Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
PREFACE xiii
ACKNOWLEDGMENTS xv
PART I METHODS 1
1 The Basic Method 3
1.1 The Probabilistic Method, 3
1.2 Graph Theory, 5
1.3 Combinatorics, 9
1.4 Combinatorial Number Theory, 11
1.5 Disjoint Pairs, 12
1.6 Independent Sets and List Coloring, 13
1.7 Exercises, 16
The Erd¿os-Ko-Rado Theorem, 18
2 Linearity of Expectation 19
2.1 Basics, 19
2.2 Splitting Graphs, 20
2.3 Two Quickies, 22
2.4 Balancing Vectors, 23
2.5 Unbalancing Lights, 25
2.6 Without Coin Flips, 26
2.7 Exercises, 27
Brégman's Theorem, 29
3 Alterations 31
3.1 Ramsey Numbers, 31
3.2 Independent Sets, 33
3.3 Combinatorial Geometry, 34
3.4 Packing, 35
3.5 Greedy Coloring, 36
3.6 Continuous Time, 38
3.7 Exercises, 41
High Girth and High Chromatic Number, 43
4 The Second Moment 45
4.1 Basics, 45
4.2 Number Theory, 46
4.3 More Basics, 49
4.4 Random Graphs, 51
4.5 Clique Number, 55
4.6 Distinct Sums, 57
4.7 The Rödl nibble, 58
4.8 Exercises, 64
Hamiltonian Paths, 65
5 The Local Lemma 69
5.1 The Lemma, 69
5.2 Property B and Multicolored Sets of Real Numbers, 72
5.3 Lower Bounds for Ramsey Numbers, 73
5.4 A Geometric Result, 75
5.5 The Linear Arboricity of Graphs, 76
5.6 Latin Transversals, 80
5.7 Moser's Fix-It Algorithm, 81
5.8 Exercises, 87
Directed Cycles, 88
6 Correlation Inequalities 89
6.1 The Four Functions Theorem of Ahlswede and Daykin, 90
6.2 The FKG Inequality, 93
6.3 Monotone Properties, 94
6.4 Linear Extensions of Partially Ordered Sets, 97
6.5 Exercises, 99
Turán's Theorem, 100
7 Martingales and Tight Concentration 103
7.1 Definitions, 103
7.2 Large Deviations, 105
7.3 Chromatic Number, 107
7.4 Two General Settings, 109
7.5 Four Illustrations, 113
7.6 Talagrand's Inequality, 116
7.7 Applications of Talagrand's Inequality, 119
7.8 Kim-Vu Polynomial Concentration, 121
7.9 Exercises, 123
Weierstrass Approximation Theorem, 124
8 The Poisson Paradigm 127
8.1 The Janson Inequalities, 127
8.2 The Proofs, 129
8.3 Brun's Sieve, 132
8.4 Large Deviations, 135
8.5 Counting Extensions, 137
8.6 Counting Representations, 139
8.7 Further Inequalities, 142
8.8 Exercises, 143
Local Coloring, 144
9 Quasirandomness 147
9.1 The Quadratic Residue Tournaments, 148
9.2 Eigenvalues and Expanders, 151
9.3 Quasirandom Graphs, 157
9.4 Szemerédi's Regularity Lemma, 165
9.5 Graphons, 170
9.6 Exercises, 172
Random Walks, 174
PART II TOPICS 177
10 Random Graphs 179
10.1 Subgraphs, 180
10.2 Clique Number, 183
10.3 Chromatic Number, 184
10.4 Zero-One Laws, 186
10.5 Exercises, 193
Counting Subgraphs, 195
11 The Erd¿os-Rényi Phase Transition 197
11.1 An Overview, 197
11.2 Three Processes, 199
11.3 The Galton-Watson Branching Process, 201
11.4 Analysis of the Poisson Branching Process, 202
11.5 The Graph Branching Model, 204
11.6 The Graph and Poisson Processes Compared, 205
11.7 The Parametrization Explained, 207
11.8 The Subcritical Regions, 208
11.9 The Supercritical Regimes, 209
11.10 The Critical Window, 212
11.11 Analogies to Classical Percolation Theory, 214
11.12 Exercises, 219
Long paths in the supercritical regime, 220
12 Circuit Complexity 223
12.1 Preliminaries, 223
12.2 Random Restrictions and Bounded-Depth Circuits, 225
12.3 More on Bounded-Depth Circuits, 229
12.4 Monotone Circuits, 232
12.5 Formulae, 235
12.6 Exercises, 236
Maximal Antichains, 237
13 Discrepancy 239
13.1 Basics, 239
13.2 Six Standard Deviations Suffice, 241
13.3 Linear and Hereditary Discrepancy, 245
13.4 Lower Bounds, 248
13.5 The Beck-Fiala Theorem, 250
13.6 Exercises, 251
Unbalancing Lights, 253
14 Geometry 255
14.1 The Greatest Angle Among Points in Euclidean Spaces, 256
14.2 Empty Triangles Determined by Points in the Plane, 257
14.3 Geometrical Realizations of Sign Matrices, 259
14.4 ¿¿¿¿-Nets and VC-Dimensions of Range Spaces, 261
14.5 Dual Shatter Functions and Discrepancy, 266
14.6 Exercises, 269
Efficient Packing, 270
15 Codes, Games, and Entropy 273
15.1 Codes, 273
15.2 Liar Game, 276
15.3 Tenure Game, 278
15.4 Balancing Vector Game, 279
15.5 Nonadaptive Algorithms, 281
15.6 Half Liar Game, 282
15.7 Entropy, 284
15.8 Exercises, 289
An Extremal Graph, 291
16 Derandomization 293
16.1 The Method of Conditional Probabilities, 293
16.2 d-Wise Independent Random Variables in Small Sample Spaces, 297
16.3 Exercises, 302
Crossing Numbers, Incidences, Sums and Products, 303
17 Graph Property Testing 307
17.1 Property Testing, 307
17.2 Testing Colorability, 308
17.3 Testing Triangle-Freeness, 312
17.4 Characterizing the Testable Graph Properties, 314
17.5 Exercises, 316
Turán Numbers and Dependent Random Choice, 317
Appendix A Bounding of Large Deviations 321
A.1 Chernoff Bounds, 321
A.2 Lower Bounds, 330
A.3 Exercises, 334
Triangle-Free Graphs Have Large Independence Numbers, 336
Appendix B Paul Erd¿os 339
B.1 Papers, 339
B.2 Conjectures, 341
B.3 On Erd¿os, 342
B.4 Uncle Paul, 343
The Rich Get Richer, 346
Appendix C Hints to Selected Exercises 349
REFERENCES 355
AUTHOR INDEX 367
SUBJECT INDEX 371
-Paul Erdos
The probabilistic method is a powerful tool for tackling many problems in discrete mathematics. Roughly speaking, the method works as follows: trying to prove that a structure with certain desired properties exists, one defines an appropriate probability space of structures and then shows that the desired properties hold in these structures with positive probability. The method is best illustrated by examples. Here is a simple one. The Ramsey number is the smallest integer n such that in any two-coloring of the edges of a complete graph on n vertices by red and blue, either there is a red (i.e., a complete subgraph on k vertices all of whose edges are colored red) or there is a blue . Ramsey 1929 showed that is finite for any two integers k and . Let us obtain a lower bound for the diagonal Ramsey numbers .
If , then . Thus for all .
Consider a random two-coloring of the edges of obtained by coloring each edge independently either red or blue, where each color is equally likely. For any fixed set R of k vertices, let be the event that the induced subgraph of on R is monochromatic (i.e., that either all its edges are red or they are all blue). Clearly, . Since there are possible choices for R, the probability that at least one of the events occurs is at most . Thus, with positive probability, no event occurs and there is a two-coloring of without a monochromatic ; that is, . Note that if and we take , then
and hence for all .
This simple example demonstrates the essence of the probabilistic method. To prove the existence of a good coloring, we do not present one explicitly, but rather show, in a nonconstructive way, that it exists. This example appeared in a paper of P. Erdos from 1947. Although Szele had applied the probabilistic method to another combinatorial problem, mentioned in Chapter 2, already in 1943, Erdos was certainly the first to understand the full power of this method and apply it successfully over the years to numerous problems. One can, of course, claim that the probability is not essential in the proof given above. An equally simple proof can be described by counting; we just check that the total number of two-colorings of is larger than the number of those containing a monochromatic .
Moreover, since the vast majority of the probability spaces considered in the study of combinatorial problems are finite, this claim applies to most of the applications of the probabilistic method in discrete mathematics. Theoretically, this is indeed the case. However, in practice the probability is essential. It would be hopeless to replace the applications of many of the tools appearing in this book, including, for example, the second moment method, the Lovász Local Lemma and the concentration via martingales by counting arguments, even when these are applied to finite probability spaces.
The probabilistic method has an interesting algorithmic aspect. Consider, for example, the proof of Proposition 1.1.1, which shows that there is an edge two-coloring of without a monochromatic . Can we actually find such a coloring? This question, as asked, may sound ridiculous; the total number of possible colorings is finite, so we can try them all until we find the desired one. However, such a procedure may require steps; an amount of time that is exponential in the size of the problem. Algorithms whose running time is more than polynomial in the size of the problem are usually considered impractical. The class of problems that can be solved in polynomial time, usually denoted by P (see, e.g., Aho, Hopcroft and Ullman 1974), is, in a sense, the class of all solvable problems. In this sense, the exhaustive search approach suggested above for finding a good coloring of is not acceptable, and this is the reason for our remark that the proof of Proposition 1.1.1 is nonconstructive; it does not supply a constructive, efficient, and deterministic way of producing a coloring with the desired properties. However, a closer look at the proof shows that, in fact, it can be used to produce, effectively, a coloring that is very likely to be good. This is because, for large k, if , then
Hence, a random coloring of is very likely not to contain a monochromatic . This means that if, for some reason, we must present a two-coloring of the edges of without a monochromatic , we can simply produce a random two-coloring by flipping a fair coin times. We can then deliver the resulting coloring safely; the probability that it contains a monochromatic is less than , probably much smaller than our chances of making a mistake in any rigorous proof that a certain coloring is good! Therefore, in some cases the probabilistic, nonconstructive method does supply effective probabilistic algorithms. Moreover, these algorithms can sometimes be converted into deterministic ones. This topic is discussed in some detail in Chapter 16.
The probabilistic method is a powerful tool in combinatorics and graph theory. It is also extremely useful in number theory and in combinatorial geometry. More recently, it has been applied in the development of efficient algorithmic techniques and in the study of various computational problems. In the rest of this chapter, we present several simple examples that demonstrate some of the broad spectrum of topics in which this method is helpful. More complicated examples, involving various more delicate probabilistic arguments, appear in the rest of the book.
A tournament on a set V of n players is an orientation of the edges of the complete graph on the set of vertices V. Thus for every two distinct elements x and y of V, either or is in E, but not both. The name "tournament" is natural, since one can think of the set V as a set of players in which each pair participates in a single match, where is in the tournament iff x beats y. We say that T has the property if, for every set of k Players, there is one that beats them all. For example, a directed triangle , where and , has . Is it true that for every finite k there is a tournament T (on more than k vertices) with the property ? As shown by Erdos 1963b, this problem, raised by Schütte, can be solved almost trivially by applying probabilistic arguments. Moreover, these arguments even supply a rather sharp estimate for the minimum possible number of vertices in such a tournament. The basic (and natural) idea is that, if n is sufficiently large as a function of k, then a random tournament on the set of n players is very likely to have the property . By a random tournament we mean here a tournament T on V obtained by choosing, for each , independently, either the edge or the edge , where each of these two choices is equally likely. Observe that in this manner, all the possible tournaments on V are equally likely; that is, the probability space considered is symmetric. It is worth noting that we often use in applications symmetric probability spaces. In these cases, we shall sometimes refer to an element of the space as a random element, without describing explicitly the probability distribution . Thus, for example, in the proof of Proposition 1.1.1 random two-colorings of were considered; that is, all possible colorings were equally likely. Similarly, in the proof of the next simple result we study random tournaments on V.
If , then there is a tournament on n vertices that has the property .
Consider a random tournament on the set . For every fixed subset K of size k of V, let be the event that there is no vertex that beats all the members of K. Clearly, . This is because, for each fixed vertex , the probability that v does not beat all the members of K is , and all these events corresponding to the various possible choices of v are independent. It follows that
Therefore, with positive probability, no event occurs; that is, there is a tournament on n vertices that has the property .
Let denote the minimum possible number of vertices of a tournament that has the property . Since and , Theorem 1.2.1 implies that . It is not too difficult to check that and . As proved by Szekeres (cf. Moon 1968), .
Can one find an explicit construction of tournaments with at most vertices having property ? Such a construction is known but is not trivial; it is described in Chapter 9.
A dominating set of an undirected graph is a set such that every vertex has at least one neighbor in U.
Let be a graph on n vertices, with minimum degree . Then G has a dominating set of at most vertices.
Let be, for the moment, arbitrary. Let us pick, randomly and independently, each vertex of V with probability p. Let X be the (random) set of all vertices picked and let be the random set of all vertices in that do not have any neighbor in X. The expected value of is clearly . For each fixed vertex , and its neighbors are not in . Since the expected value of a sum of random...
Dateiformat: ePUBKopierschutz: Adobe-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat ePUB ist sehr gut für Romane und Sachbücher geeignet – also für „fließenden” Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Mit Adobe-DRM wird hier ein „harter” Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.Bitte beachten Sie: Wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!
Weitere Informationen finden Sie in unserer E-Book Hilfe.