On the 3-Local Profiles of Graphs
نویسندگان
چکیده
For a graph G, let pi (G), i = 0, ...,3 be the probability that three distinct random vertices span exactly i edges. We call (p0(G), ..., p3(G)) the 3-local profile of G. We investigate the set S3 ⊂ R4 of all vectors (p0, ..., p3) that are arbitrarily close to the 3-local profiles of arbitrarily large graphs. We give a full description of the projection of S3 to the (p0, p3) plane. The upper envelope of this planar domain is obtained from cliques on a fraction of the vertex set and complements of such graphs. The lower envelope is Goodman’s inequality p0 + p3 ≥ 4 . We also give a full description of the triangle-free case, i.e. the intersection of S3 with the hyperplane p3 = 0. This planar domain is characterized by an SDP constraint that is derived from Razborov’s flag algebra theory. C © 2013 Wiley Periodicals, Inc. J. Graph Theory 76: 236–248, 2014
منابع مشابه
DALD:-Distributed-Asynchronous-Local-Decontamination Algorithm in Arbitrary Graphs
Network environments always can be invaded by intruder agents. In networks where nodes are performing some computations, intruder agents might contaminate some nodes. Therefore, problem of decontaminating a network infected by intruder agents is one of the major problems in these networks. In this paper, we present a distributed asynchronous local algorithm for decontaminating a network. In mos...
متن کاملAnalytical and numerical investigation of heat and mass transfer effects on magnetohydrodynamic natural convective flow past a vertical porous plate
The aim of this investigation is to study the effect of hall current on an unsteady natural convective flow of a viscous, incompressible, electrically conducting optically thick radiating fluid past a vertical porous plate in the presence of a uniform transverse magnetic field. The Rosseland diffusion approximation is used to describe the radiative heat flux in the energy equation. Analytical a...
متن کاملA particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs
To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...
متن کاملتحلیل تجربی و عددی انتقال حرارت جابجایی آزاد از روی صفحه موجی شکل درون یک کانال عمودی
Laminar free convection heat transfer from vertical and inclined arrays of horizontal isothermal cylinders in air was investigated experimentally and numerically. Experiments were carried out using Mach-Zehnder interferometer and the FLUENT code was used for numerical study. Investigation was performed for vertical and horizontal cylinder spacing from 2 to 5 and 0 to 2 cylinder diameters respec...
متن کاملDistributed Estimation of Graph 4-Profiles
We present a novel distributed algorithm for counting all four-node induced subgraphs in a big graph.These counts, called the 4-profile, describe a graph’s connectivity properties and have found severaluses ranging from bioinformatics to spam detection. We also study the more complicated problem ofestimating the local 4-profiles centered at each vertex of the graph. The local 4-...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Journal of Graph Theory
دوره 76 شماره
صفحات -
تاریخ انتشار 2014