revolutionaries and spies
play

Revolutionaries and Spies Daniel W. Cranston Virginia Commonwealth - PowerPoint PPT Presentation

Revolutionaries and Spies Daniel W. Cranston Virginia Commonwealth University dcranston@vcu.edu Slides available on my preprint page Joint with Jane Butterfield, Greg Puleo, Cliff Smyth, Doug West, and Reza Zamani LSU Combinatorics Seminar 6


  1. Revolutionaries and Spies Daniel W. Cranston Virginia Commonwealth University dcranston@vcu.edu Slides available on my preprint page Joint with Jane Butterfield, Greg Puleo, Cliff Smyth, Doug West, and Reza Zamani LSU Combinatorics Seminar 6 October 2011

  2. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex.

  3. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy.

  4. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays.

  5. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ | V ( G ) | , then the spies win.

  6. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ | V ( G ) | , then the spies win. s s

  7. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ | V ( G ) | , then the spies win. s s s s s s s s

  8. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ | V ( G ) | , then the spies win. s s s s s s s Obs 2: If s < | V ( G ) | and ⌊ r / m ⌋ > s , then rev’s win. s

  9. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ | V ( G ) | , then the spies win. s s s s r r r r s s s s s s r r r r Obs 2: If s < | V ( G ) | and ⌊ r / m ⌋ > s , then rev’s win. s Ex: Say m = 2, r = 8, and s = 3.

  10. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ | V ( G ) | , then the spies win. s s s s r r r r s s s s s s r r r r Obs 2: If s < | V ( G ) | and ⌊ r / m ⌋ > s , then rev’s win. s Ex: Say m = 2, r = 8, and s = 3. So we assume ⌊ r / m ⌋ ≤ s < | V ( G ) | .

  11. A Problem of Network Security Setup: r revolutionaries play against s spies on a graph G . Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. Obs 1: If s ≥ | V ( G ) | , then the spies win. s s s s r r r r s s s s s s r r r r Obs 2: If s < | V ( G ) | and ⌊ r / m ⌋ > s , then rev’s win. s Ex: Say m = 2, r = 8, and s = 3. So we assume ⌊ r / m ⌋ ≤ s < | V ( G ) | . Def: σ ( G , m , r ) is minimum number of spies needed to win on G

  12. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on:

  13. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: dominated graphs, trees, interval graphs, “webbed trees”

  14. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs dominated graphs, trees, interval graphs, “webbed trees”

  15. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs dominated graphs, trees, interval graphs, “webbed trees” 2. On chordal graphs, we may need r − m + 1 spies to win

  16. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs dominated graphs, trees, interval graphs, “webbed trees” 2. On chordal graphs, we may need r − m + 1 spies to win 3. On unicyclic graphs, ⌈ r / m ⌉ spies can win rev’s may need many moves to beat ⌈ r / m ⌉ − 1 spies

  17. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs dominated graphs, trees, interval graphs, “webbed trees” 2. On chordal graphs, we may need r − m + 1 spies to win 3. On unicyclic graphs, ⌈ r / m ⌉ spies can win rev’s may need many moves to beat ⌈ r / m ⌉ − 1 spies 4. Random graph, hypercubes, large complete k -partite

  18. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs dominated graphs, trees, interval graphs, “webbed trees” 2. On chordal graphs, we may need r − m + 1 spies to win 3. On unicyclic graphs, ⌈ r / m ⌉ spies can win rev’s may need many moves to beat ⌈ r / m ⌉ − 1 spies 4. Random graph, hypercubes, large complete k -partite 5. For large complete bipartite graphs: σ ( G , 2 , r ) = 7 10 r

  19. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs dominated graphs, trees, interval graphs, “webbed trees” 2. On chordal graphs, we may need r − m + 1 spies to win 3. On unicyclic graphs, ⌈ r / m ⌉ spies can win rev’s may need many moves to beat ⌈ r / m ⌉ − 1 spies 4. Random graph, hypercubes, large complete k -partite 5. For large complete bipartite graphs: σ ( G , 2 , r ) = 7 10 r σ ( G , 3 , r ) = 1 2 r

  20. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs dominated graphs, trees, interval graphs, “webbed trees” 2. On chordal graphs, we may need r − m + 1 spies to win 3. On unicyclic graphs, ⌈ r / m ⌉ spies can win rev’s may need many moves to beat ⌈ r / m ⌉ − 1 spies 4. Random graph, hypercubes, large complete k -partite 5. For large complete bipartite graphs: σ ( G , 2 , r ) = 7 10 r σ ( G , 3 , r ) = 1 2 r � r � 3 m − 2 ≤ σ ( G , m , r ) < 1 . 58 r 2 − o (1) m , for m ≥ 4

  21. Results (thresholds for spies to win) 1. ⌊ r / m ⌋ spies can win on: spy-good graphs dominated graphs, trees, interval graphs, “webbed trees” 2. On chordal graphs, we may need r − m + 1 spies to win 3. On unicyclic graphs, ⌈ r / m ⌉ spies can win rev’s may need many moves to beat ⌈ r / m ⌉ − 1 spies 4. Random graph, hypercubes, large complete k -partite 5. For large complete bipartite graphs: σ ( G , 2 , r ) = 7 10 r = 7 r 5 2 σ ( G , 3 , r ) = 1 2 r = 3 r 2 3 � r � 3 m − 2 ≤ σ ( G , m , r ) < 1 . 58 r 2 − o (1) m , for m ≥ 4 Conj: As m grows: σ ( G , m , r ) ∼ 3 r 2 m

  22. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r .

  23. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r . Ex: P 9 is spy-good. Consider m = 3, r = 13, s = 4.

  24. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r . Ex: P 9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each m th rev. When rev’s move, spies repeat.

  25. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r . Ex: P 9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each m th rev. When rev’s move, spies repeat. s s

  26. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r . Ex: P 9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each m th rev. When rev’s move, spies repeat. s r r r r r r r r r r r r r s

  27. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r . Ex: P 9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each m th rev. When rev’s move, spies repeat. s r r r r r r r r r r r r r s s

  28. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r . Ex: P 9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each m th rev. When rev’s move, spies repeat. s r r r r r r r r r r r r r s s s

  29. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r . Ex: P 9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each m th rev. When rev’s move, spies repeat. s r r r r r r r r r r r r r s s s s

  30. Spy-good Graphs: Trees Def: A graph G is spy-good if σ ( G , m , r ) = ⌊ r / m ⌋ for all m , r . Ex: P 9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each m th rev. When rev’s move, spies repeat. s r r r r r r r r r r r r r s s s s s

Recommend


More recommend