117 results on '"Svante Janson"'
Search Results
2. On the independence number of some random trees
- Author
-
Svante Janson
- Subjects
Statistics and Probability ,media_common.quotation_subject ,random recursive tree ,Binary number ,Preferential attachment ,Branching (linguistics) ,05C05 ,05C69 ,Crump–Mode–Jagers branching process ,FOS: Mathematics ,60C05 ,Almost surely ,binary search tree ,independence number ,Mathematics ,media_common ,Independence number ,Discrete mathematics ,Probability (math.PR) ,60C05, 05C05, 05C69 ,Infinity ,Binary search tree ,Statistics, Probability and Uncertainty ,Constant (mathematics) ,random trees ,Mathematics - Probability - Abstract
We show that for many models of random trees, the independence number divided by the size converges almost surely to a constant as the size grows to infinity; the trees that we consider include random recursive trees, binary and $m$-ary search trees, preferential attachment trees, and others. The limiting constant is computed, analytically or numerically, for several examples. The method is based on Crump-Mode-Jagers branching processes., 15 pages (v2: reference added)
- Published
- 2020
3. Exact and Asymptotic Solutions of a Divide-and-Conquer Recurrence Dividing at Half
- Author
-
Hsien-Kuei Hwang, Svante Janson, and Tsung-Hsi Tsai
- Subjects
Discrete mathematics ,Recurrence relation ,010102 general mathematics ,0102 computer and information sciences ,01 natural sciences ,Combinatorics ,Uniform continuity ,Mathematics (miscellaneous) ,010201 computation theory & mathematics ,Simple (abstract algebra) ,Additive function ,Functional equation ,Order (group theory) ,0101 mathematics ,Asymptotic expansion ,Mathematics ,Analysis of algorithms - Abstract
Divide-and-conquer recurrences of the form f ( n ) = f (⌊ n/2⌋ ) + f ( ⌈ n/2⌉ ) + g ( n ) ( n ⩾ 2), with g ( n ) and f (1) given, appear very frequently in the analysis of computer algorithms and related areas. While most previous methods and results focus on simpler crude approximation to the solution, we show that the solution always satisfies the simple identity f ( n ) = n P (log 2 n ) − Q ( n ) under an optimum (iff) condition on g ( n ). This form is not only an identity but also an asymptotic expansion because Q ( n ) is of a smaller order than linearity. Explicit forms for the continuous periodic function P are provided. We show how our results can be easily applied to many dozens of concrete examples collected from the literature and how they can be extended in various directions. Our method of proof is surprisingly simple and elementary but leads to the strongest types of results for all examples to which our theory applies.
- Published
- 2017
- Full Text
- View/download PDF
4. The Greedy Independent Set in a Random Graph with Given Degrees
- Author
-
Svante Janson, Malwina J. Luczak, and Graham Brightwell
- Subjects
Graph center ,General Mathematics ,0102 computer and information sciences ,01 natural sciences ,60C05, 05C80, 60J27 ,Combinatorics ,Greedy coloring ,010104 statistics & probability ,TheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITY ,FOS: Mathematics ,Mathematics - Combinatorics ,QA Mathematics ,0101 mathematics ,Mathematics ,Random graph ,Discrete mathematics ,Applied Mathematics ,Probability (math.PR) ,Neighbourhood (graph theory) ,Computer Graphics and Computer-Aided Design ,Vertex (geometry) ,010201 computation theory & mathematics ,Independent set ,Feedback vertex set ,Maximal independent set ,Combinatorics (math.CO) ,Mathematics - Probability ,Software ,MathematicsofComputing_DISCRETEMATHEMATICS - Abstract
We analyse the size of an independent set in a random graph on $n$ vertices with specified vertex degrees, constructed via a simple greedy algorithm: order the vertices arbitrarily, and, for each vertex in turn, place it in the independent set unless it is adjacent to some vertex already chosen. We find the limit of the expected proportion of vertices in the greedy independent set as $n \to \infty$, expressed as an integral whose upper limit is defined implicitly, valid whenever the second moment of a random vertex degree is uniformly bounded. We further show that the random proportion of vertices in the independent set converges to the jamming constant as $n \to \infty$. The results hold under weaker assumptions in a random multigraph with given degrees constructed via the configuration model., Comment: 25 pages
- Published
- 2017
- Full Text
- View/download PDF
5. A graphon counter example
- Author
-
Svante Janson
- Subjects
Discrete mathematics ,020206 networking & telecommunications ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Theoretical Computer Science ,010201 computation theory & mathematics ,FOS: Mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Discrete Mathematics and Combinatorics ,Mathematics - Combinatorics ,Combinatorics (math.CO) ,Degree function ,Counterexample ,Mathematics - Abstract
We give an example of a graphon such that there is no equivalent graphon with a degree function that is (weakly) increasing., 4 pages
- Published
- 2019
6. Strong Convergence of Infinite Color Balanced Urns Under Uniform Ergodicity
- Author
-
Svante Janson, Debleena Thacker, and Antar Bandyopadhyay
- Subjects
Statistics and Probability ,Discrete mathematics ,Sequence ,Markov chain ,Generalization ,Computer Science::Information Retrieval ,General Mathematics ,010102 general mathematics ,Ergodicity ,Probability (math.PR) ,Coupling (probability) ,01 natural sciences ,Recursive tree ,010104 statistics & probability ,Convergence of random variables ,FOS: Mathematics ,Limit (mathematics) ,0101 mathematics ,Statistics, Probability and Uncertainty ,Mathematics - Probability ,Mathematics - Abstract
We consider the generalization of the P\'olya urn scheme with possibly infinite many colors as introduced in \cite{Th-Thesis, BaTH2014, BaTh2016, BaTh2017}. For countable many colors, we prove almost sure convergence of the urn configuration under \emph{uniform ergodicity} assumption on the associated Markov chain. The proof uses a stochastic coupling of the sequence of chosen colors with a \emph{branching Markov chain} on a weighted \emph{random recursive tree} as described in \cite{BaTh2017, Sv_2018}. Using this coupling we estimate the covariance between any two selected colors. In particular, we reprove the limit theorem for the classical urn models with finitely many colors., Comment: 13 pages
- Published
- 2019
- Full Text
- View/download PDF
7. Random replacements in Polya urns with infinitely many colours
- Author
-
Svante Janson
- Subjects
infinite Pólya urn ,Statistics and Probability ,Discrete mathematics ,010102 general mathematics ,Polya urn ,infinite Polya urn ,State (functional analysis) ,Space (mathematics) ,01 natural sciences ,Measure (mathematics) ,Pólya urn ,010104 statistics & probability ,60C05 ,Sannolikhetsteori och statistik ,0101 mathematics ,Statistics, Probability and Uncertainty ,Probability Theory and Statistics ,random replacements ,Mathematics - Abstract
We consider the general version of Pólya urns recently studied by Bandyopadhyay and Thacker (2016+) and Mailler and Marckert (2017), with the space of colours being any Borel space $S$ and the state of the urn being a finite measure on $S$. We consider urns with random replacements, and show that these can be regarded as urns with deterministic replacements using the colour space $S\times [0,1]$.
- Published
- 2019
8. On a representation theorem for finitely exchangeable random vectors
- Author
-
Svante Janson, Takis Konstantopoulos, and Linglong Yuan
- Subjects
Discrete mathematics ,Representation theorem ,Multivariate random variable ,Applied Mathematics ,Signed measure ,Probability (math.PR) ,010102 general mathematics ,Space (mathematics) ,01 natural sciences ,Measure (mathematics) ,60G09 (Primary), 60G55, 62E99 (Secondary) ,010104 statistics & probability ,Homogeneous polynomial ,FOS: Mathematics ,0101 mathematics ,Mathematics - Probability ,Analysis ,Mixing (physics) ,Mathematics ,Probability measure - Abstract
A random vector $X=(X_1,\ldots,X_n)$ with the $X_i$ taking values in an arbitrary measurable space $(S, \mathscr{S})$ is exchangeable if its law is the same as that of $(X_{\sigma(1)}, \ldots, X_{\sigma(n)})$ for any permutation $\sigma$. We give an alternative and shorter proof of the representation result (Jaynes \cite{Jay86} and Kerns and Sz\'ekely \cite{KS06}) stating that the law of $X$ is a mixture of product probability measures with respect to a signed mixing measure. The result is "finitistic" in nature meaning that it is a matter of linear algebra for finite $S$. The passing from finite $S$ to an arbitrary one may pose some measure-theoretic difficulties which are avoided by our proof. The mixing signed measure is not unique (examples are given), but we pay more attention to the one constructed in the proof ("canonical mixing measure") by pointing out some of its characteristics. The mixing measure is, in general, defined on the space of probability measures on $S$, but for $S=\mathbb{R}$, one can choose a mixing measure on $\mathbb{R}^n$., Comment: We here give an alternative proof of the measurability of the random signed-measure underlying the construction. We also add an independent proof of the main algebraic fact used in the paper. Title updated
- Published
- 2016
- Full Text
- View/download PDF
9. Patterns in random permutations avoiding some sets of multiple patterns
- Author
-
Svante Janson
- Subjects
Discrete mathematics ,General Computer Science ,Limit distribution ,Random permutations ,Computer Sciences ,Discrete Mathematics ,Applied Mathematics ,Probability (math.PR) ,Patterns in permutations ,Sigma ,Random permutation ,Forbidden patterns ,Diskret matematik ,Computer Science Applications ,Set (abstract data type) ,Datavetenskap (datalogi) ,Theory of computation ,FOS: Mathematics ,Mathematics - Combinatorics ,Combinatorics (math.CO) ,60C05, 05A05, 05A16, 60F05 ,Scaling ,Mathematics - Probability ,Mathematics - Abstract
We consider a random permutation drawn from the set of permutations of length $n$ that avoid some given set of patterns of length 3. We show that the number of occurrences of another pattern $\sigma$ has a limit distribution, after suitable scaling. In several cases, the number is asymptotically normal; this contrasts to the cases of permutations avoiding a single pattern of length 3 studied in earlier papers., Comment: 23 pages
- Published
- 2018
10. Feynman–Kac theorems for generalized diffusions
- Author
-
Erik Ekström, Johan Tysk, and Svante Janson
- Subjects
Discrete mathematics ,Pure mathematics ,symbols.namesake ,Applied Mathematics ,General Mathematics ,Representation (systemics) ,symbols ,Feynman diagram ,Uniqueness ,Type (model theory) ,Mathematics - Abstract
We find Feynman–Kac type representation theorems for generalized diffusions. To do this we need to establish existence, uniqueness and regularity results for equations with measure-valued coefficients.
- Published
- 2015
- Full Text
- View/download PDF
11. On convergence for graphexes
- Author
-
Svante Janson
- Subjects
Discrete Mathematics ,Probability (math.PR) ,FOS: Mathematics ,Discrete Mathematics and Combinatorics ,Mathematics - Combinatorics ,Combinatorics (math.CO) ,Diskret matematik ,Mathematics - Probability - Abstract
We study four different notions of convergence for graphexes, recently introduced by Borgs, Chayes, Cohn and Holden, and by Veitch and Roy. We give some properties of them and some relations between them. We also extend results by Veitch and Roy on convergence of empirical graphons., 16 pages. To appear
- Published
- 2017
12. Superboolean rank and the size of the largest triangular submatrix of a random matrix
- Author
-
Svante Janson, Zur Izhakian, and John A. Rhodes
- Subjects
Discrete mathematics ,Rank (linear algebra) ,Applied Mathematics ,General Mathematics ,media_common.quotation_subject ,Probability (math.PR) ,Block matrix ,Mathematics - Rings and Algebras ,Single-entry matrix ,Infinity ,Computer Science::Numerical Analysis ,Combinatorics ,Matrix (mathematics) ,Rings and Algebras (math.RA) ,FOS: Mathematics ,Mathematics - Combinatorics ,Combinatorics (math.CO) ,03G05, 06E25, 06E75, 60C05 ,Algebraic number ,Random matrix ,Mathematics - Probability ,Mathematics ,media_common - Abstract
We explore the size of the largest (permuted) triangular submatrix of a random matrix, and more precisely its asymptotical behavior as the size of the ambient matrix tends to infinity. The importance of such permuted triangular submatrices arises when dealing with certain combinatorial algebraic settings in which these submatrices determine the rank of the ambient matrix, and thus attract a special attention., 11 pages
- Published
- 2014
- Full Text
- View/download PDF
13. Asymptotic normality of fringe subtrees and additive functionals in conditioned Galton-Watson trees
- Author
-
Svante Janson
- Subjects
General Mathematics ,Asymptotic distribution ,0102 computer and information sciences ,Finite variance ,01 natural sciences ,Combinatorics ,010104 statistics & probability ,Random tree ,FOS: Mathematics ,Mathematics - Combinatorics ,0101 mathematics ,Special case ,Mathematics ,Galton watson ,Discrete mathematics ,Applied Mathematics ,Probability (math.PR) ,60C05, 05C05 ,Computer Graphics and Computer-Aided Design ,Moment (mathematics) ,Tree (data structure) ,Distribution (mathematics) ,010201 computation theory & mathematics ,Combinatorics (math.CO) ,Mathematics - Probability ,Software - Abstract
We consider conditioned Galton-Watson trees and show asymptotic normality of additive functionals that are defined by toll functions that are not too large. This includes, as a special case, asymptotic normality of the number of fringe subtrees isomorphic to any given tree, and joint asymptotic normality for several such subtree counts. Another example is the number of protected nodes. The offspring distribution defining the random tree is assumed to have expectation 1 and finite variance; no further moment condition is assumed., 49 pages
- Published
- 2014
- Full Text
- View/download PDF
14. INFLUENCE IN PRODUCT SPACES
- Author
-
James Norris, Svante Janson, Geoffrey Grimmett, Grimmett, Geoffrey [0000-0001-7646-3368], and Apollo - University of Cambridge Repository
- Subjects
Statistics and Probability ,Discrete mathematics ,60A10, 28A35 ,Applied Mathematics ,010102 general mathematics ,Probability (math.PR) ,Probabilistic logic ,measure-space isomorphism ,01 natural sciences ,Separable space ,Algebra ,010104 statistics & probability ,Influence ,product space ,Product (mathematics) ,sharp threshold ,Key (cryptography) ,FOS: Mathematics ,Standard probability space ,Product topology ,0101 mathematics ,separable space ,Mathematics - Probability ,Mathematics - Abstract
The theory of influence and sharp threshold is a key tool in probability and probabilistic combinatorics, with numerous applications. One significant aspect of the theory is directed at identifying the level of generality of the product probability space that accommodates the event under study. We derive the influence inequality for a completely general product space, by establishing a relationship to the Lebesgue cube studied by Bourgain, Kahn, Kalai, Katznelson and Linial (BKKKL) in 1992. This resolves one of the assertions of BKKKL. Our conclusion is valid also in the setting of the generalized influences of Keller.
- Published
- 2016
15. Fringe trees, Crump-Mode-Jagers branching processes and $m$-ary search trees
- Author
-
Svante Janson and Cecilia Holmgren
- Subjects
Statistics and Probability ,68P10 ,05C80 ,branching processes ,0102 computer and information sciences ,01 natural sciences ,Branching (linguistics) ,extended fringe trees ,05C05 ,010104 statistics & probability ,protected nodes ,FOS: Mathematics ,60C05 ,Sannolikhetsteori och statistik ,60J85 ,0101 mathematics ,Probability Theory and Statistics ,preferential attachment trees ,Mathematics ,Branching process ,random recursive trees ,Condensed Matter::Quantum Gases ,Discrete mathematics ,60J80 ,clades ,Random trees ,Probability (math.PR) ,Astrophysics::Instrumentation and Methods for Astrophysics ,68P05 ,$m$-ary search trees ,60C05 (Primary) 05C05, 05C80, 60J80, 60J85, 68P05, 68P10 (Secondary) ,fragmentation trees ,010201 computation theory & mathematics ,m-ary search trees ,fringe Trees ,Mathematics - Probability - Abstract
This survey studies asymptotics of random fringe trees and extended fringe trees in random trees that can be constructed as family trees of a Crump-Mode-Jagers branching process, stopped at a suitable time. This includes random recursive trees, preferential attachment trees, fragmentation trees, binary search trees and (more generally) $m$-ary search trees, as well as some other classes of random trees. We begin with general results, mainly due to Aldous (1991) and Jagers and Nerman (1984). The general results are applied to fringe trees and extended fringe trees for several particular types of random trees, where the theory is developed in detail. In particular, we consider fringe trees of $m$-ary search trees in detail; this seems to be new. Various applications are given, including degree distribution, protected nodes and maximal clades for various types of random trees. Again, we emphasise results for $m$-ary search trees, and give for example new results on protected nodes in $m$-ary search trees. A separate section surveys results on height, saturation level, typical depth and total path length, due to Devroye (1986), Biggins (1995, 1997) and others. This survey contains well-known basic results together with some additional general results as well as many new examples and applications for various classes of random trees.
- Published
- 2016
- Full Text
- View/download PDF
16. Hitting Times for Random Walks with Restarts
- Author
-
Svante Janson and Yuval Peres
- Subjects
Discrete mathematics ,Gittins index ,Markov chain ,General Mathematics ,Probability (math.PR) ,Hitting time ,Primary: 60J15, Secondary: 60J10, 60J45, 60J65 ,Random walk ,Square lattice ,Combinatorics ,Random walker algorithm ,Harmonic function ,Lattice (order) ,FOS: Mathematics ,Mathematics - Combinatorics ,Combinatorics (math.CO) ,Mathematics - Probability ,Mathematics - Abstract
The time it takes a random walker in a lattice to reach the origin from another vertex $x$, has infinite mean. If the walker can restart the walk at $x$ at will, then the minimum expected hitting time $T(x,0)$ (minimized over restarting strategies) is finite; it was called the ``grade'' of $x$ by Dumitriu, Tetali and Winkler. They showed that, in a more general setting, the grade (a variant of the ``Gittins index'') plays a crucial role in control problems involving several Markov chains. Here we establish several conjectures of Dumitriu et al on the asymptotics of the grade in Euclidean lattices. In particular, we show that in the planar square lattice, $T(x,0)$ is asymptotic to $2|x|^2\log|x|$ as $|x| \to \infty$. The proof hinges on the local variance of the potential kernel $h$ being almost constant on the level sets of $h$. We also show how the same method yields precise second order asymptotics for hitting times of a random walk (without restarts) in a lattice disk., 12 pages
- Published
- 2012
- Full Text
- View/download PDF
17. Correlations for paths in random orientations of G(n,p) and G(n,m)
- Author
-
Svante Linusson, Sven Erick Alm, and Svante Janson
- Subjects
Combinatorics ,Discrete mathematics ,Random graph ,Probability space ,Conjecture ,Applied Mathematics ,General Mathematics ,Computer Graphics and Computer-Aided Design ,Software ,Mathematics ,Sign (mathematics) - Abstract
We study random graphs, both G( n,p) and G( n,m), with random orientations on the edges. For three fixed distinct vertices s,a,b we study the correlation, in the combine probability space, of the events $\{a\to s\}$ and $\{s\to b\}$ . For G(n,p), we prove that there is a $pc = 1/2$ such that for a fixed $p the correlation is negative for large enough n and for $p > pc$ the correlation is positive for large enough n. We conjecture that for a fixed $n \ge 27$ the correlation changes sign three times for three critical values of p. For G(n,m) it is similarly proved that, with $p=m/({{n}\atop {2}})$ , there is a critical pc that is the solution to a certain equation and approximately equal to 0.7993. A lemma, which computes the probability of non existence of any $\ell$ directed edges in G(n,m), is thought to be of independent interest. We present exact recursions to compute **math-image** and **math-image**. We also briefly discuss the corresponding question in the quenched version of the problem. © 2011 Wiley Periodicals, Inc. Random Struct. Alg., 2011 (Supported by Knut and Alice Wallenberg Foundation (Royal Swedish Academy of Sciences Research Fellow)(Svante Linusson). Part of this research was done at Institut Mittag-Leffler, Djursholm, Sweden, which we thank for their hospitality.)
- Published
- 2011
- Full Text
- View/download PDF
18. Generalized Stirling permutations, families of increasing trees and urn models
- Author
-
Markus Kuba, Svante Janson, and Alois Panholzer
- Subjects
Class (set theory) ,Distribution (number theory) ,Stirling numbers of the first kind ,Asymptotic distribution ,Urn models ,Theoretical Computer Science ,Combinatorics ,05C05 ,Descents ,FOS: Mathematics ,Mathematics - Combinatorics ,Discrete Mathematics and Combinatorics ,Order (group theory) ,Plane recursive trees ,Mathematics ,Discrete mathematics ,Mathematics::Combinatorics ,Plane (geometry) ,Probability (math.PR) ,Increasing trees ,Stirling permutations ,Computational Theory and Mathematics ,Ascents ,Bijection ,Combinatorics (math.CO) ,Bijection, injection and surjection ,Limiting distribution ,Mathematics - Probability - Abstract
Bona [2007+] studied the distribution of ascents, plateaux and descents in the class of Stirling permutations, introduced by Gessel and Stanley [1978]. Recently, Janson [2008+] showed the connection between Stirling permutations and plane recursive trees and proved a joint normal law for the parameters considered by Bona. Here we will consider generalized Stirling permutations extending the earlier results of Bona and Janson, and relate them with certain families of generalized plane recursive trees, and also $(k+1)$-ary increasing trees. We also give two different bijections between certain families of increasing trees, which both give as a special case a bijection between ternary increasing trees and plane recursive trees. In order to describe the (asymptotic) behaviour of the parameters of interests, we study three (generalized) Polya urn models using various methods., 25 pages, 3 figures, Keywords: Increasing trees, plane recursive trees, Stirling permutations, ascents, descents, urn models, limiting distributions
- Published
- 2011
- Full Text
- View/download PDF
19. On the size of identifying codes in binary hypercubes
- Author
-
Svante Janson and Tero Laihonen
- Subjects
Discrete mathematics ,Binary number ,020206 networking & telecommunications ,0102 computer and information sciences ,02 engineering and technology ,Optimal rate ,16. Peace & justice ,01 natural sciences ,Theoretical Computer Science ,Combinatorics ,Hypercube ,Computational Theory and Mathematics ,010201 computation theory & mathematics ,Identifying code ,FOS: Mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Mathematics - Combinatorics ,Discrete Mathematics and Combinatorics ,Combinatorics (math.CO) ,Hamming code ,Fault diagnosis ,Mathematics - Abstract
We consider identifying codes in binary Hamming spaces F^n, i.e., in binary hypercubes. The concept of identifying codes was introduced by Karpovsky, Chakrabarty and Levitin in 1998. Currently, the subject forms a topic of its own with several possible applications, for example, to sensor networks. Let C be a subset of F^n. For any subset X of F^n, denote by I_r(X)=I_r(C;X) the set of elements of C within distance r from at least one x in X. Now C is called an (r, 13 pages
- Published
- 2009
- Full Text
- View/download PDF
20. Sorting Using Complete Subintervals and the Maximum Number of Runs in a Randomly Evolving Sequence
- Author
-
Svante Janson
- Subjects
Random graph ,Discrete mathematics ,Sequence ,Sorting algorithm ,Probability (math.PR) ,String (computer science) ,Sorting ,68W40 ,Term (time) ,60C05 ,Combinatorics ,FOS: Mathematics ,Discrete Mathematics and Combinatorics ,Order (group theory) ,Priority queue ,Mathematics - Probability ,Mathematics - Abstract
We study the space requirements of a sorting algorithm where only items that at the end will be adjacent are kept together. This is equivalent to the following combinatorial problem: Consider a string of fixed length n that starts as a string of 0's, and then evolves by changing each 0 to 1, with then changes done in random order. What is the maximal number of runs of 1's? We give asymptotic results for the distribution and mean. It turns out that, as in many problems involving a maximum, the maximum is asymptotically normal, with fluctuations of order n^{1/2}, and to the first order well approximated by the number of runs at the instance when the expectation is maximized, in this case when half the elements have changed to 1; there is also a second order term of order n^{1/3}. We also treat some variations, including priority queues. The proofs use methods originally developed for random graphs., Comment: 31 PAGES
- Published
- 2009
- Full Text
- View/download PDF
21. Limit laws for functions of fringe trees for binary search trees and random recursive trees
- Author
-
Cecilia Holmgren and Svante Janson
- Subjects
Statistics and Probability ,Discrete mathematics ,Binary tree ,Random recursive trees ,Weight-balanced tree ,Binary search trees ,Fringe trees ,Scapegoat tree ,Random binary tree ,Limit laws ,Combinatorics ,05C05 ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Binary search tree ,Geometry of binary search trees ,60F05 ,Ternary search tree ,Couplings ,60C05 ,Metric tree ,Stein's method ,Sannolikhetsteori och statistik ,Statistics, Probability and Uncertainty ,Probability Theory and Statistics ,Mathematics - Abstract
We prove general limit theorems for sums of functions of subtrees of (random) binary search trees and random recursive trees. The proofs use a new version of a representation by Devroye, and Stein's method for both normal and Poisson approximation together with certain couplings. ¶ As a consequence, we give simple new proofs of the fact that the number of fringe trees of size $ k=k_n $ in the binary search tree or in the random recursive tree (of total size $ n $) has an asymptotical Poisson distribution if $ k\rightarrow\infty $, and that the distribution is asymptotically normal for $ k=o(\sqrt{n}) $. Furthermore, we prove similar results for the number of subtrees of size $ k $ with some required property $ P $, e.g., the number of copies of a certain fixed subtree $ T $. Using the Cramér-Wold device, we show also that these random numbers for different fixed subtrees converge jointly to a multivariate normal distribution. We complete the paper by giving examples of applications of the general results, e.g., we obtain a normal limit law for the number of $ \ell $-protected nodes in a binary search tree or in a random recursive tree.
- Published
- 2015
22. Individual displacements for linear probing hashing with different insertion policies
- Author
-
Svante Janson
- Subjects
Discrete mathematics ,Mathematics (miscellaneous) ,Universal hashing ,Dynamic perfect hashing ,Linear probing ,Mathematical analysis ,Linear hashing ,Double hashing ,Hash table ,Mathematics ,K-independent hashing ,Hopscotch hashing - Abstract
We study the distribution of the individual displacements in hashing with linear probing for three different versions: First Come, Last Come and Robin Hood. Asymptotic distributions and their moments are found when the the size of the hash table tends to infinity with the proportion of occupied cells converging to some α, 0 < α < 1. (In the case of Last Come, the results are more complicated and less complete than in the other cases.)We also show, using the diagonal Poisson transform studied by Poblete, Viola and Munro, that exact expressions for finite m and n can be obtained from the limits as m,n → ∞.We end with some results, conjectures and questions about the shape of the limit distributions. These have some relevance for computer applications.
- Published
- 2005
- Full Text
- View/download PDF
23. Some Remarks on the Combinatorics of ISn
- Author
-
Volodymyr Mazorchuk and Svante Janson
- Subjects
Discrete mathematics ,Algebra and Number Theory ,Endomorphism ,ComputingMilieux_THECOMPUTINGPROFESSION ,Semigroup ,Mathematics::History and Overview ,Computer Science::Software Engineering ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,GeneralLiterature_MISCELLANEOUS ,Computer Science::Computers and Society ,Symmetric inverse semigroup ,Combinatorics ,Nilpotent ,TheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITY ,Algebra over a field ,MathematicsofComputing_DISCRETEMATHEMATICS ,Mathematics - Abstract
\noindent We describe the asymptotic behavior of the cardinalities of the finite symmetric inverse semigroup ISn and its endomorphism semigroup. This is applied to show that the ratio |ISn|/|End(ISn)| is asymptotically 0, answering a question of Schein and Teclezghi. We also apply our results to compute the distributions of elements from ISn with respect to certain combinatorial properties, and to compute the generating functions for |ISn| and for the number of nilpotent elements in ISn.
- Published
- 2005
- Full Text
- View/download PDF
24. Branching processes, and random-cluster measures on trees
- Author
-
Svante Janson and Geoffrey Grimmett
- Subjects
Vertex (graph theory) ,Discrete mathematics ,60K35, 60J80, 82B20 ,Applied Mathematics ,General Mathematics ,Probability (math.PR) ,FOS: Physical sciences ,Mathematical Physics (math-ph) ,Type (model theory) ,Combinatorics ,Branching (linguistics) ,Path (graph theory) ,FOS: Mathematics ,Equivalence relation ,Tree (set theory) ,Uniqueness ,Mathematics - Probability ,Mathematical Physics ,Mathematics ,Branching process - Abstract
Random-cluster measures on infinite regular trees are studied in conjunction with a general type of `boundary condition', namely an equivalence relation on the set of infinite paths of the tree. The uniqueness and non-uniqueness of random-cluster measures are explored for certain classes of equivalence relations. In proving uniqueness, the following problem concerning branching processes is encountered and answered. Consider bond percolation on the family-tree $T$ of a branching process. What is the probability that every infinite path of $T$, beginning at its root, contains some vertex which is itself the root of an infinite open sub-tree?
- Published
- 2005
- Full Text
- View/download PDF
25. Upper tails for subgraph counts in random graphs
- Author
-
Krzysztof Oleszkiewicz, Svante Janson, and Andrzej Ruciński
- Subjects
Discrete mathematics ,Random graph ,Combinatorics ,Logarithm ,General Mathematics ,Random regular graph ,Exponent ,Graph ,Mathematics ,Exponential function - Abstract
LetG be a fixed graph and letX G be the number of copies ofG contained in the random graphG(n, p). We prove exponential bounds on the upper tail ofX G which are best possible up to a logarithmic factor in the exponent. Our argument relies on an extension of Alon’s result about the maximum number of copies ofG in a graph with a given number of edges. Similar bounds are proved for the random graphG(n, M) too.
- Published
- 2004
- Full Text
- View/download PDF
26. The phase transition in the uniformly grown random graph has infinite order
- Author
-
Svante Janson, Oliver Riordan, and Béla Bollobás
- Subjects
Random graph ,Discrete mathematics ,Phase transition ,Applied Mathematics ,General Mathematics ,Order (group theory) ,Computer Graphics and Computer-Aided Design ,Software ,Mathematics - Published
- 2004
- Full Text
- View/download PDF
27. The Deletion Method For Upper Tail Estimates
- Author
-
Svante Janson and Andrzej Ruciński
- Subjects
Random graph ,Combinatorics ,Discrete mathematics ,Computational Mathematics ,Discrete Mathematics and Combinatorics ,Martingale (probability theory) ,Random variable ,Mathematics - Abstract
We present a new method to show concentration of the upper tail of random variables that can be written as sums of variables with plenty of independence. We compare our method with the martingale method by Kim and Vu, which often leads to similar results.Some applications are given to the number X G of copies of a graph G in the random graph $$\Bbb G $$ (n,p). In particular, for G = K 4 and G = C 4 we improve the earlier known upper bounds on —ln ℙ(X G ≥ 2 $$\Bbb E$$ X G ) in some range of p = p(n).
- Published
- 2004
- Full Text
- View/download PDF
28. On Generalized Random Railways
- Author
-
Hans Garmo, Svante Janson, and Michał Karoński
- Subjects
Statistics and Probability ,Combinatorics ,Random graph ,Discrete mathematics ,Property (philosophy) ,Computational Theory and Mathematics ,Applied Mathematics ,Multigraph ,Random regular graph ,Random function ,Random element ,Theoretical Computer Science ,Mathematics - Abstract
We consider a random generalized railway defined as a random 3-regular multigraph where some vertices are regarded as switches that only allow traffic between certain pairs of attached edges. It is shown that the probability that the generalized railway is functioning is linear in the proportion of switches. Thus there is no threshold phenomenon for this property.
- Published
- 2004
- Full Text
- View/download PDF
29. Random dyadic tilings of the unit square
- Author
-
Svante Janson, Dana Randall, and Joel Spencer
- Subjects
Discrete mathematics ,Square tiling ,Applied Mathematics ,General Mathematics ,Substitution tiling ,Trihexagonal tiling ,Unit square ,Computer Graphics and Computer-Aided Design ,Triangular tiling ,Combinatorics ,Rectangle ,Software ,Rhombille tiling ,Hexagonal tiling ,Mathematics - Abstract
A "dyadic rectangle" is a set of the form R = [a2-s,(a + 1)2-s] × [b2-t,(b + 1)2-t], where s and t are nonnegative integers. A dyadic tiling is a tiling of the unit square with dyadic rectangles. In this paper we study n-tilings, which consist of 2n nonoverlapping dyadic rectangles, each of area 2-n, whose union is the unit square. We discuss some of the underlying combinatorial structures, provide some efficient methods for uniformly sampling from the set of n-tilings, and study some limiting properties of random tilings.
- Published
- 2002
- Full Text
- View/download PDF
30. Permutation Pseudographs and Contiguity
- Author
-
Svante Janson, Catherine Greenhill, Nicholas C. Wormald, and Jeong Han Kim
- Subjects
Statistics and Probability ,Discrete mathematics ,Degree (graph theory) ,Computer Science::Information Retrieval ,Applied Mathematics ,Multiplicative function ,Random permutation ,Hamiltonian path ,Theoretical Computer Science ,Cyclic permutation ,Combinatorics ,symbols.namesake ,Permutation ,Computational Theory and Mathematics ,Random regular graph ,symbols ,Permutation graph ,MathematicsofComputing_DISCRETEMATHEMATICS ,Mathematics - Abstract
The space of permutation pseudographs is a probabilistic model of 2-regular pseudographs on n vertices, where a pseudograph is produced by choosing a permutation σ of {1,2,…, n} uniformly at random and taking the n edges {i,σ(i)}. We prove several contiguity results involving permutation pseudographs (contiguity is a kind of asymptotic equivalence of sequences of probability spaces). Namely, we show that a random 4-regular pseudograph is contiguous with the sum of two permutation pseudographs, the sum of a permutation pseudograph and a random Hamilton cycle, and the sum of a permutation pseudograph and a random 2-regular pseudograph. (The sum of two random pseudograph spaces is defined by choosing a pseudograph from each space independently and taking the union of the edges of the two pseudographs.) All these results are proved simultaneously by working in a general setting, where each cycle of the permutation is given a nonnegative constant multiplicative weight. A further contiguity result is proved involving the union of a weighted permutation pseudograph and a random regular graph of arbitrary degree. All corresponding results for simple graphs are obtained as corollaries.
- Published
- 2002
- Full Text
- View/download PDF
31. On Symmetry of Uniform and Preferential Attachment Graphs
- Author
-
Svante Janson, Abram Magner, Wojciech Szpankowski, and Giorgios Kollias
- Subjects
Random graph ,Discrete mathematics ,Vertex (graph theory) ,Conjecture ,Applied Mathematics ,media_common.quotation_subject ,Preferential attachment ,Automorphism ,Asymmetry ,Graph ,Theoretical Computer Science ,Combinatorics ,Computational Theory and Mathematics ,Dynamic models ,Discrete Mathematics and Combinatorics ,Geometry and Topology ,Mathematics ,media_common - Abstract
Motivated by the problem of graph structure compression under realistic source models, we study the symmetry behavior of preferential and uniform attachment graphs. These are two dynamic models of network growth in which new nodes attach to a constant number $m$ of existing ones according to some attachment scheme. We prove symmetry results for $m=1$ and $2$, and we conjecture that for $m\geq 3$, both models yield asymmetry with high probability. We provide new empirical evidence in terms of graph defect. We also prove that vertex defects in the uniform attachment model grow at most logarithmically with graph size, then use this to prove a weak asymmetry result for all values of $m$ in the uniform attachment model. Finally, we introduce a natural variation of the two models that incorporates preference of new nodes for nodes of a similar age, and we show that the change introduces symmetry for all values of $m$.
- Published
- 2014
- Full Text
- View/download PDF
32. Graphs where every k-subset of vertices is an identifying set
- Author
-
Svante Janson, Tero Laihonen, Sylvain Gravier, Sanna Ranto, Institut Fourier (IF ), Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes [2016-2019] (UGA [2016-2019]), Laboratoire Leibniz (Leibniz - IMAG), Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique de Grenoble (INPG)-Université Joseph Fourier - Grenoble 1 (UJF), Department of Mathematics [Uppsala], Uppsala University, Coding Theory Research Group, University of Turku-Turku Centre for Computer Science (TUCS), Department of Physics and Astronomy [Turku], University of Turku, Institut Fourier (IF), Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes (UGA), and Université Joseph Fourier - Grenoble 1 (UJF)-Institut National Polytechnique de Grenoble (INPG)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
Discrete mathematics ,General Computer Science ,Neighbourhood (graph theory) ,Graph ,Theoretical Computer Science ,Vertex (geometry) ,Combinatorics ,[MATH.MATH-CO] Mathematics [math]/Combinatorics [math.CO] ,05C69, 94C12, 05C70, 05C75 ,Independent set ,[MATH.MATH-CO]Mathematics [math]/Combinatorics [math.CO] ,FOS: Mathematics ,Discrete Mathematics and Combinatorics ,Level structure ,Mathematics - Combinatorics ,Combinatorics (math.CO) ,Multiple edges ,Undirected graph ,Mathematics - Abstract
Let $G=(V,E)$ be an undirected graph without loops and multiple edges. A subset $C\subseteq V$ is called \emph{identifying} if for every vertex $x\in V$ the intersection of $C$ and the closed neighbourhood of $x$ is nonempty, and these intersections are different for different vertices $x$. Let $k$ be a positive integer. We will consider graphs where \emph{every} $k$-subset is identifying. We prove that for every $k>1$ the maximal order of such a graph is at most $2k-2.$ Constructions attaining the maximal order are given for infinitely many values of $k.$ The corresponding problem of $k$-subsets identifying any at most $\ell$ vertices is considered as well., 21 pages
- Published
- 2014
- Full Text
- View/download PDF
33. Bootstrap percolation on Galton-Watson trees
- Author
-
Svante Janson, Karen Gunderson, Michał Przykucki, Cecilia Holmgren, and Béla Bollobás
- Subjects
Statistics and Probability ,Bootstrap percolation ,05C05, 60K35, 60C05, 60J80 (Primary) 05C80 (Secondary) ,05C80 ,Natural number ,infinite trees ,Combinatorics ,05C05 ,Mathematics::Probability ,Physical phenomena ,FOS: Mathematics ,60C05 ,Mathematics - Combinatorics ,Critical probability ,Mathematics ,Galton watson ,Discrete mathematics ,60J80 ,Matematik ,Probability (math.PR) ,branching number ,Galton--Watson trees ,Graph ,Vertex (geometry) ,Galton-Watson trees ,60K35 ,Bounded function ,Combinatorics (math.CO) ,Statistics, Probability and Uncertainty ,bootstrap percolation ,Mathematics - Probability - Abstract
Bootstrap percolation is a type of cellular automaton which has been used to model various physical phenomena, such as ferromagnetism. For each natural number $r$, the $r$-neighbour bootstrap process is an update rule for vertices of a graph in one of two states: `infected' or `healthy'. In consecutive rounds, each healthy vertex with at least $r$ infected neighbours becomes itself infected. Percolation is said to occur if every vertex is eventually infected. Usually, the starting set of infected vertices is chosen at random, with all vertices initially infected independently with probability $p$. In that case, given a graph $G$ and infection threshold $r$, a quantity of interest is the critical probability, $p_c(G,r)$, at which percolation becomes likely to occur. In this paper, we look at infinite trees and, answering a problem posed by Balogh, Peres and Pete, we show that for any $b \geq r$ and for any $��> 0$ there exists a tree $T$ with branching number $\br(T) = b$ and critical probability $p_c(T,r) < ��$. However, this is false if we limit ourselves to the well-studied family of Galton--Watson trees. We show that for every $r \geq 2$ there exists a constant $c_r>0$ such that if $T$ is a Galton--Watson tree with branching number $\br(T) = b \geq r$ then p_c(T,r) > \frac{c_r}{b} e^{-\frac{b}{r-1}}. We also show that this bound is sharp up to a factor of $O(b)$ by giving an explicit family of Galton--Watson trees with critical probability bounded from above by $C_r e^{-\frac{b}{r-1}}$ for some constant $C_r>0$., 25 pages
- Published
- 2014
34. Asymptotic distribution of two-protected nodes in ternary search trees
- Author
-
Svante Janson and Cecilia Holmgren
- Subjects
Statistics and Probability ,Discrete mathematics ,Conjecture ,Normal limit laws ,Random Trees ,Probability (math.PR) ,Asymptotic distribution ,Context (language use) ,68P05 ,Normal limit ,Combinatorics ,Normal distribution ,Ternary search ,05C05 ,M-ary search trees ,60F05 ,Ternary search tree ,FOS: Mathematics ,60C05 ,Statistics, Probability and Uncertainty ,Polya urns ,Mathematics - Probability ,Mathematics ,Complement (set theory) - Abstract
We study protected nodes in $m$ - ary search trees, by putting them in context of generalised Po lya urns. We show that the number of two-protected nodes (the nodes that are neither leaves nor parents of leaves) in a random ternary search tree is asymptotically normal. The methods apply in principle to $m $ - ary search trees with larger $m$ as well, although the size of the matrices used in the calculations grow rapidly with $ m $ ; we conjecture that the method yields an asymptotically normal distribution for all $m\leq 26$ . The one-protected nodes, and their complement, i.e., the leaves, are easier to analyze. By using a simpler Po lya urn (that is similar to the one that has earlier been used to study the total number of nodes in $ m $ - ary search trees), we prove normal limit laws for the number of one-protected nodes and the number of leaves for all $ m\leq 26 $ .
- Published
- 2014
- Full Text
- View/download PDF
35. Weighted Staircase Tableaux, Asymmetric Exclusion Process, and Eulerian Type Recurrences
- Author
-
Svante Janson and Pawel Hitczenko
- Subjects
Discrete mathematics ,Combinatorics ,symbols.namesake ,Mathematics::Combinatorics ,Mathematics::Quantum Algebra ,Process (computing) ,symbols ,Structure (category theory) ,Eulerian path ,Context (language use) ,Type (model theory) ,Mathematics - Abstract
We consider a relatively new combinatorial structure called staircase tableaux. They were introduced in the context of the asymmetric exclusion process and Askey–Wilson polynomials; however, their purely combinatorial properties have gained considerable interest in the past few years.
- Published
- 2014
- Full Text
- View/download PDF
36. Asymptotic distribution for the cost of linear probing hashing
- Author
-
Svante Janson
- Subjects
Discrete mathematics ,Applied Mathematics ,General Mathematics ,Normal convergence ,Linear probing ,Hash function ,Asymptotic distribution ,Stein's method ,Computer Graphics and Computer-Aided Design ,Hash table ,Combinatorics ,Quadratic probing ,Software ,Average cost ,Mathematics - Abstract
We study moments and asymptotic distributions of the construction cost, measured as the total displacement, for hash tables using linear probing. Four different methods are employed for different ranges of the parameters; together they yield a complete description. This extends earlier results by Flajolet, Poblete and Viola [On the analysis of linear probing hashing, Algorithmica 22 (1998), 490–515]. The average cost of unsuccessful searches is considered too. © 2001 John Wiley & Sons, Inc. Random Struct. Alg., 19: 438–471, 2001
- Published
- 2001
- Full Text
- View/download PDF
37. Growth of components in random graphs
- Author
-
Svante Janson
- Subjects
Discrete mathematics ,Applied Mathematics ,General Mathematics ,Multigraph ,Strength of a graph ,Computer Graphics and Computer-Aided Design ,Combinatorics ,Graph power ,Random regular graph ,Cycle graph ,Path graph ,Multiple edges ,Software ,Complement graph ,Mathematics - Abstract
The creation and growth of components of a given complexity in a random graph process are studied. In particular, the expected number and total size of all such components is found. It follows that the largest '-component during the process is Op(n 2/3 ) for any given '. The results also yield a new proof of the asymptotic behaviour of Wright's coecients. between the two processes is that in {G(n,m)}, the edges are added at the fixed times 1,2,..., so at time m we have the random graph G(n,m) with m edges, while in {G(n,t)} the edges are added at random times in such a way that at time t = p, we have the random graph G(n,p). ({G(n,t)} may be constructed by letting each edge e in the complete graph Kn appear at a random time Te, with Te independent and uniformly distributed on (0,1), and letting G(n,t) contain the edges that have appeared before t.) In this paper, we will study random variables that depend on the order the edges appear in the process, but not on the time scale. All such variables will thus have the same distribution for both processes (not only asymptotically, but also for each finite n). Hence all results below are valid for both processes. We define the complexity of a connected graph to be its number of edges minus its number of vertices. A component of a graph of complexity ' is called an '-component. Here ' 1; a ( 1)-component is a tree, a 0-component is unicyclic, and '-components with ' 1 are known as complex components. In the beginning of the random graph process, there are no edges at all, and thus n components of order 1 and complexity 1; at the end, we have the complete graph, with a single component of complexity n 2 n. Several authors have studied what happens in between, see e.g. (4, 9, 6, 7, 11, 8). We will here add some results obtained by studying, as in (6), the ways '-components are created. Each time a new edge is added, there are two possibilities
- Published
- 2000
- Full Text
- View/download PDF
38. One, Two and Three Times log n/n for Paths in a Complete Graph with Random Weights
- Author
-
Svante Janson
- Subjects
Statistics and Probability ,Discrete mathematics ,Combinatorics ,Computational Theory and Mathematics ,Applied Mathematics ,Complete graph ,Point (geometry) ,Binary logarithm ,Theoretical Computer Science ,Mathematics - Abstract
Consider the minimal weights of paths between two points in a complete graph Kn with random weights on the edges, the weights being, for instance, uniformly distributed. It is shown that, asymptotically, this is log n/n for two given points, that the maximum if one point is fixed and the other varies is 2 log n/n, and that the maximum over all pairs of points is 3 log n/n.Some further related results are given as well, including results on asymptotic distributions and moments, and on the number of edges in the minimal weight paths.
- Published
- 1999
- Full Text
- View/download PDF
39. On the variance of the random sphere of influence graph
- Author
-
Svante Janson, Joseph E. Yukich, and Pawel Hitczenko
- Subjects
Discrete mathematics ,Random graph ,Applied Mathematics ,General Mathematics ,Computer Graphics and Computer-Aided Design ,Clebsch graph ,Geometric graph theory ,Planar graph ,law.invention ,Combinatorics ,symbols.namesake ,law ,Line graph ,Random regular graph ,symbols ,Cubic graph ,Multiple edges ,Software ,Mathematics - Abstract
We show that the variance of the number of edges in the random sphere of influence graph built on n i.i sites which are uniformly distributed over the unit cube in R-d, grows linearly with n. This is then used to establish a central limit theorem for the
- Published
- 1999
- Full Text
- View/download PDF
40. Shellsort with three increments
- Author
-
Svante Janson and Donald E. Knuth
- Subjects
FOS: Computer and information sciences ,Combinatorics ,Discrete mathematics ,Applied Mathematics ,General Mathematics ,Computer Science - Data Structures and Algorithms ,Perturbation (astronomy) ,Data Structures and Algorithms (cs.DS) ,Shellsort ,Computer Graphics and Computer-Aided Design ,Software ,Mathematics ,Running time - Abstract
A perturbation technique can be used to simplify and sharpen A. C. Yao's theorems about the behavior of shellsort with increments $(h,g,1)$. In particular, when $h=\Theta(n^{7/15})$ and $g=\Theta(h^{1/5})$, the average running time is $O(n^{23/15})$. The proof involves interesting properties of the inversions in random permutations that have been $h$-sorted and $g$-sorted.
- Published
- 1997
- Full Text
- View/download PDF
41. Graph properties, graph limits and entropy
- Author
-
Svante Janson, Hamed Hatami, and Balázs Szegedy
- Subjects
Random graph ,Discrete mathematics ,Symmetric graph ,Comparability graph ,0102 computer and information sciences ,01 natural sciences ,law.invention ,Combinatorics ,010104 statistics & probability ,010201 computation theory & mathematics ,law ,Random regular graph ,Line graph ,FOS: Mathematics ,Discrete Mathematics and Combinatorics ,Mathematics - Combinatorics ,Geometry and Topology ,Combinatorics (math.CO) ,0101 mathematics ,Graph property ,Forbidden graph characterization ,Universal graph ,Mathematics - Abstract
We study the relation between the growth rate of a graph property and the entropy of the graph limits that arise from graphs with that property. In particular, for hereditary classes we obtain a new description of the colouring number, which by well-known results describes the rate of growth. We study also random graphs and their entropies. We show, for example, that if a hereditary property has a unique limiting graphon with maximal entropy, then a random graph with this property, selected uniformly at random from all such graphs with a given order, converges to this maximizing graphon as the order tends to infinity., 24 pages
- Published
- 2013
42. Protected nodes and fringe subtrees in some random trees
- Author
-
Svante Janson and Luc Devroye
- Subjects
Statistics and Probability ,simply generated trees ,Context (language use) ,Mathematical proof ,Random binary tree ,Combinatorics ,protected nodes ,05C05 ,Mathematics::Probability ,Simple (abstract algebra) ,FOS: Mathematics ,fringe trees ,60C05 ,Mathematics - Combinatorics ,Mathematics ,random recursive trees ,Discrete mathematics ,Matematik ,Probability (math.PR) ,Weight-balanced tree ,60C05, 05C05 ,Scapegoat tree ,fringe subtrees ,binary search trees ,Binary search tree ,Ternary search tree ,Combinatorics (math.CO) ,Statistics, Probability and Uncertainty ,random trees ,conditioned Galton-Watson trees ,Mathematics - Probability - Abstract
We study protected nodes in various classes of random rooted trees by putting them in the general context of fringe subtrees introduced by Aldous (1991). Several types of random trees are considered: simply generated trees (or conditioned Galton-Watson trees), which includes several cases treated separately by other authors, binary search trees and random recursive trees. This gives unified and simple proofs of several earlier results, as well as new results., 11 pages
- Published
- 2013
43. First critical probability for a problem on random orientations in $G(n,p)$
- Author
-
Svante Janson, Sven Erick Alm, and Svante Linusson
- Subjects
Statistics and Probability ,Path (topology) ,05C80 ,Random directed graph ,Combinatorics ,FOS: Mathematics ,05C20 ,60C05 ,Mathematics - Combinatorics ,05C80, 60C05, 60K35 ,Sannolikhetsteori och statistik ,Probability Theory and Statistics ,Critical probability ,Mathematics ,random directed graphs ,Random graph ,Discrete mathematics ,Conjecture ,Probability (math.PR) ,Zero (complex analysis) ,Orientation (vector space) ,05C38 ,correlation ,directed paths ,Combinatorics (math.CO) ,Statistics, Probability and Uncertainty ,Mathematics - Probability - Abstract
We study the random graph $G(n,p)$ with a random orientation. For three fixed vertices $s,a,b$ in $G(n,p)$ we study the correlation of the events $a \to s$ and $s\to b$. We prove that asymptotically the correlation is negative for small $p$, $p, Comment: 15 pages, 3 figures
- Published
- 2013
44. On the Asymptotic Statistics of the Number of Occurrences of Multiple Permutation Patterns
- Author
-
Doron Zeilberger, Brian Nakamura, and Svante Janson
- Subjects
Discrete mathematics ,Probability (math.PR) ,Asymptotic distribution ,Random permutation ,Set (abstract data type) ,Combinatorics ,Permutation ,05A05, 60C05 ,Probability theory ,Permutation pattern ,FOS: Mathematics ,Mathematics - Combinatorics ,Point (geometry) ,Combinatorics (math.CO) ,Random variable ,Mathematics - Probability ,Mathematics - Abstract
We study statistical properties of the random variables $X_{\sigma}(\pi)$, the number of occurrences of the pattern $\sigma$ in the permutation $\pi$. We present two contrasting approaches to this problem: traditional probability theory and the ``less traditional'' computational approach. Through the perspective of the first one, we prove that for any pair of patterns $\sigma$ and $\tau$, the random variables $X_{\sigma}$ and $X_{\tau}$ are jointly asymptotically normal (when the permutation is chosen from $S_{n}$). From the other perspective, we develop algorithms that can show asymptotic normality and joint asymptotic normality (up to a point) and derive explicit formulas for quite a few moments and mixed moments empirically, yet rigorously. The computational approach can also be extended to the case where permutations are drawn from a set of pattern avoiders to produce many empirical moments and mixed moments. This data suggests that some random variables are not asymptotically normal in this setting., Comment: 18 pages
- Published
- 2013
- Full Text
- View/download PDF
45. Law of large numbers for the SIR epidemic on a random graph with given degrees
- Author
-
Peter Windridge, Svante Janson, and Malwina J. Luczak
- Subjects
Discrete mathematics ,Random graph ,Applied Mathematics ,General Mathematics ,Small number ,Multigraph ,Probability (math.PR) ,Second moment of area ,Computer Graphics and Computer-Aided Design ,Quantitative Biology::Other ,Vertex (geometry) ,Combinatorics ,Law of large numbers ,Bounded function ,05C80, 60F99, 60J28, 92D30 ,FOS: Mathematics ,Uniform boundedness ,Quantitative Biology::Populations and Evolution ,Software ,Mathematics - Probability ,Mathematics - Abstract
We study the susceptible-infective-recovered (SIR) epidemic on a random graph chosen uniformly subject to having given vertex degrees. In this model infective vertices infect each of their susceptible neighbours, and recover, at a constant rate. Suppose that initially there are only a few infective vertices. We prove there is a threshold for a parameter involving the rates and vertex degrees below which only a small number of infections occur. Above the threshold a large outbreak occurs with probability bounded away from zero. Our main result is that, conditional on a large outbreak, the evolutions of certain quantities of interest, such as the fraction of infective vertices, converge to deterministic functions of time. We also consider more general initial conditions for the epidemic, and derive criteria for a simple vaccination strategy to be successful. In contrast to earlier results for this model, our approach only requires basic regularity conditions and a uniformly bounded second moment of the degree of a random vertex. En route, we prove analogous results for the epidemic on the configuration model multigraph under much weaker conditions. Essentially, our main result requires only that the initial values for our processes converge, i.e. it is the best possible., Comment: 37 pages, no figures (revisewd following referee comments)
- Published
- 2013
- Full Text
- View/download PDF
46. Erratum: A central limit theorem for random ordered factorizations of integers
- Author
-
Hsien-Kuei Hwang and Svante Janson
- Subjects
Statistics and Probability ,Discrete mathematics ,method of moments ,Tauberian theorems ,central limit theorem ,11N60 ,Method of moments (probability theory) ,Abelian and tauberian theorems ,symbols.namesake ,Mathematics::Algebraic Geometry ,60F05 ,symbols ,Ordered factorizations ,Dirichlet series ,Statistics, Probability and Uncertainty ,Volume (compression) ,Mathematics ,Central limit theorem - Abstract
This is an erratum for EJP volume 16 paper 12 . We fix a gap in the proof of our estimates for odd moments.
- Published
- 2013
- Full Text
- View/download PDF
47. The minimal spanning tree in a complete graph and a functional limit theorem for trees in a random graph
- Author
-
Svante Janson
- Subjects
Random graph ,Discrete mathematics ,Spanning tree ,Applied Mathematics ,General Mathematics ,Minimum spanning tree ,Computer Graphics and Computer-Aided Design ,Tree (graph theory) ,Geometric graph theory ,Combinatorics ,Graph minor ,Null graph ,Graph factorization ,Software ,MathematicsofComputing_DISCRETEMATHEMATICS ,Mathematics - Abstract
The minimal weight of a spanning tree in a complete graph Kn with independent, uniformly distributed random weights on the edges is shown to have an asymptotic normal distribution. The proof uses a functional limit extension of results by Barbour and Pittel on the distribution of the number of tree components of given sizes in a random graph.
- Published
- 1995
- Full Text
- View/download PDF
48. Random Regular Graphs: Asymptotic Distributions and Contiguity
- Author
-
Svante Janson
- Subjects
Statistics and Probability ,Random graph ,Discrete mathematics ,Computer Science::Information Retrieval ,Applied Mathematics ,Log-Cauchy distribution ,V-statistic ,Asymptotic distribution ,Theoretical Computer Science ,Ratio distribution ,Combinatorics ,Compound Poisson distribution ,Computational Theory and Mathematics ,Heavy-tailed distribution ,Random regular graph ,Mathematics - Abstract
The asymptotic distribution of the number of Hamilton cycles in a random regular graph is determined. The limit distribution is of an unusual type; it is the distribution of a variable whose logarithm can be written as an infinite linear combination of independent Poisson variables, and thus the logarithm has an infinitely divisible distribution with a certain discrete Lévy measure. Similar results are found for some related problems. These limit results imply that some different models of random regular graphs are contiguous, which means that they are qualitatively asymptotically equivalent. For example, if r > 3, then the usual (uniformly distributed) random r-regular graph is contiguous to the one constructed by taking the union of r perfect matchings on the same vertex set (assumed to be of even cardinality), conditioned on there being no multiple edges. Some consequences of contiguity for asymptotic distributions are discussed.
- Published
- 1995
- Full Text
- View/download PDF
49. Perfect matchings in random s-uniform hypergraphs
- Author
-
Alan Frieze and Svante Janson
- Subjects
Combinatorics ,Random graph ,Set (abstract data type) ,Discrete mathematics ,Hypergraph ,Applied Mathematics ,General Mathematics ,Computer Graphics and Computer-Aided Design ,Software ,Mathematics - Abstract
Let E={X(1),X(2),...,X(m)} where the X(i) subset of or equal to V for 1 less than or equal to i less than or equal to m are distinct. The hypergraph G=(V,E) is said to be s-uniform if \X(1)\=s for 1 less than or equal to i less than or equal to m. A set o
- Published
- 1995
- Full Text
- View/download PDF
50. A graph Fourier transform and proportional graphs
- Author
-
Svante Janson
- Subjects
Random graph ,Discrete mathematics ,Applied Mathematics ,General Mathematics ,Fourier inversion theorem ,Computer Graphics and Computer-Aided Design ,1-planar graph ,Modular decomposition ,Combinatorics ,Indifference graph ,Pathwidth ,Partial k-tree ,Maximal independent set ,Software ,Mathematics - Abstract
A Fourier transform for (real valued) functions of graphs is denned. This is used to study and characterize some classes of graphs that arise as exceptional cases in limit theorems for subgraph counts in random graphs. © 1995 Wiley Periodicals, Inc.
- Published
- 1995
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.