SLIDE 1
Revolutionaries and Spies Daniel W. Cranston Virginia Commonwealth - - PowerPoint PPT Presentation
Revolutionaries and Spies Daniel W. Cranston Virginia Commonwealth - - PowerPoint PPT Presentation
Revolutionaries and Spies Daniel W. Cranston Virginia Commonwealth University dcranston@vcu.edu Slides available on my preprint page Joint with Jane Butterfield, Greg Puleo, Cliff Smyth, Doug West, and Reza Zamani LSU Combinatorics Seminar 6
SLIDE 2
SLIDE 3
A Problem of Network Security
Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy.
SLIDE 4
A Problem of Network Security
Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays.
SLIDE 5
A Problem of Network Security
Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ |V (G)|, then the spies win.
SLIDE 6
A Problem of Network Security
Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ |V (G)|, then the spies win. s s
SLIDE 7
A Problem of Network Security
Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ |V (G)|, then the spies win. s s s s s s s s
SLIDE 8
A Problem of Network Security
Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ |V (G)|, then the spies win. s s s s s s s s Obs 2: If s < |V (G)| and ⌊r/m⌋ > s, then rev’s win.
SLIDE 9
A Problem of Network Security
Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ |V (G)|, then the spies win. s s s s s s s s r r r r r r r r s s s Obs 2: If s < |V (G)| and ⌊r/m⌋ > s, then rev’s win. Ex: Say m = 2, r = 8, and s = 3.
SLIDE 10
A Problem of Network Security
Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ |V (G)|, then the spies win. s s s s s s s s r r r r r r r r s s s Obs 2: If s < |V (G)| and ⌊r/m⌋ > s, then rev’s win. Ex: Say m = 2, r = 8, and s = 3. So we assume ⌊r/m⌋ ≤ s < |V (G)|.
SLIDE 11
A Problem of Network Security
Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ |V (G)|, then the spies win. s s s s s s s s r r r r r r r r s s s Obs 2: If s < |V (G)| and ⌊r/m⌋ > s, then rev’s win. Ex: Say m = 2, r = 8, and s = 3. So we assume ⌊r/m⌋ ≤ s < |V (G)|. Def: σ(G, m, r) is minimum number of spies needed to win on G
SLIDE 12
Results (thresholds for spies to win)
- 1. ⌊r/m⌋ spies can win on:
SLIDE 13
Results (thresholds for spies to win)
- 1. ⌊r/m⌋ spies can win on:
dominated graphs, trees, interval graphs, “webbed trees”
SLIDE 14
Results (thresholds for spies to win)
- 1. ⌊r/m⌋ spies can win on: spy-good graphs
dominated graphs, trees, interval graphs, “webbed trees”
SLIDE 15
Results (thresholds for spies to win)
- 1. ⌊r/m⌋ spies can win on: spy-good graphs
dominated graphs, trees, interval graphs, “webbed trees”
- 2. On chordal graphs, we may need r − m + 1 spies to win
SLIDE 16
Results (thresholds for spies to win)
- 1. ⌊r/m⌋ spies can win on: spy-good graphs
dominated graphs, trees, interval graphs, “webbed trees”
- 2. On chordal graphs, we may need r − m + 1 spies to win
- 3. On unicyclic graphs, ⌈r/m⌉ spies can win
rev’s may need many moves to beat ⌈r/m⌉ − 1 spies
SLIDE 17
Results (thresholds for spies to win)
- 1. ⌊r/m⌋ spies can win on: spy-good graphs
dominated graphs, trees, interval graphs, “webbed trees”
- 2. On chordal graphs, we may need r − m + 1 spies to win
- 3. On unicyclic graphs, ⌈r/m⌉ spies can win
rev’s may need many moves to beat ⌈r/m⌉ − 1 spies
- 4. Random graph, hypercubes, large complete k-partite
SLIDE 18
Results (thresholds for spies to win)
- 1. ⌊r/m⌋ spies can win on: spy-good graphs
dominated graphs, trees, interval graphs, “webbed trees”
- 2. On chordal graphs, we may need r − m + 1 spies to win
- 3. On unicyclic graphs, ⌈r/m⌉ spies can win
rev’s may need many moves to beat ⌈r/m⌉ − 1 spies
- 4. Random graph, hypercubes, large complete k-partite
- 5. For large complete bipartite graphs:
σ(G, 2, r) = 7 10r
SLIDE 19
Results (thresholds for spies to win)
- 1. ⌊r/m⌋ spies can win on: spy-good graphs
dominated graphs, trees, interval graphs, “webbed trees”
- 2. On chordal graphs, we may need r − m + 1 spies to win
- 3. On unicyclic graphs, ⌈r/m⌉ spies can win
rev’s may need many moves to beat ⌈r/m⌉ − 1 spies
- 4. Random graph, hypercubes, large complete k-partite
- 5. For large complete bipartite graphs:
σ(G, 2, r) = 7 10r σ(G, 3, r) = 1 2r
SLIDE 20
Results (thresholds for spies to win)
- 1. ⌊r/m⌋ spies can win on: spy-good graphs
dominated graphs, trees, interval graphs, “webbed trees”
- 2. On chordal graphs, we may need r − m + 1 spies to win
- 3. On unicyclic graphs, ⌈r/m⌉ spies can win
rev’s may need many moves to beat ⌈r/m⌉ − 1 spies
- 4. Random graph, hypercubes, large complete k-partite
- 5. For large complete bipartite graphs:
σ(G, 2, r) = 7 10r σ(G, 3, r) = 1 2r 3 2 − o(1) r m − 2 ≤ σ(G, m, r) < 1.58 r m, for m ≥ 4
SLIDE 21
Results (thresholds for spies to win)
- 1. ⌊r/m⌋ spies can win on: spy-good graphs
dominated graphs, trees, interval graphs, “webbed trees”
- 2. On chordal graphs, we may need r − m + 1 spies to win
- 3. On unicyclic graphs, ⌈r/m⌉ spies can win
rev’s may need many moves to beat ⌈r/m⌉ − 1 spies
- 4. Random graph, hypercubes, large complete k-partite
- 5. For large complete bipartite graphs:
σ(G, 2, r) = 7 10r = 7 5 r 2 σ(G, 3, r) = 1 2r = 3 2 r 3 3 2 − o(1) r m − 2 ≤ σ(G, m, r) < 1.58 r m, for m ≥ 4 Conj: As m grows: σ(G, m, r) ∼ 3
2 r m
SLIDE 22
Spy-good Graphs: Trees
Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r.
SLIDE 23
Spy-good Graphs: Trees
Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.
SLIDE 24
Spy-good Graphs: Trees
Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat.
SLIDE 25
Spy-good Graphs: Trees
Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s
SLIDE 26
Spy-good Graphs: Trees
Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r
SLIDE 27
Spy-good Graphs: Trees
Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s
SLIDE 28
Spy-good Graphs: Trees
Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s
SLIDE 29
Spy-good Graphs: Trees
Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s
SLIDE 30
Spy-good Graphs: Trees
Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s
SLIDE 31
Spy-good Graphs: Trees
Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s s s s s r r r r r r r r r r r r r → ← → ← ⇐ ←
SLIDE 32
Spy-good Graphs: Trees
Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s ← → ← ←
SLIDE 33
Spy-good Graphs: Trees
Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s s s s s r r r r r r r r r r r r r ← → ⇐ → ← ←
SLIDE 34
Spy-good Graphs: Trees
Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s
SLIDE 35
Spy-good Graphs: Trees
Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s
SLIDE 36
Spy-good Graphs: Trees
Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s
SLIDE 37
Spy-good Graphs: Trees
Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s
SLIDE 38
Spy-good Graphs: Trees
Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s Thm: Every tree is spy-good.
SLIDE 39
Spy-good Graphs: Trees
Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s Thm: Every tree is spy-good. Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v; C(v) is children of v; and w(v) is num. of rev’s at descendants. s(v) = w(v) m
- −
- x∈C(v)
w(x) m
SLIDE 40
Spy-good Graphs: Trees
Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s Thm: Every tree is spy-good. Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v; C(v) is children of v; and w(v) is num. of rev’s at descendants. s(v) = w(v) m
- −
- x∈C(v)
w(x) m
- 1. Since ⌊a + b⌋ ≥ ⌊a⌋ + ⌊b⌋, s(v) is nonnegative
SLIDE 41
Spy-good Graphs: Trees
Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s Thm: Every tree is spy-good. Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v; C(v) is children of v; and w(v) is num. of rev’s at descendants. s(v) = w(v) m
- −
- x∈C(v)
w(x) m
- 1. Since ⌊a + b⌋ ≥ ⌊a⌋ + ⌊b⌋, s(v) is nonnegative
- 2. If r(v) ≥ m, then s(v) ≥
- w(v)
m
- −
- w(v)−r(v)
m
- ≥ 1
SLIDE 42
Spy-good Graphs: Trees
Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s Thm: Every tree is spy-good. Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v; C(v) is children of v; and w(v) is num. of rev’s at descendants. s(v) = w(v) m
- −
- x∈C(v)
w(x) m
- 1. Since ⌊a + b⌋ ≥ ⌊a⌋ + ⌊b⌋, s(v) is nonnegative
- 2. If r(v) ≥ m, then s(v) ≥
- w(v)
m
- −
- w(v)−r(v)
m
- ≥ 1
3.
v∈T s(v) =
- w(u)
m
- =
r
m
SLIDE 43
Spy-good graphs: Dominated graphs
Thm: Every graph G with a dominating vertex u is spy-good.
SLIDE 44
Spy-good graphs: Dominated graphs
Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings
SLIDE 45
Spy-good graphs: Dominated graphs
Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings
SLIDE 46
Spy-good graphs: Dominated graphs
Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings Matching covering Y ?
SLIDE 47
Spy-good graphs: Dominated graphs
Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings Matching covering Y ? Hall’s Theorem.
SLIDE 48
Spy-good graphs: Dominated graphs
Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings S Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+|N(S)∩X|
SLIDE 49
Spy-good graphs: Dominated graphs
Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings S Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+|N(S)∩X| Since rev’s at meetings in S came from X ∩ N(S) or u:
SLIDE 50
Spy-good graphs: Dominated graphs
Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings S Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+|N(S)∩X| Since rev’s at meetings in S came from X ∩ N(S) or u: m|S| ≤ m|N(S) ∩ X| + (r − km)
SLIDE 51
Spy-good graphs: Dominated graphs
Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings S Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+|N(S)∩X| Since rev’s at meetings in S came from X ∩ N(S) or u: m|S| ≤ m|N(S) ∩ X| + (r − km) |S| ≤ |N(S) ∩ X| + (⌊r/m⌋ − k)
SLIDE 52
Spy-good graphs: Dominated graphs
Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings S Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+|N(S)∩X| Since rev’s at meetings in S came from X ∩ N(S) or u: m|S| ≤ m|N(S) ∩ X| + (r − km) |S| ≤ |N(S) ∩ X| + (⌊r/m⌋ − k) |N(S) ∩ X| ≥ |S| − (⌊r/m⌋ − k)
SLIDE 53
Spy-good graphs: Dominated graphs
Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings S Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+|N(S)∩X| Since rev’s at meetings in S came from X ∩ N(S) or u: m|S| ≤ m|N(S) ∩ X| + (r − km) |S| ≤ |N(S) ∩ X| + (⌊r/m⌋ − k) |N(S) ∩ X| ≥ |S| − (⌊r/m⌋ − k) Together this gives: |N(S)| =|X ′| + |N(S) ∩ X|
SLIDE 54
Spy-good graphs: Dominated graphs
Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings S Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+|N(S)∩X| Since rev’s at meetings in S came from X ∩ N(S) or u: m|S| ≤ m|N(S) ∩ X| + (r − km) |S| ≤ |N(S) ∩ X| + (⌊r/m⌋ − k) |N(S) ∩ X| ≥ |S| − (⌊r/m⌋ − k) Together this gives: |N(S)| =|X ′| + |N(S) ∩ X| ≥ |X ′| + |S| − (⌊r/m⌋ − k)
SLIDE 55
Spy-good graphs: Dominated graphs
Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings S Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+|N(S)∩X| Since rev’s at meetings in S came from X ∩ N(S) or u: m|S| ≤ m|N(S) ∩ X| + (r − km) |S| ≤ |N(S) ∩ X| + (⌊r/m⌋ − k) |N(S) ∩ X| ≥ |S| − (⌊r/m⌋ − k) Together this gives: |N(S)| =|X ′| + |N(S) ∩ X| ≥ |X ′| + |S| − (⌊r/m⌋ − k) =(⌊r/m⌋ − k) + |S| − (⌊r/m⌋ − k)
SLIDE 56
Spy-good graphs: Dominated graphs
Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings S Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+|N(S)∩X| Since rev’s at meetings in S came from X ∩ N(S) or u: m|S| ≤ m|N(S) ∩ X| + (r − km) |S| ≤ |N(S) ∩ X| + (⌊r/m⌋ − k) |N(S) ∩ X| ≥ |S| − (⌊r/m⌋ − k) Together this gives: |N(S)| =|X ′| + |N(S) ∩ X| ≥ |X ′| + |S| − (⌊r/m⌋ − k) =(⌊r/m⌋ − k) + |S| − (⌊r/m⌋ − k) = |S|
SLIDE 57
Spy-good graphs: Dominated graphs
Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings S Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+|N(S)∩X| Since rev’s at meetings in S came from X ∩ N(S) or u: m|S| ≤ m|N(S) ∩ X| + (r − km) |S| ≤ |N(S) ∩ X| + (⌊r/m⌋ − k) |N(S) ∩ X| ≥ |S| − (⌊r/m⌋ − k) Together this gives: |N(S)| =|X ′| + |N(S) ∩ X| ≥ |X ′| + |S| − (⌊r/m⌋ − k) =(⌊r/m⌋ − k) + |S| − (⌊r/m⌋ − k) = |S| So spies have a stable position at time t + 1, and G is spy-good.
SLIDE 58
Spy-good graphs: Webbed Trees
Def: G is a webbed tree if G has a rooted spanning tree T s.t. each edge of G not in T is between siblings.
SLIDE 59
Spy-good graphs: Webbed Trees
Def: G is a webbed tree if G has a rooted spanning tree T s.t. each edge of G not in T is between siblings. Thm: Every webbed tree is spy-good. Pf Sketch: Same strategy as for trees: s(v) = w(v) m
- −
- x∈C(v)
w(x) m
SLIDE 60
Spy-good graphs: Webbed Trees
Def: G is a webbed tree if G has a rooted spanning tree T s.t. each edge of G not in T is between siblings. Thm: Every webbed tree is spy-good. Pf Sketch: Same strategy as for trees: s(v) = w(v) m
- −
- x∈C(v)
w(x) m
- Partition E(G) into subgraphs G(v) = G[v ∪ C(v)].
SLIDE 61
Spy-good graphs: Webbed Trees
Def: G is a webbed tree if G has a rooted spanning tree T s.t. each edge of G not in T is between siblings. Thm: Every webbed tree is spy-good. Pf Sketch: Same strategy as for trees: s(v) = w(v) m
- −
- x∈C(v)
w(x) m
- Partition E(G) into subgraphs G(v) = G[v ∪ C(v)]. Simulate
a game in each G(v); use those moves in the actual game. Each G(v) is a dominated graph, so we can use that result.
SLIDE 62
Spy-good graphs: Webbed Trees
Def: G is a webbed tree if G has a rooted spanning tree T s.t. each edge of G not in T is between siblings. Thm: Every webbed tree is spy-good. Pf Sketch: Same strategy as for trees: s(v) = w(v) m
- −
- x∈C(v)
w(x) m
- Partition E(G) into subgraphs G(v) = G[v ∪ C(v)]. Simulate
a game in each G(v); use those moves in the actual game. Each G(v) is a dominated graph, so we can use that result. Cor: Every interval graph is spy-good.
SLIDE 63
Spy-good graphs: Webbed Trees
Def: G is a webbed tree if G has a rooted spanning tree T s.t. each edge of G not in T is between siblings. Thm: Every webbed tree is spy-good. Pf Sketch: Same strategy as for trees: s(v) = w(v) m
- −
- x∈C(v)
w(x) m
- Partition E(G) into subgraphs G(v) = G[v ∪ C(v)]. Simulate
a game in each G(v); use those moves in the actual game. Each G(v) is a dominated graph, so we can use that result. Cor: Every interval graph is spy-good. Pf: Interval graphs are webbed trees.
SLIDE 64
Large Complete Bipartite Graphs
Thm: For a large complete bipartite graph G σ(G, 2, r) = 7 5 r 2
SLIDE 65
Large Complete Bipartite Graphs
Thm: For a large complete bipartite graph G σ(G, 2, r) = 7 5 r 2 Main ideas: Call the two parts X1 and X2.
◮ On each round, the two main threats of the rev’s are to form
as many uncovered meetings as possible in X1; or in X2. If the spies defend against these two threats, then they won’t lose.
SLIDE 66
Large Complete Bipartite Graphs
Thm: For a large complete bipartite graph G σ(G, 2, r) = 7 5 r 2 Main ideas: Call the two parts X1 and X2.
◮ On each round, the two main threats of the rev’s are to form
as many uncovered meetings as possible in X1; or in X2. If the spies defend against these two threats, then they won’t lose.
◮ “Lonely spies” are bad, so the spies avoid them when possible.
SLIDE 67
Large Complete Bipartite Graphs
Thm: For a large complete bipartite graph G σ(G, 2, r) = 7 5 r 2 Main ideas: Call the two parts X1 and X2.
◮ On each round, the two main threats of the rev’s are to form
as many uncovered meetings as possible in X1; or in X2. If the spies defend against these two threats, then they won’t lose.
◮ “Lonely spies” are bad, so the spies avoid them when possible. ◮ By always keeping a large fraction of spies in each part,
the spies guarantee that they’ll have few lonely spies.
SLIDE 68
Large Complete Bipartite Graphs
Thm: For a large complete bipartite graph G σ(G, 2, r) = 7 5 r 2 Main ideas: Call the two parts X1 and X2.
◮ On each round, the two main threats of the rev’s are to form
as many uncovered meetings as possible in X1; or in X2. If the spies defend against these two threats, then they won’t lose.
◮ “Lonely spies” are bad, so the spies avoid them when possible. ◮ By always keeping a large fraction of spies in each part,
the spies guarantee that they’ll have few lonely spies.
◮ The spies never need to look more than 1 move ahead.
SLIDE 69
Large Complete Bipartite Graphs
Thm: For a large complete bipartite graph G σ(G, 2, r) = 7 5 r 2 Main ideas: Call the two parts X1 and X2.
◮ On each round, the two main threats of the rev’s are to form
as many uncovered meetings as possible in X1; or in X2. If the spies defend against these two threats, then they won’t lose.
◮ “Lonely spies” are bad, so the spies avoid them when possible. ◮ By always keeping a large fraction of spies in each part,
the spies guarantee that they’ll have few lonely spies.
◮ The spies never need to look more than 1 move ahead. ◮ To win, on each round the spies maintain an invariant.
SLIDE 70
Main Results and Open Problems
- 1. ⌊r/m⌋ spies can win on:
dominated graphs, trees, interval graphs, “webbed trees”
SLIDE 71
Main Results and Open Problems
- 1. ⌊r/m⌋ spies can win on:
dominated graphs, trees, interval graphs, “webbed trees” also graph powers and “vertex blowups”
SLIDE 72
Main Results and Open Problems
- 1. ⌊r/m⌋ spies can win on:
dominated graphs, trees, interval graphs, “webbed trees” also graph powers and “vertex blowups” Problem 1: Characterize spy-good graphs
SLIDE 73
Main Results and Open Problems
- 1. ⌊r/m⌋ spies can win on:
dominated graphs, trees, interval graphs, “webbed trees” also graph powers and “vertex blowups” Problem 1: Characterize spy-good graphs
- 2. For large complete bipartite graphs:
σ(G, 2, r) = 7 10r = 7 5 r 2 σ(G, 3, r) = 1 2r = 3 2 r 3 3 2 − o(1) r m − 2 ≤ σ(G, m, r) < 1.58 r m, for m ≥ 4
SLIDE 74
Main Results and Open Problems
- 1. ⌊r/m⌋ spies can win on:
dominated graphs, trees, interval graphs, “webbed trees” also graph powers and “vertex blowups” Problem 1: Characterize spy-good graphs
- 2. For large complete bipartite graphs:
σ(G, 2, r) = 7 10r = 7 5 r 2 σ(G, 3, r) = 1 2r = 3 2 r 3 3 2 − o(1) r m − 2 ≤ σ(G, m, r) < 1.58 r m, for m ≥ 4 Problem 2: Improve upper bounds for m ≥ 4.
SLIDE 75
Main Results and Open Problems
- 1. ⌊r/m⌋ spies can win on:
dominated graphs, trees, interval graphs, “webbed trees” also graph powers and “vertex blowups” Problem 1: Characterize spy-good graphs
- 2. For large complete bipartite graphs: