revolutionaries and spiesdcranston/slides/spies-talk.pdf · slides available on my preprint page...
TRANSCRIPT
![Page 1: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/1.jpg)
Revolutionaries and Spies
Daniel W. CranstonVirginia Commonwealth University
Slides available on my preprint pageJoint with Jane Butterfield, Greg Puleo,
Cliff Smyth, Doug West, and Reza Zamani
LSU Combinatorics Seminar6 October 2011
![Page 2: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/2.jpg)
A Problem of Network SecuritySetup: r revolutionaries play against s spies on a graph G .Each rev. moves to a vertex, then each spy moves to a vertex.
Goal: Rev’s want to get m rev’s at a common vertex, with no spy.Each turn: Each rev. moves/stays, then each spy moves/stays.
Obs 1: If s ≥ |V (G )|, then the spies win.
s
s
Obs 2: If s < |V (G )| and br/mc > s, then rev’s win.Ex: Say m = 2, r = 8, and s = 3.So we assume br/mc ≤ s < |V (G )|.
Def: σ(G ,m, r) is minimum number of spies needed to win on G
![Page 3: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/3.jpg)
A Problem of Network SecuritySetup: r revolutionaries play against s spies on a graph G .Each rev. moves to a vertex, then each spy moves to a vertex.Goal: Rev’s want to get m rev’s at a common vertex, with no spy.
Each turn: Each rev. moves/stays, then each spy moves/stays.
Obs 1: If s ≥ |V (G )|, then the spies win.
s
s
Obs 2: If s < |V (G )| and br/mc > s, then rev’s win.Ex: Say m = 2, r = 8, and s = 3.So we assume br/mc ≤ s < |V (G )|.
Def: σ(G ,m, r) is minimum number of spies needed to win on G
![Page 4: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/4.jpg)
A Problem of Network SecuritySetup: r revolutionaries play against s spies on a graph G .Each rev. moves to a vertex, then each spy moves to a vertex.Goal: Rev’s want to get m rev’s at a common vertex, with no spy.Each turn: Each rev. moves/stays, then each spy moves/stays.
Obs 1: If s ≥ |V (G )|, then the spies win.
s
s
Obs 2: If s < |V (G )| and br/mc > s, then rev’s win.Ex: Say m = 2, r = 8, and s = 3.So we assume br/mc ≤ s < |V (G )|.
Def: σ(G ,m, r) is minimum number of spies needed to win on G
![Page 5: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/5.jpg)
A Problem of Network SecuritySetup: r revolutionaries play against s spies on a graph G .Each rev. moves to a vertex, then each spy moves to a vertex.Goal: Rev’s want to get m rev’s at a common vertex, with no spy.Each turn: Each rev. moves/stays, then each spy moves/stays.
Obs 1: If s ≥ |V (G )|, then the spies win.
s
s
Obs 2: If s < |V (G )| and br/mc > s, then rev’s win.Ex: Say m = 2, r = 8, and s = 3.So we assume br/mc ≤ s < |V (G )|.
Def: σ(G ,m, r) is minimum number of spies needed to win on G
![Page 6: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/6.jpg)
A Problem of Network SecuritySetup: r revolutionaries play against s spies on a graph G .Each rev. moves to a vertex, then each spy moves to a vertex.Goal: Rev’s want to get m rev’s at a common vertex, with no spy.Each turn: Each rev. moves/stays, then each spy moves/stays.
Obs 1: If s ≥ |V (G )|, then the spies win.
s
s
Obs 2: If s < |V (G )| and br/mc > s, then rev’s win.Ex: Say m = 2, r = 8, and s = 3.So we assume br/mc ≤ s < |V (G )|.
Def: σ(G ,m, r) is minimum number of spies needed to win on G
![Page 7: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/7.jpg)
A Problem of Network SecuritySetup: r revolutionaries play against s spies on a graph G .Each rev. moves to a vertex, then each spy moves to a vertex.Goal: Rev’s want to get m rev’s at a common vertex, with no spy.Each turn: Each rev. moves/stays, then each spy moves/stays.
Obs 1: If s ≥ |V (G )|, then the spies win.
s
s
s
s
s
ss
s
Obs 2: If s < |V (G )| and br/mc > s, then rev’s win.Ex: Say m = 2, r = 8, and s = 3.So we assume br/mc ≤ s < |V (G )|.
Def: σ(G ,m, r) is minimum number of spies needed to win on G
![Page 8: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/8.jpg)
A Problem of Network SecuritySetup: r revolutionaries play against s spies on a graph G .Each rev. moves to a vertex, then each spy moves to a vertex.Goal: Rev’s want to get m rev’s at a common vertex, with no spy.Each turn: Each rev. moves/stays, then each spy moves/stays.
Obs 1: If s ≥ |V (G )|, then the spies win.
s
s
s
s
s
ss
s
Obs 2: If s < |V (G )| and br/mc > s, then rev’s win.
Ex: Say m = 2, r = 8, and s = 3.So we assume br/mc ≤ s < |V (G )|.
Def: σ(G ,m, r) is minimum number of spies needed to win on G
![Page 9: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/9.jpg)
A Problem of Network SecuritySetup: r revolutionaries play against s spies on a graph G .Each rev. moves to a vertex, then each spy moves to a vertex.Goal: Rev’s want to get m rev’s at a common vertex, with no spy.Each turn: Each rev. moves/stays, then each spy moves/stays.
Obs 1: If s ≥ |V (G )|, then the spies win.
s
s
s
s
s
ss
s
r r
r r
r r
r r
s s s
Obs 2: If s < |V (G )| and br/mc > s, then rev’s win.Ex: Say m = 2, r = 8, and s = 3.
So we assume br/mc ≤ s < |V (G )|.
Def: σ(G ,m, r) is minimum number of spies needed to win on G
![Page 10: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/10.jpg)
A Problem of Network SecuritySetup: r revolutionaries play against s spies on a graph G .Each rev. moves to a vertex, then each spy moves to a vertex.Goal: Rev’s want to get m rev’s at a common vertex, with no spy.Each turn: Each rev. moves/stays, then each spy moves/stays.
Obs 1: If s ≥ |V (G )|, then the spies win.
s
s
s
s
s
ss
s
r r
r r
r r
r r
s s s
Obs 2: If s < |V (G )| and br/mc > s, then rev’s win.Ex: Say m = 2, r = 8, and s = 3.So we assume br/mc ≤ s < |V (G )|.
Def: σ(G ,m, r) is minimum number of spies needed to win on G
![Page 11: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/11.jpg)
A Problem of Network SecuritySetup: r revolutionaries play against s spies on a graph G .Each rev. moves to a vertex, then each spy moves to a vertex.Goal: Rev’s want to get m rev’s at a common vertex, with no spy.Each turn: Each rev. moves/stays, then each spy moves/stays.
Obs 1: If s ≥ |V (G )|, then the spies win.
s
s
s
s
s
ss
s
r r
r r
r r
r r
s s s
Obs 2: If s < |V (G )| and br/mc > s, then rev’s win.Ex: Say m = 2, r = 8, and s = 3.So we assume br/mc ≤ s < |V (G )|.
Def: σ(G ,m, r) is minimum number of spies needed to win on G
![Page 12: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/12.jpg)
Results (thresholds for spies to win)
1. br/mc spies can win on:
dominated graphs, trees, interval graphs, “webbed trees”
2. On chordal graphs, we may need r −m + 1 spies to win
3. On unicyclic graphs, dr/me spies can winrev’s may need many moves to beat dr/me − 1 spies
4. Random graph, hypercubes, large complete k-partite
5. For large complete bipartite graphs:
σ(G , 2, r) =7
10r
=7
5
r
2
σ(G , 3, r) =1
2r
=3
2
r
3
(3
2− o(1)
)r
m− 2 ≤ σ(G ,m, r) < 1.58
r
m, for m ≥ 4
Conj: As m grows: σ(G ,m, r) ∼ 32
rm
![Page 13: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/13.jpg)
Results (thresholds for spies to win)
1. br/mc spies can win on:dominated graphs, trees, interval graphs, “webbed trees”
2. On chordal graphs, we may need r −m + 1 spies to win
3. On unicyclic graphs, dr/me spies can winrev’s may need many moves to beat dr/me − 1 spies
4. Random graph, hypercubes, large complete k-partite
5. For large complete bipartite graphs:
σ(G , 2, r) =7
10r
=7
5
r
2
σ(G , 3, r) =1
2r
=3
2
r
3
(3
2− o(1)
)r
m− 2 ≤ σ(G ,m, r) < 1.58
r
m, for m ≥ 4
Conj: As m grows: σ(G ,m, r) ∼ 32
rm
![Page 14: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/14.jpg)
Results (thresholds for spies to win)
1. br/mc spies can win on: spy-good graphsdominated graphs, trees, interval graphs, “webbed trees”
2. On chordal graphs, we may need r −m + 1 spies to win
3. On unicyclic graphs, dr/me spies can winrev’s may need many moves to beat dr/me − 1 spies
4. Random graph, hypercubes, large complete k-partite
5. For large complete bipartite graphs:
σ(G , 2, r) =7
10r
=7
5
r
2
σ(G , 3, r) =1
2r
=3
2
r
3
(3
2− o(1)
)r
m− 2 ≤ σ(G ,m, r) < 1.58
r
m, for m ≥ 4
Conj: As m grows: σ(G ,m, r) ∼ 32
rm
![Page 15: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/15.jpg)
Results (thresholds for spies to win)
1. br/mc spies can win on: spy-good graphsdominated graphs, trees, interval graphs, “webbed trees”
2. On chordal graphs, we may need r −m + 1 spies to win
3. On unicyclic graphs, dr/me spies can winrev’s may need many moves to beat dr/me − 1 spies
4. Random graph, hypercubes, large complete k-partite
5. For large complete bipartite graphs:
σ(G , 2, r) =7
10r
=7
5
r
2
σ(G , 3, r) =1
2r
=3
2
r
3
(3
2− o(1)
)r
m− 2 ≤ σ(G ,m, r) < 1.58
r
m, for m ≥ 4
Conj: As m grows: σ(G ,m, r) ∼ 32
rm
![Page 16: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/16.jpg)
Results (thresholds for spies to win)
1. br/mc spies can win on: spy-good graphsdominated graphs, trees, interval graphs, “webbed trees”
2. On chordal graphs, we may need r −m + 1 spies to win
3. On unicyclic graphs, dr/me spies can winrev’s may need many moves to beat dr/me − 1 spies
4. Random graph, hypercubes, large complete k-partite
5. For large complete bipartite graphs:
σ(G , 2, r) =7
10r
=7
5
r
2
σ(G , 3, r) =1
2r
=3
2
r
3
(3
2− o(1)
)r
m− 2 ≤ σ(G ,m, r) < 1.58
r
m, for m ≥ 4
Conj: As m grows: σ(G ,m, r) ∼ 32
rm
![Page 17: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/17.jpg)
Results (thresholds for spies to win)
1. br/mc spies can win on: spy-good graphsdominated graphs, trees, interval graphs, “webbed trees”
2. On chordal graphs, we may need r −m + 1 spies to win
3. On unicyclic graphs, dr/me spies can winrev’s may need many moves to beat dr/me − 1 spies
4. Random graph, hypercubes, large complete k-partite
5. For large complete bipartite graphs:
σ(G , 2, r) =7
10r
=7
5
r
2
σ(G , 3, r) =1
2r
=3
2
r
3
(3
2− o(1)
)r
m− 2 ≤ σ(G ,m, r) < 1.58
r
m, for m ≥ 4
Conj: As m grows: σ(G ,m, r) ∼ 32
rm
![Page 18: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/18.jpg)
Results (thresholds for spies to win)
1. br/mc spies can win on: spy-good graphsdominated graphs, trees, interval graphs, “webbed trees”
2. On chordal graphs, we may need r −m + 1 spies to win
3. On unicyclic graphs, dr/me spies can winrev’s may need many moves to beat dr/me − 1 spies
4. Random graph, hypercubes, large complete k-partite
5. For large complete bipartite graphs:
σ(G , 2, r) =7
10r
=7
5
r
2
σ(G , 3, r) =1
2r
=3
2
r
3
(3
2− o(1)
)r
m− 2 ≤ σ(G ,m, r) < 1.58
r
m, for m ≥ 4
Conj: As m grows: σ(G ,m, r) ∼ 32
rm
![Page 19: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/19.jpg)
Results (thresholds for spies to win)
1. br/mc spies can win on: spy-good graphsdominated graphs, trees, interval graphs, “webbed trees”
2. On chordal graphs, we may need r −m + 1 spies to win
3. On unicyclic graphs, dr/me spies can winrev’s may need many moves to beat dr/me − 1 spies
4. Random graph, hypercubes, large complete k-partite
5. For large complete bipartite graphs:
σ(G , 2, r) =7
10r
=7
5
r
2
σ(G , 3, r) =1
2r
=3
2
r
3(3
2− o(1)
)r
m− 2 ≤ σ(G ,m, r) < 1.58
r
m, for m ≥ 4
Conj: As m grows: σ(G ,m, r) ∼ 32
rm
![Page 20: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/20.jpg)
Results (thresholds for spies to win)
1. br/mc spies can win on: spy-good graphsdominated graphs, trees, interval graphs, “webbed trees”
2. On chordal graphs, we may need r −m + 1 spies to win
3. On unicyclic graphs, dr/me spies can winrev’s may need many moves to beat dr/me − 1 spies
4. Random graph, hypercubes, large complete k-partite
5. For large complete bipartite graphs:
σ(G , 2, r) =7
10r
=7
5
r
2
σ(G , 3, r) =1
2r
=3
2
r
3
(3
2− o(1)
)r
m− 2 ≤ σ(G ,m, r) < 1.58
r
m, for m ≥ 4
Conj: As m grows: σ(G ,m, r) ∼ 32
rm
![Page 21: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/21.jpg)
Results (thresholds for spies to win)
1. br/mc spies can win on: spy-good graphsdominated graphs, trees, interval graphs, “webbed trees”
2. On chordal graphs, we may need r −m + 1 spies to win
3. On unicyclic graphs, dr/me spies can winrev’s may need many moves to beat dr/me − 1 spies
4. Random graph, hypercubes, large complete k-partite
5. For large complete bipartite graphs:
σ(G , 2, r) =7
10r =
7
5
r
2
σ(G , 3, r) =1
2r =
3
2
r
3(3
2− o(1)
)r
m− 2 ≤ σ(G ,m, r) < 1.58
r
m, for m ≥ 4
Conj: As m grows: σ(G ,m, r) ∼ 32
rm
![Page 22: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/22.jpg)
Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .
Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.
s
s
Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.
s(v) =
⌊w(v)
m
⌋−∑
x∈C(v)
⌊w(x)
m
⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative
2. If r(v) ≥ m, then s(v) ≥⌊
w(v)m
⌋−⌊
w(v)−r(v)m
⌋≥ 1
3.∑
v∈T s(v) =⌊
w(u)m
⌋=⌊
rm
⌋
![Page 23: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/23.jpg)
Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .
Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.
Pf: One spy follows each mth rev. When rev’s move, spies repeat.
s
s
Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.
s(v) =
⌊w(v)
m
⌋−∑
x∈C(v)
⌊w(x)
m
⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative
2. If r(v) ≥ m, then s(v) ≥⌊
w(v)m
⌋−⌊
w(v)−r(v)m
⌋≥ 1
3.∑
v∈T s(v) =⌊
w(u)m
⌋=⌊
rm
⌋
![Page 24: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/24.jpg)
Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .
Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.
s
s
Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.
s(v) =
⌊w(v)
m
⌋−∑
x∈C(v)
⌊w(x)
m
⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative
2. If r(v) ≥ m, then s(v) ≥⌊
w(v)m
⌋−⌊
w(v)−r(v)m
⌋≥ 1
3.∑
v∈T s(v) =⌊
w(u)m
⌋=⌊
rm
⌋
![Page 25: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/25.jpg)
Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .
Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.
s
s
Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.
s(v) =
⌊w(v)
m
⌋−∑
x∈C(v)
⌊w(x)
m
⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative
2. If r(v) ≥ m, then s(v) ≥⌊
w(v)m
⌋−⌊
w(v)−r(v)m
⌋≥ 1
3.∑
v∈T s(v) =⌊
w(u)m
⌋=⌊
rm
⌋
![Page 26: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/26.jpg)
Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .
Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.
s
s r r r r r r r r r r r r r
Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.
s(v) =
⌊w(v)
m
⌋−∑
x∈C(v)
⌊w(x)
m
⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative
2. If r(v) ≥ m, then s(v) ≥⌊
w(v)m
⌋−⌊
w(v)−r(v)m
⌋≥ 1
3.∑
v∈T s(v) =⌊
w(u)m
⌋=⌊
rm
⌋
![Page 27: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/27.jpg)
Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .
Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.
s
s r r r r r r r r r r r r r
s
Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.
s(v) =
⌊w(v)
m
⌋−∑
x∈C(v)
⌊w(x)
m
⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative
2. If r(v) ≥ m, then s(v) ≥⌊
w(v)m
⌋−⌊
w(v)−r(v)m
⌋≥ 1
3.∑
v∈T s(v) =⌊
w(u)m
⌋=⌊
rm
⌋
![Page 28: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/28.jpg)
Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .
Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.
s
s r r r r r r r r r r r r r
s s
Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.
s(v) =
⌊w(v)
m
⌋−∑
x∈C(v)
⌊w(x)
m
⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative
2. If r(v) ≥ m, then s(v) ≥⌊
w(v)m
⌋−⌊
w(v)−r(v)m
⌋≥ 1
3.∑
v∈T s(v) =⌊
w(u)m
⌋=⌊
rm
⌋
![Page 29: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/29.jpg)
Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .
Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.
s
s r r r r r r r r r r r r r
s s s
Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.
s(v) =
⌊w(v)
m
⌋−∑
x∈C(v)
⌊w(x)
m
⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative
2. If r(v) ≥ m, then s(v) ≥⌊
w(v)m
⌋−⌊
w(v)−r(v)m
⌋≥ 1
3.∑
v∈T s(v) =⌊
w(u)m
⌋=⌊
rm
⌋
![Page 30: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/30.jpg)
Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .
Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.
s
s r r r r r r r r r r r r r
s s s s
Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.
s(v) =
⌊w(v)
m
⌋−∑
x∈C(v)
⌊w(x)
m
⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative
2. If r(v) ≥ m, then s(v) ≥⌊
w(v)m
⌋−⌊
w(v)−r(v)m
⌋≥ 1
3.∑
v∈T s(v) =⌊
w(u)m
⌋=⌊
rm
⌋
![Page 31: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/31.jpg)
Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .
Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.
s
s
s s s s
r r r r r r r r r r r r r→ ← → ← ⇐ ←
Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.
s(v) =
⌊w(v)
m
⌋−∑
x∈C(v)
⌊w(x)
m
⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative
2. If r(v) ≥ m, then s(v) ≥⌊
w(v)m
⌋−⌊
w(v)−r(v)m
⌋≥ 1
3.∑
v∈T s(v) =⌊
w(u)m
⌋=⌊
rm
⌋
![Page 32: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/32.jpg)
Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .
Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.
s
s r r r r r r r r r r r r r
s s s s← → ← ←
Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.
s(v) =
⌊w(v)
m
⌋−∑
x∈C(v)
⌊w(x)
m
⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative
2. If r(v) ≥ m, then s(v) ≥⌊
w(v)m
⌋−⌊
w(v)−r(v)m
⌋≥ 1
3.∑
v∈T s(v) =⌊
w(u)m
⌋=⌊
rm
⌋
![Page 33: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/33.jpg)
Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .
Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.
s
s
s s s s
r r r r r r r r r r r r r← → ⇐ → ← ←
Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.
s(v) =
⌊w(v)
m
⌋−∑
x∈C(v)
⌊w(x)
m
⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative
2. If r(v) ≥ m, then s(v) ≥⌊
w(v)m
⌋−⌊
w(v)−r(v)m
⌋≥ 1
3.∑
v∈T s(v) =⌊
w(u)m
⌋=⌊
rm
⌋
![Page 34: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/34.jpg)
Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .
Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.
s
s r r r r r r r r r r r r r
s s s s
Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.
s(v) =
⌊w(v)
m
⌋−∑
x∈C(v)
⌊w(x)
m
⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative
2. If r(v) ≥ m, then s(v) ≥⌊
w(v)m
⌋−⌊
w(v)−r(v)m
⌋≥ 1
3.∑
v∈T s(v) =⌊
w(u)m
⌋=⌊
rm
⌋
![Page 35: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/35.jpg)
Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .
Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.
s
s r r r r r r r r r r r r r
s s s s
Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.
s(v) =
⌊w(v)
m
⌋−∑
x∈C(v)
⌊w(x)
m
⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative
2. If r(v) ≥ m, then s(v) ≥⌊
w(v)m
⌋−⌊
w(v)−r(v)m
⌋≥ 1
3.∑
v∈T s(v) =⌊
w(u)m
⌋=⌊
rm
⌋
![Page 36: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/36.jpg)
Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .
Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.
s
s r r r r r r r r r r r r r
s s s s
Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.
s(v) =
⌊w(v)
m
⌋−∑
x∈C(v)
⌊w(x)
m
⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative
2. If r(v) ≥ m, then s(v) ≥⌊
w(v)m
⌋−⌊
w(v)−r(v)m
⌋≥ 1
3.∑
v∈T s(v) =⌊
w(u)m
⌋=⌊
rm
⌋
![Page 37: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/37.jpg)
Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .
Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.
s
s r r r r r r r r r r r r r
s s s s
Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.
s(v) =
⌊w(v)
m
⌋−∑
x∈C(v)
⌊w(x)
m
⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative
2. If r(v) ≥ m, then s(v) ≥⌊
w(v)m
⌋−⌊
w(v)−r(v)m
⌋≥ 1
3.∑
v∈T s(v) =⌊
w(u)m
⌋=⌊
rm
⌋
![Page 38: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/38.jpg)
Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .
Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.
s
s r r r r r r r r r r r r r
s s s s
Thm: Every tree is spy-good.
Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.
s(v) =
⌊w(v)
m
⌋−∑
x∈C(v)
⌊w(x)
m
⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative
2. If r(v) ≥ m, then s(v) ≥⌊
w(v)m
⌋−⌊
w(v)−r(v)m
⌋≥ 1
3.∑
v∈T s(v) =⌊
w(u)m
⌋=⌊
rm
⌋
![Page 39: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/39.jpg)
Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .
Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.
s
s r r r r r r r r r r r r r
s s s s
Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.
s(v) =
⌊w(v)
m
⌋−∑
x∈C(v)
⌊w(x)
m
⌋
1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative
2. If r(v) ≥ m, then s(v) ≥⌊
w(v)m
⌋−⌊
w(v)−r(v)m
⌋≥ 1
3.∑
v∈T s(v) =⌊
w(u)m
⌋=⌊
rm
⌋
![Page 40: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/40.jpg)
Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .
Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.
s
s r r r r r r r r r r r r r
s s s s
Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.
s(v) =
⌊w(v)
m
⌋−∑
x∈C(v)
⌊w(x)
m
⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative
2. If r(v) ≥ m, then s(v) ≥⌊
w(v)m
⌋−⌊
w(v)−r(v)m
⌋≥ 1
3.∑
v∈T s(v) =⌊
w(u)m
⌋=⌊
rm
⌋
![Page 41: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/41.jpg)
Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .
Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.
s
s r r r r r r r r r r r r r
s s s s
Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.
s(v) =
⌊w(v)
m
⌋−∑
x∈C(v)
⌊w(x)
m
⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative
2. If r(v) ≥ m, then s(v) ≥⌊
w(v)m
⌋−⌊
w(v)−r(v)m
⌋≥ 1
3.∑
v∈T s(v) =⌊
w(u)m
⌋=⌊
rm
⌋
![Page 42: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/42.jpg)
Spy-good Graphs: TreesDef: A graph G is spy-good if σ(G ,m, r) = br/mc for all m, r .
Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.Pf: One spy follows each mth rev. When rev’s move, spies repeat.
s
s r r r r r r r r r r r r r
s s s s
Thm: Every tree is spy-good.Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v ;C (v) is children of v ; and w(v) is num. of rev’s at descendants.
s(v) =
⌊w(v)
m
⌋−∑
x∈C(v)
⌊w(x)
m
⌋1. Since ba + bc ≥ bac+ bbc, s(v) is nonnegative
2. If r(v) ≥ m, then s(v) ≥⌊
w(v)m
⌋−⌊
w(v)−r(v)m
⌋≥ 1
3.∑
v∈T s(v) =⌊
w(u)m
⌋=⌊
rm
⌋
![Page 43: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/43.jpg)
Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.
x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u
y1 · · · yk ′Y : new meetings
S
Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:
m|S | ≤ m|N(S) ∩ X |+ (r − km)
|S | ≤ |N(S) ∩ X |+ (br/mc − k)
|N(S) ∩ X | ≥ |S | − (br/mc − k)
Together this gives:
|N(S)| =|X ′|+ |N(S) ∩ X |
≥ |X ′|+ |S | − (br/mc − k)
=(br/mc − k) + |S | − (br/mc − k) = |S |So spies have a stable position at time t + 1, and G is spy-good.
![Page 44: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/44.jpg)
Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.
x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u
y1 · · · yk ′Y : new meetings
S
Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:
m|S | ≤ m|N(S) ∩ X |+ (r − km)
|S | ≤ |N(S) ∩ X |+ (br/mc − k)
|N(S) ∩ X | ≥ |S | − (br/mc − k)
Together this gives:
|N(S)| =|X ′|+ |N(S) ∩ X |
≥ |X ′|+ |S | − (br/mc − k)
=(br/mc − k) + |S | − (br/mc − k) = |S |So spies have a stable position at time t + 1, and G is spy-good.
![Page 45: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/45.jpg)
Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.
x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u
y1 · · · yk ′Y : new meetings
S
Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:
m|S | ≤ m|N(S) ∩ X |+ (r − km)
|S | ≤ |N(S) ∩ X |+ (br/mc − k)
|N(S) ∩ X | ≥ |S | − (br/mc − k)
Together this gives:
|N(S)| =|X ′|+ |N(S) ∩ X |
≥ |X ′|+ |S | − (br/mc − k)
=(br/mc − k) + |S | − (br/mc − k) = |S |So spies have a stable position at time t + 1, and G is spy-good.
![Page 46: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/46.jpg)
Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.
x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u
y1 · · · yk ′Y : new meetings
S
Matching covering Y ?
Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:
m|S | ≤ m|N(S) ∩ X |+ (r − km)
|S | ≤ |N(S) ∩ X |+ (br/mc − k)
|N(S) ∩ X | ≥ |S | − (br/mc − k)
Together this gives:
|N(S)| =|X ′|+ |N(S) ∩ X |
≥ |X ′|+ |S | − (br/mc − k)
=(br/mc − k) + |S | − (br/mc − k) = |S |So spies have a stable position at time t + 1, and G is spy-good.
![Page 47: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/47.jpg)
Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.
x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u
y1 · · · yk ′Y : new meetings
S
Matching covering Y ? Hall’s Theorem.
|N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:
m|S | ≤ m|N(S) ∩ X |+ (r − km)
|S | ≤ |N(S) ∩ X |+ (br/mc − k)
|N(S) ∩ X | ≥ |S | − (br/mc − k)
Together this gives:
|N(S)| =|X ′|+ |N(S) ∩ X |
≥ |X ′|+ |S | − (br/mc − k)
=(br/mc − k) + |S | − (br/mc − k) = |S |So spies have a stable position at time t + 1, and G is spy-good.
![Page 48: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/48.jpg)
Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.
x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u
y1 · · · yk ′Y : new meetings S
Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |
Since rev’s at meetings in S came from X ∩ N(S) or u:
m|S | ≤ m|N(S) ∩ X |+ (r − km)
|S | ≤ |N(S) ∩ X |+ (br/mc − k)
|N(S) ∩ X | ≥ |S | − (br/mc − k)
Together this gives:
|N(S)| =|X ′|+ |N(S) ∩ X |
≥ |X ′|+ |S | − (br/mc − k)
=(br/mc − k) + |S | − (br/mc − k) = |S |So spies have a stable position at time t + 1, and G is spy-good.
![Page 49: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/49.jpg)
Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.
x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u
y1 · · · yk ′Y : new meetings S
Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:
m|S | ≤ m|N(S) ∩ X |+ (r − km)
|S | ≤ |N(S) ∩ X |+ (br/mc − k)
|N(S) ∩ X | ≥ |S | − (br/mc − k)
Together this gives:
|N(S)| =|X ′|+ |N(S) ∩ X |
≥ |X ′|+ |S | − (br/mc − k)
=(br/mc − k) + |S | − (br/mc − k) = |S |So spies have a stable position at time t + 1, and G is spy-good.
![Page 50: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/50.jpg)
Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.
x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u
y1 · · · yk ′Y : new meetings S
Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:
m|S | ≤ m|N(S) ∩ X |+ (r − km)
|S | ≤ |N(S) ∩ X |+ (br/mc − k)
|N(S) ∩ X | ≥ |S | − (br/mc − k)
Together this gives:
|N(S)| =|X ′|+ |N(S) ∩ X |
≥ |X ′|+ |S | − (br/mc − k)
=(br/mc − k) + |S | − (br/mc − k) = |S |So spies have a stable position at time t + 1, and G is spy-good.
![Page 51: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/51.jpg)
Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.
x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u
y1 · · · yk ′Y : new meetings S
Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:
m|S | ≤ m|N(S) ∩ X |+ (r − km)
|S | ≤ |N(S) ∩ X |+ (br/mc − k)
|N(S) ∩ X | ≥ |S | − (br/mc − k)
Together this gives:
|N(S)| =|X ′|+ |N(S) ∩ X |
≥ |X ′|+ |S | − (br/mc − k)
=(br/mc − k) + |S | − (br/mc − k) = |S |So spies have a stable position at time t + 1, and G is spy-good.
![Page 52: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/52.jpg)
Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.
x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u
y1 · · · yk ′Y : new meetings S
Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:
m|S | ≤ m|N(S) ∩ X |+ (r − km)
|S | ≤ |N(S) ∩ X |+ (br/mc − k)
|N(S) ∩ X | ≥ |S | − (br/mc − k)
Together this gives:
|N(S)| =|X ′|+ |N(S) ∩ X |
≥ |X ′|+ |S | − (br/mc − k)
=(br/mc − k) + |S | − (br/mc − k) = |S |So spies have a stable position at time t + 1, and G is spy-good.
![Page 53: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/53.jpg)
Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.
x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u
y1 · · · yk ′Y : new meetings S
Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:
m|S | ≤ m|N(S) ∩ X |+ (r − km)
|S | ≤ |N(S) ∩ X |+ (br/mc − k)
|N(S) ∩ X | ≥ |S | − (br/mc − k)
Together this gives:
|N(S)| =|X ′|+ |N(S) ∩ X |
≥ |X ′|+ |S | − (br/mc − k)
=(br/mc − k) + |S | − (br/mc − k) = |S |So spies have a stable position at time t + 1, and G is spy-good.
![Page 54: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/54.jpg)
Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.
x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u
y1 · · · yk ′Y : new meetings S
Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:
m|S | ≤ m|N(S) ∩ X |+ (r − km)
|S | ≤ |N(S) ∩ X |+ (br/mc − k)
|N(S) ∩ X | ≥ |S | − (br/mc − k)
Together this gives:
|N(S)| =|X ′|+ |N(S) ∩ X | ≥ |X ′|+ |S | − (br/mc − k)
=(br/mc − k) + |S | − (br/mc − k) = |S |So spies have a stable position at time t + 1, and G is spy-good.
![Page 55: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/55.jpg)
Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.
x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u
y1 · · · yk ′Y : new meetings S
Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:
m|S | ≤ m|N(S) ∩ X |+ (r − km)
|S | ≤ |N(S) ∩ X |+ (br/mc − k)
|N(S) ∩ X | ≥ |S | − (br/mc − k)
Together this gives:
|N(S)| =|X ′|+ |N(S) ∩ X | ≥ |X ′|+ |S | − (br/mc − k)
=(br/mc − k) + |S | − (br/mc − k)
= |S |So spies have a stable position at time t + 1, and G is spy-good.
![Page 56: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/56.jpg)
Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.
x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u
y1 · · · yk ′Y : new meetings S
Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:
m|S | ≤ m|N(S) ∩ X |+ (r − km)
|S | ≤ |N(S) ∩ X |+ (br/mc − k)
|N(S) ∩ X | ≥ |S | − (br/mc − k)
Together this gives:
|N(S)| =|X ′|+ |N(S) ∩ X | ≥ |X ′|+ |S | − (br/mc − k)
=(br/mc − k) + |S | − (br/mc − k) = |S |
So spies have a stable position at time t + 1, and G is spy-good.
![Page 57: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/57.jpg)
Spy-good graphs: Dominated graphsThm: Every graph G with a dominating vertex u is spy-good.
x1 · · · xkX : spies off u xk+1 · · · xs X ′: spies on u
y1 · · · yk ′Y : new meetings S
Matching covering Y ? Hall’s Theorem. |N(S)| = |X ′|+ |N(S)∩X |Since rev’s at meetings in S came from X ∩ N(S) or u:
m|S | ≤ m|N(S) ∩ X |+ (r − km)
|S | ≤ |N(S) ∩ X |+ (br/mc − k)
|N(S) ∩ X | ≥ |S | − (br/mc − k)
Together this gives:
|N(S)| =|X ′|+ |N(S) ∩ X | ≥ |X ′|+ |S | − (br/mc − k)
=(br/mc − k) + |S | − (br/mc − k) = |S |So spies have a stable position at time t + 1, and G is spy-good.
![Page 58: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/58.jpg)
Spy-good graphs: Webbed Trees
Def: G is a webbed tree if G has a rooted spanningtree T s.t. each edge of G not in T is between siblings.
Thm: Every webbed tree is spy-good.Pf Sketch: Same strategy as for trees:
s(v) =
⌊w(v)
m
⌋−∑
x∈C(v)
⌊w(x)
m
⌋
Partition E (G ) into subgraphs G (v) = G [v ∪ C (v)]. Simulatea game in each G (v); use those moves in the actual game.Each G (v) is a dominated graph, so we can use that result.
Cor: Every interval graph is spy-good.Pf: Interval graphs are webbed trees.
![Page 59: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/59.jpg)
Spy-good graphs: Webbed Trees
Def: G is a webbed tree if G has a rooted spanningtree T s.t. each edge of G not in T is between siblings.
Thm: Every webbed tree is spy-good.Pf Sketch: Same strategy as for trees:
s(v) =
⌊w(v)
m
⌋−∑
x∈C(v)
⌊w(x)
m
⌋
Partition E (G ) into subgraphs G (v) = G [v ∪ C (v)]. Simulatea game in each G (v); use those moves in the actual game.Each G (v) is a dominated graph, so we can use that result.
Cor: Every interval graph is spy-good.Pf: Interval graphs are webbed trees.
![Page 60: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/60.jpg)
Spy-good graphs: Webbed Trees
Def: G is a webbed tree if G has a rooted spanningtree T s.t. each edge of G not in T is between siblings.
Thm: Every webbed tree is spy-good.Pf Sketch: Same strategy as for trees:
s(v) =
⌊w(v)
m
⌋−∑
x∈C(v)
⌊w(x)
m
⌋
Partition E (G ) into subgraphs G (v) = G [v ∪ C (v)].
Simulatea game in each G (v); use those moves in the actual game.Each G (v) is a dominated graph, so we can use that result.
Cor: Every interval graph is spy-good.Pf: Interval graphs are webbed trees.
![Page 61: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/61.jpg)
Spy-good graphs: Webbed Trees
Def: G is a webbed tree if G has a rooted spanningtree T s.t. each edge of G not in T is between siblings.
Thm: Every webbed tree is spy-good.Pf Sketch: Same strategy as for trees:
s(v) =
⌊w(v)
m
⌋−∑
x∈C(v)
⌊w(x)
m
⌋
Partition E (G ) into subgraphs G (v) = G [v ∪ C (v)]. Simulatea game in each G (v); use those moves in the actual game.Each G (v) is a dominated graph, so we can use that result.
Cor: Every interval graph is spy-good.Pf: Interval graphs are webbed trees.
![Page 62: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/62.jpg)
Spy-good graphs: Webbed Trees
Def: G is a webbed tree if G has a rooted spanningtree T s.t. each edge of G not in T is between siblings.
Thm: Every webbed tree is spy-good.Pf Sketch: Same strategy as for trees:
s(v) =
⌊w(v)
m
⌋−∑
x∈C(v)
⌊w(x)
m
⌋
Partition E (G ) into subgraphs G (v) = G [v ∪ C (v)]. Simulatea game in each G (v); use those moves in the actual game.Each G (v) is a dominated graph, so we can use that result.
Cor: Every interval graph is spy-good.
Pf: Interval graphs are webbed trees.
![Page 63: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/63.jpg)
Spy-good graphs: Webbed Trees
Def: G is a webbed tree if G has a rooted spanningtree T s.t. each edge of G not in T is between siblings.
Thm: Every webbed tree is spy-good.Pf Sketch: Same strategy as for trees:
s(v) =
⌊w(v)
m
⌋−∑
x∈C(v)
⌊w(x)
m
⌋
Partition E (G ) into subgraphs G (v) = G [v ∪ C (v)]. Simulatea game in each G (v); use those moves in the actual game.Each G (v) is a dominated graph, so we can use that result.
Cor: Every interval graph is spy-good.Pf: Interval graphs are webbed trees.
![Page 64: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/64.jpg)
Large Complete Bipartite Graphs
Thm: For a large complete bipartite graph G
σ(G , 2, r) =7
5
r
2
Main ideas: Call the two parts X1 and X2.
I On each round, the two main threats of the rev’s are to formas many uncovered meetings as possible in X1; or in X2. If thespies defend against these two threats, then they won’t lose.
I “Lonely spies” are bad, so the spies avoid them when possible.
I By always keeping a large fraction of spies in each part,the spies guarantee that they’ll have few lonely spies.
I The spies never need to look more than 1 move ahead.
I To win, on each round the spies maintain an invariant.
![Page 65: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/65.jpg)
Large Complete Bipartite Graphs
Thm: For a large complete bipartite graph G
σ(G , 2, r) =7
5
r
2
Main ideas: Call the two parts X1 and X2.
I On each round, the two main threats of the rev’s are to formas many uncovered meetings as possible in X1; or in X2. If thespies defend against these two threats, then they won’t lose.
I “Lonely spies” are bad, so the spies avoid them when possible.
I By always keeping a large fraction of spies in each part,the spies guarantee that they’ll have few lonely spies.
I The spies never need to look more than 1 move ahead.
I To win, on each round the spies maintain an invariant.
![Page 66: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/66.jpg)
Large Complete Bipartite Graphs
Thm: For a large complete bipartite graph G
σ(G , 2, r) =7
5
r
2
Main ideas: Call the two parts X1 and X2.
I On each round, the two main threats of the rev’s are to formas many uncovered meetings as possible in X1; or in X2. If thespies defend against these two threats, then they won’t lose.
I “Lonely spies” are bad, so the spies avoid them when possible.
I By always keeping a large fraction of spies in each part,the spies guarantee that they’ll have few lonely spies.
I The spies never need to look more than 1 move ahead.
I To win, on each round the spies maintain an invariant.
![Page 67: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/67.jpg)
Large Complete Bipartite Graphs
Thm: For a large complete bipartite graph G
σ(G , 2, r) =7
5
r
2
Main ideas: Call the two parts X1 and X2.
I On each round, the two main threats of the rev’s are to formas many uncovered meetings as possible in X1; or in X2. If thespies defend against these two threats, then they won’t lose.
I “Lonely spies” are bad, so the spies avoid them when possible.
I By always keeping a large fraction of spies in each part,the spies guarantee that they’ll have few lonely spies.
I The spies never need to look more than 1 move ahead.
I To win, on each round the spies maintain an invariant.
![Page 68: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/68.jpg)
Large Complete Bipartite Graphs
Thm: For a large complete bipartite graph G
σ(G , 2, r) =7
5
r
2
Main ideas: Call the two parts X1 and X2.
I On each round, the two main threats of the rev’s are to formas many uncovered meetings as possible in X1; or in X2. If thespies defend against these two threats, then they won’t lose.
I “Lonely spies” are bad, so the spies avoid them when possible.
I By always keeping a large fraction of spies in each part,the spies guarantee that they’ll have few lonely spies.
I The spies never need to look more than 1 move ahead.
I To win, on each round the spies maintain an invariant.
![Page 69: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/69.jpg)
Large Complete Bipartite Graphs
Thm: For a large complete bipartite graph G
σ(G , 2, r) =7
5
r
2
Main ideas: Call the two parts X1 and X2.
I On each round, the two main threats of the rev’s are to formas many uncovered meetings as possible in X1; or in X2. If thespies defend against these two threats, then they won’t lose.
I “Lonely spies” are bad, so the spies avoid them when possible.
I By always keeping a large fraction of spies in each part,the spies guarantee that they’ll have few lonely spies.
I The spies never need to look more than 1 move ahead.
I To win, on each round the spies maintain an invariant.
![Page 70: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/70.jpg)
Main Results and Open Problems
1. br/mc spies can win on:dominated graphs, trees, interval graphs, “webbed trees”
also graph powers and “vertex blowups”Problem 1: Characterize spy-good graphs
2. For large complete bipartite graphs:
σ(G , 2, r) =7
10r
=7
5
r
2
σ(G , 3, r) =1
2r
=3
2
r
3
(3
2− o(1)
)r
m− 2 ≤ σ(G ,m, r) < 1.58
r
m, for m ≥ 4
Problem 2: Improve upper bounds for m ≥ 4.Conj: As m grows: σ(G ,m, r) ∼ 3
2rm
![Page 71: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/71.jpg)
Main Results and Open Problems
1. br/mc spies can win on:dominated graphs, trees, interval graphs, “webbed trees”also graph powers and “vertex blowups”
Problem 1: Characterize spy-good graphs
2. For large complete bipartite graphs:
σ(G , 2, r) =7
10r
=7
5
r
2
σ(G , 3, r) =1
2r
=3
2
r
3
(3
2− o(1)
)r
m− 2 ≤ σ(G ,m, r) < 1.58
r
m, for m ≥ 4
Problem 2: Improve upper bounds for m ≥ 4.Conj: As m grows: σ(G ,m, r) ∼ 3
2rm
![Page 72: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/72.jpg)
Main Results and Open Problems
1. br/mc spies can win on:dominated graphs, trees, interval graphs, “webbed trees”also graph powers and “vertex blowups”Problem 1: Characterize spy-good graphs
2. For large complete bipartite graphs:
σ(G , 2, r) =7
10r
=7
5
r
2
σ(G , 3, r) =1
2r
=3
2
r
3
(3
2− o(1)
)r
m− 2 ≤ σ(G ,m, r) < 1.58
r
m, for m ≥ 4
Problem 2: Improve upper bounds for m ≥ 4.Conj: As m grows: σ(G ,m, r) ∼ 3
2rm
![Page 73: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/73.jpg)
Main Results and Open Problems
1. br/mc spies can win on:dominated graphs, trees, interval graphs, “webbed trees”also graph powers and “vertex blowups”Problem 1: Characterize spy-good graphs
2. For large complete bipartite graphs:
σ(G , 2, r) =7
10r =
7
5
r
2
σ(G , 3, r) =1
2r =
3
2
r
3(3
2− o(1)
)r
m− 2 ≤ σ(G ,m, r) < 1.58
r
m, for m ≥ 4
Problem 2: Improve upper bounds for m ≥ 4.Conj: As m grows: σ(G ,m, r) ∼ 3
2rm
![Page 74: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/74.jpg)
Main Results and Open Problems
1. br/mc spies can win on:dominated graphs, trees, interval graphs, “webbed trees”also graph powers and “vertex blowups”Problem 1: Characterize spy-good graphs
2. For large complete bipartite graphs:
σ(G , 2, r) =7
10r =
7
5
r
2
σ(G , 3, r) =1
2r =
3
2
r
3(3
2− o(1)
)r
m− 2 ≤ σ(G ,m, r) < 1.58
r
m, for m ≥ 4
Problem 2: Improve upper bounds for m ≥ 4.
Conj: As m grows: σ(G ,m, r) ∼ 32
rm
![Page 75: Revolutionaries and Spiesdcranston/slides/spies-talk.pdf · Slides available on my preprint page Joint withJane Butter eld, Greg Puleo, Cli Smyth, Doug West,andReza Zamani LSU Combinatorics](https://reader033.vdocuments.net/reader033/viewer/2022043016/5f391a719b705f23971c060e/html5/thumbnails/75.jpg)
Main Results and Open Problems
1. br/mc spies can win on:dominated graphs, trees, interval graphs, “webbed trees”also graph powers and “vertex blowups”Problem 1: Characterize spy-good graphs
2. For large complete bipartite graphs:
σ(G , 2, r) =7
10r =
7
5
r
2
σ(G , 3, r) =1
2r =
3
2
r
3(3
2− o(1)
)r
m− 2 ≤ σ(G ,m, r) < 1.58
r
m, for m ≥ 4
Problem 2: Improve upper bounds for m ≥ 4.Conj: As m grows: σ(G ,m, r) ∼ 3
2rm