The Probabilistic Method
Prev: Tail Inequalities Next: Markov Chains and Random Walks
Problems
5.1
Due to J. Naor.
Let be a random variable with expectation such that the moment generating function is finite for some . We can use the following two kinds of tail inequalities for .
Chernoff Bound:
th-Moment Bound:
- Show that for each , there exists a choice of such that the th-moment bound is stronger than the Chernoff bound. Hint: Consider the Taylor expansion of the moment generating function and apply the probabilistic method.
- Why would we still prefer the Chernoff bound to the seemingly stronger th-moment bound?
5.2
In Example 5.2, we applied the probabilistic method to certificates for the value of a game tree in the setting of Section 2.1. We showed that for any instance of there is a set of leaves whose values certify the value of the root for that instance. Show that, in fact, for any instance of , there is a set of
leaves whose values certify the value of the root for that instance.
5.3
Let be a graph on vertices, with edges. Consider the following probabilistic experiment for finding an independent set in . Delete each vertex of , together with its incident edges, independently with probability .
- Compute the expected number of vertices and edges that remain after the deletion process.
- From these, infer that there is an independent set with at least vertices in any graph on vertices with edges.
- Let be a -regular graph. Suppose that we wish to turn this probabilistic experiment into a randomized algorithm as follows. We delete each vertex independently with probability . For every edge that remains, delete one of its end-points. Derive an upper bound on the probability that this algorithm finds an independent set smaller than .
5.4
A function is said to be concave if for any , and , the following inequality is satisfied:
The reader may wish to compare this with the notion of convex functions defined in Problem 4.7.
- Suppose that is a concave function and is a linear function such that and . Show that for any in the interval , .
- Show that the function
is concave for any . What can you say when ? 3. Let
and
Show that for positive and .
5.5
Use the probabilistic method to show that an expanding graph with the following properties exists for sufficiently large:
- .
- Every vertex in has degree , and every vertex in has degree at most .
- Every subset of vertices in has at least neighbors in .
5.6
Suppose that you had access to the expanding graph described in Problem 5.5 for a certain value of . Show that it can be used to run the LazySelect algorithm of Section 3.3 on any instance of size , using random bits to choose the entire sample . Show that the expected running time of this implementation is .
5.7
Let be a -regular graph on vertices.
- Show that the number of connected subgraphs of of size is at most .
- Suppose that each vertex of is deleted independently with probability . Show that with probability , there is no surviving connected component of size exceeding , for a suitable constant .
5.8
Lemma 5.11 guarantees that with positive probability, none of the events occurs. In this problem, we see how small this positive probability can be. Consider again the probabilistic experiment suggested in Problem 5.3. Let be a -regular graph. Suppose that we delete vertices of independently with probability .
- Use Lemma 5.11 to make the obvious argument that with positive probability, an independent set remains after the deletion.
- Use the Chernoff bound to show that the probability that fewer than vertices survive is less than .
- Now consider what happens when the above experiment is run on a -regular graph containing no independent set of size exceeding . What does this say about the positive probability in part (1)?
5.9
In Section 5.5, we assumed that a variable appears in at most clauses. Replace the constant by the smallest constant you can for the following results:
- The existence proof using Corollary 5.12.
- The algorithm of Section 5.5.
5.10
Due to J. Naor.
For a graph , and any , define the cut function as the number of edges in which have exactly one end-point in . For a suitably small function and large enough even integer , show that there exists a graph with such that for every subset of size ,
How small can you make the function ?
5.11
In this problem, we will complete establishing the properties of leading to Theorem 5.15.
- Show that for a node at the th level of the computation tree, is of the form
where is a sum of binomial coefficients. Prove that for any node with children and ,
and that for any node , we can compute in time polynomial in . 2. Give an upper bound on the running time of the deterministic algorithm.
5.12
Show how the method of conditional probabilities can be applied to derandomize the RandAuto algorithm.
5.13
Consider the randomized algorithm implicitly described in the proof of Theorem 5.1, which finds a cut of expected size in a graph with edges. Use the method of conditional probabilities to derandomize this algorithm and obtain a deterministic polynomial time algorithm that computes a cut of size at least .
5.14
Due to D. R. Karger and R. Motwani [233].
An -safe set instance consists of a universe of size , a safe set , and target sets such that
- ,
- and, for , .
An isolator for a safe set instance is a set that intersects all the target sets but not the safe set. An -universal isolating family is a collection of subsets of such that contains an isolator for any -safe set instance. Show that there exists a -universal isolating family such that is polynomially bounded in and .