ID: 1302.1162

On Sharp Thresholds of Monotone Properties: Bourgain's Proof Revisited

February 5, 2013

View on ArXiv

Similar papers 3

Bounding threshold dimension: realizing graphic Boolean functions as the AND of majority gates

February 24, 2022

80% Match
Mathew C. Francis, Atrayee Majumder, Rogers Mathew
Combinatorics

A graph $G$ on $n$ vertices is a \emph{threshold graph} if there exist real numbers $a_1,a_2, \ldots, a_n$ and $b$ such that the zero-one solutions of the linear inequality $\sum \limits_{i=1}^n a_i x_i \leq b$ are the characteristic vectors of the cliques of $G$. Introduced in [Chv{\'a}tal and Hammer, Annals of Discrete Mathematics, 1977], the \emph{threshold dimension} of a graph $G$, denoted by $\dimth(G)$, is the minimum number of threshold graphs whose intersection yield...

Find SimilarView on arXiv

The Property of Having a $k$-Regular Subgraph Has a Sharp Threshold

October 17, 2013

79% Match
Shoham Letzter
Probability
Discrete Mathematics
Combinatorics

We prove that the property of containing a $k$-regular subgraph in the random graph model $G(n,p)$ has a sharp threshold for $k\ge3$. We also show how to use similar methods to obtain an easy prove for the (known fact of) sharpness of having a non empty $k$-core for $k\ge3$.

Find SimilarView on arXiv

Combinatorial and Algorithmic Properties of One Matrix Structure at Monotone Boolean Functions

February 16, 2019

79% Match
Valentin Bakoev
Discrete Mathematics

One matrix structure in the area of monotone Boolean functions is defined here. Some of its combinatorial, algebraic and algorithmic properties are derived. On the base of these properties, three algorithms are built. First of them generates all monotone Boolean functions of $n$ variables in lexicographic order. The second one determines the first (resp. the last) lexicographically minimal true (resp. maximal false) vector of an unknown monotone function $f$ of $n$ variables....

Find SimilarView on arXiv

Algorithmic Meta-Theorems for Monotone Submodular Maximization

July 12, 2018

79% Match
Masakazu Ishihata, Takanori Maehara, Tomas Rigaux
Data Structures and Algorith...

We consider a monotone submodular maximization problem whose constraint is described by a logic formula on a graph. Formally, we prove the following three `algorithmic metatheorems.' (1) If the constraint is specified by a monadic second-order logic on a graph of bounded treewidth, the problem is solved in $n^{O(1)}$ time with an approximation factor of $O(\log n)$. (2) If the constraint is specified by a first-order logic on a graph of low degree, the problem is solved i...

Find SimilarView on arXiv

Estimating parameters associated with monotone properties

July 25, 2017

79% Match
Carlos Hoppen, Yoshiharu Kohayakawa, Richard Lang, ... , Stagni Henrique
Combinatorics
Data Structures and Algorith...

There has been substantial interest in estimating the value of a graph parameter, i.e., of a real-valued function defined on the set of finite graphs, by querying a randomly sampled substructure whose size is independent of the size of the input. Graph parameters that may be successfully estimated in this way are said to be testable or estimable, and the sample complexity $q_z=q_z(\epsilon)$ of an estimable parameter $z$ is the size of a random sample of a graph $G$ required ...

Find SimilarView on arXiv

The asymptotic $k$-SAT threshold

October 10, 2013

79% Match
Amin Coja-Oghlan, Konstantinos Panagiotou
Combinatorics
Discrete Mathematics
Probability

Since the early 2000s physicists have developed an ingenious but non-rigorous formalism called the cavity method to put forward precise conjectures on phase transitions in random problems [Mezard, Parisi, Zecchina: Science 2002]. The cavity method predicts that the satisfiability threshold in the random $k$-SAT problem is $2^k\ln2-\frac12(1+\ln 2)+\epsilon_k$, with $\lim_{k\rightarrow\infty}\epsilon_k=0$ [Mertens, Mezard, Zecchina: Random Structures and Algorithms 2006]. This...

Find SimilarView on arXiv

Improved upper and lower bound techniques for monotone switching networks for directed connectivity

February 15, 2013

79% Match
Aaron Potechin
Data Structures and Algorith...
Networking and Internet Arch...

In this paper, we analyze the monotone space of complexity of directed connectivity for a large class of input graphs $G$ using the switching network model. The upper and lower bounds we obtain are a significant generalization of previous results and the proofs involve several completely new techniques and ideas.

Find SimilarView on arXiv

Exploring the toolkit of Jean Bourgain

September 14, 2020

79% Match
Terence Tao
Classical Analysis and ODEs

Gian-Carlo Rota once asserted that "every mathematician only has a few tricks". The sheer breadth and ingenuity in the work of Jean Bourgain may at first glance appear to be a counterexample to this maxim. However, as we hope to illustrate in this article, even Bourgain relied frequently on a core set of tools, which formed the base from which problems in many disparate mathematical fields could then be attacked. We discuss a selected number of these tools here, and then perf...

Find SimilarView on arXiv

Sharp Thresholds in Adaptive Random Graph Processes

July 29, 2022

79% Match
Calum MacRury, Erlang Surya
Combinatorics
Discrete Mathematics
Probability

The $\mathcal{D}$-process is a single player game in which the player is initially presented the empty graph on $n$ vertices. In each step, a subset of edges $X$ is independently sampled according to a distribution $\mathcal{D}$. The player then selects one edge $e$ from $X$, and adds $e$ to its current graph. For a fixed monotone increasing graph property $\mathcal{P}$, the objective of the player is to force the graph to satisfy $\mathcal{P}$ in as few steps as possible. Th...

Find SimilarView on arXiv

Second moment method for a family of boolean CSP

July 14, 2011

79% Match
Yacine Boufkhad, Olivier Dubois
Discrete Mathematics

The estimation of phase transitions in random boolean Constraint Satisfaction Problems (CSP) is based on two fundamental tools: the first and second moment methods. While the first moment method on the number of solutions permits to compute upper bounds on any boolean CSP, the second moment method used for computing lower bounds proves to be more tricky and in most cases gives only the trivial lower bound 0. In this paper, we define a subclass of boolean CSP covering the mono...

Find SimilarView on arXiv