies the Zero-One Law for circular unary predicates. Inversely, if p(n) falls into none of the above categories then it does not satisfy the Zero-One Law for circular unary predicates.
△ Less
Submitted 14 January, 1994;
originally announced January 1994.
-
Can you feel the double jump?
Authors:
Saharon Shelah,
Joel Spencer
Abstract:
Paul Erdős and Alfred Renyi considered the evolution of the random graph G(n,p) as p ``evolved'' from 0 to 1. At p=1/n a sudden and dramatic change takes place in G. When p=c/n with c<1 the random G consists of small components, the largest of size Theta(log n). But by p=c/n with c>1 many of the components have ``congealed'' into a ``giant component'' of size Theta (n). Erdős and Renyi called th…
▽ More
Paul Erdős and Alfred Renyi considered the evolution of the random graph G(n,p) as p ``evolved'' from 0 to 1. At p=1/n a sudden and dramatic change takes place in G. When p=c/n with c<1 the random G consists of small components, the largest of size Theta(log n). But by p=c/n with c>1 many of the components have ``congealed'' into a ``giant component'' of size Theta (n). Erdős and Renyi called this the double jump, the terms phase transition (from the analogy to percolation) and Big Bang have also been proferred. Now imagine an observer who can only see G through a logical fog. He may refer to graph theoretic properties A within a limited logical language. Will he be able to detect the double jump? The answer depends on the strength of the language. Our rough answer to this rough question is: the double jump is not detectible in the First Order Theory of Graphs but it is detectible in the Second Order Monadic Theory of Graphs.
△ Less
Submitted 14 January, 1994;
originally announced January 1994.