Revolutionaries and Spies Daniel W. Cranston Virginia Commonwealth - - PowerPoint PPT Presentation

revolutionaries and spies
SMART_READER_LITE
LIVE PREVIEW

Revolutionaries and Spies Daniel W. Cranston Virginia Commonwealth - - PowerPoint PPT Presentation

Revolutionaries and Spies Daniel W. Cranston Virginia Commonwealth University dcranston@vcu.edu Slides available on my preprint page Joint with Jane Butterfield, Greg Puleo, Cliff Smyth, Doug West, and Reza Zamani LSU Combinatorics Seminar 6


slide-1
SLIDE 1

Revolutionaries and Spies

Daniel W. Cranston

Virginia Commonwealth University dcranston@vcu.edu Slides available on my preprint page Joint with Jane Butterfield, Greg Puleo, Cliff Smyth, Doug West, and Reza Zamani LSU Combinatorics Seminar 6 October 2011

slide-2
SLIDE 2

A Problem of Network Security

Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex.

slide-3
SLIDE 3

A Problem of Network Security

Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy.

slide-4
SLIDE 4

A Problem of Network Security

Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays.

slide-5
SLIDE 5

A Problem of Network Security

Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ |V (G)|, then the spies win.

slide-6
SLIDE 6

A Problem of Network Security

Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ |V (G)|, then the spies win. s s

slide-7
SLIDE 7

A Problem of Network Security

Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ |V (G)|, then the spies win. s s s s s s s s

slide-8
SLIDE 8

A Problem of Network Security

Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ |V (G)|, then the spies win. s s s s s s s s Obs 2: If s < |V (G)| and ⌊r/m⌋ > s, then rev’s win.

slide-9
SLIDE 9

A Problem of Network Security

Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ |V (G)|, then the spies win. s s s s s s s s r r r r r r r r s s s Obs 2: If s < |V (G)| and ⌊r/m⌋ > s, then rev’s win. Ex: Say m = 2, r = 8, and s = 3.

slide-10
SLIDE 10

A Problem of Network Security

Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ |V (G)|, then the spies win. s s s s s s s s r r r r r r r r s s s Obs 2: If s < |V (G)| and ⌊r/m⌋ > s, then rev’s win. Ex: Say m = 2, r = 8, and s = 3. So we assume ⌊r/m⌋ ≤ s < |V (G)|.

slide-11
SLIDE 11

A Problem of Network Security

Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ |V (G)|, then the spies win. s s s s s s s s r r r r r r r r s s s Obs 2: If s < |V (G)| and ⌊r/m⌋ > s, then rev’s win. Ex: Say m = 2, r = 8, and s = 3. So we assume ⌊r/m⌋ ≤ s < |V (G)|. Def: σ(G, m, r) is minimum number of spies needed to win on G

slide-12
SLIDE 12

Results (thresholds for spies to win)

  • 1. ⌊r/m⌋ spies can win on:
slide-13
SLIDE 13

Results (thresholds for spies to win)

  • 1. ⌊r/m⌋ spies can win on:

dominated graphs, trees, interval graphs, “webbed trees”

slide-14
SLIDE 14

Results (thresholds for spies to win)

  • 1. ⌊r/m⌋ spies can win on: spy-good graphs

dominated graphs, trees, interval graphs, “webbed trees”

slide-15
SLIDE 15

Results (thresholds for spies to win)

  • 1. ⌊r/m⌋ spies can win on: spy-good graphs

dominated graphs, trees, interval graphs, “webbed trees”

  • 2. On chordal graphs, we may need r − m + 1 spies to win
slide-16
SLIDE 16

Results (thresholds for spies to win)

  • 1. ⌊r/m⌋ spies can win on: spy-good graphs

dominated graphs, trees, interval graphs, “webbed trees”

  • 2. On chordal graphs, we may need r − m + 1 spies to win
  • 3. On unicyclic graphs, ⌈r/m⌉ spies can win

rev’s may need many moves to beat ⌈r/m⌉ − 1 spies

slide-17
SLIDE 17

Results (thresholds for spies to win)

  • 1. ⌊r/m⌋ spies can win on: spy-good graphs

dominated graphs, trees, interval graphs, “webbed trees”

  • 2. On chordal graphs, we may need r − m + 1 spies to win
  • 3. On unicyclic graphs, ⌈r/m⌉ spies can win

rev’s may need many moves to beat ⌈r/m⌉ − 1 spies

  • 4. Random graph, hypercubes, large complete k-partite
slide-18
SLIDE 18

Results (thresholds for spies to win)

  • 1. ⌊r/m⌋ spies can win on: spy-good graphs

dominated graphs, trees, interval graphs, “webbed trees”

  • 2. On chordal graphs, we may need r − m + 1 spies to win
  • 3. On unicyclic graphs, ⌈r/m⌉ spies can win

rev’s may need many moves to beat ⌈r/m⌉ − 1 spies

  • 4. Random graph, hypercubes, large complete k-partite
  • 5. For large complete bipartite graphs:

σ(G, 2, r) = 7 10r

slide-19
SLIDE 19

Results (thresholds for spies to win)

  • 1. ⌊r/m⌋ spies can win on: spy-good graphs

dominated graphs, trees, interval graphs, “webbed trees”

  • 2. On chordal graphs, we may need r − m + 1 spies to win
  • 3. On unicyclic graphs, ⌈r/m⌉ spies can win

rev’s may need many moves to beat ⌈r/m⌉ − 1 spies

  • 4. Random graph, hypercubes, large complete k-partite
  • 5. For large complete bipartite graphs:

σ(G, 2, r) = 7 10r σ(G, 3, r) = 1 2r

slide-20
SLIDE 20

Results (thresholds for spies to win)

  • 1. ⌊r/m⌋ spies can win on: spy-good graphs

dominated graphs, trees, interval graphs, “webbed trees”

  • 2. On chordal graphs, we may need r − m + 1 spies to win
  • 3. On unicyclic graphs, ⌈r/m⌉ spies can win

rev’s may need many moves to beat ⌈r/m⌉ − 1 spies

  • 4. Random graph, hypercubes, large complete k-partite
  • 5. For large complete bipartite graphs:

σ(G, 2, r) = 7 10r σ(G, 3, r) = 1 2r 3 2 − o(1) r m − 2 ≤ σ(G, m, r) < 1.58 r m, for m ≥ 4

slide-21
SLIDE 21

Results (thresholds for spies to win)

  • 1. ⌊r/m⌋ spies can win on: spy-good graphs

dominated graphs, trees, interval graphs, “webbed trees”

  • 2. On chordal graphs, we may need r − m + 1 spies to win
  • 3. On unicyclic graphs, ⌈r/m⌉ spies can win

rev’s may need many moves to beat ⌈r/m⌉ − 1 spies

  • 4. Random graph, hypercubes, large complete k-partite
  • 5. For large complete bipartite graphs:

σ(G, 2, r) = 7 10r = 7 5 r 2 σ(G, 3, r) = 1 2r = 3 2 r 3 3 2 − o(1) r m − 2 ≤ σ(G, m, r) < 1.58 r m, for m ≥ 4 Conj: As m grows: σ(G, m, r) ∼ 3

2 r m

slide-22
SLIDE 22

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r.

slide-23
SLIDE 23

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.

slide-24
SLIDE 24

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat.

slide-25
SLIDE 25

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s

slide-26
SLIDE 26

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r

slide-27
SLIDE 27

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s

slide-28
SLIDE 28

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s

slide-29
SLIDE 29

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s

slide-30
SLIDE 30

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s

slide-31
SLIDE 31

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s s s s s r r r r r r r r r r r r r → ← → ← ⇐ ←

slide-32
SLIDE 32

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s ← → ← ←

slide-33
SLIDE 33

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s s s s s r r r r r r r r r r r r r ← → ⇐ → ← ←

slide-34
SLIDE 34

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s

slide-35
SLIDE 35

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s

slide-36
SLIDE 36

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s

slide-37
SLIDE 37

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s

slide-38
SLIDE 38

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s Thm: Every tree is spy-good.

slide-39
SLIDE 39

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s Thm: Every tree is spy-good. Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v; C(v) is children of v; and w(v) is num. of rev’s at descendants. s(v) = w(v) m

  • x∈C(v)

w(x) m

slide-40
SLIDE 40

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s Thm: Every tree is spy-good. Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v; C(v) is children of v; and w(v) is num. of rev’s at descendants. s(v) = w(v) m

  • x∈C(v)

w(x) m

  • 1. Since ⌊a + b⌋ ≥ ⌊a⌋ + ⌊b⌋, s(v) is nonnegative
slide-41
SLIDE 41

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s Thm: Every tree is spy-good. Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v; C(v) is children of v; and w(v) is num. of rev’s at descendants. s(v) = w(v) m

  • x∈C(v)

w(x) m

  • 1. Since ⌊a + b⌋ ≥ ⌊a⌋ + ⌊b⌋, s(v) is nonnegative
  • 2. If r(v) ≥ m, then s(v) ≥
  • w(v)

m

  • w(v)−r(v)

m

  • ≥ 1
slide-42
SLIDE 42

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s Thm: Every tree is spy-good. Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v; C(v) is children of v; and w(v) is num. of rev’s at descendants. s(v) = w(v) m

  • x∈C(v)

w(x) m

  • 1. Since ⌊a + b⌋ ≥ ⌊a⌋ + ⌊b⌋, s(v) is nonnegative
  • 2. If r(v) ≥ m, then s(v) ≥
  • w(v)

m

  • w(v)−r(v)

m

  • ≥ 1

3.

v∈T s(v) =

  • w(u)

m

  • =

r

m

slide-43
SLIDE 43

Spy-good graphs: Dominated graphs

Thm: Every graph G with a dominating vertex u is spy-good.

slide-44
SLIDE 44

Spy-good graphs: Dominated graphs

Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings

slide-45
SLIDE 45

Spy-good graphs: Dominated graphs

Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings

slide-46
SLIDE 46

Spy-good graphs: Dominated graphs

Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings Matching covering Y ?

slide-47
SLIDE 47

Spy-good graphs: Dominated graphs

Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings Matching covering Y ? Hall’s Theorem.

slide-48
SLIDE 48

Spy-good graphs: Dominated graphs

Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings S Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+|N(S)∩X|

slide-49
SLIDE 49

Spy-good graphs: Dominated graphs

Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings S Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+|N(S)∩X| Since rev’s at meetings in S came from X ∩ N(S) or u:

slide-50
SLIDE 50

Spy-good graphs: Dominated graphs

Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings S Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+|N(S)∩X| Since rev’s at meetings in S came from X ∩ N(S) or u: m|S| ≤ m|N(S) ∩ X| + (r − km)

slide-51
SLIDE 51

Spy-good graphs: Dominated graphs

Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings S Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+|N(S)∩X| Since rev’s at meetings in S came from X ∩ N(S) or u: m|S| ≤ m|N(S) ∩ X| + (r − km) |S| ≤ |N(S) ∩ X| + (⌊r/m⌋ − k)

slide-52
SLIDE 52

Spy-good graphs: Dominated graphs

Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings S Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+|N(S)∩X| Since rev’s at meetings in S came from X ∩ N(S) or u: m|S| ≤ m|N(S) ∩ X| + (r − km) |S| ≤ |N(S) ∩ X| + (⌊r/m⌋ − k) |N(S) ∩ X| ≥ |S| − (⌊r/m⌋ − k)

slide-53
SLIDE 53

Spy-good graphs: Dominated graphs

Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings S Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+|N(S)∩X| Since rev’s at meetings in S came from X ∩ N(S) or u: m|S| ≤ m|N(S) ∩ X| + (r − km) |S| ≤ |N(S) ∩ X| + (⌊r/m⌋ − k) |N(S) ∩ X| ≥ |S| − (⌊r/m⌋ − k) Together this gives: |N(S)| =|X ′| + |N(S) ∩ X|

slide-54
SLIDE 54

Spy-good graphs: Dominated graphs

Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings S Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+|N(S)∩X| Since rev’s at meetings in S came from X ∩ N(S) or u: m|S| ≤ m|N(S) ∩ X| + (r − km) |S| ≤ |N(S) ∩ X| + (⌊r/m⌋ − k) |N(S) ∩ X| ≥ |S| − (⌊r/m⌋ − k) Together this gives: |N(S)| =|X ′| + |N(S) ∩ X| ≥ |X ′| + |S| − (⌊r/m⌋ − k)

slide-55
SLIDE 55

Spy-good graphs: Dominated graphs

Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings S Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+|N(S)∩X| Since rev’s at meetings in S came from X ∩ N(S) or u: m|S| ≤ m|N(S) ∩ X| + (r − km) |S| ≤ |N(S) ∩ X| + (⌊r/m⌋ − k) |N(S) ∩ X| ≥ |S| − (⌊r/m⌋ − k) Together this gives: |N(S)| =|X ′| + |N(S) ∩ X| ≥ |X ′| + |S| − (⌊r/m⌋ − k) =(⌊r/m⌋ − k) + |S| − (⌊r/m⌋ − k)

slide-56
SLIDE 56

Spy-good graphs: Dominated graphs

Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings S Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+|N(S)∩X| Since rev’s at meetings in S came from X ∩ N(S) or u: m|S| ≤ m|N(S) ∩ X| + (r − km) |S| ≤ |N(S) ∩ X| + (⌊r/m⌋ − k) |N(S) ∩ X| ≥ |S| − (⌊r/m⌋ − k) Together this gives: |N(S)| =|X ′| + |N(S) ∩ X| ≥ |X ′| + |S| − (⌊r/m⌋ − k) =(⌊r/m⌋ − k) + |S| − (⌊r/m⌋ − k) = |S|

slide-57
SLIDE 57

Spy-good graphs: Dominated graphs

Thm: Every graph G with a dominating vertex u is spy-good. x1 · · · xk X: spies off u xk+1 · · · xs X ′: spies on u y1 · · · yk′ Y : new meetings S Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+|N(S)∩X| Since rev’s at meetings in S came from X ∩ N(S) or u: m|S| ≤ m|N(S) ∩ X| + (r − km) |S| ≤ |N(S) ∩ X| + (⌊r/m⌋ − k) |N(S) ∩ X| ≥ |S| − (⌊r/m⌋ − k) Together this gives: |N(S)| =|X ′| + |N(S) ∩ X| ≥ |X ′| + |S| − (⌊r/m⌋ − k) =(⌊r/m⌋ − k) + |S| − (⌊r/m⌋ − k) = |S| So spies have a stable position at time t + 1, and G is spy-good.

slide-58
SLIDE 58

Spy-good graphs: Webbed Trees

Def: G is a webbed tree if G has a rooted spanning tree T s.t. each edge of G not in T is between siblings.

slide-59
SLIDE 59

Spy-good graphs: Webbed Trees

Def: G is a webbed tree if G has a rooted spanning tree T s.t. each edge of G not in T is between siblings. Thm: Every webbed tree is spy-good. Pf Sketch: Same strategy as for trees: s(v) = w(v) m

  • x∈C(v)

w(x) m

slide-60
SLIDE 60

Spy-good graphs: Webbed Trees

Def: G is a webbed tree if G has a rooted spanning tree T s.t. each edge of G not in T is between siblings. Thm: Every webbed tree is spy-good. Pf Sketch: Same strategy as for trees: s(v) = w(v) m

  • x∈C(v)

w(x) m

  • Partition E(G) into subgraphs G(v) = G[v ∪ C(v)].
slide-61
SLIDE 61

Spy-good graphs: Webbed Trees

Def: G is a webbed tree if G has a rooted spanning tree T s.t. each edge of G not in T is between siblings. Thm: Every webbed tree is spy-good. Pf Sketch: Same strategy as for trees: s(v) = w(v) m

  • x∈C(v)

w(x) m

  • Partition E(G) into subgraphs G(v) = G[v ∪ C(v)]. Simulate

a game in each G(v); use those moves in the actual game. Each G(v) is a dominated graph, so we can use that result.

slide-62
SLIDE 62

Spy-good graphs: Webbed Trees

Def: G is a webbed tree if G has a rooted spanning tree T s.t. each edge of G not in T is between siblings. Thm: Every webbed tree is spy-good. Pf Sketch: Same strategy as for trees: s(v) = w(v) m

  • x∈C(v)

w(x) m

  • Partition E(G) into subgraphs G(v) = G[v ∪ C(v)]. Simulate

a game in each G(v); use those moves in the actual game. Each G(v) is a dominated graph, so we can use that result. Cor: Every interval graph is spy-good.

slide-63
SLIDE 63

Spy-good graphs: Webbed Trees

Def: G is a webbed tree if G has a rooted spanning tree T s.t. each edge of G not in T is between siblings. Thm: Every webbed tree is spy-good. Pf Sketch: Same strategy as for trees: s(v) = w(v) m

  • x∈C(v)

w(x) m

  • Partition E(G) into subgraphs G(v) = G[v ∪ C(v)]. Simulate

a game in each G(v); use those moves in the actual game. Each G(v) is a dominated graph, so we can use that result. Cor: Every interval graph is spy-good. Pf: Interval graphs are webbed trees.

slide-64
SLIDE 64

Large Complete Bipartite Graphs

Thm: For a large complete bipartite graph G σ(G, 2, r) = 7 5 r 2

slide-65
SLIDE 65

Large Complete Bipartite Graphs

Thm: For a large complete bipartite graph G σ(G, 2, r) = 7 5 r 2 Main ideas: Call the two parts X1 and X2.

◮ On each round, the two main threats of the rev’s are to form

as many uncovered meetings as possible in X1; or in X2. If the spies defend against these two threats, then they won’t lose.

slide-66
SLIDE 66

Large Complete Bipartite Graphs

Thm: For a large complete bipartite graph G σ(G, 2, r) = 7 5 r 2 Main ideas: Call the two parts X1 and X2.

◮ On each round, the two main threats of the rev’s are to form

as many uncovered meetings as possible in X1; or in X2. If the spies defend against these two threats, then they won’t lose.

◮ “Lonely spies” are bad, so the spies avoid them when possible.

slide-67
SLIDE 67

Large Complete Bipartite Graphs

Thm: For a large complete bipartite graph G σ(G, 2, r) = 7 5 r 2 Main ideas: Call the two parts X1 and X2.

◮ On each round, the two main threats of the rev’s are to form

as many uncovered meetings as possible in X1; or in X2. If the spies defend against these two threats, then they won’t lose.

◮ “Lonely spies” are bad, so the spies avoid them when possible. ◮ By always keeping a large fraction of spies in each part,

the spies guarantee that they’ll have few lonely spies.

slide-68
SLIDE 68

Large Complete Bipartite Graphs

Thm: For a large complete bipartite graph G σ(G, 2, r) = 7 5 r 2 Main ideas: Call the two parts X1 and X2.

◮ On each round, the two main threats of the rev’s are to form

as many uncovered meetings as possible in X1; or in X2. If the spies defend against these two threats, then they won’t lose.

◮ “Lonely spies” are bad, so the spies avoid them when possible. ◮ By always keeping a large fraction of spies in each part,

the spies guarantee that they’ll have few lonely spies.

◮ The spies never need to look more than 1 move ahead.

slide-69
SLIDE 69

Large Complete Bipartite Graphs

Thm: For a large complete bipartite graph G σ(G, 2, r) = 7 5 r 2 Main ideas: Call the two parts X1 and X2.

◮ On each round, the two main threats of the rev’s are to form

as many uncovered meetings as possible in X1; or in X2. If the spies defend against these two threats, then they won’t lose.

◮ “Lonely spies” are bad, so the spies avoid them when possible. ◮ By always keeping a large fraction of spies in each part,

the spies guarantee that they’ll have few lonely spies.

◮ The spies never need to look more than 1 move ahead. ◮ To win, on each round the spies maintain an invariant.

slide-70
SLIDE 70

Main Results and Open Problems

  • 1. ⌊r/m⌋ spies can win on:

dominated graphs, trees, interval graphs, “webbed trees”

slide-71
SLIDE 71

Main Results and Open Problems

  • 1. ⌊r/m⌋ spies can win on:

dominated graphs, trees, interval graphs, “webbed trees” also graph powers and “vertex blowups”

slide-72
SLIDE 72

Main Results and Open Problems

  • 1. ⌊r/m⌋ spies can win on:

dominated graphs, trees, interval graphs, “webbed trees” also graph powers and “vertex blowups” Problem 1: Characterize spy-good graphs

slide-73
SLIDE 73

Main Results and Open Problems

  • 1. ⌊r/m⌋ spies can win on:

dominated graphs, trees, interval graphs, “webbed trees” also graph powers and “vertex blowups” Problem 1: Characterize spy-good graphs

  • 2. For large complete bipartite graphs:

σ(G, 2, r) = 7 10r = 7 5 r 2 σ(G, 3, r) = 1 2r = 3 2 r 3 3 2 − o(1) r m − 2 ≤ σ(G, m, r) < 1.58 r m, for m ≥ 4

slide-74
SLIDE 74

Main Results and Open Problems

  • 1. ⌊r/m⌋ spies can win on:

dominated graphs, trees, interval graphs, “webbed trees” also graph powers and “vertex blowups” Problem 1: Characterize spy-good graphs

  • 2. For large complete bipartite graphs:

σ(G, 2, r) = 7 10r = 7 5 r 2 σ(G, 3, r) = 1 2r = 3 2 r 3 3 2 − o(1) r m − 2 ≤ σ(G, m, r) < 1.58 r m, for m ≥ 4 Problem 2: Improve upper bounds for m ≥ 4.

slide-75
SLIDE 75

Main Results and Open Problems

  • 1. ⌊r/m⌋ spies can win on:

dominated graphs, trees, interval graphs, “webbed trees” also graph powers and “vertex blowups” Problem 1: Characterize spy-good graphs

  • 2. For large complete bipartite graphs:

σ(G, 2, r) = 7 10r = 7 5 r 2 σ(G, 3, r) = 1 2r = 3 2 r 3 3 2 − o(1) r m − 2 ≤ σ(G, m, r) < 1.58 r m, for m ≥ 4 Problem 2: Improve upper bounds for m ≥ 4. Conj: As m grows: σ(G, m, r) ∼ 3

2 r m