revolutionaries and spiesdcranston/slides/spies-talk.pdf · slides available on my preprint page...

75
Revolutionaries and Spies Daniel W. Cranston Virginia Commonwealth University [email protected] Slides available on my preprint page Joint with Jane Butterfield, Greg Puleo, Cliff Smyth, Doug West, and Reza Zamani LSU Combinatorics Seminar 6 October 2011

Upload: others

Post on 11-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Revolutionaries and Spies

Daniel W. CranstonVirginia Commonwealth University

[email protected]

Slides available on my preprint pageJoint with Jane Butterfield, Greg Puleo,

Cliff Smyth, Doug West, and Reza Zamani

LSU Combinatorics Seminar6 October 2011

Page 2: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

A Problem of Network SecuritySetup: r revolutionaries play against s spies on a graph G .Each rev. moves to a vertex, then each spy moves to a vertex.

Goal: Rev’s want to get m rev’s at a common vertex, with no spy.Each turn: Each rev. moves/stays, then each spy moves/stays.

Obs 1: If s ≥ |V (G )|, then the spies win.

s

s

Obs 2: If s < |V (G )| and br/mc > s, then rev’s win.Ex: Say m = 2, r = 8, and s = 3.So we assume br/mc ≤ s < |V (G )|.

Def: σ(G ,m, r) is minimum number of spies needed to win on G

Page 3: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

A Problem of Network SecuritySetup: r revolutionaries play against s spies on a graph G .Each rev. moves to a vertex, then each spy moves to a vertex.Goal: Rev’s want to get m rev’s at a common vertex, with no spy.

Each turn: Each rev. moves/stays, then each spy moves/stays.

Obs 1: If s ≥ |V (G )|, then the spies win.

s

s

Obs 2: If s < |V (G )| and br/mc > s, then rev’s win.Ex: Say m = 2, r = 8, and s = 3.So we assume br/mc ≤ s < |V (G )|.

Def: σ(G ,m, r) is minimum number of spies needed to win on G

Page 4: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

A Problem of Network SecuritySetup: r revolutionaries play against s spies on a graph G .Each rev. moves to a vertex, then each spy moves to a vertex.Goal: Rev’s want to get m rev’s at a common vertex, with no spy.Each turn: Each rev. moves/stays, then each spy moves/stays.

Obs 1: If s ≥ |V (G )|, then the spies win.

s

s

Obs 2: If s < |V (G )| and br/mc > s, then rev’s win.Ex: Say m = 2, r = 8, and s = 3.So we assume br/mc ≤ s < |V (G )|.

Def: σ(G ,m, r) is minimum number of spies needed to win on G

Page 5: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

A Problem of Network SecuritySetup: r revolutionaries play against s spies on a graph G .Each rev. moves to a vertex, then each spy moves to a vertex.Goal: Rev’s want to get m rev’s at a common vertex, with no spy.Each turn: Each rev. moves/stays, then each spy moves/stays.

Obs 1: If s ≥ |V (G )|, then the spies win.

s

s

Obs 2: If s < |V (G )| and br/mc > s, then rev’s win.Ex: Say m = 2, r = 8, and s = 3.So we assume br/mc ≤ s < |V (G )|.

Def: σ(G ,m, r) is minimum number of spies needed to win on G

Page 6: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

A Problem of Network SecuritySetup: r revolutionaries play against s spies on a graph G .Each rev. moves to a vertex, then each spy moves to a vertex.Goal: Rev’s want to get m rev’s at a common vertex, with no spy.Each turn: Each rev. moves/stays, then each spy moves/stays.

Obs 1: If s ≥ |V (G )|, then the spies win.

s

s

Obs 2: If s < |V (G )| and br/mc > s, then rev’s win.Ex: Say m = 2, r = 8, and s = 3.So we assume br/mc ≤ s < |V (G )|.

Def: σ(G ,m, r) is minimum number of spies needed to win on G

Page 7: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

A Problem of Network SecuritySetup: r revolutionaries play against s spies on a graph G .Each rev. moves to a vertex, then each spy moves to a vertex.Goal: Rev’s want to get m rev’s at a common vertex, with no spy.Each turn: Each rev. moves/stays, then each spy moves/stays.

Obs 1: If s ≥ |V (G )|, then the spies win.

s

s

s

s

s

ss

s

Obs 2: If s < |V (G )| and br/mc > s, then rev’s win.Ex: Say m = 2, r = 8, and s = 3.So we assume br/mc ≤ s < |V (G )|.

Def: σ(G ,m, r) is minimum number of spies needed to win on G

Page 8: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

A Problem of Network SecuritySetup: r revolutionaries play against s spies on a graph G .Each rev. moves to a vertex, then each spy moves to a vertex.Goal: Rev’s want to get m rev’s at a common vertex, with no spy.Each turn: Each rev. moves/stays, then each spy moves/stays.

Obs 1: If s ≥ |V (G )|, then the spies win.

s

s

s

s

s

ss

s

Obs 2: If s < |V (G )| and br/mc > s, then rev’s win.

Ex: Say m = 2, r = 8, and s = 3.So we assume br/mc ≤ s < |V (G )|.

Def: σ(G ,m, r) is minimum number of spies needed to win on G

Page 9: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

A Problem of Network SecuritySetup: r revolutionaries play against s spies on a graph G .Each rev. moves to a vertex, then each spy moves to a vertex.Goal: Rev’s want to get m rev’s at a common vertex, with no spy.Each turn: Each rev. moves/stays, then each spy moves/stays.

Obs 1: If s ≥ |V (G )|, then the spies win.

s

s

s

s

s

ss

s

r r

r r

r r

r r

s s s

Obs 2: If s < |V (G )| and br/mc > s, then rev’s win.Ex: Say m = 2, r = 8, and s = 3.

So we assume br/mc ≤ s < |V (G )|.

Def: σ(G ,m, r) is minimum number of spies needed to win on G

Page 10: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

A Problem of Network SecuritySetup: r revolutionaries play against s spies on a graph G .Each rev. moves to a vertex, then each spy moves to a vertex.Goal: Rev’s want to get m rev’s at a common vertex, with no spy.Each turn: Each rev. moves/stays, then each spy moves/stays.

Obs 1: If s ≥ |V (G )|, then the spies win.

s

s

s

s

s

ss

s

r r

r r

r r

r r

s s s

Obs 2: If s < |V (G )| and br/mc > s, then rev’s win.Ex: Say m = 2, r = 8, and s = 3.So we assume br/mc ≤ s < |V (G )|.

Def: σ(G ,m, r) is minimum number of spies needed to win on G

Page 11: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

A Problem of Network SecuritySetup: r revolutionaries play against s spies on a graph G .Each rev. moves to a vertex, then each spy moves to a vertex.Goal: Rev’s want to get m rev’s at a common vertex, with no spy.Each turn: Each rev. moves/stays, then each spy moves/stays.

Obs 1: If s ≥ |V (G )|, then the spies win.

s

s

s

s

s

ss

s

r r

r r

r r

r r

s s s

Obs 2: If s < |V (G )| and br/mc > s, then rev’s win.Ex: Say m = 2, r = 8, and s = 3.So we assume br/mc ≤ s < |V (G )|.

Def: σ(G ,m, r) is minimum number of spies needed to win on G

Page 12: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Results (thresholds for spies to win)

1. br/mc spies can win on:

dominated graphs, trees, interval graphs, “webbed trees”

2. On chordal graphs, we may need r −m + 1 spies to win

3. On unicyclic graphs, dr/me spies can winrev’s may need many moves to beat dr/me − 1 spies

4. Random graph, hypercubes, large complete k-partite

5. For large complete bipartite graphs:

σ(G , 2, r) =7

10r

=7

5

r

2

σ(G , 3, r) =1

2r

=3

2

r

3

(3

2− o(1)

)r

m− 2 ≤ σ(G ,m, r) < 1.58

r

m, for m ≥ 4

Conj: As m grows: σ(G ,m, r) ∼ 32

rm

Page 13: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Results (thresholds for spies to win)

1. br/mc spies can win on:dominated graphs, trees, interval graphs, “webbed trees”

2. On chordal graphs, we may need r −m + 1 spies to win

3. On unicyclic graphs, dr/me spies can winrev’s may need many moves to beat dr/me − 1 spies

4. Random graph, hypercubes, large complete k-partite

5. For large complete bipartite graphs:

σ(G , 2, r) =7

10r

=7

5

r

2

σ(G , 3, r) =1

2r

=3

2

r

3

(3

2− o(1)

)r

m− 2 ≤ σ(G ,m, r) < 1.58

r

m, for m ≥ 4

Conj: As m grows: σ(G ,m, r) ∼ 32

rm

Page 14: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Results (thresholds for spies to win)

1. br/mc spies can win on: spy-good graphsdominated graphs, trees, interval graphs, “webbed trees”

2. On chordal graphs, we may need r −m + 1 spies to win

3. On unicyclic graphs, dr/me spies can winrev’s may need many moves to beat dr/me − 1 spies

4. Random graph, hypercubes, large complete k-partite

5. For large complete bipartite graphs:

σ(G , 2, r) =7

10r

=7

5

r

2

σ(G , 3, r) =1

2r

=3

2

r

3

(3

2− o(1)

)r

m− 2 ≤ σ(G ,m, r) < 1.58

r

m, for m ≥ 4

Conj: As m grows: σ(G ,m, r) ∼ 32

rm

Page 15: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Results (thresholds for spies to win)

1. br/mc spies can win on: spy-good graphsdominated graphs, trees, interval graphs, “webbed trees”

2. On chordal graphs, we may need r −m + 1 spies to win

3. On unicyclic graphs, dr/me spies can winrev’s may need many moves to beat dr/me − 1 spies

4. Random graph, hypercubes, large complete k-partite

5. For large complete bipartite graphs:

σ(G , 2, r) =7

10r

=7

5

r

2

σ(G , 3, r) =1

2r

=3

2

r

3

(3

2− o(1)

)r

m− 2 ≤ σ(G ,m, r) < 1.58

r

m, for m ≥ 4

Conj: As m grows: σ(G ,m, r) ∼ 32

rm

Page 16: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Results (thresholds for spies to win)

1. br/mc spies can win on: spy-good graphsdominated graphs, trees, interval graphs, “webbed trees”

2. On chordal graphs, we may need r −m + 1 spies to win

3. On unicyclic graphs, dr/me spies can winrev’s may need many moves to beat dr/me − 1 spies

4. Random graph, hypercubes, large complete k-partite

5. For large complete bipartite graphs:

σ(G , 2, r) =7

10r

=7

5

r

2

σ(G , 3, r) =1

2r

=3

2

r

3

(3

2− o(1)

)r

m− 2 ≤ σ(G ,m, r) < 1.58

r

m, for m ≥ 4

Conj: As m grows: σ(G ,m, r) ∼ 32

rm

Page 17: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Results (thresholds for spies to win)

1. br/mc spies can win on: spy-good graphsdominated graphs, trees, interval graphs, “webbed trees”

2. On chordal graphs, we may need r −m + 1 spies to win

3. On unicyclic graphs, dr/me spies can winrev’s may need many moves to beat dr/me − 1 spies

4. Random graph, hypercubes, large complete k-partite

5. For large complete bipartite graphs:

σ(G , 2, r) =7

10r

=7

5

r

2

σ(G , 3, r) =1

2r

=3

2

r

3

(3

2− o(1)

)r

m− 2 ≤ σ(G ,m, r) < 1.58

r

m, for m ≥ 4

Conj: As m grows: σ(G ,m, r) ∼ 32

rm

Page 18: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Results (thresholds for spies to win)

1. br/mc spies can win on: spy-good graphsdominated graphs, trees, interval graphs, “webbed trees”

2. On chordal graphs, we may need r −m + 1 spies to win

3. On unicyclic graphs, dr/me spies can winrev’s may need many moves to beat dr/me − 1 spies

4. Random graph, hypercubes, large complete k-partite

5. For large complete bipartite graphs:

σ(G , 2, r) =7

10r

=7

5

r

2

σ(G , 3, r) =1

2r

=3

2

r

3

(3

2− o(1)

)r

m− 2 ≤ σ(G ,m, r) < 1.58

r

m, for m ≥ 4

Conj: As m grows: σ(G ,m, r) ∼ 32

rm

Page 19: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Results (thresholds for spies to win)

1. br/mc spies can win on: spy-good graphsdominated graphs, trees, interval graphs, “webbed trees”

2. On chordal graphs, we may need r −m + 1 spies to win

3. On unicyclic graphs, dr/me spies can winrev’s may need many moves to beat dr/me − 1 spies

4. Random graph, hypercubes, large complete k-partite

5. For large complete bipartite graphs:

σ(G , 2, r) =7

10r

=7

5

r

2

σ(G , 3, r) =1

2r

=3

2

r

3(3

2− o(1)

)r

m− 2 ≤ σ(G ,m, r) < 1.58

r

m, for m ≥ 4

Conj: As m grows: σ(G ,m, r) ∼ 32

rm

Page 20: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Results (thresholds for spies to win)

1. br/mc spies can win on: spy-good graphsdominated graphs, trees, interval graphs, “webbed trees”

2. On chordal graphs, we may need r −m + 1 spies to win

3. On unicyclic graphs, dr/me spies can winrev’s may need many moves to beat dr/me − 1 spies

4. Random graph, hypercubes, large complete k-partite

5. For large complete bipartite graphs:

σ(G , 2, r) =7

10r

=7

5

r

2

σ(G , 3, r) =1

2r

=3

2

r

3

(3

2− o(1)

)r

m− 2 ≤ σ(G ,m, r) < 1.58

r

m, for m ≥ 4

Conj: As m grows: σ(G ,m, r) ∼ 32

rm

Page 21: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Results (thresholds for spies to win)

1. br/mc spies can win on: spy-good graphsdominated graphs, trees, interval graphs, “webbed trees”

2. On chordal graphs, we may need r −m + 1 spies to win

3. On unicyclic graphs, dr/me spies can winrev’s may need many moves to beat dr/me − 1 spies

4. Random graph, hypercubes, large complete k-partite

5. For large complete bipartite graphs:

σ(G , 2, r) =7

10r =

7

5

r

2

σ(G , 3, r) =1

2r =

3

2

r

3(3

2− o(1)

)r

m− 2 ≤ σ(G ,m, r) < 1.58

r

m, for m ≥ 4

Conj: As m grows: σ(G ,m, r) ∼ 32

rm

Page 22: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .

Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.

s

s

Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.

s(v) =

⌊w(v)

m

⌋−∑

x∈C(v)

⌊w(x)

m

⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative

2. If r(v) ≥ m, then s(v) ≥⌊

w(v)m

⌋−⌊

w(v)−r(v)m

⌋≥ 1

3.∑

v∈T s(v) =⌊

w(u)m

⌋=⌊

rm

Page 23: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .

Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.

Pf: One spy follows each mth rev. When rev’s move, spies repeat.

s

s

Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.

s(v) =

⌊w(v)

m

⌋−∑

x∈C(v)

⌊w(x)

m

⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative

2. If r(v) ≥ m, then s(v) ≥⌊

w(v)m

⌋−⌊

w(v)−r(v)m

⌋≥ 1

3.∑

v∈T s(v) =⌊

w(u)m

⌋=⌊

rm

Page 24: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .

Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.

s

s

Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.

s(v) =

⌊w(v)

m

⌋−∑

x∈C(v)

⌊w(x)

m

⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative

2. If r(v) ≥ m, then s(v) ≥⌊

w(v)m

⌋−⌊

w(v)−r(v)m

⌋≥ 1

3.∑

v∈T s(v) =⌊

w(u)m

⌋=⌊

rm

Page 25: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .

Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.

s

s

Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.

s(v) =

⌊w(v)

m

⌋−∑

x∈C(v)

⌊w(x)

m

⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative

2. If r(v) ≥ m, then s(v) ≥⌊

w(v)m

⌋−⌊

w(v)−r(v)m

⌋≥ 1

3.∑

v∈T s(v) =⌊

w(u)m

⌋=⌊

rm

Page 26: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .

Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.

s

s r r r r r r r r r r r r r

Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.

s(v) =

⌊w(v)

m

⌋−∑

x∈C(v)

⌊w(x)

m

⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative

2. If r(v) ≥ m, then s(v) ≥⌊

w(v)m

⌋−⌊

w(v)−r(v)m

⌋≥ 1

3.∑

v∈T s(v) =⌊

w(u)m

⌋=⌊

rm

Page 27: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .

Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.

s

s r r r r r r r r r r r r r

s

Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.

s(v) =

⌊w(v)

m

⌋−∑

x∈C(v)

⌊w(x)

m

⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative

2. If r(v) ≥ m, then s(v) ≥⌊

w(v)m

⌋−⌊

w(v)−r(v)m

⌋≥ 1

3.∑

v∈T s(v) =⌊

w(u)m

⌋=⌊

rm

Page 28: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .

Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.

s

s r r r r r r r r r r r r r

s s

Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.

s(v) =

⌊w(v)

m

⌋−∑

x∈C(v)

⌊w(x)

m

⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative

2. If r(v) ≥ m, then s(v) ≥⌊

w(v)m

⌋−⌊

w(v)−r(v)m

⌋≥ 1

3.∑

v∈T s(v) =⌊

w(u)m

⌋=⌊

rm

Page 29: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .

Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.

s

s r r r r r r r r r r r r r

s s s

Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.

s(v) =

⌊w(v)

m

⌋−∑

x∈C(v)

⌊w(x)

m

⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative

2. If r(v) ≥ m, then s(v) ≥⌊

w(v)m

⌋−⌊

w(v)−r(v)m

⌋≥ 1

3.∑

v∈T s(v) =⌊

w(u)m

⌋=⌊

rm

Page 30: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .

Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.

s

s r r r r r r r r r r r r r

s s s s

Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.

s(v) =

⌊w(v)

m

⌋−∑

x∈C(v)

⌊w(x)

m

⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative

2. If r(v) ≥ m, then s(v) ≥⌊

w(v)m

⌋−⌊

w(v)−r(v)m

⌋≥ 1

3.∑

v∈T s(v) =⌊

w(u)m

⌋=⌊

rm

Page 31: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .

Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.

s

s

s s s s

r r r r r r r r r r r r r→ ← → ← ⇐ ←

Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.

s(v) =

⌊w(v)

m

⌋−∑

x∈C(v)

⌊w(x)

m

⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative

2. If r(v) ≥ m, then s(v) ≥⌊

w(v)m

⌋−⌊

w(v)−r(v)m

⌋≥ 1

3.∑

v∈T s(v) =⌊

w(u)m

⌋=⌊

rm

Page 32: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .

Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.

s

s r r r r r r r r r r r r r

s s s s← → ← ←

Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.

s(v) =

⌊w(v)

m

⌋−∑

x∈C(v)

⌊w(x)

m

⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative

2. If r(v) ≥ m, then s(v) ≥⌊

w(v)m

⌋−⌊

w(v)−r(v)m

⌋≥ 1

3.∑

v∈T s(v) =⌊

w(u)m

⌋=⌊

rm

Page 33: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .

Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.

s

s

s s s s

r r r r r r r r r r r r r← → ⇐ → ← ←

Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.

s(v) =

⌊w(v)

m

⌋−∑

x∈C(v)

⌊w(x)

m

⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative

2. If r(v) ≥ m, then s(v) ≥⌊

w(v)m

⌋−⌊

w(v)−r(v)m

⌋≥ 1

3.∑

v∈T s(v) =⌊

w(u)m

⌋=⌊

rm

Page 34: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .

Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.

s

s r r r r r r r r r r r r r

s s s s

Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.

s(v) =

⌊w(v)

m

⌋−∑

x∈C(v)

⌊w(x)

m

⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative

2. If r(v) ≥ m, then s(v) ≥⌊

w(v)m

⌋−⌊

w(v)−r(v)m

⌋≥ 1

3.∑

v∈T s(v) =⌊

w(u)m

⌋=⌊

rm

Page 35: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .

Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.

s

s r r r r r r r r r r r r r

s s s s

Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.

s(v) =

⌊w(v)

m

⌋−∑

x∈C(v)

⌊w(x)

m

⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative

2. If r(v) ≥ m, then s(v) ≥⌊

w(v)m

⌋−⌊

w(v)−r(v)m

⌋≥ 1

3.∑

v∈T s(v) =⌊

w(u)m

⌋=⌊

rm

Page 36: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .

Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.

s

s r r r r r r r r r r r r r

s s s s

Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.

s(v) =

⌊w(v)

m

⌋−∑

x∈C(v)

⌊w(x)

m

⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative

2. If r(v) ≥ m, then s(v) ≥⌊

w(v)m

⌋−⌊

w(v)−r(v)m

⌋≥ 1

3.∑

v∈T s(v) =⌊

w(u)m

⌋=⌊

rm

Page 37: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .

Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.

s

s r r r r r r r r r r r r r

s s s s

Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.

s(v) =

⌊w(v)

m

⌋−∑

x∈C(v)

⌊w(x)

m

⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative

2. If r(v) ≥ m, then s(v) ≥⌊

w(v)m

⌋−⌊

w(v)−r(v)m

⌋≥ 1

3.∑

v∈T s(v) =⌊

w(u)m

⌋=⌊

rm

Page 38: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .

Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.

s

s r r r r r r r r r r r r r

s s s s

Thm: Every tree is spy-good.

Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.

s(v) =

⌊w(v)

m

⌋−∑

x∈C(v)

⌊w(x)

m

⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative

2. If r(v) ≥ m, then s(v) ≥⌊

w(v)m

⌋−⌊

w(v)−r(v)m

⌋≥ 1

3.∑

v∈T s(v) =⌊

w(u)m

⌋=⌊

rm

Page 39: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .

Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.

s

s r r r r r r r r r r r r r

s s s s

Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.

s(v) =

⌊w(v)

m

⌋−∑

x∈C(v)

⌊w(x)

m

1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative

2. If r(v) ≥ m, then s(v) ≥⌊

w(v)m

⌋−⌊

w(v)−r(v)m

⌋≥ 1

3.∑

v∈T s(v) =⌊

w(u)m

⌋=⌊

rm

Page 40: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .

Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.

s

s r r r r r r r r r r r r r

s s s s

Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.

s(v) =

⌊w(v)

m

⌋−∑

x∈C(v)

⌊w(x)

m

⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative

2. If r(v) ≥ m, then s(v) ≥⌊

w(v)m

⌋−⌊

w(v)−r(v)m

⌋≥ 1

3.∑

v∈T s(v) =⌊

w(u)m

⌋=⌊

rm

Page 41: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .

Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.

s

s r r r r r r r r r r r r r

s s s s

Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.

s(v) =

⌊w(v)

m

⌋−∑

x∈C(v)

⌊w(x)

m

⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative

2. If r(v) ≥ m, then s(v) ≥⌊

w(v)m

⌋−⌊

w(v)−r(v)m

⌋≥ 1

3.∑

v∈T s(v) =⌊

w(u)m

⌋=⌊

rm

Page 42: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .

Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.

s

s r r r r r r r r r r r r r

s s s s

Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.

s(v) =

⌊w(v)

m

⌋−∑

x∈C(v)

⌊w(x)

m

⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative

2. If r(v) ≥ m, then s(v) ≥⌊

w(v)m

⌋−⌊

w(v)−r(v)m

⌋≥ 1

3.∑

v∈T s(v) =⌊

w(u)m

⌋=⌊

rm

Page 43: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.

x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u

y1 · · · yk ′Y : new meetings

S

Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:

m|S | ≤ m|N(S) ∩ X |+ (r − km)

|S | ≤ |N(S) ∩ X |+ (br/mc − k)

|N(S) ∩ X | ≥ |S | − (br/mc − k)

Together this gives:

|N(S)| =|X ′|+ |N(S) ∩ X |

≥ |X ′|+ |S | − (br/mc − k)

=(br/mc − k) + |S | − (br/mc − k) = |S |So spies have a stable position at time t + 1, and G is spy-good.

Page 44: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.

x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u

y1 · · · yk ′Y : new meetings

S

Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:

m|S | ≤ m|N(S) ∩ X |+ (r − km)

|S | ≤ |N(S) ∩ X |+ (br/mc − k)

|N(S) ∩ X | ≥ |S | − (br/mc − k)

Together this gives:

|N(S)| =|X ′|+ |N(S) ∩ X |

≥ |X ′|+ |S | − (br/mc − k)

=(br/mc − k) + |S | − (br/mc − k) = |S |So spies have a stable position at time t + 1, and G is spy-good.

Page 45: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.

x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u

y1 · · · yk ′Y : new meetings

S

Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:

m|S | ≤ m|N(S) ∩ X |+ (r − km)

|S | ≤ |N(S) ∩ X |+ (br/mc − k)

|N(S) ∩ X | ≥ |S | − (br/mc − k)

Together this gives:

|N(S)| =|X ′|+ |N(S) ∩ X |

≥ |X ′|+ |S | − (br/mc − k)

=(br/mc − k) + |S | − (br/mc − k) = |S |So spies have a stable position at time t + 1, and G is spy-good.

Page 46: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.

x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u

y1 · · · yk ′Y : new meetings

S

Matching covering Y ?

Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:

m|S | ≤ m|N(S) ∩ X |+ (r − km)

|S | ≤ |N(S) ∩ X |+ (br/mc − k)

|N(S) ∩ X | ≥ |S | − (br/mc − k)

Together this gives:

|N(S)| =|X ′|+ |N(S) ∩ X |

≥ |X ′|+ |S | − (br/mc − k)

=(br/mc − k) + |S | − (br/mc − k) = |S |So spies have a stable position at time t + 1, and G is spy-good.

Page 47: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.

x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u

y1 · · · yk ′Y : new meetings

S

Matching covering Y ? Hall’s Theorem.

|N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:

m|S | ≤ m|N(S) ∩ X |+ (r − km)

|S | ≤ |N(S) ∩ X |+ (br/mc − k)

|N(S) ∩ X | ≥ |S | − (br/mc − k)

Together this gives:

|N(S)| =|X ′|+ |N(S) ∩ X |

≥ |X ′|+ |S | − (br/mc − k)

=(br/mc − k) + |S | − (br/mc − k) = |S |So spies have a stable position at time t + 1, and G is spy-good.

Page 48: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.

x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u

y1 · · · yk ′Y : new meetings S

Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |

Since rev’s at meetings in S came from X ∩ N(S) or u:

m|S | ≤ m|N(S) ∩ X |+ (r − km)

|S | ≤ |N(S) ∩ X |+ (br/mc − k)

|N(S) ∩ X | ≥ |S | − (br/mc − k)

Together this gives:

|N(S)| =|X ′|+ |N(S) ∩ X |

≥ |X ′|+ |S | − (br/mc − k)

=(br/mc − k) + |S | − (br/mc − k) = |S |So spies have a stable position at time t + 1, and G is spy-good.

Page 49: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.

x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u

y1 · · · yk ′Y : new meetings S

Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:

m|S | ≤ m|N(S) ∩ X |+ (r − km)

|S | ≤ |N(S) ∩ X |+ (br/mc − k)

|N(S) ∩ X | ≥ |S | − (br/mc − k)

Together this gives:

|N(S)| =|X ′|+ |N(S) ∩ X |

≥ |X ′|+ |S | − (br/mc − k)

=(br/mc − k) + |S | − (br/mc − k) = |S |So spies have a stable position at time t + 1, and G is spy-good.

Page 50: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.

x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u

y1 · · · yk ′Y : new meetings S

Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:

m|S | ≤ m|N(S) ∩ X |+ (r − km)

|S | ≤ |N(S) ∩ X |+ (br/mc − k)

|N(S) ∩ X | ≥ |S | − (br/mc − k)

Together this gives:

|N(S)| =|X ′|+ |N(S) ∩ X |

≥ |X ′|+ |S | − (br/mc − k)

=(br/mc − k) + |S | − (br/mc − k) = |S |So spies have a stable position at time t + 1, and G is spy-good.

Page 51: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.

x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u

y1 · · · yk ′Y : new meetings S

Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:

m|S | ≤ m|N(S) ∩ X |+ (r − km)

|S | ≤ |N(S) ∩ X |+ (br/mc − k)

|N(S) ∩ X | ≥ |S | − (br/mc − k)

Together this gives:

|N(S)| =|X ′|+ |N(S) ∩ X |

≥ |X ′|+ |S | − (br/mc − k)

=(br/mc − k) + |S | − (br/mc − k) = |S |So spies have a stable position at time t + 1, and G is spy-good.

Page 52: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.

x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u

y1 · · · yk ′Y : new meetings S

Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:

m|S | ≤ m|N(S) ∩ X |+ (r − km)

|S | ≤ |N(S) ∩ X |+ (br/mc − k)

|N(S) ∩ X | ≥ |S | − (br/mc − k)

Together this gives:

|N(S)| =|X ′|+ |N(S) ∩ X |

≥ |X ′|+ |S | − (br/mc − k)

=(br/mc − k) + |S | − (br/mc − k) = |S |So spies have a stable position at time t + 1, and G is spy-good.

Page 53: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.

x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u

y1 · · · yk ′Y : new meetings S

Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:

m|S | ≤ m|N(S) ∩ X |+ (r − km)

|S | ≤ |N(S) ∩ X |+ (br/mc − k)

|N(S) ∩ X | ≥ |S | − (br/mc − k)

Together this gives:

|N(S)| =|X ′|+ |N(S) ∩ X |

≥ |X ′|+ |S | − (br/mc − k)

=(br/mc − k) + |S | − (br/mc − k) = |S |So spies have a stable position at time t + 1, and G is spy-good.

Page 54: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.

x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u

y1 · · · yk ′Y : new meetings S

Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:

m|S | ≤ m|N(S) ∩ X |+ (r − km)

|S | ≤ |N(S) ∩ X |+ (br/mc − k)

|N(S) ∩ X | ≥ |S | − (br/mc − k)

Together this gives:

|N(S)| =|X ′|+ |N(S) ∩ X | ≥ |X ′|+ |S | − (br/mc − k)

=(br/mc − k) + |S | − (br/mc − k) = |S |So spies have a stable position at time t + 1, and G is spy-good.

Page 55: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.

x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u

y1 · · · yk ′Y : new meetings S

Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:

m|S | ≤ m|N(S) ∩ X |+ (r − km)

|S | ≤ |N(S) ∩ X |+ (br/mc − k)

|N(S) ∩ X | ≥ |S | − (br/mc − k)

Together this gives:

|N(S)| =|X ′|+ |N(S) ∩ X | ≥ |X ′|+ |S | − (br/mc − k)

=(br/mc − k) + |S | − (br/mc − k)

= |S |So spies have a stable position at time t + 1, and G is spy-good.

Page 56: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.

x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u

y1 · · · yk ′Y : new meetings S

Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:

m|S | ≤ m|N(S) ∩ X |+ (r − km)

|S | ≤ |N(S) ∩ X |+ (br/mc − k)

|N(S) ∩ X | ≥ |S | − (br/mc − k)

Together this gives:

|N(S)| =|X ′|+ |N(S) ∩ X | ≥ |X ′|+ |S | − (br/mc − k)

=(br/mc − k) + |S | − (br/mc − k) = |S |

So spies have a stable position at time t + 1, and G is spy-good.

Page 57: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.

x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u

y1 · · · yk ′Y : new meetings S

Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:

m|S | ≤ m|N(S) ∩ X |+ (r − km)

|S | ≤ |N(S) ∩ X |+ (br/mc − k)

|N(S) ∩ X | ≥ |S | − (br/mc − k)

Together this gives:

|N(S)| =|X ′|+ |N(S) ∩ X | ≥ |X ′|+ |S | − (br/mc − k)

=(br/mc − k) + |S | − (br/mc − k) = |S |So spies have a stable position at time t + 1, and G is spy-good.

Page 58: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good graphs: Webbed Trees

Def: G is a webbed tree if G has a rooted spanningtree T s.t. each edge of G not in T is between siblings.

Thm: Every webbed tree is spy-good.Pf Sketch: Same strategy as for trees:

s(v) =

⌊w(v)

m

⌋−∑

x∈C(v)

⌊w(x)

m

Partition E (G ) into subgraphs G (v) = G [v ∪ C (v)]. Simulatea game in each G (v); use those moves in the actual game.Each G (v) is a dominated graph, so we can use that result.

Cor: Every interval graph is spy-good.Pf: Interval graphs are webbed trees.

Page 59: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good graphs: Webbed Trees

Def: G is a webbed tree if G has a rooted spanningtree T s.t. each edge of G not in T is between siblings.

Thm: Every webbed tree is spy-good.Pf Sketch: Same strategy as for trees:

s(v) =

⌊w(v)

m

⌋−∑

x∈C(v)

⌊w(x)

m

Partition E (G ) into subgraphs G (v) = G [v ∪ C (v)]. Simulatea game in each G (v); use those moves in the actual game.Each G (v) is a dominated graph, so we can use that result.

Cor: Every interval graph is spy-good.Pf: Interval graphs are webbed trees.

Page 60: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good graphs: Webbed Trees

Def: G is a webbed tree if G has a rooted spanningtree T s.t. each edge of G not in T is between siblings.

Thm: Every webbed tree is spy-good.Pf Sketch: Same strategy as for trees:

s(v) =

⌊w(v)

m

⌋−∑

x∈C(v)

⌊w(x)

m

Partition E (G ) into subgraphs G (v) = G [v ∪ C (v)].

Simulatea game in each G (v); use those moves in the actual game.Each G (v) is a dominated graph, so we can use that result.

Cor: Every interval graph is spy-good.Pf: Interval graphs are webbed trees.

Page 61: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good graphs: Webbed Trees

Def: G is a webbed tree if G has a rooted spanningtree T s.t. each edge of G not in T is between siblings.

Thm: Every webbed tree is spy-good.Pf Sketch: Same strategy as for trees:

s(v) =

⌊w(v)

m

⌋−∑

x∈C(v)

⌊w(x)

m

Partition E (G ) into subgraphs G (v) = G [v ∪ C (v)]. Simulatea game in each G (v); use those moves in the actual game.Each G (v) is a dominated graph, so we can use that result.

Cor: Every interval graph is spy-good.Pf: Interval graphs are webbed trees.

Page 62: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good graphs: Webbed Trees

Def: G is a webbed tree if G has a rooted spanningtree T s.t. each edge of G not in T is between siblings.

Thm: Every webbed tree is spy-good.Pf Sketch: Same strategy as for trees:

s(v) =

⌊w(v)

m

⌋−∑

x∈C(v)

⌊w(x)

m

Partition E (G ) into subgraphs G (v) = G [v ∪ C (v)]. Simulatea game in each G (v); use those moves in the actual game.Each G (v) is a dominated graph, so we can use that result.

Cor: Every interval graph is spy-good.

Pf: Interval graphs are webbed trees.

Page 63: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Spy-good graphs: Webbed Trees

Def: G is a webbed tree if G has a rooted spanningtree T s.t. each edge of G not in T is between siblings.

Thm: Every webbed tree is spy-good.Pf Sketch: Same strategy as for trees:

s(v) =

⌊w(v)

m

⌋−∑

x∈C(v)

⌊w(x)

m

Partition E (G ) into subgraphs G (v) = G [v ∪ C (v)]. Simulatea game in each G (v); use those moves in the actual game.Each G (v) is a dominated graph, so we can use that result.

Cor: Every interval graph is spy-good.Pf: Interval graphs are webbed trees.

Page 64: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Large Complete Bipartite Graphs

Thm: For a large complete bipartite graph G

σ(G , 2, r) =7

5

r

2

Main ideas: Call the two parts X1 and X2.

I On each round, the two main threats of the rev’s are to formas many uncovered meetings as possible in X1; or in X2. If thespies defend against these two threats, then they won’t lose.

I “Lonely spies” are bad, so the spies avoid them when possible.

I By always keeping a large fraction of spies in each part,the spies guarantee that they’ll have few lonely spies.

I The spies never need to look more than 1 move ahead.

I To win, on each round the spies maintain an invariant.

Page 65: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Large Complete Bipartite Graphs

Thm: For a large complete bipartite graph G

σ(G , 2, r) =7

5

r

2

Main ideas: Call the two parts X1 and X2.

I On each round, the two main threats of the rev’s are to formas many uncovered meetings as possible in X1; or in X2. If thespies defend against these two threats, then they won’t lose.

I “Lonely spies” are bad, so the spies avoid them when possible.

I By always keeping a large fraction of spies in each part,the spies guarantee that they’ll have few lonely spies.

I The spies never need to look more than 1 move ahead.

I To win, on each round the spies maintain an invariant.

Page 66: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Large Complete Bipartite Graphs

Thm: For a large complete bipartite graph G

σ(G , 2, r) =7

5

r

2

Main ideas: Call the two parts X1 and X2.

I On each round, the two main threats of the rev’s are to formas many uncovered meetings as possible in X1; or in X2. If thespies defend against these two threats, then they won’t lose.

I “Lonely spies” are bad, so the spies avoid them when possible.

I By always keeping a large fraction of spies in each part,the spies guarantee that they’ll have few lonely spies.

I The spies never need to look more than 1 move ahead.

I To win, on each round the spies maintain an invariant.

Page 67: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Large Complete Bipartite Graphs

Thm: For a large complete bipartite graph G

σ(G , 2, r) =7

5

r

2

Main ideas: Call the two parts X1 and X2.

I On each round, the two main threats of the rev’s are to formas many uncovered meetings as possible in X1; or in X2. If thespies defend against these two threats, then they won’t lose.

I “Lonely spies” are bad, so the spies avoid them when possible.

I By always keeping a large fraction of spies in each part,the spies guarantee that they’ll have few lonely spies.

I The spies never need to look more than 1 move ahead.

I To win, on each round the spies maintain an invariant.

Page 68: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Large Complete Bipartite Graphs

Thm: For a large complete bipartite graph G

σ(G , 2, r) =7

5

r

2

Main ideas: Call the two parts X1 and X2.

I On each round, the two main threats of the rev’s are to formas many uncovered meetings as possible in X1; or in X2. If thespies defend against these two threats, then they won’t lose.

I “Lonely spies” are bad, so the spies avoid them when possible.

I By always keeping a large fraction of spies in each part,the spies guarantee that they’ll have few lonely spies.

I The spies never need to look more than 1 move ahead.

I To win, on each round the spies maintain an invariant.

Page 69: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Large Complete Bipartite Graphs

Thm: For a large complete bipartite graph G

σ(G , 2, r) =7

5

r

2

Main ideas: Call the two parts X1 and X2.

I On each round, the two main threats of the rev’s are to formas many uncovered meetings as possible in X1; or in X2. If thespies defend against these two threats, then they won’t lose.

I “Lonely spies” are bad, so the spies avoid them when possible.

I By always keeping a large fraction of spies in each part,the spies guarantee that they’ll have few lonely spies.

I The spies never need to look more than 1 move ahead.

I To win, on each round the spies maintain an invariant.

Page 70: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Main Results and Open Problems

1. br/mc spies can win on:dominated graphs, trees, interval graphs, “webbed trees”

also graph powers and “vertex blowups”Problem 1: Characterize spy-good graphs

2. For large complete bipartite graphs:

σ(G , 2, r) =7

10r

=7

5

r

2

σ(G , 3, r) =1

2r

=3

2

r

3

(3

2− o(1)

)r

m− 2 ≤ σ(G ,m, r) < 1.58

r

m, for m ≥ 4

Problem 2: Improve upper bounds for m ≥ 4.Conj: As m grows: σ(G ,m, r) ∼ 3

2rm

Page 71: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Main Results and Open Problems

1. br/mc spies can win on:dominated graphs, trees, interval graphs, “webbed trees”also graph powers and “vertex blowups”

Problem 1: Characterize spy-good graphs

2. For large complete bipartite graphs:

σ(G , 2, r) =7

10r

=7

5

r

2

σ(G , 3, r) =1

2r

=3

2

r

3

(3

2− o(1)

)r

m− 2 ≤ σ(G ,m, r) < 1.58

r

m, for m ≥ 4

Problem 2: Improve upper bounds for m ≥ 4.Conj: As m grows: σ(G ,m, r) ∼ 3

2rm

Page 72: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Main Results and Open Problems

1. br/mc spies can win on:dominated graphs, trees, interval graphs, “webbed trees”also graph powers and “vertex blowups”Problem 1: Characterize spy-good graphs

2. For large complete bipartite graphs:

σ(G , 2, r) =7

10r

=7

5

r

2

σ(G , 3, r) =1

2r

=3

2

r

3

(3

2− o(1)

)r

m− 2 ≤ σ(G ,m, r) < 1.58

r

m, for m ≥ 4

Problem 2: Improve upper bounds for m ≥ 4.Conj: As m grows: σ(G ,m, r) ∼ 3

2rm

Page 73: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Main Results and Open Problems

1. br/mc spies can win on:dominated graphs, trees, interval graphs, “webbed trees”also graph powers and “vertex blowups”Problem 1: Characterize spy-good graphs

2. For large complete bipartite graphs:

σ(G , 2, r) =7

10r =

7

5

r

2

σ(G , 3, r) =1

2r =

3

2

r

3(3

2− o(1)

)r

m− 2 ≤ σ(G ,m, r) < 1.58

r

m, for m ≥ 4

Problem 2: Improve upper bounds for m ≥ 4.Conj: As m grows: σ(G ,m, r) ∼ 3

2rm

Page 74: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Main Results and Open Problems

1. br/mc spies can win on:dominated graphs, trees, interval graphs, “webbed trees”also graph powers and “vertex blowups”Problem 1: Characterize spy-good graphs

2. For large complete bipartite graphs:

σ(G , 2, r) =7

10r =

7

5

r

2

σ(G , 3, r) =1

2r =

3

2

r

3(3

2− o(1)

)r

m− 2 ≤ σ(G ,m, r) < 1.58

r

m, for m ≥ 4

Problem 2: Improve upper bounds for m ≥ 4.

Conj: As m grows: σ(G ,m, r) ∼ 32

rm

Page 75: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics

Main Results and Open Problems

1. br/mc spies can win on:dominated graphs, trees, interval graphs, “webbed trees”also graph powers and “vertex blowups”Problem 1: Characterize spy-good graphs

2. For large complete bipartite graphs:

σ(G , 2, r) =7

10r =

7

5

r

2

σ(G , 3, r) =1

2r =

3

2

r

3(3

2− o(1)

)r

m− 2 ≤ σ(G ,m, r) < 1.58

r

m, for m ≥ 4

Problem 2: Improve upper bounds for m ≥ 4.Conj: As m grows: σ(G ,m, r) ∼ 3

2rm