revolutionaries and spies on graphs
play

Revolutionaries and Spies on Graphs Daniel W. Cranston Virginia - PowerPoint PPT Presentation

Revolutionaries and Spies on Graphs Daniel W. Cranston Virginia Commonwealth University dcranston@vcu.edu Slides available on my webpage Joint with Jane Butterfield, Greg Puleo, Doug West, and Reza Zamani NIST ACMD Seminar 12 March 2013 A


  1. Revolutionaries and Spies on Graphs Daniel W. Cranston Virginia Commonwealth University dcranston@vcu.edu Slides available on my webpage Joint with Jane Butterfield, Greg Puleo, Doug West, and Reza Zamani NIST ACMD Seminar 12 March 2013

  2. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex.

  3. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy.

  4. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays.

  5. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r

  6. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r r r r r r

  7. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r sr r r rs r

  8. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. rr r s r rr s r

  9. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. rrs r r srr r

  10. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. rs r r srr r r

  11. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r rs srr r r

  12. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r rs srr r Obs 1: If s ≥ | V ( G ) | , then the spies win. r

  13. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r rs srr r Obs 1: If s ≥ | V ( G ) | , then the spies win. r If s < | V ( G ) | and ⌊ r / m ⌋ > s , then rev’s win. Obs 2:

  14. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r rs r r r r s s s srr r r r r r Obs 1: If s ≥ | V ( G ) | , then the spies win. r If s < | V ( G ) | and ⌊ r / m ⌋ > s , then rev’s win. Obs 2: Ex: Say m = 2, r = 8, and s = 3.

  15. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r rs r r r r s s s srr r r r r r Obs 1: If s ≥ | V ( G ) | , then the spies win. r If s < | V ( G ) | and ⌊ r / m ⌋ > s , then rev’s win. Obs 2: Ex: Say m = 2, r = 8, and s = 3. So we assume ⌊ r / m ⌋ ≤ s < | V ( G ) | .

  16. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r rs r r r r s s s srr r r r r r Obs 1: If s ≥ | V ( G ) | , then the spies win. r If s < | V ( G ) | and ⌊ r / m ⌋ > s , then rev’s win. Obs 2: Ex: Say m = 2, r = 8, and s = 3. So we assume ⌊ r / m ⌋ ≤ s < | V ( G ) | . Def: σ ( G , m , r ) is minimum number of spies needed to win on G .

  17. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on:

  18. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: trees, dominated graphs, “webbed trees”

  19. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs trees, dominated graphs, “webbed trees”

  20. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs trees, dominated graphs, “webbed trees” 2. Random graph, hypercubes, large complete k -partite; solved completely for unicyclic graphs

  21. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs trees, dominated graphs, “webbed trees” 2. Random graph, hypercubes, large complete k -partite; solved completely for unicyclic graphs 3. For large complete bipartite graphs:

  22. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs trees, dominated graphs, “webbed trees” 2. Random graph, hypercubes, large complete k -partite; solved completely for unicyclic graphs 3. For large complete bipartite graphs: σ ( G , 2 , r ) = 7 10 r

  23. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs trees, dominated graphs, “webbed trees” 2. Random graph, hypercubes, large complete k -partite; solved completely for unicyclic graphs 3. For large complete bipartite graphs: σ ( G , 2 , r ) = 7 10 r σ ( G , 3 , r ) = 1 2 r

  24. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs trees, dominated graphs, “webbed trees” 2. Random graph, hypercubes, large complete k -partite; solved completely for unicyclic graphs 3. For large complete bipartite graphs: σ ( G , 2 , r ) = 7 10 r σ ( G , 3 , r ) = 1 2 r � r � 3 m − 2 ≤ σ ( G , m , r ) < 1 . 58 r 2 − o (1) m , for m ≥ 4

  25. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs trees, dominated graphs, “webbed trees” 2. Random graph, hypercubes, large complete k -partite; solved completely for unicyclic graphs 3. For large complete bipartite graphs: σ ( G , 2 , r ) = 7 10 r = 7 r 5 2 σ ( G , 3 , r ) = 1 2 r = 3 r 2 3 � r � 3 m − 2 ≤ σ ( G , m , r ) < 1 . 58 r 2 − o (1) m , for m ≥ 4

  26. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs trees, dominated graphs, “webbed trees” 2. Random graph, hypercubes, large complete k -partite; solved completely for unicyclic graphs 3. For large complete bipartite graphs: σ ( G , 2 , r ) = 7 10 r = 7 r 5 2 σ ( G , 3 , r ) = 1 2 r = 3 r 2 3 � r � 3 m − 2 ≤ σ ( G , m , r ) < 1 . 58 r 2 − o (1) m , for m ≥ 4 Conj: As m grows: σ ( G , m , r ) ∼ 3 r 2 m

  27. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r .

  28. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r . Ex: P 9 is spy-good. Consider m = 3, r = 13, s = 4.

  29. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r . Ex: P 9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each m th rev. When rev’s move, spies repeat.

  30. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r . Ex: P 9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each m th rev. When rev’s move, spies repeat. s s

  31. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r . Ex: P 9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each m th rev. When rev’s move, spies repeat. s r r r r r r r r r r r r r s

  32. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r . Ex: P 9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each m th rev. When rev’s move, spies repeat. s r r r r r r r r r r r r r s s

Recommend


More recommend