Revolutionaries and Spies on Graphs Daniel W. Cranston Virginia - - PowerPoint PPT Presentation

revolutionaries and spies on graphs
SMART_READER_LITE
LIVE PREVIEW

Revolutionaries and Spies on Graphs Daniel W. Cranston Virginia - - PowerPoint PPT Presentation

Revolutionaries and Spies on Graphs Daniel W. Cranston Virginia Commonwealth University dcranston@vcu.edu Slides available on my webpage Joint with Jane Butterfield, Greg Puleo, Doug West, and Reza Zamani NIST ACMD Seminar 12 March 2013 A


slide-1
SLIDE 1

Revolutionaries and Spies on Graphs

Daniel W. Cranston

Virginia Commonwealth University dcranston@vcu.edu Slides available on my webpage Joint with Jane Butterfield, Greg Puleo, Doug West, and Reza Zamani NIST ACMD Seminar 12 March 2013

slide-2
SLIDE 2

A Problem of Network Security

Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex.

slide-3
SLIDE 3

A Problem of Network Security

Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy.

slide-4
SLIDE 4

A Problem of Network Security

Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays.

slide-5
SLIDE 5

A Problem of Network Security

Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r

slide-6
SLIDE 6

A Problem of Network Security

Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r r r r r r

slide-7
SLIDE 7

A Problem of Network Security

Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r sr r r rs r

slide-8
SLIDE 8

A Problem of Network Security

Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r s rr r s rr

slide-9
SLIDE 9

A Problem of Network Security

Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r srr r rrs

slide-10
SLIDE 10

A Problem of Network Security

Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r srr r r rs

slide-11
SLIDE 11

A Problem of Network Security

Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r srr rs r r

slide-12
SLIDE 12

A Problem of Network Security

Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r srr rs r r Obs 1: If s ≥ |V (G)|, then the spies win.

slide-13
SLIDE 13

A Problem of Network Security

Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r srr rs r r Obs 1: If s ≥ |V (G)|, then the spies win. Obs 2: If s < |V (G)| and ⌊r/m⌋ > s, then rev’s win.

slide-14
SLIDE 14

A Problem of Network Security

Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r srr rs r r r r r r r r r r s s s Obs 1: If s ≥ |V (G)|, then the spies win. Obs 2: If s < |V (G)| and ⌊r/m⌋ > s, then rev’s win. Ex: Say m = 2, r = 8, and s = 3.

slide-15
SLIDE 15

A Problem of Network Security

Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r srr rs r r r r r r r r r r s s s Obs 1: If s ≥ |V (G)|, then the spies win. Obs 2: If s < |V (G)| and ⌊r/m⌋ > s, then rev’s win. Ex: Say m = 2, r = 8, and s = 3. So we assume ⌊r/m⌋ ≤ s < |V (G)|.

slide-16
SLIDE 16

A Problem of Network Security

Setup: r revolutionaries play against s spies on a graph G. Each rev. moves to a vertex, then each spy moves to a vertex. Goal: Rev’s want to get m rev’s at a common vertex, with no spy. Each turn: Each rev. moves/stays, then each spy moves/stays. r r srr rs r r r r r r r r r r s s s Obs 1: If s ≥ |V (G)|, then the spies win. Obs 2: If s < |V (G)| and ⌊r/m⌋ > s, then rev’s win. Ex: Say m = 2, r = 8, and s = 3. So we assume ⌊r/m⌋ ≤ s < |V (G)|. Def: σ(G, m, r) is minimum number of spies needed to win on G.

slide-17
SLIDE 17

Results (thresholds for spies to win)

  • 1. ⌊r/m⌋ spies can win on:
slide-18
SLIDE 18

Results (thresholds for spies to win)

  • 1. ⌊r/m⌋ spies can win on:

trees, dominated graphs, “webbed trees”

slide-19
SLIDE 19

Results (thresholds for spies to win)

  • 1. ⌊r/m⌋ spies can win on: spy-good graphs

trees, dominated graphs, “webbed trees”

slide-20
SLIDE 20

Results (thresholds for spies to win)

  • 1. ⌊r/m⌋ spies can win on: spy-good graphs

trees, dominated graphs, “webbed trees”

  • 2. Random graph, hypercubes, large complete k-partite;

solved completely for unicyclic graphs

slide-21
SLIDE 21

Results (thresholds for spies to win)

  • 1. ⌊r/m⌋ spies can win on: spy-good graphs

trees, dominated graphs, “webbed trees”

  • 2. Random graph, hypercubes, large complete k-partite;

solved completely for unicyclic graphs

  • 3. For large complete bipartite graphs:
slide-22
SLIDE 22

Results (thresholds for spies to win)

  • 1. ⌊r/m⌋ spies can win on: spy-good graphs

trees, dominated graphs, “webbed trees”

  • 2. Random graph, hypercubes, large complete k-partite;

solved completely for unicyclic graphs

  • 3. For large complete bipartite graphs:

σ(G, 2, r) = 7 10r

slide-23
SLIDE 23

Results (thresholds for spies to win)

  • 1. ⌊r/m⌋ spies can win on: spy-good graphs

trees, dominated graphs, “webbed trees”

  • 2. Random graph, hypercubes, large complete k-partite;

solved completely for unicyclic graphs

  • 3. For large complete bipartite graphs:

σ(G, 2, r) = 7 10r σ(G, 3, r) = 1 2r

slide-24
SLIDE 24

Results (thresholds for spies to win)

  • 1. ⌊r/m⌋ spies can win on: spy-good graphs

trees, dominated graphs, “webbed trees”

  • 2. Random graph, hypercubes, large complete k-partite;

solved completely for unicyclic graphs

  • 3. For large complete bipartite graphs:

σ(G, 2, r) = 7 10r σ(G, 3, r) = 1 2r 3 2 − o(1) r m − 2 ≤ σ(G, m, r) < 1.58 r m, for m ≥ 4

slide-25
SLIDE 25

Results (thresholds for spies to win)

  • 1. ⌊r/m⌋ spies can win on: spy-good graphs

trees, dominated graphs, “webbed trees”

  • 2. Random graph, hypercubes, large complete k-partite;

solved completely for unicyclic graphs

  • 3. For large complete bipartite graphs:

σ(G, 2, r) = 7 10r = 7 5 r 2 σ(G, 3, r) = 1 2r = 3 2 r 3 3 2 − o(1) r m − 2 ≤ σ(G, m, r) < 1.58 r m, for m ≥ 4

slide-26
SLIDE 26

Results (thresholds for spies to win)

  • 1. ⌊r/m⌋ spies can win on: spy-good graphs

trees, dominated graphs, “webbed trees”

  • 2. Random graph, hypercubes, large complete k-partite;

solved completely for unicyclic graphs

  • 3. For large complete bipartite graphs:

σ(G, 2, r) = 7 10r = 7 5 r 2 σ(G, 3, r) = 1 2r = 3 2 r 3 3 2 − o(1) r m − 2 ≤ σ(G, m, r) < 1.58 r m, for m ≥ 4 Conj: As m grows: σ(G, m, r) ∼ 3

2 r m

slide-27
SLIDE 27

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r.

slide-28
SLIDE 28

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4.

slide-29
SLIDE 29

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat.

slide-30
SLIDE 30

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s

slide-31
SLIDE 31

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r

slide-32
SLIDE 32

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s

slide-33
SLIDE 33

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s

slide-34
SLIDE 34

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s

slide-35
SLIDE 35

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s

slide-36
SLIDE 36

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s s s s s r r r r r r r r r r r r r → ← → ← ⇐ ←

slide-37
SLIDE 37

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s ← → ← ←

slide-38
SLIDE 38

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s s s s s r r r r r r r r r r r r r ← → ⇐ → ← ←

slide-39
SLIDE 39

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s

slide-40
SLIDE 40

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s

slide-41
SLIDE 41

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s

slide-42
SLIDE 42

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s Thm: Every tree is spy-good.

slide-43
SLIDE 43

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s Thm: Every tree is spy-good. Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v; C(v) is children of v; and w(v) is num. of rev’s at descendants. s(v) = w(v) m

  • x∈C(v)

w(x) m

slide-44
SLIDE 44

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s Thm: Every tree is spy-good. Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v; C(v) is children of v; and w(v) is num. of rev’s at descendants. s(v) = w(v) m

  • x∈C(v)

w(x) m

  • 1. Since ⌊a + b⌋ ≥ ⌊a⌋ + ⌊b⌋, s(v) is nonnegative
slide-45
SLIDE 45

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s Thm: Every tree is spy-good. Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v; C(v) is children of v; and w(v) is num. of rev’s at descendants. s(v) = w(v) m

  • x∈C(v)

w(x) m

  • 1. Since ⌊a + b⌋ ≥ ⌊a⌋ + ⌊b⌋, s(v) is nonnegative
  • 2. If r(v) ≥ m, then s(v) ≥
  • w(v)

m

  • w(v)−r(v)

m

  • ≥ 1
slide-46
SLIDE 46

Spy-good Graphs: Trees

Def: A graph G is spy-good if σ(G, m, r) = ⌊r/m⌋ for all m, r. Ex: P9 is spy-good. Consider m = 3, r = 13, s = 4. Pf: One spy follows each mth rev. When rev’s move, spies repeat. s s r r r r r r r r r r r r r s s s s Thm: Every tree is spy-good. Pf Sketch: Write r(v) and s(v) for num. of rev’s and spies at v; C(v) is children of v; and w(v) is num. of rev’s at descendants. s(v) = w(v) m

  • x∈C(v)

w(x) m

  • 1. Since ⌊a + b⌋ ≥ ⌊a⌋ + ⌊b⌋, s(v) is nonnegative
  • 2. If r(v) ≥ m, then s(v) ≥
  • w(v)

m

  • w(v)−r(v)

m

  • ≥ 1

3.

v∈T s(v) =

  • w(u)

m

  • =

r

m

slide-47
SLIDE 47

Spy-good graphs: Dominated Graphs and Webbed Trees

Def: G is a dominated graph if G has a dominating vertex, u.

slide-48
SLIDE 48

Spy-good graphs: Dominated Graphs and Webbed Trees

Def: G is a dominated graph if G has a dominating vertex, u. Thm: Every dominated graph is spy-good.

slide-49
SLIDE 49

Spy-good graphs: Dominated Graphs and Webbed Trees

Def: G is a dominated graph if G has a dominating vertex, u. Thm: Every dominated graph is spy-good. Pf Sketch: One spy covers each meeting; all unused spies go to u.

slide-50
SLIDE 50

Spy-good graphs: Dominated Graphs and Webbed Trees

Def: G is a dominated graph if G has a dominating vertex, u. Thm: Every dominated graph is spy-good. Pf Sketch: One spy covers each meeting; all unused spies go to u. We find a matching between the old and new positions of spies.

slide-51
SLIDE 51

Spy-good graphs: Dominated Graphs and Webbed Trees

Def: G is a dominated graph if G has a dominating vertex, u. Thm: Every dominated graph is spy-good. Pf Sketch: One spy covers each meeting; all unused spies go to u. We find a matching between the old and new positions of spies. Def: G is a webbed tree if G has a rooted spanning tree T s.t. each edge of G not in T is between siblings.

slide-52
SLIDE 52

Spy-good graphs: Dominated Graphs and Webbed Trees

Def: G is a dominated graph if G has a dominating vertex, u. Thm: Every dominated graph is spy-good. Pf Sketch: One spy covers each meeting; all unused spies go to u. We find a matching between the old and new positions of spies. Def: G is a webbed tree if G has a rooted spanning tree T s.t. each edge of G not in T is between siblings. Thm: Every webbed tree is spy-good.

slide-53
SLIDE 53

Spy-good graphs: Dominated Graphs and Webbed Trees

Def: G is a dominated graph if G has a dominating vertex, u. Thm: Every dominated graph is spy-good. Pf Sketch: One spy covers each meeting; all unused spies go to u. We find a matching between the old and new positions of spies. Def: G is a webbed tree if G has a rooted spanning tree T s.t. each edge of G not in T is between siblings. Thm: Every webbed tree is spy-good. Pf Sketch: Same strategy as for trees: s(v) = w(v) m

  • x∈C(v)

w(x) m

slide-54
SLIDE 54

Spy-good graphs: Dominated Graphs and Webbed Trees

Def: G is a dominated graph if G has a dominating vertex, u. Thm: Every dominated graph is spy-good. Pf Sketch: One spy covers each meeting; all unused spies go to u. We find a matching between the old and new positions of spies. Def: G is a webbed tree if G has a rooted spanning tree T s.t. each edge of G not in T is between siblings. Thm: Every webbed tree is spy-good. Pf Sketch: Same strategy as for trees: s(v) = w(v) m

  • x∈C(v)

w(x) m

  • Partition E(G) into subgraphs G(v) = G[v ∪ C(v)].
slide-55
SLIDE 55

Spy-good graphs: Dominated Graphs and Webbed Trees

Def: G is a dominated graph if G has a dominating vertex, u. Thm: Every dominated graph is spy-good. Pf Sketch: One spy covers each meeting; all unused spies go to u. We find a matching between the old and new positions of spies. Def: G is a webbed tree if G has a rooted spanning tree T s.t. each edge of G not in T is between siblings. Thm: Every webbed tree is spy-good. Pf Sketch: Same strategy as for trees: s(v) = w(v) m

  • x∈C(v)

w(x) m

  • Partition E(G) into subgraphs G(v) = G[v ∪ C(v)]. Simulate

a game in each G(v); use those moves in the actual game. Each G(v) is a dominated graph, so we can use that result.

slide-56
SLIDE 56

Large Complete Bipartite Graphs

Thm: For a large complete bipartite graph G σ(G, 2, r) = 7 5 r 2

slide-57
SLIDE 57

Large Complete Bipartite Graphs

Thm: For a large complete bipartite graph G σ(G, 2, r) = 7 5 r 2 Main ideas: Call the two parts X1 and X2.

◮ On each round, the two main threats of the rev’s are to form

as many uncovered meetings as possible in X1; or in X2. If the spies defend against these two threats, then they won’t lose.

slide-58
SLIDE 58

Large Complete Bipartite Graphs

Thm: For a large complete bipartite graph G σ(G, 2, r) = 7 5 r 2 Main ideas: Call the two parts X1 and X2.

◮ On each round, the two main threats of the rev’s are to form

as many uncovered meetings as possible in X1; or in X2. If the spies defend against these two threats, then they won’t lose.

◮ By always keeping a large fraction of spies in each part,

the spies never need to look more than 1 move ahead.

slide-59
SLIDE 59

Large Complete Bipartite Graphs

Thm: For a large complete bipartite graph G σ(G, 2, r) = 7 5 r 2 Main ideas: Call the two parts X1 and X2.

◮ On each round, the two main threats of the rev’s are to form

as many uncovered meetings as possible in X1; or in X2. If the spies defend against these two threats, then they won’t lose.

◮ By always keeping a large fraction of spies in each part,

the spies never need to look more than 1 move ahead.

◮ To win, on each round the spies maintain an invariant;

the proof goes by induction on the number of rounds.

slide-60
SLIDE 60

Main Results and Open Problems

  • 1. ⌊r/m⌋ spies can win on:

trees, dominated graphs, “webbed trees”

slide-61
SLIDE 61

Main Results and Open Problems

  • 1. ⌊r/m⌋ spies can win on:

trees, dominated graphs, “webbed trees” also graph powers and “vertex blowups”

slide-62
SLIDE 62

Main Results and Open Problems

  • 1. ⌊r/m⌋ spies can win on:

trees, dominated graphs, “webbed trees” also graph powers and “vertex blowups” Problem 1: Characterize spy-good graphs

slide-63
SLIDE 63

Main Results and Open Problems

  • 1. ⌊r/m⌋ spies can win on:

trees, dominated graphs, “webbed trees” also graph powers and “vertex blowups” Problem 1: Characterize spy-good graphs

  • 2. For large complete bipartite graphs:

σ(G, 2, r) = 7 10r = 7 5 r 2 σ(G, 3, r) = 1 2r = 3 2 r 3 3 2 − o(1) r m − 2 ≤ σ(G, m, r) < 1.58 r m, for m ≥ 4

slide-64
SLIDE 64

Main Results and Open Problems

  • 1. ⌊r/m⌋ spies can win on:

trees, dominated graphs, “webbed trees” also graph powers and “vertex blowups” Problem 1: Characterize spy-good graphs

  • 2. For large complete bipartite graphs:

σ(G, 2, r) = 7 10r = 7 5 r 2 σ(G, 3, r) = 1 2r = 3 2 r 3 3 2 − o(1) r m − 2 ≤ σ(G, m, r) < 1.58 r m, for m ≥ 4 Problem 2: Improve upper bounds for m ≥ 4.

slide-65
SLIDE 65

Main Results and Open Problems

  • 1. ⌊r/m⌋ spies can win on:

trees, dominated graphs, “webbed trees” also graph powers and “vertex blowups” Problem 1: Characterize spy-good graphs

  • 2. For large complete bipartite graphs:

σ(G, 2, r) = 7 10r = 7 5 r 2 σ(G, 3, r) = 1 2r = 3 2 r 3 3 2 − o(1) r m − 2 ≤ σ(G, m, r) < 1.58 r m, for m ≥ 4 Problem 2: Improve upper bounds for m ≥ 4. Conj: As m grows: σ(G, m, r) ∼ 3

2 r m