The binding number of a random graph

نویسنده

  • Vadim E. Zverovich
چکیده

Let G be a random graph with n labelled vertices in which the edges are chosen independently with a fixed probability p, 0 < p < 1. In this note we prove that, with the probability tending to 1 as n -+ 00, the binding number of a random graph G satisfies: (i) b(G) = (n l)/(n 8), where 8 is the minimal degree of G; (ii) l/q E < b(G) < l/q, where E is any fixed positive number and q = 1 p; (iii) b(G) is realized on a unique set X = V( G)\N(x), where deg(x) = 8(G), and the induced subgraph (X) contains exactly one isolated vertex x. All graphs will be finite and undirected, without loops or multiple edges. If G is a graph, V(G) denotes the set of vertices in G, and n =1 V(G) I. We shall denote the neighborhood of a vertex x by N(x). More generally, N(X) UxEX N(x) for X ~ V( G). The minimal degree of vertices and the vertex connectivity of G are denoted by 8 = 8( G) and K,( G), respectively. For a set X of vertices, (X) deno tes the subgraph of G induced by X. Woodall [5] defined the binding number b( G) of a graph G as follows: b(G) = . I N(X) I Tl~ IX I ' where :F = {X : 0 =IX ~ V(G), N(X) =IV(G)}. We say that b(G) is realized on a set X if X E :F and b( G) N (X) I / 1 X I, and the set X is called a realizing set for b( G). Proposition 1 For any graph G) _8 _ ::; b( G) ::; n 1 n-8 n*On leave from Faculty of Mechanics and Mathematics, Belarus State Uni versity, Minsk 220050, Republic of Belarus. Supported by an award from the Alexander von Hu mboldt Foundation. Australasian Journal of Combinatorics 15(1997), pp.271-275 Proof. The upper bound is proved by Woodall in [5]. Let us prove the lower bound. Let X E :F and I N(X) I j I X 1= b(G), i.e., X is a realizing set. We have I N(X) 12:: 0, since the set X is not empty. Suppose that I X 12:: n 0 + 1. Then any vertex of G is adjacent to some vertex of X, i.e. N(X) = V(G), a contradiction. Therefore I X I:::; n 0 and b(G) =1 N(X) I j I X 12:: oj(n 0). The proof is complete. III Note that the difference between the upper and lower bounds on b( G) in Proposition 1 is less than 1. In the sequel we shall see that the binding number of almost every graph is equal to the upper bound in Proposition 1. Let 0 < p < 1 be fixed and put q = 1 p. Denote by Q(n,P(edge) = p) the discrete probability space consisting of all graphs with n fixed and labelled vertices, in which the probability of each graph with M edges is pM qN-M, where N = (~). Equivalently, the edges of a labelled random graph are chosen independently and with the same probability p. We say that a random graph G satisfies a property Q if P(G has Q) -+ 1 as n -+ 00. We shall need the following results. Theorem 1 (Bollobas [1]) A random graph G satisfies h;(G) = J(G). Theorem 2 (Bollobas [1]) A random graph G satisfies I o(G) pn + (2pqn log n)1/2 ( Plqn ) 1/2 log log n I :::; C(n) (-1 n ) 1/2, 80gn ogn where C(n) -+ 00 arbitrarily slowly. Theorem 3 (Erdos and Wilson [3]) A random graph has a unique vertex of minimal degree. Now we can state the main result of the paper. Theorem 4 The binding number of a random graph G satisfies b(G) = n 1 nProof. Taking into account Proposition 1, it is sufficient to prove that for any set X E F. Let Y = N(X) \X and consider three cases. (i) The induced subgraph (X) does not contain an isolated vertex. The set V(G)\N(X) is not empty, since X E F. Hence the set Y is a cutset of the graph G. By Theorem 1, h;(G) = o(G). -Therefore I Y 12:: 0 and I X 1< n o. We have I N(X) I = I Y I + I X I = ~ + 1 > _n_ > ~. IXI IXI IXI -n 0 n-O

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards a measure of vulnerability, tenacity of a Graph

If we think of the graph as modeling a network, the vulnerability measure the resistance of the network to disruption of operation after the failure of certain stations or communication links. Many graph theoretical parameters have been used to describe the vulnerability of communication networks, including connectivity, integrity, toughness, binding number and tenacity.In this paper we discuss...

متن کامل

A Survey On the Vulnerability Parameters of Networks

The analysis of vulnerability in networks generally involves some questions about how the underlying graph is connected. One is naturally interested in studying the types of disruption in the network that maybe caused by failures of certain links or nodes. In terms of a graph, the concept of connectedness is used in dierent forms to study many of the measures of vulnerability. When certain vert...

متن کامل

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

Tenacity and some related results

Conceptually graph vulnerability relates to the study of graphintactness when some of its elements are removed. The motivation forstudying vulnerability measures is derived from design and analysisof networks under hostile environment. Graph tenacity has been anactive area of research since the the concept was introduced in1992. The tenacity T(G) of a graph G is defined asbegin{center} $T(G)=di...

متن کامل

Sampling from social networks’s graph based on topological properties and bee colony algorithm

In recent years, the sampling problem in massive graphs of social networks has attracted much attention for fast analyzing a small and good sample instead of a huge network. Many algorithms have been proposed for sampling of social network’ graph. The purpose of these algorithms is to create a sample that is approximately similar to the original network’s graph in terms of properties such as de...

متن کامل

A Survey on Complexity of Integrity Parameter

Many graph theoretical parameters have been used to describe the vulnerability of communication networks, including toughness, binding number, rate of disruption, neighbor-connectivity, integrity, mean integrity, edgeconnectivity vector, l-connectivity and tenacity. In this paper we discuss Integrity and its properties in vulnerability calculation. The integrity of a graph G, I(G), is defined t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Australasian J. Combinatorics

دوره 15  شماره 

صفحات  -

تاریخ انتشار 1997