Graphs with Large Variance

نویسندگان

  • Yair Caro
  • Raphael Yuster
چکیده

For a graph G, let V ar(G) denote the variance of the degree sequence of G, let sq(G) denote the sum of the squares of the degrees of G, and let t(G) denote the number of triangles in G and in its complement. The parameters are related by: V ar(G) = sq(G)/n− d where d is the average degree of G, and t(G) = ( n 3 ) + sq(G)/2−m(n− 1). Let V ar(n) denote the maximum possible value of V ar(G) where G has n vertices, and let sq(n,m) and t(n,m) denote the maximum possible values of sq(G) and t(G), respectively, where G has n vertices and m edges. We present a polynomial time algorithm which generates all the graphs with n vertices and m edges having sq(G) = sq(n,m) and t(G) = t(n,m). This extends a result of Olpp which determined t(n,m). We also determine V ar(n) precisely for every n, and show that V ar(n) = q(q − 1) n (1− q n ) = 27 256 n −O(n), where q = [3n/4], (if n ≡ 2 mod 4 the rounding is up) thereby improving upon previous results.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Variance reduction in large graph sampling

The norm of practice in estimating graph properties is to use uniform random node (RN) samples whenever possible. Many graphs are large and scale-free, inducing large degree variance and estimator variance. This paper shows that random edge (RE) sampling and the corresponding harmonic mean estimator for average degree can reduce the estimation variance significantly. First, we demonstrate that ...

متن کامل

A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs

To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...

متن کامل

An Ant Colony Optimization Algorithm for Network Vulnerability Analysis

Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...

متن کامل

Random walk kernels and learning curves for Gaussian process regression on random graphs

We consider learning on graphs, guided by kernels that encode similarity between vertices. Our focus is on random walk kernels, the analogues of squared exponential kernels in Euclidean spaces. We show that on large, locally treelike, graphs these have some counter-intuitive properties, specifically in the limit of large kernel lengthscales. We consider using these kernels as covariance matrice...

متن کامل

Periodic Walks on Large Regular Graphs and Random Matrix Theory

We study the distribution of the number of (non-backtracking) periodic walks on large regular graphs. We propose a formula for the ratio between the variance of the number of t-periodic walks and its mean, when the cardinality of the vertex set V and the period t approach ∞ with t/V → τ for any τ . This formula is based on the conjecture that the spectral statistics of the adjacency eigenvalues...

متن کامل

Sufficient conditions for maximally edge-connected and super-edge-connected

Let $G$ be a connected graph with minimum degree $delta$ and edge-connectivity $lambda$. A graph ismaximally edge-connected if $lambda=delta$, and it is super-edge-connected if every minimum edge-cut istrivial; that is, if every minimum edge-cut consists of edges incident with a vertex of minimum degree.In this paper, we show that a connected graph or a connected triangle-free graph is maximall...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Ars Comb.

دوره 57  شماره 

صفحات  -

تاریخ انتشار 2000