Revolutionaries and spies: Spy-good and spy-bad graphs

نویسندگان

  • Jane Butterfield
  • Daniel W. Cranston
  • Gregory J. Puleo
  • Douglas B. West
  • Reza Zamani
چکیده

We study a game on a graph G played by r revolutionaries and s spies. Initially, revolutionaries and then spies occupy vertices. In each subsequent round, each revolutionary may move to a neighboring vertex or not move, and then each spy has the same option. The revolutionaries win if m of them meet at some vertex having no spy (at the end of a round); the spies win if they can avoid this forever. Let σ(G, m, r) denote the minimum number of spies needed to win. To avoid degenerate cases, assume |V (G)| ≥ r −m + 1 ≥ ⌊r/m⌋ ≥ 1. The easy bounds are then ⌊r/m⌋ ≤ σ(G, m, r) ≤ r −m + 1. We prove that the lower bound is sharp when G has a rooted spanning tree T such that every edge of G not in T joins two vertices having the same parent in T . As a consequence, σ(G, m, r) ≤ γ(G) ⌊r/m⌋, where γ(G) is the domination number; this bound is nearly sharp when γ(G) ≤ m. For the random graph with constant edge-probability p, we obtain constants c and c′ (depending on m and p) such that σ(G, m, r) is near the trivial upper bound when r < c lnn and at most c′ times the trivial lower bound when r > c′ lnn. For the hypercube Qd with d ≥ r, we have σ(G, m, r) = r −m + 1 when m = 2, and for m ≥ 3 at least r − 39m spies are needed. For complete k-partite graphs with partite sets of size at least 2r, the leading term in σ(G, m, r) is approximately k k−1 r m when k ≥ m. For k = 2, we have σ(G, 2, r) = ⌈ ⌊7r/2⌋−3 5 ⌉ and σ(G, 3, r) = ⌊r/2⌋, and in general 3r 2m − 3 ≤ σ(G, m, r) ≤ (1+1/ √ 3)r m .

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Revolutionaries and spies on trees and unicyclic graphs

A team of r revolutionaries and a team of s spies play a game on a graph G. Initially, revolutionaries and then spies take positions at vertices. In each subsequent round, each revolutionary may move to an adjacent vertex or not move, and then each spy has the same option. The revolutionaries want to hold an unguarded meeting, meaning m revolutionaries at some vertex having no spy at the end of...

متن کامل

Revolutionaries and Spies on Random Graphs

Pursuit-evasion games, such as the game of Revolutionaries and Spies, are a simplified model for network security. In the game we consider in this paper, a team of r revolutionaries tries to hold an unguarded meeting consisting of m revolutionaries. A team of s spies wants to prevent this forever. For given r and m, the minimum number of spies required to win on a graph G is the spy number σ(G,...

متن کامل

Searching for knights and spies: A majority/minority game

There are n people, each of whom is either a knight or a spy. It is known that at least k knights are present, where n/2 < k < n. Knights always tell the truth. We consider both spies who always lie and spies who answer as they see fit. This paper determines the number of questions required to find a spy or prove that everyone in the room is a knight. We also determine the minimum number of que...

متن کامل

Metadata-Conscious Anonymous Messaging

Consider a line graph G(V,E) in which V = {0, 1, . . . , n, n + 1}, nodes s1 = 0 and s2 = n + 1 are spies, and E = {(i, i + 1) | i ∈ {0, . . . , n}}. One of the n nodes between the spies is chosen uniformly at random as a source, denoted by v∗ ∈ {1, . . . , n}. When the message reaches a spy si, the spy collects at least two pieces of metadata: the timestamp Tsi and the parent node psi that rel...

متن کامل

Spy-Game on graphs: complexity and simple topologies

We define and study the following two-player game on a graph G. Let k ∈ N∗. A set of k guards is occupying some vertices of G while one spy is standing at some node. At each turn, first the spy may move along at most s edges, where s ∈ N∗ is his speed. Then, each guard may move along one edge. The spy and the guards may occupy the same vertices. The spy has to escape the surveillance of the gua...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Theor. Comput. Sci.

دوره 463  شماره 

صفحات  -

تاریخ انتشار 2012