limited choice and randomness in evolution of networks lecture...
TRANSCRIPT
![Page 1: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/1.jpg)
Limited choice and randomnessin evolution of networks
Lecture 1Cornell Probability summer school
July 2012
Shankar Bhamidi
Department of Statistics and Operations ResearchUniversity of North Carolina
July, 2012
Shankar Bhamidi Limited choice in networks
![Page 2: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/2.jpg)
Plan of the lectures
Underlying theme
Mathematical techniques for dynamic random graph models
Effect of limited choice
Lecture contentLecture 1: Critical random graphs, Bounded size rules [Scaling limits]
Lecture 2: Preferential attachment models, random trees [Local Weakconvergence]
Shankar Bhamidi Limited choice in networks
![Page 3: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/3.jpg)
Plan of the lectures
Underlying theme
Mathematical techniques for dynamic random graph models
Effect of limited choice
Lecture contentLecture 1: Critical random graphs, Bounded size rules [Scaling limits]
Lecture 2: Preferential attachment models, random trees [Local Weakconvergence]
Shankar Bhamidi Limited choice in networks
![Page 4: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/4.jpg)
Lecture 1
General motivation
Critical random graphs
Bounded size rules and the emergence of the giant
Method of proof (Joint work with Budhiraja and Wang)
Extensions: “Explosive percolation”
Shankar Bhamidi Limited choice in networks
![Page 5: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/5.jpg)
Lecture 2
Preferential attachment models
Convergence of random trees
Implications: Convergence of the spectral measure (Arnab Sen, SteveEvans, SB)
Power of choice in random trees
Local weak convergence (Angel, Pemantle, SB)
Shankar Bhamidi Limited choice in networks
![Page 6: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/6.jpg)
Power of two choices
Application setting
Consider n bins (servers) into which we are going to sequentially place nballs (jobs).
Centralized scheme (asking bins current load) computationallyexpensive and time consuming
Simplest scheme, each stage choose bin at random and place ball
Each ball has ∼ Poi(1) # of balls at end
Max load ∼ Θ(log n/ log(log n))
Limited choice Choose 2 bins u.a.r.
Put ball in bin with minimal # of balls at that stage
Max load ∼ Θ(log log n)
Shankar Bhamidi Limited choice in networks
![Page 7: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/7.jpg)
Power of two choices
Application setting
Consider n bins (servers) into which we are going to sequentially place nballs (jobs).
Centralized scheme (asking bins current load) computationallyexpensive and time consuming
Simplest scheme, each stage choose bin at random and place ball
Each ball has ∼ Poi(1) # of balls at end
Max load ∼ Θ(log n/ log(log n))
Limited choice Choose 2 bins u.a.r.
Put ball in bin with minimal # of balls at that stage
Max load ∼ Θ(log log n)
Shankar Bhamidi Limited choice in networks
![Page 8: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/8.jpg)
Power of two choices
Application setting
Consider n bins (servers) into which we are going to sequentially place nballs (jobs).
Centralized scheme (asking bins current load) computationallyexpensive and time consuming
Simplest scheme, each stage choose bin at random and place ball
Each ball has ∼ Poi(1) # of balls at end
Max load ∼ Θ(log n/ log(log n))
Limited choice Choose 2 bins u.a.r.
Put ball in bin with minimal # of balls at that stage
Max load ∼ Θ(log log n)
Shankar Bhamidi Limited choice in networks
![Page 9: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/9.jpg)
Power of two choices
Application setting
Consider n bins (servers) into which we are going to sequentially place nballs (jobs).
Centralized scheme (asking bins current load) computationallyexpensive and time consuming
Simplest scheme, each stage choose bin at random and place ball
Each ball has ∼ Poi(1) # of balls at end
Max load ∼ Θ(log n/ log(log n))
Limited choice Choose 2 bins u.a.r.
Put ball in bin with minimal # of balls at that stage
Max load ∼ Θ(log log n)
Shankar Bhamidi Limited choice in networks
![Page 10: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/10.jpg)
Power of two choices
Application setting
Consider n bins (servers) into which we are going to sequentially place nballs (jobs).
Centralized scheme (asking bins current load) computationallyexpensive and time consuming
Simplest scheme, each stage choose bin at random and place ball
Each ball has ∼ Poi(1) # of balls at end
Max load ∼ Θ(log n/ log(log n))
Limited choice Choose 2 bins u.a.r.
Put ball in bin with minimal # of balls at that stage
Max load ∼ Θ(log log n)
Shankar Bhamidi Limited choice in networks
![Page 11: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/11.jpg)
Power of two choices
Application setting
Consider n bins (servers) into which we are going to sequentially place nballs (jobs).
Centralized scheme (asking bins current load) computationallyexpensive and time consuming
Simplest scheme, each stage choose bin at random and place ball
Each ball has ∼ Poi(1) # of balls at end
Max load ∼ Θ(log n/ log(log n))
Limited choice Choose 2 bins u.a.r.
Put ball in bin with minimal # of balls at that stage
Max load ∼ Θ(log log n)
Shankar Bhamidi Limited choice in networks
![Page 12: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/12.jpg)
Network models
MotivationLast few years have seen an explosion in empirical data on real worldnetworks.
Has motivated an interdisciplinary study in understanding theemergence of properties of these network models.
Formulation of many mathematical models of network formation.
Limited choiceIncorporate effect of limited choice in network formation
Mathematically understand explosive percolation
Simple variants of standard models give much better fit but hard tomathematically analyze
Shankar Bhamidi Limited choice in networks
![Page 13: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/13.jpg)
Network models
MotivationLast few years have seen an explosion in empirical data on real worldnetworks.
Has motivated an interdisciplinary study in understanding theemergence of properties of these network models.
Formulation of many mathematical models of network formation.
Limited choiceIncorporate effect of limited choice in network formation
Mathematically understand explosive percolation
Simple variants of standard models give much better fit but hard tomathematically analyze
Shankar Bhamidi Limited choice in networks
![Page 14: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/14.jpg)
Erdos-Renyi random graph
Setting
n vertices
Edge probability t/n
Phase transition at t = 1
# of edges ∼ n/2
t < 1, C1(t) ∼ log n
t > 1, C1 ∼ f(t)n
t = 1 +1
n1/3
Beautiful math theory
Shankar Bhamidi Limited choice in networks
![Page 15: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/15.jpg)
Erdos-Renyi random graph
Setting
n vertices
Edge probability t/n
Phase transition at t = 1
# of edges ∼ n/2
t < 1, C1(t) ∼ log n
t > 1, C1 ∼ f(t)n
t = 1 +1
n1/3
Beautiful math theory
Shankar Bhamidi Limited choice in networks
![Page 16: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/16.jpg)
Erdos-Renyi random graph
Setting
n vertices
Edge probability t/n
Phase transition at t = 1
# of edges ∼ n/2
t < 1, C1(t) ∼ log n
t > 1, C1 ∼ f(t)n
t = 1
+1
n1/3
Beautiful math theory
Shankar Bhamidi Limited choice in networks
![Page 17: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/17.jpg)
Erdos-Renyi random graph
Setting
n vertices
Edge probability t/n
Phase transition at t = 1
# of edges ∼ n/2
t < 1, C1(t) ∼ log n
t > 1, C1 ∼ f(t)n
t = 1 +1
n1/3
Beautiful math theory
Shankar Bhamidi Limited choice in networks
![Page 18: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/18.jpg)
Erdos-Renyi random graph
Setting
n vertices
Edge probability t/n
Phase transition at t = 1
# of edges ∼ n/2
t < 1, C1(t) ∼ log n
t > 1, C1 ∼ f(t)n
t = 1 +1
n1/3
Beautiful math theory
Shankar Bhamidi Limited choice in networks
![Page 19: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/19.jpg)
Bounded size rules
The Erdos-Renyi random graph of GERn
Gn(0) = 0n the graph with n vertices but no edgesEach step, choose one edge e uniformly among all
(n2
)possible
edges, and add it to the graph.
Gn(t): add edges at rate n/2.
Shankar Bhamidi Limited choice in networks
![Page 20: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/20.jpg)
Bounded size rules
The Erdos-Renyi random graph of GERn
Gn(0) = 0n the graph with n vertices but no edgesEach step, choose one edge e uniformly among all
(n2
)possible
edges, and add it to the graph.Gn(t): add edges at rate n/2.
Shankar Bhamidi Limited choice in networks
![Page 21: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/21.jpg)
The Erdos-Renyi random graph process
The Erdos-Renyi random graph of GERn
Gn(0) = 0n the graph with n vertices but no edgesEach step, choose one edge e uniformly among all
(n2
)possible
edges, and add it to the graph.Gn(t): add edges at rate n/2.
Shankar Bhamidi Limited choice in networks
![Page 22: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/22.jpg)
The Erdos-Renyi random graph process
The Erdos-Renyi random graph of GERn
Gn(0) = 0n the graph with n vertices but no edgesEach step, choose one edge e uniformly among all
(n2
)possible
edges, and add it to the graph.Gn(t): add edges at rate n/2.
Shankar Bhamidi Limited choice in networks
![Page 23: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/23.jpg)
The Erdos-Renyi random graph process
The Erdos-Renyi random graph of GERn
Gn(0) = 0n the graph with n vertices but no edgesEach step, choose one edge e uniformly among all
(n2
)possible
edges, and add it to the graph.Gn(t): add edges at rate n/2.
Shankar Bhamidi Limited choice in networks
![Page 24: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/24.jpg)
The Erdos-Renyi random graph process
The Erdos-Renyi random graph of GERn
Gn(0) = 0n the graph with n vertices but no edgesEach step, choose one edge e uniformly among all
(n2
)possible
edges, and add it to the graph.Gn(t): add edges at rate n/2.
Shankar Bhamidi Limited choice in networks
![Page 25: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/25.jpg)
The Erdos-Renyi random graph process
The Erdos-Renyi random graph of GERn
Gn(0) = 0n the graph with n vertices but no edgesEach step, choose one edge e uniformly among all
(n2
)possible
edges, and add it to the graph.Gn(t): add edges at rate n/2.
Shankar Bhamidi Limited choice in networks
![Page 26: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/26.jpg)
The Erdos-Renyi random graph process
The phase transition of GERn (t)
The giant component: the component contains Θ(n) vertices.
Let C(k)n (t) be the size of the kth largest component
tc = tERc = 1 is the critical time.
(super-critical) when t > 1, C(1)n = Θ(n), C(2)
n = O(log n).
(sub-critical) when t < 1, C(1)n = O(log n), C(2)
n = O(log n).
(critical) when t = 1, C(1)n ∼ n2/3, C(2)
n ∼ n2/3.
after initial work by [ER1960], further work by [JKLP1994], finally provedby [Aldous1997].
Merging dynamics through the scaling window of the componentsdescribed by a Markov Process called the multiplicative coalescent.
Formal existence of multiplicative coalescent.
Shankar Bhamidi Limited choice in networks
![Page 27: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/27.jpg)
The Erdos-Renyi random graph process
The phase transition of GERn (t)
The giant component: the component contains Θ(n) vertices.
Let C(k)n (t) be the size of the kth largest component
tc = tERc = 1 is the critical time.
(super-critical) when t > 1, C(1)n = Θ(n), C(2)
n = O(log n).
(sub-critical) when t < 1, C(1)n = O(log n), C(2)
n = O(log n).
(critical) when t = 1, C(1)n ∼ n2/3, C(2)
n ∼ n2/3.
after initial work by [ER1960], further work by [JKLP1994], finally provedby [Aldous1997].
Merging dynamics through the scaling window of the componentsdescribed by a Markov Process called the multiplicative coalescent.
Formal existence of multiplicative coalescent.
Shankar Bhamidi Limited choice in networks
![Page 28: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/28.jpg)
The Erdos-Renyi random graph process
The phase transition of GERn (t)
The giant component: the component contains Θ(n) vertices.
Let C(k)n (t) be the size of the kth largest component
tc = tERc = 1 is the critical time.
(super-critical) when t > 1, C(1)n = Θ(n), C(2)
n = O(log n).
(sub-critical) when t < 1, C(1)n = O(log n), C(2)
n = O(log n).
(critical) when t = 1, C(1)n ∼ n2/3, C(2)
n ∼ n2/3.
after initial work by [ER1960], further work by [JKLP1994], finally provedby [Aldous1997].
Merging dynamics through the scaling window of the componentsdescribed by a Markov Process called the multiplicative coalescent.
Formal existence of multiplicative coalescent.
Shankar Bhamidi Limited choice in networks
![Page 29: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/29.jpg)
The Erdos-Renyi random graph process
The phase transition of GERn (t)
The giant component: the component contains Θ(n) vertices.
Let C(k)n (t) be the size of the kth largest component
tc = tERc = 1 is the critical time.
(super-critical) when t > 1, C(1)n = Θ(n), C(2)
n = O(log n).
(sub-critical) when t < 1, C(1)n = O(log n), C(2)
n = O(log n).
(critical) when t = 1, C(1)n ∼ n2/3, C(2)
n ∼ n2/3.
after initial work by [ER1960], further work by [JKLP1994], finally provedby [Aldous1997].
Merging dynamics through the scaling window of the componentsdescribed by a Markov Process called the multiplicative coalescent.
Formal existence of multiplicative coalescent.
Shankar Bhamidi Limited choice in networks
![Page 30: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/30.jpg)
Bounded size rules: Effect of limited choice
[Bohman, Frieze 2001]The Bohman-Frieze random graph
Motivated by very interesting question of D. Achlioptas. Delayemergence of giant component using simple rules
Each step, two candidate edges (e1, e2) chosen uniformly among all(n2
)×(n2
)possible pairs of ordered edges. If e1 connect two singletons
(component of size 1), then add e1 to the graph; otherwise, add e2.Shall consider continuous time version wherein between any orderedpair of edges, poisson process with rate 2/n3.
Shankar Bhamidi Limited choice in networks
![Page 31: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/31.jpg)
Bounded size rules: Effect of limited choice
[Bohman, Frieze 2001]The Bohman-Frieze random graph
Motivated by very interesting question of D. Achlioptas. Delayemergence of giant component using simple rulesEach step, two candidate edges (e1, e2) chosen uniformly among all(n2
)×(n2
)possible pairs of ordered edges. If e1 connect two singletons
(component of size 1), then add e1 to the graph; otherwise, add e2.
Shall consider continuous time version wherein between any orderedpair of edges, poisson process with rate 2/n3.
Shankar Bhamidi Limited choice in networks
![Page 32: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/32.jpg)
Bounded size rules: Effect of limited choice
[Bohman, Frieze 2001]The Bohman-Frieze random graph
Motivated by very interesting question of D. Achlioptas. Delayemergence of giant component using simple rulesEach step, two candidate edges (e1, e2) chosen uniformly among all(n2
)×(n2
)possible pairs of ordered edges. If e1 connect two singletons
(component of size 1), then add e1 to the graph; otherwise, add e2.Shall consider continuous time version wherein between any orderedpair of edges, poisson process with rate 2/n3.
Shankar Bhamidi Limited choice in networks
![Page 33: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/33.jpg)
Bounded size rules: Effect of limited choice
[Bohman, Frieze 2001]The Bohman-Frieze random graph
Motivated by very interesting question of D. Achlioptas. Delayemergence of giant component using simple rulesEach step, two candidate edges (e1, e2) chosen uniformly among all(n2
)×(n2
)possible pairs of ordered edges. If e1 connect two singletons
(component of size 1), then add e1 to the graph; otherwise, add e2.Shall consider continuous time version wherein between any orderedpair of edges, poisson process with rate 2/n3.
Shankar Bhamidi Limited choice in networks
![Page 34: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/34.jpg)
The Bohman-Frieze process[Bohman, Frieze 2001] The delay of phase transitionConsider the continuous time version GBF
n (t), then there exists ε > 0such that at time tER
c + ε,
C(1)n (tERc + ε) = o(n)
[Spencer, Wormald 2004] The critical timetBFc ≈ 1.1763 > tER
c = 1.(super-critical) when t > tc, C(1)n = Θ(n), C(2)n = O(log n).(sub-critical) when t < tc, C(1)n = O(log n), C(2)n = O(log n).
Near CriticalityJanson and Spencer (2011) analyzed how s2(·), s3(·)→∞ ast ↑ tc.Kang, Perkins and Spencer (2011) analyze the near subcritical(tc − ε) regime.
Shankar Bhamidi Limited choice in networks
![Page 35: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/35.jpg)
The Bohman-Frieze process[Bohman, Frieze 2001] The delay of phase transitionConsider the continuous time version GBF
n (t), then there exists ε > 0such that at time tER
c + ε,
C(1)n (tERc + ε) = o(n)
[Spencer, Wormald 2004] The critical timetBFc ≈ 1.1763 > tER
c = 1.(super-critical) when t > tc, C(1)n = Θ(n), C(2)n = O(log n).(sub-critical) when t < tc, C(1)n = O(log n), C(2)n = O(log n).
Near CriticalityJanson and Spencer (2011) analyzed how s2(·), s3(·)→∞ ast ↑ tc.Kang, Perkins and Spencer (2011) analyze the near subcritical(tc − ε) regime.
Shankar Bhamidi Limited choice in networks
![Page 36: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/36.jpg)
The Bohman-Frieze process[Bohman, Frieze 2001] The delay of phase transitionConsider the continuous time version GBF
n (t), then there exists ε > 0such that at time tER
c + ε,
C(1)n (tERc + ε) = o(n)
[Spencer, Wormald 2004] The critical timetBFc ≈ 1.1763 > tER
c = 1.(super-critical) when t > tc, C(1)n = Θ(n), C(2)n = O(log n).(sub-critical) when t < tc, C(1)n = O(log n), C(2)n = O(log n).
Near CriticalityJanson and Spencer (2011) analyzed how s2(·), s3(·)→∞ ast ↑ tc.Kang, Perkins and Spencer (2011) analyze the near subcritical(tc − ε) regime.
Shankar Bhamidi Limited choice in networks
![Page 37: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/37.jpg)
General bounded size rules
Fix K ≥ 1
Let ΩK = 1, 2, . . . ,K, ω
General bounded size rule: subset F ⊂ Ω4K .
Pick 4 vertices uniformly at random. If (c(v1), c(v2), c(v3), c(v4)) ∈ F thenchoose edge e1 else e2
BF modelK = 1, F = (1, 1, α, β).
Shankar Bhamidi Limited choice in networks
![Page 38: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/38.jpg)
General bounded size rules
Fix K ≥ 1
Let ΩK = 1, 2, . . . ,K, ω
General bounded size rule: subset F ⊂ Ω4K .
Pick 4 vertices uniformly at random. If (c(v1), c(v2), c(v3), c(v4)) ∈ F thenchoose edge e1 else e2
BF modelK = 1, F = (1, 1, α, β).
Shankar Bhamidi Limited choice in networks
![Page 39: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/39.jpg)
Applied context
Shankar Bhamidi Limited choice in networks
![Page 40: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/40.jpg)
Main questions
Question: when t = tc, do we have C(1)n ∼ n2/3? How do components
merge?
scaling window?
What about the surplus of the largest components in the scalingwindow?
Shankar Bhamidi Limited choice in networks
![Page 41: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/41.jpg)
Main questions
Question: when t = tc, do we have C(1)n ∼ n2/3? How do components
merge? scaling window?
What about the surplus of the largest components in the scalingwindow?
Shankar Bhamidi Limited choice in networks
![Page 42: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/42.jpg)
Notation
C(i)n (t) size of i-th largest component at time t
Surplus (Complexity) of a component
ξ(i)
n (t) = E(C(i)
n (t))− (C(i)
n (t)− 1)
l2↓ =
(xi)i≥1 : x1 ≥ x2 ≥ · · · ≥ 0,∑i x
2i <∞
l2,∗↓ =
(xi, yi)i≥1 : (xi) ∈ l2↓, yi ∈ Z+,
∑i xiyi <∞
d((x, y), (x′, y′)) =
√∑i(xi − x′i)2 +
∑i |xiyi − x′iy′i|+
∑∞i=1
|yi−y′i|2i
Shankar Bhamidi Limited choice in networks
![Page 43: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/43.jpg)
Notation
C(i)n (t) size of i-th largest component at time t
Surplus (Complexity) of a component
ξ(i)
n (t) = E(C(i)
n (t))− (C(i)
n (t)− 1)
l2↓ =
(xi)i≥1 : x1 ≥ x2 ≥ · · · ≥ 0,∑i x
2i <∞
l2,∗↓ =
(xi, yi)i≥1 : (xi) ∈ l2↓, yi ∈ Z+,
∑i xiyi <∞
d((x, y), (x′, y′)) =
√∑i(xi − x′i)2 +
∑i |xiyi − x′iy′i|+
∑∞i=1
|yi−y′i|2i
Shankar Bhamidi Limited choice in networks
![Page 44: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/44.jpg)
Notation
C(i)n (t) size of i-th largest component at time t
Surplus (Complexity) of a component
ξ(i)
n (t) = E(C(i)
n (t))− (C(i)
n (t)− 1)
l2↓ =
(xi)i≥1 : x1 ≥ x2 ≥ · · · ≥ 0,∑i x
2i <∞
l2,∗↓ =
(xi, yi)i≥1 : (xi) ∈ l2↓, yi ∈ Z+,
∑i xiyi <∞
d((x, y), (x′, y′)) =
√∑i(xi − x′i)2 +
∑i |xiyi − x′iy′i|+
∑∞i=1
|yi−y′i|2i
Shankar Bhamidi Limited choice in networks
![Page 45: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/45.jpg)
The Erdos-Renyi random graph
Theorem (Aldous 1997)
Let (C(1)n (t), C(2)n (t), ...) be the component sizes of GERn (t) in decreasing order
and ξi(t) the corresponding complexity (surplus). Define rescaled size vectorC∗n(λ), −∞ < λ < +∞ as(
(1
n2/3C(i)n (tc +
λ
n1/3),
ξ(i)
n (tc +λ
n1/3)) : i ≥ 1
)Then Cn(λ)
d−→ X(λ) = (X(λ), ξ(λ)). Here (X(λ),−∞ < λ < +∞) is thestandard multiplicative coalescent, a continuous time Markov process on thestate space l2↓.
Distribution for fixed λFor fixed λ ∈ R, let
Wλ(t) = W (t) + λt− t2
2,
Wλ(·) is the above process reflected at 0.X(λ) has same distribution as lengths of excursions away from 0of W (·) arranged in decreasing order
Shankar Bhamidi Limited choice in networks
![Page 46: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/46.jpg)
The Erdos-Renyi random graph
Theorem (Aldous 1997)
Let (C(1)n (t), C(2)n (t), ...) be the component sizes of GERn (t) in decreasing order
and ξi(t) the corresponding complexity (surplus). Define rescaled size vectorC∗n(λ), −∞ < λ < +∞ as(
(1
n2/3C(i)n (tc +
λ
n1/3), ξ(i)
n (tc +λ
n1/3)) : i ≥ 1
)Then Cn(λ)
d−→ X(λ) = (X(λ), ξ(λ)). Here (X(λ),−∞ < λ < +∞) is thestandard multiplicative coalescent, a continuous time Markov process on thestate space l2↓.
Distribution for fixed λFor fixed λ ∈ R, let
Wλ(t) = W (t) + λt− t2
2,
Wλ(·) is the above process reflected at 0.X(λ) has same distribution as lengths of excursions away from 0of W (·) arranged in decreasing order
Shankar Bhamidi Limited choice in networks
![Page 47: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/47.jpg)
The Erdos-Renyi random graph
Theorem (Aldous 1997)
Let (C(1)n (t), C(2)n (t), ...) be the component sizes of GERn (t) in decreasing order
and ξi(t) the corresponding complexity (surplus). Define rescaled size vectorC∗n(λ), −∞ < λ < +∞ as(
(1
n2/3C(i)n (tc +
λ
n1/3), ξ(i)
n (tc +λ
n1/3)) : i ≥ 1
)Then Cn(λ)
d−→ X(λ) = (X(λ), ξ(λ)). Here (X(λ),−∞ < λ < +∞) is thestandard multiplicative coalescent, a continuous time Markov process on thestate space l2↓.
Distribution for fixed λFor fixed λ ∈ R, let
Wλ(t) = W (t) + λt− t2
2,
Wλ(·) is the above process reflected at 0.X(λ) has same distribution as lengths of excursions away from 0of W (·) arranged in decreasing order
Shankar Bhamidi Limited choice in networks
![Page 48: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/48.jpg)
The standard multiplicative coalescent X(λ)
Think of each edge having a Poisson rate 1/n clockCi(λ) = n−2/3Ci(1 + λ/n1/3)
At some time λ, rate at which two components i, j merge:
Ci(1 +λ
n1/3)Cj(1 +
λ
n1/3)
· 1
n· 1
n1/3= Ci(λ)Cj(λ)
Dynamics of X(λ)
suppose X(λ) = (x1, x2, x3, ...), each xl is viewed as the size of acluster.each pair of clusters of sizes (xi, xj) merges at rate xixj into acluster of size xi + xj .if xi, xj is merging, then (x1, x2, x3, ...) (x′1, x
′2, x′3, ...) where the
latter is the re-ordering of xi + xj , xl : l 6= i, j.
Shankar Bhamidi Limited choice in networks
![Page 49: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/49.jpg)
The standard multiplicative coalescent X(λ)
Think of each edge having a Poisson rate 1/n clockCi(λ) = n−2/3Ci(1 + λ/n1/3)
At some time λ, rate at which two components i, j merge:
Ci(1 +λ
n1/3)Cj(1 +
λ
n1/3) · 1
n·
1
n1/3= Ci(λ)Cj(λ)
Dynamics of X(λ)
suppose X(λ) = (x1, x2, x3, ...), each xl is viewed as the size of acluster.each pair of clusters of sizes (xi, xj) merges at rate xixj into acluster of size xi + xj .if xi, xj is merging, then (x1, x2, x3, ...) (x′1, x
′2, x′3, ...) where the
latter is the re-ordering of xi + xj , xl : l 6= i, j.
Shankar Bhamidi Limited choice in networks
![Page 50: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/50.jpg)
The standard multiplicative coalescent X(λ)
Think of each edge having a Poisson rate 1/n clockCi(λ) = n−2/3Ci(1 + λ/n1/3)
At some time λ, rate at which two components i, j merge:
Ci(1 +λ
n1/3)Cj(1 +
λ
n1/3) · 1
n· 1
n1/3
= Ci(λ)Cj(λ)
Dynamics of X(λ)
suppose X(λ) = (x1, x2, x3, ...), each xl is viewed as the size of acluster.each pair of clusters of sizes (xi, xj) merges at rate xixj into acluster of size xi + xj .if xi, xj is merging, then (x1, x2, x3, ...) (x′1, x
′2, x′3, ...) where the
latter is the re-ordering of xi + xj , xl : l 6= i, j.
Shankar Bhamidi Limited choice in networks
![Page 51: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/51.jpg)
The standard multiplicative coalescent X(λ)
Think of each edge having a Poisson rate 1/n clockCi(λ) = n−2/3Ci(1 + λ/n1/3)
At some time λ, rate at which two components i, j merge:
Ci(1 +λ
n1/3)Cj(1 +
λ
n1/3) · 1
n· 1
n1/3= Ci(λ)Cj(λ)
Dynamics of X(λ)
suppose X(λ) = (x1, x2, x3, ...), each xl is viewed as the size of acluster.each pair of clusters of sizes (xi, xj) merges at rate xixj into acluster of size xi + xj .if xi, xj is merging, then (x1, x2, x3, ...) (x′1, x
′2, x′3, ...) where the
latter is the re-ordering of xi + xj , xl : l 6= i, j.
Shankar Bhamidi Limited choice in networks
![Page 52: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/52.jpg)
The standard multiplicative coalescent X(λ)
Think of each edge having a Poisson rate 1/n clockCi(λ) = n−2/3Ci(1 + λ/n1/3)
At some time λ, rate at which two components i, j merge:
Ci(1 +λ
n1/3)Cj(1 +
λ
n1/3) · 1
n· 1
n1/3= Ci(λ)Cj(λ)
Dynamics of X(λ)
suppose X(λ) = (x1, x2, x3, ...), each xl is viewed as the size of acluster.each pair of clusters of sizes (xi, xj) merges at rate xixj into acluster of size xi + xj .if xi, xj is merging, then (x1, x2, x3, ...) (x′1, x
′2, x′3, ...) where the
latter is the re-ordering of xi + xj , xl : l 6= i, j.
Shankar Bhamidi Limited choice in networks
![Page 53: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/53.jpg)
Bounded size rules
Theorem (Bhamidi, Budhiraja, Wang, 2012)
Let (C(1)n (t), C(2)n (t), ...) be the component sizes of GBSRn (t) in decreasing
order and ξi(t) the corresponding surplus. Define the rescaled sizevector Cn(λ), −∞ < λ < +∞ as the vector
((Ci(λ), ξi(λ) : i ≥ 1) =
(β1/3
n2/3C(i)n (tc +
β2/3αλ
n1/3), ξi(tc +
β2/3αλ
n1/3) : i ≥ 1
)
where α, β are constants determined by the BSR process. Then
Cn(λ)d−→ X(λ)
where (X(λ),−∞ < λ < +∞) is the standard augmentedmultiplicative coalescent and convergence happens in l2↓ with metric d.
Shankar Bhamidi Limited choice in networks
![Page 54: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/54.jpg)
Techniques
Branching process methods: Great tool above and below criticality.
Exploration walks: Very refined results presence of lots ofindependence, including structure of components
Differential equation method: Technical, standard workhorse for suchmodels. Can be pushed all the way to the critical window.
Shankar Bhamidi Limited choice in networks
![Page 55: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/55.jpg)
Techniques
Branching process methods: Great tool above and below criticality.
Exploration walks: Very refined results
presence of lots ofindependence, including structure of components
Differential equation method: Technical, standard workhorse for suchmodels. Can be pushed all the way to the critical window.
Shankar Bhamidi Limited choice in networks
![Page 56: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/56.jpg)
Techniques
Branching process methods: Great tool above and below criticality.
Exploration walks: Very refined results presence of lots ofindependence,
including structure of components
Differential equation method: Technical, standard workhorse for suchmodels. Can be pushed all the way to the critical window.
Shankar Bhamidi Limited choice in networks
![Page 57: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/57.jpg)
Techniques
Branching process methods: Great tool above and below criticality.
Exploration walks: Very refined results presence of lots ofindependence, including structure of components
Differential equation method: Technical, standard workhorse for suchmodels. Can be pushed all the way to the critical window.
Shankar Bhamidi Limited choice in networks
![Page 58: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/58.jpg)
Typical method of proof: Exploration
Shankar Bhamidi Limited choice in networks
![Page 59: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/59.jpg)
Typical method of proof: Exploration
Shankar Bhamidi Limited choice in networks
![Page 60: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/60.jpg)
Typical method of proof: Exploration
Shankar Bhamidi Limited choice in networks
![Page 61: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/61.jpg)
Typical method of proof
Exploration of the graph
Explore the components of the graph one by one
choose a vertex. Let c(1) be the number of children of this vertex
choose one of the children of this vertex, let c(2) be number of childrenof this vertex
continue, when one component completed move onto anothercomponent
Define Z(0) = 0, Z(i) = Z(i− 1) + c(i)− 1
Z(·) = −1 for the first time when we finish exploring component 1, thenhits −2 for first time when exploring component 2 and so on.
Try to use Martingale functional limit theorem to show1
n1/3Z(n2/3t)→d Wλ(t)
Shankar Bhamidi Limited choice in networks
![Page 62: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/62.jpg)
Typical method of proof
Exploration of the graph
Explore the components of the graph one by one
choose a vertex. Let c(1) be the number of children of this vertex
choose one of the children of this vertex, let c(2) be number of childrenof this vertex
continue, when one component completed move onto anothercomponent
Define Z(0) = 0, Z(i) = Z(i− 1) + c(i)− 1
Z(·) = −1 for the first time when we finish exploring component 1, thenhits −2 for first time when exploring component 2 and so on.
Try to use Martingale functional limit theorem to show1
n1/3Z(n2/3t)→d Wλ(t)
Shankar Bhamidi Limited choice in networks
![Page 63: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/63.jpg)
Typical method of proof
Exploration of the graph
Explore the components of the graph one by one
choose a vertex. Let c(1) be the number of children of this vertex
choose one of the children of this vertex, let c(2) be number of childrenof this vertex
continue, when one component completed move onto anothercomponent
Define Z(0) = 0, Z(i) = Z(i− 1) + c(i)− 1
Z(·) = −1 for the first time when we finish exploring component 1, thenhits −2 for first time when exploring component 2 and so on.
Try to use Martingale functional limit theorem to show1
n1/3Z(n2/3t)→d Wλ(t)
Shankar Bhamidi Limited choice in networks
![Page 64: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/64.jpg)
Bounded size rules
Hard to think about exploration process especially at criticality
Turns out: Easier to analyze the entire process
Shankar Bhamidi Limited choice in networks
![Page 65: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/65.jpg)
Bounded size rules
Hard to think about exploration process especially at criticality
Turns out: Easier to analyze the entire process
Shankar Bhamidi Limited choice in networks
![Page 66: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/66.jpg)
Proof idea: The Bohman-Frieze process
Where does tc come from ?Define Xn(t) = # of singletons, S2(t) =
∑i(C
(i)n (t))2, S3(t) =
∑i(C
(i)n )3.
and xn(t) = Xn(t)/n, s2(t) = S2/n, s3(t) = S3/n.Then [Spencer, Wormald 2004] for any fix t > 0,
xn(t)P−→ x(t), s2(t)
P−→ s2(t), s3(t)P−→ s3(t)
Shankar Bhamidi Limited choice in networks
![Page 67: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/67.jpg)
Why?
Behavior of xn(t)
In small time interval [t, t+ ∆(t)), xn(t)→ xn(t)− 1/n at rate2
n3
((n
2
)−(Xn(t)
2
))Xn(t)(n−Xn(t)) ∼ n(1− x2n(t))xn(t)(1− xn(t))
[t, t+ ∆(t)), xn(t)→ xn(t)− 2/n at rate2
n3
[(Xn(t)
2
)(n
2
)+
((n
2
)−(Xn(t)
2
))(Xn(t)
2
)]∼ 1
2(x2n(t)+(1−x2n(t)x2n(t)))
Suggests that xn(t)→ x(t) wherex′(t) = −x2(t)− (1− x2(t))x(t) for t ∈ [0,∞, ) x(0) = 1
Similar analysis suggests that for s2(t), s3(t)
s′2(t) = x2(t) + (1− x2(t))s22(t) for t ∈ [0, tc), s2(0) = 1
s′3(t) = 3x2(t) + 3(1− x2(t))s2(t)s3(t) for t ∈ [0, tc), s3(0) = 1.
Shankar Bhamidi Limited choice in networks
![Page 68: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/68.jpg)
Why?
Behavior of xn(t)
In small time interval [t, t+ ∆(t)), xn(t)→ xn(t)− 1/n at rate2
n3
((n
2
)−(Xn(t)
2
))Xn(t)(n−Xn(t)) ∼ n(1− x2n(t))xn(t)(1− xn(t))
[t, t+ ∆(t)), xn(t)→ xn(t)− 2/n at rate2
n3
[(Xn(t)
2
)(n
2
)+
((n
2
)−(Xn(t)
2
))(Xn(t)
2
)]∼ 1
2(x2n(t)+(1−x2n(t)x2n(t)))
Suggests that xn(t)→ x(t) wherex′(t) = −x2(t)− (1− x2(t))x(t) for t ∈ [0,∞, ) x(0) = 1
Similar analysis suggests that for s2(t), s3(t)
s′2(t) = x2(t) + (1− x2(t))s22(t) for t ∈ [0, tc), s2(0) = 1
s′3(t) = 3x2(t) + 3(1− x2(t))s2(t)s3(t) for t ∈ [0, tc), s3(0) = 1.
Shankar Bhamidi Limited choice in networks
![Page 69: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/69.jpg)
Why?
Behavior of xn(t)
In small time interval [t, t+ ∆(t)), xn(t)→ xn(t)− 1/n at rate2
n3
((n
2
)−(Xn(t)
2
))Xn(t)(n−Xn(t)) ∼ n(1− x2n(t))xn(t)(1− xn(t))
[t, t+ ∆(t)), xn(t)→ xn(t)− 2/n at rate2
n3
[(Xn(t)
2
)(n
2
)+
((n
2
)−(Xn(t)
2
))(Xn(t)
2
)]∼ 1
2(x2n(t)+(1−x2n(t)x2n(t)))
Suggests that xn(t)→ x(t) wherex′(t) = −x2(t)− (1− x2(t))x(t) for t ∈ [0,∞, ) x(0) = 1
Similar analysis suggests that for s2(t), s3(t)
s′2(t) = x2(t) + (1− x2(t))s22(t) for t ∈ [0, tc), s2(0) = 1
s′3(t) = 3x2(t) + 3(1− x2(t))s2(t)s3(t) for t ∈ [0, tc), s3(0) = 1.
Shankar Bhamidi Limited choice in networks
![Page 70: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/70.jpg)
Why?
Behavior of xn(t)
In small time interval [t, t+ ∆(t)), xn(t)→ xn(t)− 1/n at rate2
n3
((n
2
)−(Xn(t)
2
))Xn(t)(n−Xn(t)) ∼ n(1− x2n(t))xn(t)(1− xn(t))
[t, t+ ∆(t)), xn(t)→ xn(t)− 2/n at rate2
n3
[(Xn(t)
2
)(n
2
)+
((n
2
)−(Xn(t)
2
))(Xn(t)
2
)]∼ 1
2(x2n(t)+(1−x2n(t)x2n(t)))
Suggests that xn(t)→ x(t) wherex′(t) = −x2(t)− (1− x2(t))x(t) for t ∈ [0,∞, ) x(0) = 1
Similar analysis suggests that for s2(t), s3(t)
s′2(t) = x2(t) + (1− x2(t))s22(t) for t ∈ [0, tc), s2(0) = 1
s′3(t) = 3x2(t) + 3(1− x2(t))s2(t)s3(t) for t ∈ [0, tc), s3(0) = 1.
Shankar Bhamidi Limited choice in networks
![Page 71: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/71.jpg)
The Bohman-Frieze process
Scaling exponents of s2 and s3 (Janson, Spencer 11)Functions x(t), s2(t), s3(t) are determined by some differentialequationsDifferential equations imply ∃ constants α, β such that t ↑ tc
s2(t) ∼α
tc − t
s3(t) ∼ β(s2(t))3 ∼ β α3
(tc − t)3
Shankar Bhamidi Limited choice in networks
![Page 72: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/72.jpg)
I: Regularity conditions of the component sizes at“−∞”
Let C(λ) = n−2/3C(tc + β2/3αλ/n1/3
).
For δ ∈ (1/6, 1/5) let tn = tc − n−δ = tc + β2/3α λn
n1/3 , thenλn = −β2/3αn1/3−δ.
Need to verify the three conditions∑i
(Ci(λn)
)3[∑i
(Ci(λn)
)2]3 P−→ 1 ⇔ n2S3(tn)
S32(tn)
P−→ β
1∑i
(Ci(λn)
)2 + λnP−→ 0 ⇔ n4/3
S2(tn)− n−δ+1/3
α
P−→ 0
C1(λn)∑i
(Ci(λn)
)2 P−→ 0 ⇔ n2/3C(1)n (tn)
S2(tn)
P−→ 0
Shankar Bhamidi Limited choice in networks
![Page 73: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/73.jpg)
I: Regularity conditions of the component sizes at“−∞”
Let C(λ) = n−2/3C(tc + β2/3αλ/n1/3
).
For δ ∈ (1/6, 1/5) let tn = tc − n−δ = tc + β2/3α λn
n1/3 , thenλn = −β2/3αn1/3−δ.
Need to verify the three conditions∑i
(Ci(λn)
)3[∑i
(Ci(λn)
)2]3 P−→ 1 ⇔ n2S3(tn)
S32(tn)
P−→ β
1∑i
(Ci(λn)
)2 + λnP−→ 0 ⇔ n4/3
S2(tn)− n−δ+1/3
α
P−→ 0
C1(λn)∑i
(Ci(λn)
)2 P−→ 0 ⇔ n2/3C(1)n (tn)
S2(tn)
P−→ 0
Shankar Bhamidi Limited choice in networks
![Page 74: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/74.jpg)
I: Regularity conditions of the component sizes at“−∞”
Let C(λ) = n−2/3C(tc + β2/3αλ/n1/3
).
For δ ∈ (1/6, 1/5) let tn = tc − n−δ = tc + β2/3α λn
n1/3 , thenλn = −β2/3αn1/3−δ.
Need to verify the three conditions∑i
(Ci(λn)
)3[∑i
(Ci(λn)
)2]3 P−→ 1 ⇔ n2S3(tn)
S32(tn)
P−→ β
1∑i
(Ci(λn)
)2 + λnP−→ 0 ⇔ n4/3
S2(tn)− n−δ+1/3
α
P−→ 0
C1(λn)∑i
(Ci(λn)
)2 P−→ 0 ⇔ n2/3C(1)n (tn)
S2(tn)
P−→ 0
Shankar Bhamidi Limited choice in networks
![Page 75: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/75.jpg)
II: Dynamics of merging in the critical window
The dynamic of merging
In any small time interval [t, t+ dt), two components i and j merge atrate
2
n3
[(n
2
)−(Xn(t)
2
)]Ci(t)Cj(t)
∼ 1
n(1− x2(t))Ci(t)Cj(t)
Let λ = (t− tc)n1/3/αβ2/3 be rescaled time paramter, rate at which twocomponents merge
γij(λ) ∼(1− x2(tc + β2/3α λ
n1/3 ))
n
β2/3α
n1/3Ci(tc +
β2/3αλ
n1/3
)Cj(tc +
β2/3αλ
n1/3
)
= α
(1− x2
(tc + β2/3α
λ
n1/3
))Ci(λ)Cj(λ)
= Ci(λ)Cj(λ) since α(1− x2(tc)) = 1
Shankar Bhamidi Limited choice in networks
![Page 76: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/76.jpg)
II: Dynamics of merging in the critical window
The dynamic of merging
In any small time interval [t, t+ dt), two components i and j merge atrate
2
n3
[(n
2
)−(Xn(t)
2
)]Ci(t)Cj(t)
∼ 1
n(1− x2(t))Ci(t)Cj(t)
Let λ = (t− tc)n1/3/αβ2/3 be rescaled time paramter, rate at which twocomponents merge
γij(λ) ∼(1− x2(tc + β2/3α λ
n1/3 ))
n
β2/3α
n1/3Ci(tc +
β2/3αλ
n1/3
)Cj(tc +
β2/3αλ
n1/3
)= α
(1− x2
(tc + β2/3α
λ
n1/3
))Ci(λ)Cj(λ)
= Ci(λ)Cj(λ) since α(1− x2(tc)) = 1
Shankar Bhamidi Limited choice in networks
![Page 77: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/77.jpg)
II: Dynamics of merging in the critical window
The dynamic of merging
In any small time interval [t, t+ dt), two components i and j merge atrate
2
n3
[(n
2
)−(Xn(t)
2
)]Ci(t)Cj(t)
∼ 1
n(1− x2(t))Ci(t)Cj(t)
Let λ = (t− tc)n1/3/αβ2/3 be rescaled time paramter, rate at which twocomponents merge
γij(λ) ∼(1− x2(tc + β2/3α λ
n1/3 ))
n
β2/3α
n1/3Ci(tc +
β2/3αλ
n1/3
)Cj(tc +
β2/3αλ
n1/3
)= α
(1− x2
(tc + β2/3α
λ
n1/3
))Ci(λ)Cj(λ)
= Ci(λ)Cj(λ) since α(1− x2(tc)) = 1
Shankar Bhamidi Limited choice in networks
![Page 78: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/78.jpg)
How to check regularity conditions
Analysis of C(1)n (t)
Key point: need to get refined bounds on maximal component in barelysubcritical regime.
known result: for fixed t < tc, C(1)n (t) = O(log n).
not enough, since we want a sharp upper bound when t ↑ tc.
Lemma (Bounds on the largest component)Let δ ∈ (0, 1/5), tc be the critical time for the BF process, C(1)
n (t) be the size ofthe largest component. Then there exists a constant B = B(δ) such that asn→ +∞,
PC(1)
n (t) ≤ B log4 n
(tc − t)2for all t < tc − n−δ → 1
Proof strategy: Coupling with a near critical multi-type branching process onan infinite dimensional type space. delicate analysis of the maximaleigenvalue.
Shankar Bhamidi Limited choice in networks
![Page 79: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/79.jpg)
How to check regularity conditions
Analysis of C(1)n (t)
Key point: need to get refined bounds on maximal component in barelysubcritical regime.
known result: for fixed t < tc, C(1)n (t) = O(log n).
not enough, since we want a sharp upper bound when t ↑ tc.
Lemma (Bounds on the largest component)Let δ ∈ (0, 1/5), tc be the critical time for the BF process, C(1)
n (t) be the size ofthe largest component. Then there exists a constant B = B(δ) such that asn→ +∞,
PC(1)
n (t) ≤ B log4 n
(tc − t)2for all t < tc − n−δ → 1
Proof strategy: Coupling with a near critical multi-type branching process onan infinite dimensional type space. delicate analysis of the maximaleigenvalue.
Shankar Bhamidi Limited choice in networks
![Page 80: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/80.jpg)
Random graph with Immigrating doubletons
Shankar Bhamidi Limited choice in networks
![Page 81: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/81.jpg)
Sketch of the proofRegularity condition at time λ = −∞Check the following properties for the un-scaled component sizes. Forδ ∈ (1/6, 1/5), and tn = tc − n−δ,
n2S3(tn)
S32(tn)
P−→ β (1)
n4/3
S2(tn)− n−δ+1/3
α
P−→ 0 (2)
n2/3C(1)n (tn)
S2(tn)
P−→ 0 (3)
Analysis of S2(t), S3(t)
above relations hold for limiting functions s2, s3 for tn.
Delicate stochastic analytic argument combined with result on C(1)n (t) to
show this holds for S2, S3 near criticality.
Shankar Bhamidi Limited choice in networks
![Page 82: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/82.jpg)
Sketch of the proofRegularity condition at time λ = −∞Check the following properties for the un-scaled component sizes. Forδ ∈ (1/6, 1/5), and tn = tc − n−δ,
n2S3(tn)
S32(tn)
P−→ β (1)
n4/3
S2(tn)− n−δ+1/3
α
P−→ 0 (2)
n2/3C(1)n (tn)
S2(tn)
P−→ 0 (3)
Analysis of S2(t), S3(t)
above relations hold for limiting functions s2, s3 for tn.
Delicate stochastic analytic argument combined with result on C(1)n (t) to
show this holds for S2, S3 near criticality.
Shankar Bhamidi Limited choice in networks
![Page 83: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/83.jpg)
Work in progress
Explosive percolationIn 2009, Achlioptas,D’Souza and Spencer considered “product rule”.Conjectured that this process exhibits Explosive percolation
Shankar Bhamidi Limited choice in networks
![Page 84: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/84.jpg)
Truncated product rule
Fix KChoose 2 edges e1 = (v1, v2) and e2 = (v3, v4) at random
If maxC(v1), C(v2)C(v3), C(v4) ≤ K, then use the edge whichminimizes of minC(v1)C(v2), C(v3)C(v4).
Else use e2.
Work in progress
Consider the rescaled and re-centered component sizes
CK(λ) =
(1
n2/3C(i)
K
(tc(K) + γ(K)
λ
n1/3
): i ≥ 1
)λ ∈ R
Then we have (CK(λ) : λ ∈ R)d−→ (X(λ) : λ ∈ R) as n→∞.
tc(K)→ tc; γ(K) → 0
Shankar Bhamidi Limited choice in networks
![Page 85: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/85.jpg)
Truncated product rule
Fix KChoose 2 edges e1 = (v1, v2) and e2 = (v3, v4) at random
If maxC(v1), C(v2)C(v3), C(v4) ≤ K, then use the edge whichminimizes of minC(v1)C(v2), C(v3)C(v4).
Else use e2.
Work in progress
Consider the rescaled and re-centered component sizes
CK(λ) =
(1
n2/3C(i)
K
(tc(K) + γ(K)
λ
n1/3
): i ≥ 1
)λ ∈ R
Then we have (CK(λ) : λ ∈ R)d−→ (X(λ) : λ ∈ R) as n→∞.
tc(K)→ tc;
γ(K) → 0
Shankar Bhamidi Limited choice in networks
![Page 86: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/86.jpg)
Truncated product rule
Fix KChoose 2 edges e1 = (v1, v2) and e2 = (v3, v4) at random
If maxC(v1), C(v2)C(v3), C(v4) ≤ K, then use the edge whichminimizes of minC(v1)C(v2), C(v3)C(v4).
Else use e2.
Work in progress
Consider the rescaled and re-centered component sizes
CK(λ) =
(1
n2/3C(i)
K
(tc(K) + γ(K)
λ
n1/3
): i ≥ 1
)λ ∈ R
Then we have (CK(λ) : λ ∈ R)d−→ (X(λ) : λ ∈ R) as n→∞.
tc(K)→ tc; γ(K) → 0
Shankar Bhamidi Limited choice in networks
![Page 87: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/87.jpg)
Truncated product rule
Fix KChoose 2 edges e1 = (v1, v2) and e2 = (v3, v4) at random
If maxC(v1), C(v2)C(v3), C(v4) ≤ K, then use the edge whichminimizes of minC(v1)C(v2), C(v3)C(v4).
Else use e2.
Work in progress
Consider the rescaled and re-centered component sizes
CK(λ) =
(1
n2/3C(i)
K
(tc(K) + γ(K)
λ
n1/3
): i ≥ 1
)λ ∈ R
Then we have (CK(λ) : λ ∈ R)d−→ (X(λ) : λ ∈ R) as n→∞.
tc(K)→ tc; γ(K) → 0
Shankar Bhamidi Limited choice in networks
![Page 88: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/88.jpg)
Other questions
“Natural questions”
What happens if we start with a configuration other than the emptygraph?
Related to the entrance boundary of the multiplicative coalescent.
Unnatural next questions
Scaling limits?
Conjecture: Rescale each edge by n−1/3
Largest components converge to random fractals (Gromov-Hausdorffsense), the same limits as for Erdos-Renyii
Shankar Bhamidi Limited choice in networks
![Page 89: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/89.jpg)
Other questions
“Natural questions”
What happens if we start with a configuration other than the emptygraph?
Related to the entrance boundary of the multiplicative coalescent.
Unnatural next questions
Scaling limits?
Conjecture: Rescale each edge by n−1/3
Largest components converge to random fractals (Gromov-Hausdorffsense), the same limits as for Erdos-Renyii
Shankar Bhamidi Limited choice in networks
![Page 90: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/90.jpg)
Minimal spanning tree
Connected Graph, put distinct positive edge lengths (road network)
Want to get a spanning graph,
minimal total weight
Choose spanning tree with minimal total weight: MST
Enormous literature in applied sciences
Deep connections to statistical physics models of disorder
Shankar Bhamidi Limited choice in networks
![Page 91: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/91.jpg)
Minimal spanning tree
Connected Graph, put distinct positive edge lengths (road network)
Want to get a spanning graph, minimal total weight
Choose spanning tree with minimal total weight: MST
Enormous literature in applied sciences
Deep connections to statistical physics models of disorder
Shankar Bhamidi Limited choice in networks
![Page 92: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/92.jpg)
Minimal spanning tree
Connected Graph, put distinct positive edge lengths (road network)
Want to get a spanning graph, minimal total weight
Choose spanning tree with minimal total weight: MST
Enormous literature in applied sciences
Deep connections to statistical physics models of disorder
Shankar Bhamidi Limited choice in networks
![Page 93: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/93.jpg)
Statistical physics models of disorder
Weak disorder (First passage percolation)
Weight of a path = sum of weight on edges
Choose optimal path
Strong disorder (Minimal spanning tree)
Weight of path = max edge on the path
Choose optimal path
Shankar Bhamidi Limited choice in networks
![Page 94: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/94.jpg)
Statistical physics models of disorder
Weak disorder (First passage percolation)
Weight of a path = sum of weight on edges
Choose optimal path
Strong disorder (Minimal spanning tree)
Weight of path = max edge on the path
Choose optimal path
Shankar Bhamidi Limited choice in networks
![Page 95: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/95.jpg)
Adario-Berry, Broutin, Goldschmidt + Miermont
Minimal spanning tree
Consider complete graph, each edge given iid continuous edge length
Mn minimal spanning tree
Asymptotics?
For the Erdos-Renyi, the largest components at criticality rescaled byn−1/3 converge to limiting random fractals [BBG]
This implies that n−1/3Mn converges to a limiting random fractal[BBGM]
Open Problem: Show that for these models, have same limitingstructure
Shankar Bhamidi Limited choice in networks
![Page 96: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/96.jpg)
Adario-Berry, Broutin, Goldschmidt + Miermont
Minimal spanning tree
Consider complete graph, each edge given iid continuous edge length
Mn minimal spanning tree
Asymptotics?
For the Erdos-Renyi, the largest components at criticality rescaled byn−1/3 converge to limiting random fractals [BBG]
This implies that n−1/3Mn converges to a limiting random fractal[BBGM]
Open Problem: Show that for these models, have same limitingstructure
Shankar Bhamidi Limited choice in networks
![Page 97: Limited choice and randomness in evolution of networks Lecture 1pi.math.cornell.edu/~cpss/2012/Lecture-1.pdf · in evolution of networks Lecture 1 Cornell Probability summer school](https://reader035.vdocuments.us/reader035/viewer/2022070922/5fba47d73566f3202e54d949/html5/thumbnails/97.jpg)
Adario-Berry, Broutin, Goldschmidt + Miermont
Minimal spanning tree
Consider complete graph, each edge given iid continuous edge length
Mn minimal spanning tree
Asymptotics?
For the Erdos-Renyi, the largest components at criticality rescaled byn−1/3 converge to limiting random fractals [BBG]
This implies that n−1/3Mn converges to a limiting random fractal[BBGM]
Open Problem: Show that for these models, have same limitingstructure
Shankar Bhamidi Limited choice in networks