Hints and Comments for Some Exercises

Total Page:16

File Type:pdf, Size:1020Kb

Hints and Comments for Some Exercises Hints and Comments for Some Exercises Chapter 1 1.5 Consider A(Hn)2 and use Exercise 1.3. V ,V ,...,V 1.6 (a) First count the number of sequences i0 i1 i for which there exists a closed walk with vertices v0,v1,...,v = v0 (in that order) such that vj ∈ Vij . 1.11 Consider the rank of A(), and also consider A()2. The answer is very simple and does not involve irrational numbers. 1.12 (b) Consider A(G)2. Chapter 2 2.2 Give an argument analogous to the proof of Theorem 8.8.9. 2.3 This result is known as the “middle levels conjecture” and was proved by Torsten Mütze in 2016. 2.5 (c) Mimic the proof for the graph Cn, using the definition χu,χv= χu(w)χv(w), w∈Zn where an overhead bar denotes complex conjugation. Chapter 3 3.4 You may find Example 3.1 useful. 3.8 It is easier not to use linear algebra. 3.9 See previous hint. © Springer International Publishing AG, part of Springer Nature 2018 245 R. P. Stanley, Algebraic Combinatorics, Undergraduate Texts in Mathematics, https://doi.org/10.1007/978-3-319-77173-1 246 Hints and Comments for Some Exercises 3.11 First show (easy) that if we start at a vertex v and take n steps (using our random walk model), then the probability that we traverse a fixed closed walk W is equal to the probability that we traverse W in reverse order. 3.13 See hint for Exercise 3.8. Chapter 4 4.4 (b) One way to do this is to count in two ways the number of k-tuples n (v1,...,vk) of linearly independent elements from Fq : (1) first choose v1, then v2, etc., and (2) first choose the subspace W spanned by v1,...,vk, and then choose v1, v2,etc. 4.4 (c) The easiest way is to use (b). 4.7 (b) This result was proved by R. P. Dilworth in 1950 and is known as Dilworth’s theorem. Chapter 5 ∼ 5.5 (a) Show that Nn = Bn/G for a suitable group G. n = p 5.9 (a) Use Corollary 2.4 with 2 . 5.13 Use Exercise 5.12. Chapter 6 6.2 (b) Not really a hint, but the result is equivalent [why?] to the case r = m, s = n, t = 2, and x = 1 of Exercise 36. 6.3 Consider μ = (8, 8, 4, 4). 6.5 First consider the case where S has ζ elements equal to 0 (so ζ = 0or1),ν elements that are negative, and π elements that are positive, so ν + ζ + π = 2m + 1. Chapter 7 7.3 Hint. Dark red and burgundy are the same color! For those who are interested, the cycle indicator ZG of the full symmetry group G of the dodecahedron acting on the vertices is 1 z20 + 15z10 + 20z2z6 + 24z4 + 15z4z8 + z10 + 20z z3 + 24z2 . 120 1 2 1 3 5 1 2 2 2 6 10 The number of inequivalent vertex colorings using two distinct colors is ZG(2, 2,...,2) = 9436. 7.19 (a) Use Pólya’s theorem. Hints and Comments for Some Exercises 247 Chapter 8 8.3 Encode a maximal chain by an object that we already know how to enumerate. 8.7 Partially order by diagram inclusion the set of all partitions whose diagrams can be covered by nonoverlapping dominos, thereby obtaining a subposet Y2 ∼ of Young’s lattice Y . Show that Y2 = Y × Y . 8.14 Use induction on n. Z (z ,z ,...) 8.17 (a) One way to do this is to use the generating function n≥0 Sn 1 2 n x for the cycle indicator of Sn (Theorem 7.13). Another method is to find a recurrence for B(n + 1) in terms of B(0), . , B(n) and then convert this recurrence into a generating function 8.18 Consider the generating function tkqn G(q, t) = κ(n → n + k → n) (k!)2 k,n≥0 and use (8.25). 8.20 (b) Consider the square of the adjacency matrix of Yj−1,j . 8.24 Use Exercise 8.14. 8.33 Use an inclusion–exclusion argument (a topic not covered in the text). Chapter 9 p− 9.1 There is a simple proof based on the formula κ(Kp) = p 2, avoiding the Matrix-Tree Theorem. 9.3 Consider the matrices L − nI and L − (n − m)I. 9.2 (c) Use the fact that the rows of L sum to 0, and compute the trace of L. 9.7 (b) Use Exercise 1.3. 9.8 (a) For the most elegant proof, use the fact that commuting p × p matrices A and B can be simultaneously triangularized, i.e., there exists an invertible matrix X such that both XAX−1 and XBX−1 are upper triangular. 9.8 (d) Use Exercise 9.10(a). 9.9 Let G∗ be the full dual graph of G, i.e., the vertices of G∗ are the faces of G, including the outside face. For every edge e of G separating two faces R and S of G, there is an edge e∗ of G∗ connecting the vertices R and S. Thus G∗ will have some multiple edges, and #E(G) = #E(G∗). First show combinatorially that κ(G) = κ(G∗). (See Corollary 11.19.) 9.10 (a) Use the Binet–Cauchy theorem. 9.12 (a) The Laplacian matrix L = L(G) acts on the space RV(G), the real vector space with basis V(G). Consider the subspace W of RV(G)spanned by the elements v + ϕ(v), v ∈ V(G). 9.13 (a) Let s(n,q,r) be the number of n × n symmetric matrices of rank r over Fq . Find a recurrence satisfied by s(n,q,r), and verify that this recurrence is satisfied by 248 Hints and Comments for Some Exercises ⎧ ⎪ t 2i 2 t−1 ⎪ q n−i ⎪ · (q − 1), 0 ≤ r = 2t ≤ n ⎨ q2i − 1 s(n,q,r) = i=1 i=0 ⎪ t q2i 2t ⎪ n−i ⎩⎪ · (q − 1), 0 ≤ r = 2t + 1 ≤ n. q2i − 1 i=1 i=0 9.14 Any of the three proofs of the Appendix to Chapter 9 can be carried over to the present exercise. Chapter 10 10.4 (a) Use a suitable generalization of the deBruijn graph. (b) Use techniques similar to those in Theorem 7.7.10. 10.5 (b) Use the Perron–Frobenius theorem (Theorem 3.3). 10.8 (a) Consider A. 10.8 (f) There is an example with nine vertices that is not a de Bruijn graph. 10.8 (c) Let E be the (column) eigenvector of A(D) corresponding to the largest eigenvalue. Consider AE and At E, where t denotes transpose. Chapter 11 11.2(d) Let e be an edge of G that is not an isthmus. Let G − e denote G with the edge e removed, and let G/e denote G with the edge e contracted to a point (so G/e has one less vertex than G). Find a simple recurrence satisfied by CG(n) in terms of CG−e(n) and CG/e(n), and then use induction. 11.5 Use the unimodularity of the basis matrices CT and BT . 11.6 Use the formula (11.5) for the resistance of a parallel connection. 11.8 (a) Mimic the proof of Theorem 9.8 (the Matrix-Tree Theorem). 11.8 (b) Consider ZZt . Chapter 12 12.9. Compute the reduced Euler characteristic of X and consider the last step of a possible shelling. 12.10. Modify the dunce hat of the previous exercise. 12.12. There are two examples with f -vector (6, 14, 9) and none smaller. 12.13. (b) Consider the hint for Problem 12.12. (c) Use Exercise 12.10. 12.18. The following property of triangulations of spheres is sufficient for solving this exercise. For every F ∈ we have dim lk (F ) χ(˜ lk (F )) = (−1) . Hints and Comments for Some Exercises 249 Here χ˜ denotes reduced Euler characteristic, and lk denotes link, as defined in Remark 12.26. 12.20. There are five minimal nonfaces. 12.21. One approach is to consider minimal ideals I of K[], say, for which K[]/I is a polynomial ring, i.e., isomorphic to K[y1,...,yr ] for inde- terminates y1,...,yr . 12.30. Answer: 588. Without shellability, the answer is 589. 12.31. Let I be the ideal of K[ ] generated by all monomials xF , where F ∈ . Clearly K[ ] is isomorphic to K[ ]/I (as a K-algebra). Let θ1,...,θd ∈ K[ ]1 satisfy Property (P), and consider the natural map f : K[ ]/(θ1,...,θd ) → (K[ ]/I)/(θ1,...,θd ). θ ∈ K[ ] θ = x 12.32. Consider i 1 defined by i xj ∈Vi j . Also consider the product xj θi in the ring K[ ]/(θ1,...,θd ) for all 1 ≤ i ≤ d and xj ∈ Vi. Chapter 13 13.4 The best strategy involves the concept of odd and even permutations. 13.5 For the easiest solution, don’t use linear algebra but rather use the original Oddtown theorem. 13.12 What are the eigenvalues of skew-symmetric matrices? 13.15 Consider the incidence matrix M of the sets and their elements. Consider two cases: det M = 0 and det M = 0. 13.19 Consider the first three rows of H . Another method is to use row operations to factor a large power of 2 from the determinant. 13.22 It is easiest to proceed directly and not use the proof of Theorem 13.18.
Recommended publications
  • The Number of Euler Tours of Random Directed Graphs
    The number of Euler tours of random directed graphs P´aid´ıCreed∗ Mary Cryanyz School of Mathematical Sciences School of Informatics Queen Mary, University of London University of Edinburgh United Kingdom United Kingdom [email protected] [email protected] Submitted: May 21, 2012; Accepted: Jul 26, 2013; Published: Aug 9, 2013 Mathematics Subject Classifications: 05A16, 05C30, 05C80, 68Q25 Abstract In this paper we obtain the expectation and variance of the number of Euler tours of a random Eulerian directed graph with fixed out-degree sequence. We use this to obtain the asymptotic distribution of the number of Euler tours of a random d-in/d-out graph and prove a concentration result. We are then able to show that a very simple approach for uniform sampling or approximately counting Euler tours yields algorithms running in expected polynomial time for almost every d-in/d-out graph. We make use of the BEST theorem of de Bruijn, van Aardenne-Ehrenfest, Smith and Tutte, which shows that the number of Euler tours of an Eulerian directed graph with out-degree sequence d is the product of the number of arborescences and 1 Q the term jV j [ v2V (dv − 1)!]. Therefore most of our effort is towards estimating the moments of the number of arborescences of a random graph with fixed out-degree sequence. 1 Introduction 1.1 Background Let G = (V; A) be a directed graph. An Euler tour of G is any ordering eπ(1); : : : ; eπ(jAj) of the set of arcs E such that for every 1 6 i < jAj, the target vertex of arc eπ(i) is the source vertex of eπ(i+1), and such that the target vertex of eπ(jAj) is the source of eπ(1).
    [Show full text]
  • A Reverse Aldous–Broder Algorithm
    A Reverse Aldous{Broder Algorithm Yiping Hu∗ Russell Lyons† Pengfei Tang‡ October 8, 2020 Abstract The Aldous{Broder algorithm provides a way of sampling a uniformly random spanning tree for finite connected graphs using simple random walk. Namely, start a simple random walk on a connected graph and stop at the cover time. The tree formed by all the first-entrance edges has the law of a uniform spanning tree. Here we show that the tree formed by all the last-exit edges also has the law of a uniform spanning tree. This answers a question of Tom Hayes and Cris Moore from 2010. The proof relies on a bijection that is related to the BEST theorem in graph theory. We also give other applications of our results, including new proofs of the reversibility of loop-erased random walk, of the Aldous{Broder algorithm itself, and of Wilson's algorithm. R´esum´e L'algorithme Aldous{Broder fournit un moyen d'´echantillonner un arbre couvrant uni- form´ement al´eatoirepour des graphes connexes finis en utilisant une marche al´eatoiresimple. A` savoir, commen¸consune marche al´eatoiresimple sur un graphe connexe et arr^etons-nousau moment de la couverture. L'arbre form´epar toutes les ar^etesde la premi`ereentr´eea la loi d'un arbre couvrant uniforme. Nous montrons ici que l'arbre form´epar toutes les ar^etesde derni`ere sortie a ´egalement la loi d'un arbre couvrant uniforme. Cela r´epond `aune question de Tom Hayes et Cris Moore de 2010. La preuve repose sur une bijection qui est li´eeau th´eor`emeBEST de la th´eoriedes graphes.
    [Show full text]
  • The Number of Euler Tours of a Random D-In/D-Out Graph Páidí Creed, Mary Cryan
    The number of Euler tours of a random d-in/d-out graph Páidí Creed, Mary Cryan To cite this version: Páidí Creed, Mary Cryan. The number of Euler tours of a random d-in/d-out graph. 21st International Meeting on Probabilistic, Combinatorial, and Asymptotic Methods in the Analysis of Algorithms (AofA’10), 2010, Vienna, Austria. pp.117-128. hal-01185585 HAL Id: hal-01185585 https://hal.inria.fr/hal-01185585 Submitted on 20 Aug 2015 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License AofA’10 DMTCS proc. AM, 2010, 117–128 The number of Euler tours of a random d-in/d-out graph Paid´ ´ı Creed1: and Mary Cryan2; 1Department of Computer Science, Royal Holloway University of London, Egham, Surrey, UK, TW20 0EX, UK. 2School of Informatics, University of Edinburgh, 10 Crichton Street, Edinburgh EH8 9AB, UK. In this paper we obtain the expectation and variance of the number of Euler tours of a random d-in/d-out directed graph, for d ¥ 2. We use this to obtain the asymptotic distribution and prove a concentration result.
    [Show full text]
  • Graph Theory & Combinatorics
    MATH 775: GRAPH THEORY & COMBINATORICS I MATTHEW KAHLE 1. Enumeration The standard references for enumerative combinatorics are Richard Stanley's EC1 and EC2 [11, 12]. 1.1. Factorials, binomial coefficients, multinomial coefficients. The first useful fact in combinatorics is that n! = n × (n − 1) × · · · × 1 is the number of ways to order n objects. Note that when n is large, a useful approximation is Stirling's formula p n! ≈ 2πn(n=e)n: The next useful fact is the binomial theorem n X n (x + y)n = xiyn−i; i i=0 n where the binomial coefficient i is defined by n n! = (n − i)!: i i! Note that 0! = 1 by useful convention. From the binomial theorem, some useful identities can easily be deduced. For example, n X n = 2n; i i=0 or n X n (−1)i = 0: i i=0 Exercise 1.1. Deduce both of these identities without resorting to the binomial theorem. A more general version of the binomial theorem is the multinomial theorem. For three variables, for example. X n! (x + y + z)n = xaybzc; a!b!c! a+b+c=n Exercise 1.2. Write down and prove a k-variable multinomial theorem. Date: November 16, 2011. 1 2 MATTHEW KAHLE Note that multinomial coefficients naturally arise in certain types of counting problems. For example, one easily checks that the number of anagrams of the word \bananacabana" is 12! ; 6!2!1!3! where 6, 2, 1, 3 count the number of a's, b's, c's, and n's, respectively.
    [Show full text]
  • Graph Algorithms
    Graph Algorithms PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Wed, 29 Aug 2012 18:41:05 UTC Contents Articles Introduction 1 Graph theory 1 Glossary of graph theory 8 Undirected graphs 19 Directed graphs 26 Directed acyclic graphs 28 Computer representations of graphs 32 Adjacency list 35 Adjacency matrix 37 Implicit graph 40 Graph exploration and vertex ordering 44 Depth-first search 44 Breadth-first search 49 Lexicographic breadth-first search 52 Iterative deepening depth-first search 54 Topological sorting 57 Application: Dependency graphs 60 Connectivity of undirected graphs 62 Connected components 62 Edge connectivity 64 Vertex connectivity 65 Menger's theorems on edge and vertex connectivity 66 Ear decomposition 67 Algorithms for 2-edge-connected components 70 Algorithms for 2-vertex-connected components 72 Algorithms for 3-vertex-connected components 73 Karger's algorithm for general vertex connectivity 76 Connectivity of directed graphs 82 Strongly connected components 82 Tarjan's strongly connected components algorithm 83 Path-based strong component algorithm 86 Kosaraju's strongly connected components algorithm 87 Application: 2-satisfiability 88 Shortest paths 101 Shortest path problem 101 Dijkstra's algorithm for single-source shortest paths with positive edge lengths 106 Bellman–Ford algorithm for single-source shortest paths allowing negative edge lengths 112 Johnson's algorithm for all-pairs shortest paths in sparse graphs 115 Floyd–Warshall algorithm
    [Show full text]
  • A Graph Theoretical Approach to DNA Fragment Assembly
    AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 7, NO. 1 A Graph Theoretical Approach to DNA Fragment Assembly Jonathan Kaptcianos‡ Saint Michael’s College Colchester, Vermont 05439 USA Received: September 19, 2007 Accepted: April 1, 2008 ABSTRACT Built on prior work on sequencing by hybridization, fragment assembly is a newly explored method of determining whether or not a reassembled strand of DNA matches the original strand. One particular way to analyze this method is by using concepts from graph theory. By constructing data models based on these ideas, it is possible to come to various conclusions about the original problem regarding reassembled strands of DNA. In this paper we will detail this approach to DNA fragment assembly and present some related graph theoretical proofs in the process, including the BEST theorem. Further, we will explore the Eulerian superpath problem and its role in aiding fragment assembly, in addition to other recent applications of graph theory in the field of bioinformatics. I. Introduction both of which are used in counting Eulerian circuits in a directed graph. In recent years, scientists and Further, this paper will briefly survey researchers have emphasized DNA the current state of DNA sequencing and sequencing and fragment assembly with the fragment assembly, such as the problems hopes of enhancing their abilities to that arise, and how they are addressed reconstruct full strands of DNA based on the using graph theory. We will see how graphs pieces of data they are able to record. are being constructed using DNA data, and Complications arise with fragment assembly how these graphs inform the problem.
    [Show full text]
  • Sampling Arborescences in Parallel
    Sampling Arborescences in Parallel Nima Anari1, Nathan Hu1, Amin Saberi1, and Aaron Schild2 1Stanford University, {anari,zixia314,saberi}@stanford.edu 2University of Washington, [email protected] December 18, 2020 Abstract We study the problem of sampling a uniformly random directed rooted spanning tree, also known as an arborescence, from a possibly weighted directed graph. Classically, this problem has long been known to be polynomial-time solvable; the exact number of arborescences can be computed by a determinant [Tut48], and sampling can be reduced to counting [JVV86; JS96]. However, the classic reduction from sampling to counting seems to be inherently sequential. This raises the question of designing efficient parallel algorithms for sampling. We show that sampling arborescences can be done in RNC. For several well-studied combinatorial structures, counting can be reduced to the computation of a determinant, which is known to be in NC [Csa75]. These include arborescences, planar graph perfect matchings, Eulerian tours in digraphs, and determinantal point processes. However, not much is known about efficient parallel sampling of these structures. Our work is a step towards resolving this mystery. 1 Introduction Algorithms for (approximately) counting various combinatorial structures are often based on the equiva- lence between (approximate) counting and sampling [JVV86; JS96]. This is indeed the basis of the Markov Chain Monte Carlo (MCMC) method to approximate counting, which is arguably the most successful ap- proach to counting, resolving long-standing problems such as approximating the permanent [JSV04] and computing the volume of convex sets [DFK91]. Approximate sampling and counting are known to be equivalent for a wide class of problems, including the so-called self-reducible ones [JVV86; JS96].
    [Show full text]
  • Notices of the American Mathematical Society ABCD Springer.Com
    ISSN 0002-9920 Notices of the American Mathematical Society ABCD springer.com Highlights in Springer’s eBook Collection of the American Mathematical Society June/July 2009 Volume 56, Number 6 NEW NEW Using representation theory and This self-contained text off ers a host of Editor-in-Chief: Steven G. Krantz invariant theory to analyze the new mathematical tools and strategies The Journal of Geometric Analysis is a symmetries arising from group actions, which develop a connection between high-quality journal devoted to and with emphasis on the geometry analysis and other mathematical publishing important new results at the and basic theory of Lie groups and Lie disciplines, such as physics and interface of analysis, geometry and algebras, this book reworks an earlier engineering. A broad view of math- partial diff erential equations. Founded highly acclaimed work by the author. ematics is presented throughout; the 17 years ago by its current Editor-in- This comprehensive introduction to Lie text is excellent for the classroom or Chief the journal has maintained theory, representation theory, invariant self-study. standards of innovation and excellence. theory and algebraic groups is more 2009. XX, 452 p. 10 illus. Softcover accessible to students and includes a ISSN 1050-6926 (print ) ISBN 978-0-387-77378-0 7 $79.95 broader ranger of applications. ISSN 1559-002X (online) 2009. XX, 716 p. 10 illus. (Graduate Texts in Mathematics, Volume 255) Hardcover ISBN 978-0-387-79851-6 7 $69.95 For access check with your librarian Fractional Diff erentiation Risk and Asset Allocation Groups and Symmetries Inequalities A.
    [Show full text]
  • The Number of Euler Tours of a Random D-In/D-Out Graph
    Discrete Mathematics and Theoretical Computer Science DMTCS vol. (subm.), by the authors, 1–1 The number of Euler tours of a random d-in/d-out graph Paid´ ´ı Creed1 and Mary Cryan2 1Department of Computer Science, Royal Holloway University of London, Egham, Surrey, UK, TW20 0EX, UK. [email protected]. Supported by EPSRC grants EP/F01161X/1 and EP/D043905/1. 2School of Informatics, University of Edinburgh, 10 Crichton Street, Edinburgh EH8 9AB, UK. Supported by EPSRC grant EP/D043905/1 In this paper we obtain the expectation and variance of the number of Euler tours of a random d-in/d-out directed graph, for d ¥ 2. We use this to obtain the asymptotic distribution and prove a concentration result. We are then able to show that a very simple approach for uniform sampling or approximately counting Euler tours yields algorithms running in expected polynomial time for almost every d-in/d-out graph. We make use of the BEST theorem of de Bruijn, van Aardenne-Ehrenfest, Smith and Tutte, which shows that the number of Euler tours of a d-in/d-out graph is the product of the number of arborescences and the term rpd ¡ 1q!sn{n. Therefore most of our effort is towards estimating the asymptotic distribution of the number of arborescences of a random d-in/d-out graph. Keywords: Euler tours, Random graphs, Directed graphs, Counting, Sampling 1 Introduction Let G pV, Eq be a directed graph. An Euler tour of G is any ordering eπp1q, . , eπp|E|q of the set of arcs E such that for every 1 ¤ i |E|, the target vertex of arc eπpiq is the source vertex of eπpi 1q, and such that the target vertex of eπp|E|q is the source of eπp1q.
    [Show full text]
  • Algebraic and Geometric Methods in Enumerative Combinatorics
    Algebraic and geometric methods in enumerative combinatorics Federico Ardila∗ 0 Introduction Enumerative combinatorics is about counting. The typical question is to find the number of objects with a given set of properties. However, enumerative combinatorics is not just about counting. In \real life", when we talk about counting, we imagine lining up a set of objects and counting them off: 1; 2; 3;:::. However, families of combinatorial objects do not come to us in a natural linear order. To give a very simple example: we do not count the squares in an m × n rectangular grid linearly. Instead, we use the rectangular structure to understand that the number of squares is m · n. Similarly, to count a more complicated combinatorial set, we usually spend most of our efforts understanding the underlying structure of the individual objects, or of the set itself. Many combinatorial objects of interest have a rich and interesting algebraic or geometric structure, which often becomes a very powerful tool towards their enumeration. In fact, there are many families of objects that we only know how to count using these tools. This chapter highlights some key aspects of the rich interplay between algebra, discrete geometry, and combinatorics, with an eye towards enumeration. About this survey. Over the last fifty years, combinatorics has undergone a radical transformation. Not too long ago, combinatorics mostly consisted of ad hoc methods and clever solutions to problems that were fairly isolated from the rest of mathematics. It has since grown to be a central area of mathematics, largely thanks to the discovery of deep connections to other fields.
    [Show full text]
  • Arxiv:1907.10196V2 [Math.PR] 26 Mar 2021 Let Introduction 1 Reuigsml Admwl on Walk Random Simple Using Tree T Nvriyo Ahntn Email: Washington
    A Reverse Aldous–Broder Algorithm Yiping Hu∗ Russell Lyons† Pengfei Tang‡ March 29, 2021 Abstract The Aldous–Broder algorithm provides a way of sampling a uniformly random spanning tree for finite connected graphs using simple random walk. Namely, start a simple random walk on a connected graph and stop at the cover time. The tree formed by all the first-entrance edges has the law of a uniform spanning tree. Here we show that the tree formed by all the last-exit edges also has the law of a uniform spanning tree. This answers a question of Tom Hayes and Cris Moore from 2010. The proof relies on a bijection that is related to the BEST theorem in graph theory. We also give other applications of our results, including new proofs of the reversibility of loop-erased random walk, of the Aldous–Broder algorithm itself, and of Wilson’s algorithm. R´esum´e L’algorithme Aldous–Broder fournit un moyen d’´echantillonner un arbre couvrant uniform´ement al´eatoire pour des graphes connexes finis en utilisant une marche al´eatoire simple. A` savoir, com- men¸cons une marche al´eatoire simple sur un graphe connexe et arrˆetons-nous au moment de la couverture. L’arbre form´epar toutes les arˆetes de la premi`ere entr´ee a la loi d’un arbre couvrant uniforme. Nous montrons ici que l’arbre form´epar toutes les arˆetes de derni`ere sortie a ´egalement la loi d’un arbre couvrant uniforme. Cela r´epond `aune question de Tom Hayes et Cris Moore de 2010.
    [Show full text]
  • An Efficient Algorithm for Enumerating Eulerian Paths
    TCS -TR-A-14-77 TCS Technical Report An Efficient Algorithm for Enumerating Eulerian Paths by Muhammad Kholilurrohman and Shin-ichi Minato Division of Computer Science Report Series A October 3, 2014 Hokkaido University Graduate School of Information Science and Technology Email: [email protected] Phone: +81-011-706-7682 Fax: +81-011-706-7682 An Efficient Algorithm for Enumerating Eulerian Paths Muhammad Kholilurrohman1 and Shin-ichi Minato1;2 1 Graduate School of Information Science and Technology, Hokkaido University, Sapporo, Japan 2 ERATO MINATO Discrete Structure Manipulation System Project, Japan Science and Technology Agency, Sapporo, Japan Abstract. Although a mathematical formula for counting the number of Eulerian circles in a directed graph is already known [1, 2], no formula is yet known for enumerating such circles if the graph is an undirected one. In computer science, the latter problem is known to be in #P-complete [3], enumerating the solutions of such problem is known to be hard. In this paper, an efficient algorithm to enumerate all the Eulerian paths in an undirected graph, both simple graph and multigraph, is proposed. Keywords: enumeration, Eulerian circle, Eulerian path, graph theory, undirected graph 1 Introduction In graph theory, Eulerian path (or Eulerian trail) is a path in a graph which visits every edge exactly once. If the path starts and ends on the same vertex, then it is called an Eulerian circle. Eulerian path problem dates back to 1736, when for the first time Leonhard Euler discuss in his paper [4] the famous Seven Bridges of K¨onigsberg problem. He proved the necessary condition for the existence of Eulerian circle that all the vertices of the connected graph must have an even degree, while the necessity condition was proved later by Carl Hierholzer [5] in 1873.
    [Show full text]