Tight products and graph expansion
نویسندگان
چکیده
In this paper we study a new product of graphs called tight product. A graph H is said to be a tight product of two (undirected multi) graphs G1 and G2, if V (H) = V (G1) × V (G2) and both projection maps V (H) → V (G1) and V (H) → V (G2) are covering maps. It is not a priori clear when two given graphs have a tight product (in fact, it is NP -hard to decide). We investigate the conditions under which this is possible. This perspective yields a new characterization of class-1 (2k + 1)-regular graphs. We also obtain a new model of random d-regular graphs whose second eigenvalue is almost surely at most O(d3/4). This construction resembles random graph lifts, but requires fewer random bits.
منابع مشابه
Sharp Upper bounds for Multiplicative Version of Degree Distance and Multiplicative Version of Gutman Index of Some Products of Graphs
In $1994,$ degree distance of a graph was introduced by Dobrynin, Kochetova and Gutman. And Gutman proposed the Gutman index of a graph in $1994.$ In this paper, we introduce the concepts of multiplicative version of degree distance and the multiplicative version of Gutman index of a graph. We find the sharp upper bound for the multiplicative version of degree distance and multiplicative ver...
متن کاملTight products and Expansion
In this paper we study a new product of graphs called tight product. A graph H is said to be a tight product of two (undirected multi) graphs G1 and G2, if V (H) = V (G1) × V (G2) and both projection maps V (H) → V (G1) and V (H) → V (G2) are covering maps. It is not a priori clear when two given graphs have a tight product (in fact, it is NP -hard to decide). We investigate the conditions unde...
متن کاملMAXIMAL INDEPENDENT SETS FOR THE PIXEL EXPANSION OF GRAPH ACCESS STRUCTURE
Given a graph G, a visual cryptography scheme based on the graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper we apply maximal independent sets of the grap...
متن کاملMaximal Independent Sets for the Pixel Expansion of Graph Access Structure
Abstract : A visual cryptography scheme based on a given graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper a maximal independent sets of the graph G was ...
متن کاملLower Bounds on Expansions of Graph Powers
Given a lazy regular graph G, we prove that the expansion of G is at least Ω( √ t) times the expansion of G. This bound is tight and can be generalized to small set expansion. We show some applications of this result. 1998 ACM Subject Classification G.2.2 Graph Theory
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Journal of Graph Theory
دوره 69 شماره
صفحات -
تاریخ انتشار 2012