Lecture 1: Introduction

Similar documents
Cycles and clique-minors in expanders

Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs

All trees contain a large induced subgraph having all degrees 1 (mod k)

(67902) Topics in Theory and Complexity Nov 2, Lecture 7

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH

High degree graphs contain large-star factors

Factoring & Primality

ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015

Entropy Waves, The Zig-Zag Graph Product, and New Constant-Degree Expanders

2.1 Complexity Classes

Private Approximation of Clustering and Vertex Cover

Lecture 1: Course overview, circuits, and formulas

8.1 Min Degree Spanning Tree

ON INDUCED SUBGRAPHS WITH ALL DEGREES ODD. 1. Introduction

1 The Line vs Point Test

Candidate One-Way Functions Based on Expander Graphs

5.1 Bipartite Matching

The positive minimum degree game on sparse graphs

Exponential time algorithms for graph coloring

Single machine parallel batch scheduling with unbounded capacity

CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma

COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction

Large induced subgraphs with all degrees odd

A Sublinear Bipartiteness Tester for Bounded Degree Graphs

An Approximation Algorithm for Bounded Degree Deletion

Ph.D. Thesis. Judit Nagy-György. Supervisor: Péter Hajnal Associate Professor

Lecture 22: November 10

Lecture 2: Universality

Zachary Monaco Georgia College Olympic Coloring: Go For The Gold

Every tree contains a large induced subgraph with all degrees odd

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory

On the Unique Games Conjecture

Connectivity and cuts

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar

Approximation Algorithms

Applied Algorithm Design Lecture 5

CSC 373: Algorithm Design and Analysis Lecture 16

On the crossing number of K m,n

Cycles in a Graph Whose Lengths Differ by One or Two

Network Flow I. Lecture Overview The Network Flow Problem

An Empirical Study of Two MIS Algorithms

Network Algorithms for Homeland Security

JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004

arxiv: v1 [math.co] 7 Mar 2012

GENERATING LOW-DEGREE 2-SPANNERS

Why? A central concept in Computer Science. Algorithms are ubiquitous.

Tenacity and rupture degree of permutation graphs of complete bipartite graphs

A Turán Type Problem Concerning the Powers of the Degrees of a Graph

1. Nondeterministically guess a solution (called a certificate) 2. Check whether the solution solves the problem (called verification)

CAD Algorithms. P and NP

CS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs

arxiv: v1 [math.pr] 5 Dec 2011

Online Client-Server Load Balancing Without Global Information

. P. 4.3 Basic feasible solutions and vertices of polyhedra. x 1. x 2

9th Max-Planck Advanced Course on the Foundations of Computer Science (ADFOCS) Primal-Dual Algorithms for Online Optimization: Lecture 1

3.1 Solving Systems Using Tables and Graphs

U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, Notes on Algebra

Generating models of a matched formula with a polynomial delay

The Steepest Descent Algorithm for Unconstrained Optimization and a Bisection Line-search Method

Broadcasting in Wireless Networks

Lecture 13 - Basic Number Theory.

Induced subgraphs of Ramsey graphs with many distinct degrees

HOMEWORK 5 SOLUTIONS. n!f n (1) lim. ln x n! + xn x. 1 = G n 1 (x). (2) k + 1 n. (n 1)!

Linear Programming I

Finding and counting given length cycles

Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li

Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs

Introduction to Algorithms. Part 3: P, NP Hard Problems

The Open University s repository of research publications and other research outputs

Algorithm Design and Analysis

Lecture 4: BK inequality 27th August and 6th September, 2007

Chapter 7: Products and quotients

Discrete Mathematics Problems

Markov random fields and Gibbs measures

Graphical degree sequences and realizations

1 Introduction. Dr. T. Srinivas Department of Mathematics Kakatiya University Warangal , AP, INDIA

Scheduling Shop Scheduling. Tim Nieberg

The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge,

Notes on Complexity Theory Last updated: August, Lecture 1

SYMMETRIC ENCRYPTION. Mihir Bellare UCSD 1

Design of LDPC codes

Class One: Degree Sequences

Diversity Coloring for Distributed Data Storage in Networks 1

Analysis of Algorithms, I

On Algorithmic Strong Sufficient Statistics

Cycle transversals in bounded degree graphs

On Integer Additive Set-Indexers of Graphs

SIMS 255 Foundations of Software Design. Complexity and NP-completeness

Permutation Betting Markets: Singleton Betting with Extra Information

Polytope Examples (PolyComp Fukuda) Matching Polytope 1

Stationary random graphs on Z with prescribed iid degrees and finite mean connections

n 2 + 4n + 3. The answer in decimal form (for the Blitz): 0, 75. Solution. (n + 1)(n + 3) = n lim m 2 1

Even Faster Algorithm for Set Splitting!

A Brief Introduction to Property Testing

Computer Science Department. Technion - IIT, Haifa, Israel. Itai and Rodeh [IR] have proved that for any 2-connected graph G and any vertex s G there

Algebraic Computation Models. Algebraic Computation Models

Zeros of Polynomial Functions

On the k-path cover problem for cacti

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.

Transcription:

Expander Graphs in Computer Science WS 2010/2011 Lecture 1: Introduction Lecturer: He Sun 1 Definitions Over the past decades expanders play an important role in derandomization, network design, error-correcting codes and so on. Informally expanders are regular graphs with low degree and high connectivity and we can use different ways to define expanders. 1. Combinatorically, expanders are highly connected graphs, and to disconnect a large part of the graph, one has to sever many edges. 2. Geometrically, every vertex set has a relatively very large boundary. 3. From the Probabilistic view, expanders are graphs whose behavior is like random graphs. 4. Algebraically, expanders are the real-symmetric matrix whose first positive eigenvalue of the Laplace operator is bounded away from zero. Before showing the equivalence between combinatorial and algebraical definitions, let us present the combinatorial definition at first. For any d-degree graph G = (V, E), we use Γ(v) to represent the set of neighbors of v, i.e., Γ(v) = {u (u, v) E}. For any subset S V, let Γ(S) = v S Γ(v) and Γ (S) = Γ(S) S. Furthermore, for any set S V we define S := E(S, S). Definition 1.1 (vertex expansion) A graph G with n vertices is said to have vertex expansion (K, A) if Γ(S) A S, S V : S K. When K = n/2, for simplicity we call G an A-expander. Informally expanders are graphs with the property that every subsets (under some constraint on the their size) has many neighborhoods. Definition 1.2 (edge expansion) The edge expansion of a graph G = (V, E) is defined by h(g) := S min S: S V /2 S. 1

2 Lecture 1: Introduction To explain edge expansion, let us see two examples. (1) If G is non-connected, we choose one connected-component as S and we know that E(S, S) = 0. Therefore h(g) = 0. (2) If G is a complete graph K n, then E(S, S) = S (n S ) and h(g) = n/2. Definition 1.3 Let d N. A sequence of d-regular graphs {G i } i N of size increasing with i is a family of expanders if there is ɛ > 0 such that h(g i ) ɛ for all i. Usually, when speaking of an expander G i, we actually mean a family of graphs {G i } i N, where each graph in {G i } i N is d-regular and has the same expansion coefficient. Proposition 1.4 Any expander graph is a connected graph. 2 Existence and Constructibility Expander graphs have two seemingly contradictory properties: low degree and high connectivity. Two general problems for expanders are existence and constructibility. Between these two problems, existence proof of a certain family of expanders is easier and, as a black-block, the existence of such kind of expanders can be used to show the existence of other combinatorial objects. On the other hand, many applications of expanders really need explicit constructions and they proved much harder to find. We will show some constructions in this course, but they do not always match the bounds given by probabilistic methods. 2.1 Existence Let G d,n be the set of bipartite graphs with bipartite sets L, R of size N and left degree d. Theorem 1.5 For any d, there exists an α(d) > 0, such that for all N where G is chosen uniformly from G d,n. Proof: Define Pr[G is an (αn, d 2)-expander] 1/2, p k := Pr [ S L : S = k, Γ(S) < (d 2) S ]. So G is not an (αn, d 2)-expander iff k p k > 0. Assume that there is a set S of size K and Γ(S) < (d 2) S. Then there are at least 2k repeats among all the neighbors of vertices in S. We calculate the probability ( ) ( ) dk dk 2k Pr[at least 2k repeats among all the neighbors of vertices in S]. 2k N Therefore ( )( ) ( ) N dk dk 2k p k k 2k N ( ) Ne k ( ) dke 2k k 2k ( cd 4 ) k k = N ( ) dk 2k N

Lecture 1: Introduction 3 where c = e 3. By setting α = 1/(cd 4 ) and k αn, we know that p k 4 k and Pr[G is not an (αn, d 2)-expander] αn p k αn k=1 k=1 4 k 1/2. Theorem 1.6 For any fixed d 3, a random d-regular graph is a (Ω(N), d 1.01)-expander with high probability (as N, the probability goes to 1). 2.2 Constructibility Definition 1.7 Let {G i } i N be a family of expander graphs where G i is a d-regular graph on n i vertices and the integers {n i } are increasing, but not too fast.(e.g. n i+1 n 2 i will do) 1. The family is called Mildly Explicit if there is an algorithm that generates the j-th graph in the family {G i } i N in time polynomial in j. 2. The family is called Very Explicit if there is an algorithm that on input of an integer i, a vertex v V (G i ) and k {1,, d} computes the k-th neighbor of the vertex v in the graph G i. The algorithm s running time should be polynomial in its input length. Theorem 1.8 (Margulis, 1973) Fix a positive integer M and let [M] = {1, 2,, M}. Define the bipartite graph G = (V, E) as follows. Let V = [M] 2 [M] 2, where vertices in the first partite set as denoted (x, y) 1 and vertices in the second partite set are denoted (x, y) 2. From each vertex (x, y) 1, put in edges (x, y) 2, (x, x + y) 2, (x, x + y + 1) 2, (x + y, y) 2, (x + y + 1, y) 2, where all arithmetic is done modulo M. Then G is an expander. Theorem 1.9 (Jimbo and Maruoka, 1987) Let G = (L R, E) be the graph described above, then X L, Γ(X) X (1 + d 0 X /n), where d 0 = (2 3)/4 is the optimal constant. 3 Applications 3.1 Super concentrators Let G = (V, E) be a directed graph and let I and O be two subsets of V with n vertices, each called the input and the output sets respectively. We call G a super concentrator if for every k and every S I, T O with S = T = k, there exist k vertex disjoint paths in G from S to T. The density of a super concentrator is defined by Den(G) = E[G] n. Proposed by Valiant, super concentrators have many applications in computer science and communication networks. Valiant conjectured that any super concentrator with n inputs must have n edges. However, Valiant himself disproved this conjecture and presented super concentrators with O(n) edges. The main problems in this topic include: Prove the existence of super concentrators with low density. It was known that there exists a super concentrator with density 28, whose proof is based on Kolmogorov complexity.

4 Lecture 1: Introduction Give an explicit construction of super concentrators. Gabber and Galil presented the first explicit construction of super concentrators with density about 270, and so far the best known result is 44 (SODA 2003). Prove the lower bound of Den(G). The best known lower bound is (5 o(1)), proved by Lev and Valiant. Now we show that super concentrators with constant density can be constructed from constant degree expanders. Lemma 1.10 Assume that {G i } i N is a family of bipartite expanders with bipartite sets L, R with R = α L, 1/2 < α < 1 and left degree d. Moreover each graph in {G i } i N has vertex expansion 1. Then there is a super concentrator with density 1+2d 1 α. 3.2 Saving Random Bits For several problems, expander graphs provide an efficient way to derandomize complexity classes. For example, Reingold used expander graphs to derandomize the complexity class SL, which was open for many years. On the other hand, expanders are used to save random bits and reduce the randomness complexity in randomized algorithms. Here we consider the complexity class RP. Definition 1.11 The complexity class RP is the class of all languages L for which there exists a probabilistic polynomial-time Turing machine M such that m L = Pr[M(x) = 1] 3 4 m L = Pr[M(x) = 1] = 0 Fix any RP language L and let r( x ) be the number of random bits used for the RP machine M. To decrease the error probability to δ, a basic approach is to use the Chernoff bound. We run M O(log 1 δ ) independent trials and take the average value. But the number of random bits used is O(r log 1 δ ). 1 Now we discuss how to use expanders to decrease the error probability to poly( r ) with no extra random bits. At first we assume that there is an explicit family of expanders G = {G i } i N with vertex expansion A where N = V [G] = 2 r. Our algorithm is as follows: Input: x. Choose a parameter c such that 1/(4A c ) < δ and let v u V [G]; Run M(x, y i ) for all strings y i where dist(v, y i ) c; if i M(x, y i ) = 0 then return 0 else return 1 end Algorithm 1: Algorithm for Saving Random Bits

Lecture 1: Introduction 5 Assume that L RP. For any x L, define Bad x = {y M(x, y) = 0} and B = {v Γ c(v) Bad x }. Then Algorithm 1 outputs 0 iff v B. By definition, 1 i c 1, we have Γ i (B) Γ i+1 (B) Bad x. Since L RP, we get Bad x N/4. On the other hand Γ c(b) A c B. Therefore A c B Γ c(b) Bad x N/4 and the error probability of Algorithm 1 is bounded by B /N 1/(4A c ) δ.