revolutionaries and spies on graphs
play

Revolutionaries and Spies on Graphs Daniel W. Cranston Virginia - PowerPoint PPT Presentation

Revolutionaries and Spies on Graphs Daniel W. Cranston Virginia Commonwealth University dcranston@vcu.edu Slides available on my webpage Joint with Jane Butterfield, Greg Puleo, Doug West, and Reza Zamani NIST ACMD Seminar 12 March 2013 A


  1. Revolutionaries and Spies on Graphs Daniel W. Cranston Virginia Commonwealth University dcranston@vcu.edu Slides available on my webpage Joint with Jane Butterfield, Greg Puleo, Doug West, and Reza Zamani NIST ACMD Seminar 12 March 2013

  2. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex.

  3. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy.

  4. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays.

  5. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r

  6. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r r r r r r

  7. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r sr r r rs r

  8. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. rr r s r rr s r

  9. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. rrs r r srr r

  10. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. rs r r srr r r

  11. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r rs srr r r

  12. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r rs srr r Obs 1: If s ≥ | V ( G ) | , then the spies win. r

  13. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r rs srr r Obs 1: If s ≥ | V ( G ) | , then the spies win. r If s < | V ( G ) | and ⌊ r / m ⌋ > s , then rev’s win. Obs 2:

  14. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r rs r r r r s s s srr r r r r r Obs 1: If s ≥ | V ( G ) | , then the spies win. r If s < | V ( G ) | and ⌊ r / m ⌋ > s , then rev’s win. Obs 2: Ex: Say m = 2, r = 8, and s = 3.

  15. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r rs r r r r s s s srr r r r r r Obs 1: If s ≥ | V ( G ) | , then the spies win. r If s < | V ( G ) | and ⌊ r / m ⌋ > s , then rev’s win. Obs 2: Ex: Say m = 2, r = 8, and s = 3. So we assume ⌊ r / m ⌋ ≤ s < | V ( G ) | .

  16. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r rs r r r r s s s srr r r r r r Obs 1: If s ≥ | V ( G ) | , then the spies win. r If s < | V ( G ) | and ⌊ r / m ⌋ > s , then rev’s win. Obs 2: Ex: Say m = 2, r = 8, and s = 3. So we assume ⌊ r / m ⌋ ≤ s < | V ( G ) | . Def: σ ( G , m , r ) is minimum number of spies needed to win on G .

  17. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on:

  18. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: trees, dominated graphs, “webbed trees”

  19. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs trees, dominated graphs, “webbed trees”

  20. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs trees, dominated graphs, “webbed trees” 2. Random graph, hypercubes, large complete k -partite; solved completely for unicyclic graphs

  21. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs trees, dominated graphs, “webbed trees” 2. Random graph, hypercubes, large complete k -partite; solved completely for unicyclic graphs 3. For large complete bipartite graphs:

  22. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs trees, dominated graphs, “webbed trees” 2. Random graph, hypercubes, large complete k -partite; solved completely for unicyclic graphs 3. For large complete bipartite graphs: σ ( G , 2 , r ) = 7 10 r

  23. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs trees, dominated graphs, “webbed trees” 2. Random graph, hypercubes, large complete k -partite; solved completely for unicyclic graphs 3. For large complete bipartite graphs: σ ( G , 2 , r ) = 7 10 r σ ( G , 3 , r ) = 1 2 r

  24. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs trees, dominated graphs, “webbed trees” 2. Random graph, hypercubes, large complete k -partite; solved completely for unicyclic graphs 3. For large complete bipartite graphs: σ ( G , 2 , r ) = 7 10 r σ ( G , 3 , r ) = 1 2 r � r � 3 m − 2 ≤ σ ( G , m , r ) < 1 . 58 r 2 − o (1) m , for m ≥ 4

  25. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs trees, dominated graphs, “webbed trees” 2. Random graph, hypercubes, large complete k -partite; solved completely for unicyclic graphs 3. For large complete bipartite graphs: σ ( G , 2 , r ) = 7 10 r = 7 r 5 2 σ ( G , 3 , r ) = 1 2 r = 3 r 2 3 � r � 3 m − 2 ≤ σ ( G , m , r ) < 1 . 58 r 2 − o (1) m , for m ≥ 4

  26. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs trees, dominated graphs, “webbed trees” 2. Random graph, hypercubes, large complete k -partite; solved completely for unicyclic graphs 3. For large complete bipartite graphs: σ ( G , 2 , r ) = 7 10 r = 7 r 5 2 σ ( G , 3 , r ) = 1 2 r = 3 r 2 3 � r � 3 m − 2 ≤ σ ( G , m , r ) < 1 . 58 r 2 − o (1) m , for m ≥ 4 Conj: As m grows: σ ( G , m , r ) ∼ 3 r 2 m

  27. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r .

  28. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r . Ex: P 9 is spy-good. Consider m = 3, r = 13, s = 4.

  29. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r . Ex: P 9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each m th rev. When rev’s move, spies repeat.

  30. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r . Ex: P 9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each m th rev. When rev’s move, spies repeat. s s

  31. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r . Ex: P 9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each m th rev. When rev’s move, spies repeat. s r r r r r r r r r r r r r s

  32. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r . Ex: P 9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each m th rev. When rev’s move, spies repeat. s r r r r r r r r r r r r r s s

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend