- Research Article
- 10.5555/1873569.1873577
- Dec 1, 2010
- Random Structures and Algorithms
- Friedgutehud + 2 more
We study thresholds for Ramsey properties of random discrete structures. In particular, we determine the threshold for Rado's theorem for solutions of partition regular systems of equations in rand...
- Research Article
- 10.5555/1840741.1840744
- Aug 1, 2010
- Random Structures and Algorithms
- Krivelevichmichael + 2 more
In this article, we analyze the appearance of a Hamilton cycle in the following random process. The process starts with an empty graph on nlabeled vertices. At each round we are presented with K = ...
- Research Article
- 10.5555/1711885.1711886
- Mar 1, 2010
- Random Structures and Algorithms
- Nachmiasasaf + 1 more
The behavior of the random graph G(n,p) around the critical probability pc = $ {1 \over n} $ is well understood. When p = (1 + O(n1-3))pc the components are roughly of size n2-3 and converge, when ...
- Research Article
- 10.5555/1711885.1711888
- Mar 1, 2010
- Random Structures and Algorithms
- Behrischmichael + 2 more
We establish central and local limit theorems for the number of vertices in the largest component of a random d-uniform hypergraph Hd(n,p) with edge probability p = c-$\left(\matrix{n-1 \cr d-1 }\r...
- Research Article
- 10.5555/1605230.1605232
- Sep 1, 2009
- Random Structures and Algorithms
- Guilleminfabrice + 1 more
We consider in this article the problem of discovering, via a traceroute algorithm, the topology of a network, whose graph is spanned by an infinite branching process. A subset of nodes is selected...
- Journal Issue
208
- 10.1002/rsa.v34:3
- May 1, 2009
- Random Structures and Algorithms
- Luc Devroye + 3 more
In this article we consider tries built from n strings such that each string can be chosen from a pool of k strings, each of them generated by a discrete i.i.d. source. Three cases are considered: k = 2, k is large but fixed, and k ~ clog n. The goal in each case is to obtain tries as balanced as possible. Various parameters such as height and fill-up level are analyzed. It is shown that for two-choice tries a 50% reduction in height is achieved when compared with ordinary tries. In a greedy online construction when the string that minimizes the depth of insertion for every pair is inserted, the height is only reduced by 25p. To further reduce the height by another 25%, we design a more refined online algorithm. The total computation time of the algorithm is O(nlog n). Furthermore, when we choose the best among k ≥ 2 strings, then for large but fixed k the height is asymptotically equal to the typical depth in a trie. Finally, we show that further improvement can be achieved if the number of choices for each string is proportional to log n. In this case highly balanced trees can be constructed by a simple greedy algorithm for which the difference between the height and the fill-up level is bounded by a constant with high probability. This, in turn, has implications for distributed hash tables, leading to a randomized ID management algorithm in peer-to-peer networks such that, with high probability, the ratio between the maximum and the minimum load of a processor is O(1). © 2008 Wiley Periodicals, Inc. Random Struct. Alg., 2009
- Research Article
- 10.5555/1400123.1400126
- Sep 1, 2008
- Random Structures and Algorithms
- R Jelenkovićpredrag + 1 more
Caching is widely recognized as an effective mechanism for improving the performance of the World Wide Web. One of the key components in engineering the Web caching systems is designing document pl...
- Research Article
11
- 10.5555/1400123.1400129
- Sep 1, 2008
- Random Structures and Algorithms
- Matoušekjiří
The JohnsonLindenstrauss lemma asserts that an n-point set in any Euclidean space can be mapped to a Euclidean space of dimension k = O(e-2 log n) so that all distances are preserved up to a multip...
- Research Article
11
- 10.5555/1400123.1400125
- Sep 1, 2008
- Random Structures and Algorithms
- Kirschadam + 1 more
A standard technique from the hashing literature is to use two hash functions h1(x) and h2(x) to simulate additional hash functions of the form gi(x) = h1(x) + ih2(x). We demonstrate that this tech...
- Research Article
- 10.5555/1400123.1400128
- Sep 1, 2008
- Random Structures and Algorithms
- Černýjiří + 1 more
We study the simple random walk on the n-dimensional hypercube, in particular its hitting times of large (possibly random) sets. We give simple conditions on these sets ensuring that the properly r...