Lecture 9: Probabilistic methods

نویسنده

  • Rajat Mittal
چکیده

Previously in class we proved that if we color the edges of K6 using blue or red color, then either there is a blue K3 or a red K3 as a subgraph. Here Kn is the complete graph (every pair of vertices are connected) on n vertices. We can generalize the above concept and ask, are there complete graphs for which any 2-coloring gives rise to either a blue Kk or a red Kl. It has been shown that there always exists n, s.t., any two coloring of Kn will have a monochromatic blue Kk or monochromatic red Kl. The smallest such number n is called the Ramsey number R(k, l). It has been a big open question to find out the bounds on R(k, l). We will use probabilistic method to give a lower bound on the diagonal Ramsey number R(k, k). Call an edge coloring of Kn good, if there are no monochromatic Kk’s. The idea would be to randomly color the edges of the graph Kn. If there is a positive probability (over the random coloring) that none of the Kk subgraphs are monochromatic red or blue, then there exist a coloring which is good. We color every edge either red or blue independently with probability 1/2. There are in total ( n k ) subgraphs Kk for a Kn.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Lecture 15: Learning probabilistic models

In the first half of the course, we introduced backpropagation, a technique we used to train neural nets to minimize a variety of cost functions. One of the cost functions we discussed was cross-entropy, which encourages the network to learn to predict a probability distribution over the targets. This was our first glimpse into probabilistic modeling. But probabilistic modeling is so important ...

متن کامل

Probabilistic Method & Randomized Algorithms Lecture 9 : Lovasz Local Lemma , Job Shop Scheduling

We have seen how the union bound is used in probabilistic method. Suppose A0, A1, . . . , An−1 are bad events (not necessarily independent) such that each Pr[Ai] ≤ p. If np < 1, then by union bound, we conclude that Pr[∪iAi] ≤ np < 1, and hence, with positive probability, none of the bad events occur. We see that if the events have limited dependency, we can have the same conclusion under a wea...

متن کامل

Cs294-1 On-line Computation & Network Algorithms Lecture 21: April 17

Spring 1997 Lecture 21: April 17 Lecturer: Yair Bartal Scribe: Tzu-Yi Chen This is the third of a series of lectures on probabilistic approximate metric spaces [Bartal96]. This lecture states a theorem relating probabilistic partitions to k-HST trees and then proves it. At the end of the lecture we brie y discuss why probabilistic approximate metric spaces are useful in practice. 21.1 Probabili...

متن کامل

The Probabilistic Method

In this lecture, we will study some basic principles of the probabilistic method, a combinatorial tool with many applications in computer science. This method is a powerful tool for demonstrating the existence of combinatorial objects. We introduce the basic idea through several examples drawn from early lecture notes, and follow that by a detailed study of the maximum satisfiability (MAX-SAT) ...

متن کامل

Lecture 17: Learning probabilistic models

In the first half of the course, we introduced backpropagation, a technique we used to train neural nets to minimize a variety of cost functions. One of the cost functions we discussed was cross-entropy, which encourages the network to learn to predict a probability distribution over the targets. This was our first glimpse into probabilistic modeling. But probabilistic modeling is so important ...

متن کامل

Probabilistic Proof Systems Lecture Notes

Various types of probabilistic proof systems have played a central role in the development of computer science in the last decade. In these notes, we concentrate on three such proof systems | interactive proofs, zero-knowledge proofs, and probabilistic checkable proofs. Remark: These are lecture notes in the strict sense of the word. Surveys of mine on this subject can be obtained from URL http...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015