revolutionaries and spies
play

Revolutionaries and Spies Daniel W. Cranston Virginia Commonwealth - PowerPoint PPT Presentation

Revolutionaries and Spies Daniel W. Cranston Virginia Commonwealth University dcranston@vcu.edu Slides available on my preprint page Joint with Jane Butterfield, Greg Puleo, Cliff Smyth, Doug West, and Reza Zamani LSU Combinatorics Seminar 6


  1. Revolutionaries and Spies Daniel W. Cranston Virginia Commonwealth University dcranston@vcu.edu Slides available on my preprint page Joint with Jane Butterfield, Greg Puleo, Cliff Smyth, Doug West, and Reza Zamani LSU Combinatorics Seminar 6 October 2011

  2. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex.

  3. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy.

  4. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays.

  5. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ | V ( G ) | , then the spies win.

  6. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ | V ( G ) | , then the spies win. s s

  7. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ | V ( G ) | , then the spies win. s s s s s s s s

  8. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ | V ( G ) | , then the spies win. s s s s s s s Obs 2: If s < | V ( G ) | and ⌊ r / m ⌋ > s , then rev’s win. s

  9. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ | V ( G ) | , then the spies win. s s s s r r r r s s s s s s r r r r Obs 2: If s < | V ( G ) | and ⌊ r / m ⌋ > s , then rev’s win. s Ex: Say m = 2, r = 8, and s = 3.

  10. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ | V ( G ) | , then the spies win. s s s s r r r r s s s s s s r r r r Obs 2: If s < | V ( G ) | and ⌊ r / m ⌋ > s , then rev’s win. s Ex: Say m = 2, r = 8, and s = 3. So we assume ⌊ r / m ⌋ ≤ s < | V ( G ) | .

  11. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ | V ( G ) | , then the spies win. s s s s r r r r s s s s s s r r r r Obs 2: If s < | V ( G ) | and ⌊ r / m ⌋ > s , then rev’s win. s Ex: Say m = 2, r = 8, and s = 3. So we assume ⌊ r / m ⌋ ≤ s < | V ( G ) | . Def: σ ( G , m , r ) is minimum number of spies needed to win on G

  12. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on:

  13. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: dominated graphs, trees, interval graphs, “webbed trees”

  14. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs dominated graphs, trees, interval graphs, “webbed trees”

  15. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs dominated graphs, trees, interval graphs, “webbed trees” 2. On chordal graphs, we may need r − m + 1 spies to win

  16. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs dominated graphs, trees, interval graphs, “webbed trees” 2. On chordal graphs, we may need r − m + 1 spies to win 3. On unicyclic graphs, ⌈ r / m ⌉ spies can win rev’s may need many moves to beat ⌈ r / m ⌉ − 1 spies

  17. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs dominated graphs, trees, interval graphs, “webbed trees” 2. On chordal graphs, we may need r − m + 1 spies to win 3. On unicyclic graphs, ⌈ r / m ⌉ spies can win rev’s may need many moves to beat ⌈ r / m ⌉ − 1 spies 4. Random graph, hypercubes, large complete k -partite

  18. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs dominated graphs, trees, interval graphs, “webbed trees” 2. On chordal graphs, we may need r − m + 1 spies to win 3. On unicyclic graphs, ⌈ r / m ⌉ spies can win rev’s may need many moves to beat ⌈ r / m ⌉ − 1 spies 4. Random graph, hypercubes, large complete k -partite 5. For large complete bipartite graphs: σ ( G , 2 , r ) = 7 10 r

  19. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs dominated graphs, trees, interval graphs, “webbed trees” 2. On chordal graphs, we may need r − m + 1 spies to win 3. On unicyclic graphs, ⌈ r / m ⌉ spies can win rev’s may need many moves to beat ⌈ r / m ⌉ − 1 spies 4. Random graph, hypercubes, large complete k -partite 5. For large complete bipartite graphs: σ ( G , 2 , r ) = 7 10 r σ ( G , 3 , r ) = 1 2 r

  20. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs dominated graphs, trees, interval graphs, “webbed trees” 2. On chordal graphs, we may need r − m + 1 spies to win 3. On unicyclic graphs, ⌈ r / m ⌉ spies can win rev’s may need many moves to beat ⌈ r / m ⌉ − 1 spies 4. Random graph, hypercubes, large complete k -partite 5. For large complete bipartite graphs: σ ( G , 2 , r ) = 7 10 r σ ( G , 3 , r ) = 1 2 r � r � 3 m − 2 ≤ σ ( G , m , r ) < 1 . 58 r 2 − o (1) m , for m ≥ 4

  21. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs dominated graphs, trees, interval graphs, “webbed trees” 2. On chordal graphs, we may need r − m + 1 spies to win 3. On unicyclic graphs, ⌈ r / m ⌉ spies can win rev’s may need many moves to beat ⌈ r / m ⌉ − 1 spies 4. Random graph, hypercubes, large complete k -partite 5. For large complete bipartite graphs: σ ( G , 2 , r ) = 7 10 r = 7 r 5 2 σ ( G , 3 , r ) = 1 2 r = 3 r 2 3 � r � 3 m − 2 ≤ σ ( G , m , r ) < 1 . 58 r 2 − o (1) m , for m ≥ 4 Conj: As m grows: σ ( G , m , r ) ∼ 3 r 2 m

  22. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r .

  23. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r . Ex: P 9 is spy-good. Consider m = 3, r = 13, s = 4.

  24. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r . Ex: P 9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each m th rev. When rev’s move, spies repeat.

  25. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r . Ex: P 9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each m th rev. When rev’s move, spies repeat. s s

  26. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r . Ex: P 9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each m th rev. When rev’s move, spies repeat. s r r r r r r r r r r r r r s

  27. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r . Ex: P 9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each m th rev. When rev’s move, spies repeat. s r r r r r r r r r r r r r s s

  28. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r . Ex: P 9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each m th rev. When rev’s move, spies repeat. s r r r r r r r r r r r r r s s s

  29. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r . Ex: P 9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each m th rev. When rev’s move, spies repeat. s r r r r r r r r r r r r r s s s s

  30. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r . Ex: P 9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each m th rev. When rev’s move, spies repeat. s r r r r r r r r r r r r r s s s s s

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend