The Diameter of Sparse Random Graphs
β Scribed by Fan Chung; Linyuan Lu
- Publisher
- Elsevier Science
- Year
- 2001
- Tongue
- English
- Weight
- 150 KB
- Volume
- 26
- Category
- Article
- ISSN
- 0196-8858
No coin nor oath required. For personal study only.
β¦ Synopsis
We consider the diameter of a random graph G n p for various ranges of p close to the phase transition point for connectivity. For a disconnected graph G, we use the convention that the diameter of G is the maximum diameter of its connected components. We show that almost surely the diameter of random graph G n p is close to log n log np if np β β. Moreover if np log n = c > 8, then the diameter of G n p is concentrated on two values. In general, if np log n = c > c 0 , the diameter is concentrated on at most 2 1/c 0 + 4 values. We also proved that the diameter of G n p is almost surely equal to the diameter of its giant component if np > 3 6.
π SIMILAR VOLUMES
## Abstract In this article we study Hamilton cycles in sparse pseudoβrandom graphs. We prove that if the second largest absolute value Ξ» of an eigenvalue of a __d__βregular graph __G__ on __n__ vertices satisfies and __n__ is large enough, then __G__ is Hamiltonian. We also show how our main resu
The performance of the greedy coloring algorithm ''first fit'' on sparse random graphs G and on random trees is investigated. In each case, approximately n, c r n log log n colors are used, the exact number being concentrated almost surely on at 2 most two consecutive integers for a sparse random gr
The author proved that, for c > 1, the random graph G(n, p ) on n vertices with edge probability p = c / n contains almost always an induced tree on at least q n ( 1 -o( 1)) vertices, where L Y ~ is the positive root of the equation CLY = log( 1 + c'a). It is shown here that if c is sufficiently lar
We study the average performance of a simple greedy algorithm for finding a matching in a sparse random graph G , where c ) 0 is constant. The algorithm was first n, c r n w proposed by Karp and Sipser Proceedings of the Twenty-Second Annual IEEE Symposium on x Foundations of Computing, 1981, pp. 3