40 DM16 Abstracts

IP1 [email protected] Accuracy, Privacy, and Validity: When Right is Wrong and Wrong is Right IP4 In 2008 a simple pen-and-paper privacy attack on aggre- Mathematical Models: Uses, Abuses, and Non-uses gate allele frequency statistics in a Genome-Wide Asso- ciation Study rocked the world of genomics research and Models are indispensable, but have to be used with caution. resulted in a change in access policy for aggregate statistics Some early quantitative models, drawn from the early his- in studies funded by the US National Institutes of Health. tory of British railways and related to the ubiquitous grav- After describing the original attack and summarizing re- ity models of transportation, urban planning, spacial eco- cent advances in attack strategies, we shift to the defense, nomics, and related areas, will be presented. They demon- discussing differential privacy, a notion of privacy tailored strate how even clearly false models can be useful, and how to statistical analysis of large datasets. Signal properties of sometimes they are misused or tragically not used. differential privacy include its resilience to arbitrary side in- formation and the ability to understand cumulative privacy Andrew M. Odlyzko loss over multiple statistical analyses. Finally, we describe University of Minnesota a tight connection between differential privacy and statis- [email protected] tical validity under adaptive (exploratory) data analysis.

IP5 Cynthia Dwork Microsoft Research, USA Tangles and the Mona Lisa: Connectivity Versus [email protected] Structure

Tangles, first introduced by Robertson and Seymour in IP2 their work on graph minors, are a radically new way to define regions of high connectivity in a graph. The idea From Algorithm to Theorem (in Probabilistic is that, whatever that highly connected region might ‘be’, Combinatorics) low-order separations of the graph cannot cut through it, and so it will orient them: towards the side of the separa- The general question is let X be a set of interesting ”things” tion on which it lies. A tangle, thus, is simply a consistent (permutations, graphs, partitions, ...). Pick x in X at way of orienting all the low-order separations in a graph. random; what does x ”look like”? There are a host of The new paradigm this brings to connectivity theory is that results for taking theorems(e.g., the Gale-Ryser theorem) such consistent orientations of all the low-order separations and turning them into algorithms for efficient generation. may, in themselves, be thought of as highly connected re- This talk goes in the opposite direction: given an algorithm gions: rather than asking exactly which vertices or edges for random generation, what (limit) theorems does it im- belong to such a region, we only ask where it is, collect- ply? One key example, drawn from joint work with Chern, ing pointers to it from all sides. Pixellated images share Kane, and Rhoades—there is a clever algorithm for gener- this property: we cannot tell exactly which pixels belong ating a random set partition due to Stam. This allowed us to the Mona Lisa’s nose, rather than her cheek, but we can to prove the limiting normality of the number of crossings identify ‘low-order’ separations of the picture that do not (and many other functionals), a long-open problem. cut right through such features, and which can therefore be used collectively to delineate them. This talk will outline Persi Diaconis a general theory of tangles that applies not only to graphs and matroids but to a broad range of discrete structures. [email protected] Including, perhaps, the pixellated Mona Lisa.

Reinhard Diestel IP3 Univeritat Hamburg [email protected] Stabilisation in Algebra, Geometry, and Combina- torics IP6 Throughout mathematics, one encounters sequences of al- gebraic varieties—geometric structures defined by polyno- Induced Matchings, Arithmetic Progressions and mial equations. As the dimension of the variety grows, Communication typically so does its complexity, measured, for instance, by the degrees of its defining equations. And yet, many se- Extremal combinatorics is one of the central branches of quences stabilise in the sense that from some member of the discrete mathematics that deals with the problem of es- sequence on, all complexity is inherited from the smaller timating the maximum possible size of a combinatorial members by applying symmetries. I will present several structure which satisfies certain restrictions. Often, such examples of this, as yet, only partially understood phe- problems also have applications to other areas including nomenon. Beautiful combinatorics of well-quasi-ordered theoretical computer science, additive number theory and sets plays a key role in the proofs. The hope is that, con- information theory. In his talk, we will illustrate this fact versely, algebraic stabilisation may in the future also shed using several closely related examples, focusing on the re- new light on well-quasi-orders. cent works with Alon, Fox, Huang and Moitra.

Jan Draisma Benny Sudakov Eindhoven University of Technology, The Netherlands ETH Zurich Department of Mathematics and Computer Science D-Math DM16 Abstracts 41

[email protected] [email protected]

IP7 SP2 Quasirandomness, Sidorenko’s Conjecture and Hot Topics Session: in Graph Norms Quasipolynomial Time - Part I of II

Using the theory of quasirandomness as an underlying In the first talk I will sketch the main ingredients of the theme, we will discuss recent progress on a number of prob- algorithm and indicate how they lead to quasipolynomial lems in extremal , including Sidorenko’s con- recurrence. Familiarity with basic concepts of group theory jecture and a question of Lov´asz asking for a classification (such as kernel of a homomorphism) will be assumed. of graphs that define norms. L´aszl´o Babai David Conlon University of Chicago University of Oxford [email protected] [email protected]

CP1 IP8 The Family of Plane Graphs with Face Sizes 3 or 4 Excluded Grid Theorem: Improved and Simplified A reduction theorem will be proved for the family of plane One of the key results in Robertson and Seymour’s seminal graphs with faces sizes 3 or 4. Each reduction produces work on graph minors is the Excluded Grid Theorem. The large proper minors in the same family. Each reduction is theorem states that there is a function f, such that for every shown to be necessary. positive integer g, every graph whose treewidth is at least f(g) contains the (gxg)-grid as a minor. This theorem has Sheng Bau found many applications in graph theory and algorithms. University of Natal, Pietermaritzburg An important open question is establishing tight bounds on Private Bag X01, Scottsville 3209 f(g) for which the theorem holds. Robertson and Seymour [email protected] showed that f(g) ≥ Ω(g2logg), and this remains the best current lower bound on f(g). Until recently, the best upper bound was super-exponential in g. In this talk, we will give CP1 an overview of a recent sequence of results, that has lead to Bijections to Split Graphs the best current upper bound of f(g)=O(g19polylog(g)). AgraphG is a split graph if its vertices can be partitioned into a clique and a stable set. We call a split graph balanced Julia Chuzhoy if its partition is unique and unbalanced otherwise. In this Toyota Technological Institute at Chicago talk, we present several proofs, using natural bijections, [email protected] that the number of unbalanced split graphs on n vertices is equal to the number of split graphs on n−1vertices.These proofs demonstrate connections between split graphs and SP0 other well-known combinatorial families. Hot Topics Session: Graph Isomorphism in Quasipolynomial Time - Part II of II Karen Collins Wesleyan University I will explain the core “Local Certificates’ algorithm in de- [email protected] tail and sketch the aggregation of the local certificates. Familiarity with basic concepts of group theory (such as Ann N. Trenk kernel of a homomorphism) will be assumed. Wellesley College L´aszl´o Babai [email protected] University of Chicago [email protected] Christine T. Cheng University of Wisconsin-Milwaukee [email protected] SP1 2016 Dnes Knig Prize Lecture - Phase Transitions CP1 in Random Graph Processes Unhinging Cycles: An Approach to Universal Cy- One of the most interesting features of Erd˝os-R´enyi ran- cles Under Equivalence Relations dom graphs is the ‘percolation phase transition’, where the global structure intuitively changes from only small compo- For all prime numbers p, we investigate universal cycles nents to a single giant component plus small ones. In this of string equivalence classes of length-p under equivalence talk, we discuss the percolation phase transition of Achliop- relations based on non-transitive group actions. We offer tas processes, which are a class of time-evolving variants of two types of equivalences which admit a universal cycle Erd˝os-R´enyi random graphs that (i) can exhibit somewhat of all length-p equivalence classes: first any equivalence surprising phenomena, and (ii) are difficult to analyze due with p greater than a constant dependent on the group to dependencies between the edges. action, second for any p and an equivalence satisfying cer- tain orbit space conditions. We will also introduce a new Lutz Warnke method, called unhinging, to construct the De Bruijn-like University of Cambridge graph that is used to prove the existence of universal cycles. 42 DM16 Abstracts

haviour in Grids

Melinda Lanius The Prisoner’s Dilemma is played on a graph by assigning Department of Mathematics to each vertex a strategy and the sum of the payoffs of a University of Illinois at Urbana-Champaign single round of the game played with each of the vertex’s [email protected] neighbours. We imagine vertices having the desire to alter their strategies if they observe one of their neighbours with a higher total payoff. Iterating the process, we observe the CP1 evolution of patterns of cooperative and selfish behaviour. We examine this process on the toroidal grid, considering Monotone Paths in Dense Edge-Ordered Graphs how the initial distribution of strategies affect the distri- bution of the strategies in a limiting configuration. In a graph whose edges are are totally ordered, a mono- tone path is a path that traverses edges in increasing or- Christopher Duffy der. Let f(G) be the minimum, over all total order- University of Victoria ings of E(G), of the maximum length of a monotone christopher.duff[email protected] path in G.√ In 1973, Graham and Kleitman proved that f(Kn) ≥ ( 4n − 3 − 1)/2. The best known upper bound Jeannette Janssen on f(Kn) is due to Calderbank, Chung, and Sturtevant, 1 Dalhousie University who proved that f(Kn) ≤ + o(1) n in 1984. We show 2 [email protected] 2/3 that f(Kn) ≥ Ω((n/ log n) ).

Kevin Milans CP2 West Virginia University Counting Spanning Trees in Random Regular [email protected] Graphs

The number of spanning trees in a graph is an important CP1 parameter in many contexts. Particular attention has been A Generalization of α-Orientations to Higher given to regular graphs. We obtain a sharp asymptotic for- Genus Surfaces mula for the expected number of spanning trees in a ran- dom d-regular graph on n vertices, d = o(n1/3). The proof We obtain a generalization of Stephen Felsner’s theory of α- involves some interesting techniques, including an analysis orientations on embeddings (with associated of the Pr¨ufer code algorithm to establish concentration of lattice structures) to graph embeddings on higher genus a certain function over random trees. surfaces. We obtain several applications to bijective meth- ods in map enumeration and reconstruction. In particular, Matthew Kwan we identify an application in the structural theory of com- ETH Zurich binatorial models of moduli spaces of complex curves, with [email protected] possible further applications in quantum physics. Catherine Greenhill Jason Suagee UNSW Australia George Washington University School of Math & Statistics [email protected] [email protected]

MikhailIsaev,BrendanMcKay CP2 Australian National University The Region of Critical Probabilities in Bootstrap [email protected], [email protected] Percolation on Inhomogeneous Periodic Trees CP2 We study bootstrap percolation process where nodes in a given graph do not all receive the same probabilities within l-Cycles in Randomly Perturbed Hypergraphs the initial configuration. Instead of a simple percolation Krivelevich, Kwan and Sudakov showed that any k-graph threshold, now regions of possible probabilities emerge. To of linear minimum degree contains a Hamilton 1-cycle if keep a problem tractable we consider infinite periodic trees. a linear number of random edges are added to the graph. We show the existence, and convexity of the critical region This demonstrates that far below the extremal threshold of the initial probabilities for which the tree becomes a.a.s. for Hamiltonicity, graphs are still, in a sense, close to active. We also specify the boundary of the critical region, Hamiltonian. We generalise this to any l-cycle and con- and show how it can be numerically computed. sider other degree conditions.

Milan Bradonjic Andrew J. Mcdowell Bell Labs, Alcatel-Lucent University of Birmingham, United Kingdom [email protected] [email protected]

Stephan Wagner Richard Mycroft Stellenbosch University, South Africa University of Birmingham [email protected] [email protected]

CP2 CP2 The Emergence of Patterns of Cooperative Be- Recovering the Structure of Random Linear DM16 Abstracts 43

Graphs cyclic graphs implies that the basis graph BG(M)ofevery matroid M is edge Hamiltonian. We prove that the num- We investigate a class of random graphs defined from the ber of Hamiltonian cycles passing through an edge of the following model: on a set of vertices {v1,v2 ...,vn} there is basis graph of the cycle matroid of a graph G grows expo- an edge between vi and vj with probability p if |i − j|≤k nentially in the number of vertices of G. A similar result and with probability q otherwise. This model describes is proved por generalized Calatan lattice path matroids. graphs with a linear nature. Our problem is to reconstruct its linear embedding by recovering the order of vertices. In this work, we show how this order can be recovered Cesar Hernandez-Velez with minimal error from the eigenvectors of its adjacency Facultad de Ciencias matrix. Universidad Aut´onoma de San Luis Potos [email protected] Israel S. Rocha, Jeannette Janssen Dalhousie University Cristina Fernandes [email protected], [email protected] University of S˜ao Paulo [email protected] CP2 Jose de Pina Modularity of Random Graphs Instituto de Matematica e Estatistica Modularity is a quality function on partitions in networks Universidade de Sao Paulo which may be used to identify highly clustered components [email protected] [M. Newman and M. Girvan, Phys. Rev. E, 69 (2004)]. It is commonly used to analyse large real networks. Given Jorge Luis Ramirez Alfonsin graph G, the modularity of a partition of the vertex set Institut Montpellierain Alexander Grothendieck measures the extent to which edge density is higher within Universite de Montpellier parts than between parts, and the maximum modularity [email protected] q∗(G)ofG (where 0 ≤ q∗(G) < 1) is the maximum mod- ularity over all partitions. Knowledge of the maximum modularity of random graphs is important to determine CP3 the statistical significance of partitions in real networks [J. Reichardt and S. Bornholdt, Physica D, 224 (2006), The Generalized Onsager Model for a Binary Gas pp.20–26]. We show Erd˝oos-R´enyi random graphs have Mixture with Swirling Feed three different phases of likely maximum modularity. For np =1+o(1) the maximum modularity is 1 + o(1) whp and for np →∞the maximum modularity is o(1) whp. For The generalized Onsager model (Pradhan & Kumaran np = c with c>1 a constant, functions are constructed (JFM-2011); Kumaran & Pradhan (JFM-2014)) for the with 0

[email protected] [email protected]

CP3 CP4 Universal Cycles of Graph Colorings Fractal Graphs and Their Combinatorial Proper- ties A universal cycle enumerates the elements of a set in such a way that cycling through the set one k-window at a time Lately there is a growing applications-inspired interest in exhibits each element exactly once. U-cycles have been studying self-similarity and fractal properties of graphs. shown to exist for k-ary strings, permutations, graphs, dis- Such studies often employ statistical physics methods, crete functions, posets, and even juggling patterns. We while rigorous combinatorial theory still has not been de- consider whether u-cycles exist for k-colorings of a labeled veloped. We study discrete analogues of Lebesgue and graph G, and discover this actually encompasses and ex- Hausdorff dimensions for graphs. We show that they are pands on many of the other combinatorial objects previ- closely related to well-known graph parameters such as ously studied. Krausz and Nesetril-Rdl(Prague) dimensions. It allowed us to formally define fractal graphs and determine fractal- Katie V. Johnson, Danny DePrisco, Molly Honecker ity of some graph classes. Florida Gulf Coast University [email protected], [email protected], maho- Pavel Skums [email protected] Georgia State University [email protected] CP4 Leonid Bunimovich Connectedness of the Graph of Neighborhood Dis- Georgia Institute of Technology tinguishing Colorings and Irregular Colorings [email protected] Let G be a simple Graph. If π = {V1,V2,...,Vk} is a proper color partition and u is a vertex then the code for u is the ordered k − tuple Cπ(u)= CP3 (|N(u) ∩ V1| , |N(u) ∩ V2| ,...,|N(u) ∩ Vk|)andπ is distin- A Faster Algorithm for Computting Tutte Polyno- guishing if Cπ(u) = Cπ(v)whenu = v. The minimum mials of Lattice Path Matroids value of the cardinality of Neighborhood distinguishing proper color partition is called the neighborhood distin- Lattice path matroids were introduced as a nice class of guishing coloring number of G and is denoted by χNDC(G). matroids that show up naturally in many places. It has Irregular coloring(ir-coloring) has been introduced by Mary been known for some time that computing the Tutte poly- Radcliffe and Ping Zhang in 2006. The irregular chromatic nomial of such matroids can be done in polynomial time. number denoted by χir(G) is the minimum positive integer − Using ideas from tensor networks and holographic algo- k for which G has an irregular k coloring. For any simple rithms, we give a simple algorithm with improved running graph G, ir-coloring exists but ND-coloring is not guar- time of O(n4) in the size of the ground set. anteed. For example, K1,n does not admit ND-coloring. Study of Connectedness of the graph of vertex-colorings done by Luis Cereceda in 2008. In this paper, some results Jacob Turner on the connectedness of the graph with respect to Neigh- Pennsylvania State University borhood Distinguishing Coloring and ir-coloring has been [email protected] done with Hajos construction.

Ramar Rajasekaran CP4 College of Applied Sciences, Sohar, Oman Coloring the Square of Subcubic Planar Graphs [email protected]

Given a graph G, the square of G is the graph formed from Swaminathan V G by adding edges between vertices that are distance at Saraswathi Narayanan College most two apart. A graph is subcubic if the maximum de- Madurai Kamaraj University, India gree is at most 3. In 1977, Wegner showed that the square [email protected] of a subcubic planar graph can be properly colored with at most 8 colors and conjectured that 7 colors suffice. We prove this conjecture using discharging and computation CP4 for the reducible configurations. Coloring Intersection Graphs of Curves Crossing a Fixed Line Stephen Hartke We prove, for every t ≥ 1, that the class of intersection University of Nebraska-Lincoln graphs of curves in the plane such that each curve crosses [email protected] a fixed line L in at least one and at most t points is χ- bounded. As a corollary, the upper bound on the number Jennifer Diemunsch of edges in a k-quasi-planar topological graph drawn with Saint Vincent College at most t crossings between any pair of edges is improved [email protected] to ck,tn log n.

Sogol Jahanbekam, Brent Thomas Bartosz Walczak University of Colorado Denver Georgia Insitute of Technology & Jagiellonian University [email protected], [email protected] DM16 Abstracts 45

Alexandre Rok Department of Applied Mathematics Ben-Gurion University of the Negev National Chung-Hsing University [email protected] [email protected], [email protected]

CP5 CP5 On the Competition Graphs of d-Partial Orders Unavoidable Trees in Tournaments In this talk, we study the competition graphs of d-partial orders and obtain their characterization. We also show that An oriented tree T on n vertices is unavoidable if every any graph can be made into the competition graph of a d- n-vertex tournament contains a copy of T .Alonraised partial order for some positive integer d as long as adding the question of which trees are unavoidable. Only a few isolated vertices is allowed. We then introduce the notion examples of such trees are known, such as oriented paths of the partial order competition dimension of a graph and (as demonstrated by Thomason). We exhibit a large class study graphs whose partial order competition dimensions of unavoidable trees, including almost all orientations of are at most three. large balanced q-ary trees for any fixed q.

Jihoon Choi Richard Mycroft, T´assio Naia Seoul National University, Seoul, South Korea University of Birmingham Department of Mathematics Education [email protected], [email protected] [email protected]

Kyeong Seok Kim CP5 Korea Advanced Institute of Science and Technology, Unit Tolerance Orders with Open and Closed Daejeon Points [email protected] AposetP =(X, ≺)isaunit OC interval order if there Suh-Ryung Kim exists a representation that assigns an open or closed real Seoul National University interval Ix =[L(x),R(x)] of unit length to each x ∈ P so [email protected] that x ≺ y in P precisely when each point of Ix is less than each point of Iy. In this talk we consider a tolerance Jung Yeun Lee version of OC interval orders in which for each x ∈ X,the National Institute of Mathematical Science center point c(x) is designated as either open or closed. [email protected] This results in four types of intervals A, B, C, D,andwe define x ≺ y if and only if either (i) R(x)

We consider a correspondence between shifted Young di- Ann N. Trenk agrams and binary sequences and define an ordering for Wellesley College binary sequences. Based on the correspondence, we dis- [email protected] cuss partially ordered structure of shifted Young diagram with an inclusion ordering from coding theory. In partic- ular, from some recent results on insertion/deletion (I/D) CP6 errors in coding theory, we obtain a bounded and graded A Relative of the Odd Hadwiger’s Conjecture sub-poset of shifted Young diagrams. Gerards and Seymour conjectured that a graph with no Manabu Hagiwara odd Kt minor is (t − 1)-colorable, which strengthens Had- Chiba University, Japan wiger’s conjecture. We have two variants of the conjec- [email protected] ture. For t ≥ 2, a graph with no odd Kt minor has a partition V1,...,V7t−10 of the vertex-set such that each in- CP5 duced subgraph on Vi has bounded maximum degree. Fur- thermore, a graph with no odd Kt minor has a partition The Nested Chain Decompositions of Some Nor- W ,...,W t− of the vertex-set such that each induced malized Graded Posets of Rank Three 1 16 19 subgraph on Wi has bounded component size. This im- It is conjectured by Griggs in 1975 that every finite nor- proves a result of Kawarabayashi(2008), which states the malized matching rank-unimodal poset has a nested chain vertex-set can be partitioned into 496t sets. decomposition. This conjecture is widely open and is only verified for posets of rank 2. In this talk, we will learn the Dongyeap Kang early results of Shahriari et al. on the normalized matching Korea Advanced Institute of Science and Technology posets of rank 3. Moreover, we will modify their approach [email protected] to show more posets satisfying the Griggs’s conjecture. Sang-Il Oum Wei-Tian Li, Yu-Lun Chang KAIST 46 DM16 Abstracts

[email protected] them Hall k-extendible is known.

Sarah Holliday, Jennifer Vandenbussche, CP6 Erik E. Westlund Colorings of Hypergraphs with Large Number of Kennesaw State University Colors [email protected], [email protected], ewest- [email protected] The paper deals with the well-known problem of Erd˝os and Hajnal concerning colorings of uniform hypergraphs CP6 with few edges. Let m(n, r) denote the minimum possible number of edges in an n-uniform non-r-colorable hyper- Gy´arf´as Conjecture Is Almost Always True graph. We show that for r>nand some absolute con- stants c ,C > 0, Gy´arf´as conjectured that for every tree T , there is a func- 1 1 tion f such that every T -free graph G (i.e. graph with- out T as an induced subgraph) whose largest clique has n ≤ m(n, r) ≤ 3 c1 n C1 n ln n, size ω, has chromatic number at most f(ω). We show ln n r that almost every T -free G has chromatic number at most (1 + o(1))ω(G) and that for most trees T almost every We also obtain similar bounds for d(n, r), the minimum T -free G,satisfiesχ(G)=ω(G). Key to doing so is a possible value of the maximum edge degree in an n-uniform structural characterization of almost all T -free graphs. non-r-colorable hypergraph. Yelena Yuditsky Dmitry Shabanov McGill Lomonosov Moscow State University [email protected] Faculty of Mechanics and Mathematics [email protected] Bruce Reed McGill University Ilia Akolzin [email protected] Moscow Institute of Physics and Technology [email protected] CP6 A Vizing Type Adjacency Theorem on gc-Colorings CP6 (2,0,0)-Coloring of Planar Graphs Without 4- A gc-coloring of graph G is an edge-coloring with k colors Cycles or Close Triangles in such a way that, for each vertex v ∈ V (G), each color appears at least g(v) times. It is well known that Vizing’s Some classes of planar graphs have been conjectured to Adjacency Lemma saying that, if G is an edge-chromatic be 3-colorable, such as those without 4- or 5-cycles, and critical simple graph and xy ∈ E(G), then x is adjacent those avoiding 5-cycles and intersecting triangles. We take to at least Δ(G) − d(y)+1vertices(= y)ofdegreeΔ(G). a step toward these conjectures by showing that a planar Recently, we obtain a Vizing Type’s result in critical graphs graph without 4-cycles whose triangles are at least distance on gc-colorings. 2 apart can be colored with 3 colors such that the subgraph induced by one color class has maximum degree 2, and the Xia Zhang other color classes form independent sets. Shandong Normal University College of William and Mary Jennifer Vandenbussche [email protected] Kennesaw State University [email protected] CP7 Gexin Yu Realization Graphs of Degree Sequences Department of Mathematics The College of William and Mary Given a degree sequence d, the realization graph R(d)has [email protected] as its vertices the labeled realizations of d,withedgescor- responding to edge-switching operations. It is known that R(d) is connected and conjectured that it is Hamiltonian, Heather Hopkins but many questions remain about its structure. We prove College of William and Mary that a degree sequence decomposition due to Tyshkevich [email protected] yields a Cartesian product decomposition of realization graphs, and we characterize the degree sequences whose realization graphs are hypercubes or triangle-free. CP6 Precoloring Extensions Using a Generalization of MichaelD.Barrus Hall’s Marriage Theorem University of Rhode Island [email protected] Hall’s condition (a generalization of Hall’s Marriage The- orem) is necessary (though not sufficient) for a graph to admit a precoloring extension. We discuss results related CP7 to sufficiency. A graph is Hall k-extendible if every k- Generating Near-Bipartite Bricks precoloring that satisfies Hall’s condition is extendible. We prove every graph G is Hall Δ(G)-extendible, discuss be- A 3-connected graph G is a brick if for any two vertices havior under certain graph operations, and outline some u and v, the graph G −{u, v} has a perfect matching. A graphs for which the complete set of values of k making brick G is near-bipartite if it has two edges e and f such DM16 Abstracts 47

that G −{e, f} is bipartite and matching covered. Norine any graph G with n ≥ n0 vertices and δ(G) ≥ (n +1)/2 and Thomas (2007) showed that all simple bricks may be contains a spanning Halin subgraph. We generalize this re- generated from five infinite families and the . sult in showing that there exists a positive integer n0 such Likewise, we show that all simple near-bipartite bricks may that any graph G with n ≥ n0 vertices and σ2(G) ≥ n +1 be generated from eight infinite families. Some applications contains a spanning Halin subgraph. will be discussed. Songling Shan Nishad Kothari Department of Mathematics Department of Combinatorics and Optimization Vanderbilt University University of Waterloo [email protected] [email protected] Guantao Chen Department of Mathematics & Statistics CP7 Georgia State University Antimagic Labelings of Weighted Graphs [email protected] In 1990, Hartsfield and Ringel conjectured that every con- nected graph of order at least 3 is antimagic, meaning there Colton Magnant is a bijective labeling φ : E(G) → [|E(G)|] such that vertex Georgia Southern University sums are pairwise distinct. Using the Combinatorial Null- [email protected] stellensatz (CN) and a relaxation of antimagic we show that graphs having no K or K components are 4n - 1 2 3 CP8 weighted-antimagic, improving upon a result of Wong and Zhu. In this talk, we discuss the application of CN and Spatial Networks with Random Connections related results. Spatial networks of interest (including climate, communi- Victor Larsen cations, nanowire and neuronal networks) may be modelled Kennesaw State University by randomly located nodes with a distance-dependent link [email protected] probability. We show that the connection probability can be estimated from just a few moments of the link proba- Zhanar Berikkyzy bility function for many domain geometries. Random con- Iowa State University nection models more accurately estimate connectivity and [email protected] resilience than older deterministic connection models such as the random geometric graph.

Axel Brandt Carl Dettmann University of Colorado-Denver University of Bristol [email protected] [email protected]

Sogol Jahanbekam Orestis Georgiou University of Colorado Denver Toshiba [email protected] [email protected]

Danny Rorabaugh Justin Coon Queen’s University University of Oxford [email protected] [email protected]

CP7 CP8 Hamiltonian Cycles in Directed Toeplitz Graphs Algebraic Bounds for Heterogeneous and Corre- An matrix is called a Toeplitz matrix if it has constant lated Percolation values along all diagonals parallel to the main diagonal. A directed Toeplitz graph is a digraph with Toeplitz adja- We consider percolation with positively correlated site cency matrix. In this talk I will discuss conditions for the probabilities. The corresponding multi-variate Bernoulli existence of hamiltonian cycles in directed Toeplitz graphs. distribution is modeled using clusters: multiple sites are marked open all at once, independently from other clus- ters. We bound the correlated percolation transition by Shabnam Malik heterogeneous percolation on a specially constructed clus- Forman Christian College ter connectivity graph, and apply our recent results to [email protected] construct algebraic bounds for connectivity, cluster sus- ceptibility, and self-avoiding cycle susceptibility in terms of weighted adjacency and backtracking matrices. CP7 Ore’s Condition for Spanning Halin Subgraphs Kathleen Hamilton Complex Systems Division A Halin graph, which consists of a plane tree with no ver- Oak Ridge National Laboratory tices of degree 2 and a cycle connecting its leaves accord- [email protected] ing to the cyclic order determined by the embedding, pos- sesses rich hamiltonicity properties such as being hamil- Leonid Pryadko tonian, hamiltonian-connected, and almost pancyclic. It Department of Physics and Astronomy was shown that there exists a positive integer n0 such that University of California at Riverside 48 DM16 Abstracts

[email protected] Drexel University [email protected], [email protected]

CP8 Using Optimization to Define Unbiased Treatment CP8 Effect Estimators for Causal Inference Using Ob- Evolutionary Dynamics in Finite Populations Mix servational Data Rapidly Matching is used to estimate treatment effects in obser- vational studies in the social science, public health, and We prove that the mixing time of a broad class of evo- medicine. One mechanism for overcoming its restrictive- lutionary dynamics in finite, unstructured populations is ness is to relax the exact matching requirement to one of roughly logarithmic in the size of the state space. An balance on the covariate distributions for the treatment important special case of such a stochastic process is the and control groups. The Balance Optimization Subset Se- Wright-Fisher model from evolutionary biology (with se- lection (BOSS) model is introduced to identify a control lection and mutation) on a population of size N over m group featuring optimal covariate balance. This presen- genotypes. Our main result implies that the mixing time tation discusses conditions under which the BOSS model of this process is O(log N) for all mutation rates and fitness yields unbiased estimators for the treatment effect. landscapes, and solves the main open problem from [Dixit, N., Srivastava, P., and Vishnoi, N. K., A finite population Sheldon H. Jacobson model of molecular evolution: Theory and computation]. University of Illinois Biologically, such models have been used to study the evo- Dept of Computer Science lution of viral populations with applications to drug design [email protected] strategies countering them. Technically, we make a novel connection between Markov chains arising in evolutionary dynamics and dynamical systems on the probability sim- Jason Sauppe plex. This allows us to use the local and global stability University of Wisconsin - lacrosse properties of the fixed points of such dynamical systems to [email protected] construct a contractive coupling in a fairly general setting. We expect that our mixing time result would be useful be- CP8 yond the evolutionary biology setting, and the techniques used here would find applications in bounding the mixing Uniform Distribution, Stein-Like Characteriza- times of Markov chains which have a natural underlying tions and Identities dynamical system. An overview of Prokhorov’s school results on the uni- form distribution is presented, including some refinement Ioannis Panageas of Diaconis–Freedman theorem on the uniform distribution Georgia Institute of Technology on multidimensional spheres. A new method to get Stein- [email protected] and Chen-like characterizations for all distributions defined by their moments is presented and applied to uniform and Piyush Srivastava equiprobable distributions. The method is partly based California Institute of Technology on Weyl–Heisenberg non-commutative algebras. Starting [email protected] from Burchnall-like recurrent formulas for classical orthog- onal polynomials, some generalized Stein- and Chen-like Nisheeth K. Vishnoi identities of higher orders for classical distributions are de- EPFL rived to solve linearization problems for these polynomi- EPFL als. This makes it possible to get enumerations in discrete nisheeth.vishnoi@epfl.ch mathematics.

Vladimir I. Khokhlov, Oleg Viskov CP9 Steklov Mathematical Institute [email protected], [email protected] Cycle Decompositions with No Subsystems

Valerii Maksimov A k-cycle decomposition of G is a partition of the edge Russian State Humanitarian University set of G such that each element of the partition induces a [email protected] k-cycle. The necessary and sufficient conditions for the ex- istence of a k-cycle decomposition of Kn have already been determined. We are concerned with showing there exists a P P CP8 k-cycle decomposition of Kn such that no subset of forms a k-cycle decomposition of Kt where 2

Venkata Dinavahi University of Birmingham University of Findlay [email protected] dinavahi@findlay.edu Ben Barber University of Bristol CP9 [email protected] The Decomposition Threshold of a Given Graph

A fundamental theorem of Wilson states that, for every Daniela K¨uhn, Deryk Osthus, Amelia Taylor graph F , the edge-set of every sufficiently large clique (sat- University of Birmingham isfying a trivially necessary divisibility condition) has a [email protected], [email protected], decomposition into copies of F . One of the main open [email protected] problems in this area is to determine the minimum degree threshold which guarantees an F -decomposition in an in- CP9 complete host graph. We solve this problem for the case when F is bipartite and make significant progress towards Strong Oriented Graphs with Largest Directed the general case. Metric Dimension

Stefan Glock, Daniela Kuehn, Allan Lo Let D be a strongly connected oriented graph with vertex- University of Birmingham set V and arc-set E. The distance from a vertex u to [email protected], [email protected], another vertex v, d(u, v) is the minimum length of ori- { } [email protected] ented paths from u to v. Suppose B = b1,b2,b3, ...bk is a nonempty ordered subset of V . The representation of a vertex v with respect to B, r(v|B), is defined as a vector Richard Montgomery (d(v,b1),d(v,b2),...,d(v, bk)). If any two distinct vertices University of Cambridge u, v satisfy r(u|B) = r(v|B), then B is a resolving set of D. [email protected] If the cardinality of B is minimum then B is a basis of D and the cardinality of B is the directed metric dimension Deryk Osthus of D, dim(D). We proved that if D is a strongly connected University of Birmingham oriented graph of order n ≥ 4, then dim(D) ≤ n − 3. Fur- [email protected] thermore, we characterized strong oriented graphs attain- ing the upper bound, i.e., strong oriented graphs of order n and metric dimension n − 3. CP9 Proof of the Bar´at-Thomassen Conjecture Rinovia Simanjuntak, Yozef Tjandra Institut Teknologi Bandung The Bar´at-Thomassen conjecture asserts that for every tree [email protected], [email protected] T on m edges, there exists a constant kT such that every kT -edge-connected graph with size divisible by m can be edge-decomposed into copies of T . So far this conjecture CP9 has only been verified when T is a path or when T has On (Strongly) Chordal-(k, l) Graph Sandwich diameter at most 4. We prove the full statement of the Problem conjecture. In the graph sandwich problem, given G1 =(V,E1), G2 = Ararat Harutyunyan (V,E2), E1 ⊆ E2,weseekG =(V,E) with some property Mathematical Institute, University of Oxford and E1 ⊆ E ⊆ E2. A graph is (strongly) chordal-(k, l) [email protected] if it is (strongly) chordal and its vertex-set partitions into at most k independent sets and l cliques. We consider the Julien Bensmail, Martin Merker complexity of seeking a sandwich that is (strongly) chordal- Technical University of Denmark (k, l) and settle many previously open cases. [email protected], [email protected] R Sritharan Tien-Nam Le, St´ephan Thomass´e The University of Dayton ENS de Lyon [email protected] [email protected], [email protected] CP10 CP9 Stability Number Linear Programs Clique Decompositions of Multipartite Graphs and Completion of Latin Squares We introduce new constraints for relaxations of the stabil- ity number integer program. Optima for these LPs give We give the best known bounds on the minimum degree upper bounds for the stability number of a graph. Cuts or which ensures an edge-decomposition of an r-partite graph constraints that have been used in stability number LPs into r-cliques (subject to necessary divisibility conditions). include edge, clique, odd cycle, wheel, anti-hole and cir- Our proof essentially reduces the problem to the problem culant constraints. Many of these constraints are either of finding a fractional r-clique decomposition or an approx- alpha-critical graph constraints or are implied by them. imate one. The case of triangles translates into the setting Alpha-critical graphs are graphs where the removal of any of partially completed Latin squares and more generally edge increases its stability number. And every graph has the case of r-cliques translates into the setting of partially an alpha-critical subgraph with the same stability num- completed mutually orthogonal Latin squares. ber. We will also discuss a generalization of a result of Nemhauser and Trotter which guarantees that the 1s in Allan Lo an optimal solution of the edge-constraint stability num- 50 DM16 Abstracts

ber LP correspond to nodes which can be extended to a [email protected] maximum stable set.

Craig E. Larson CP10 Virginia Commonwealth University Modified Linear Programming and Class 0 Bounds [email protected] for Graph Pebbling Given a configuration of pebbles on the vertices of a con- CP10 nected graph G,apebbling move removes two pebbles from some vertex and places one pebble on an adjacent vertex. Spectral Graph Properties in Combined Routing- The pebbling number of a graph G is the smallest integer k Facility Location Problems such that for each vertex v and each configuration of k peb- bles on G, there exists a sequence of pebbling moves that The facility location problem (FLP) models the cost of places at least one pebble on v. If the pebbling number of allocating demands originated by a given customer inde- G equals the number of vertices of G,wesaythegraphis pendently of other customer demands. Its combination Class 0. In this talk, we investigate and improve on bounds with routing removes the allocation independence property, related to the minimum number of edges in a Class 0 graph leading in turn to strongly interrelated location and rout- via a discharging approach. We also discuss improvements ing decisions -facility location aggregates demands whereas to Glenn Hurlbert’s linear programming technique. multiple demand points may or not be served simultane- ously by a common path. This paper proposes to exploit Carl Yerger the conductance and expansion properties of the under- Department of Mathematics lying graph to determine when common paths are more Davidson College suited in the joint decision process. [email protected]

Dimitri Papadimitriou Daniel Cranston Bell Labs Virginia Commonwealth University [email protected] Department of Mathematics and Applied Mathematics [email protected]

CP10 Luke Postle University of Waterloo Approximate Recognition of Nonregular Lan- [email protected] guages by Finite Automata Chenxiao Xue AmeasureμL of approximation of language L by a finite Davidson College fL(n) fL(M)(n) automaton is 1 - cn in the limit where fL(n) [email protected] denotes the number of strings of length n in L and fL(M)(n) is the number of strings of length n in L(M). In this paper, we study a trade-off between the size of a DFA M and how CP11 well a language L canbeapproximatedbytheDFA.Weuse On Solution-Free Sets of Integers as case study two languages - one of which is a non-regular language and the other is a regular language. Given a linear equation L,asetA ⊆ [n]isL-free if A does not contain any ‘non-trivial’ solutions to L.Weprovea L Bala Ravikumar number of results concerning -free sets. For example, we L L Sonoma State University determine the size of the largest -free set where is the ≥ [email protected] equation px + qy = z for fixed p, q with p 2. We also give various bounds on the number of maximal L-free sets for three-variable homogeneous linear equations. Jacob Combs University of Arizona, Tucson Robert A. Hancock, Andrew Treglown [email protected] University of Birmingham, UK [email protected], [email protected]

CP10 CP11 A Minimum-Change Version of the Chung-Feller Theorem Combinatorial Approaches Stanley Depth: Where Do We Stand?

In this talk we present a new combinatorial Gray code on In light of the recent counterexample of Duval et al. to Dyck paths that provides a strengthening of the classi- Stanley’s conjecture on the relationship between the depth cal Chung-Feller theorem from 1949. We also present a of a module and its Stanley depth, it is appropriate to eval- corresponding constant-time generation algorithm, and, as uate what is known, what (if any) weakening of Stanley’s an application on the graph-theoretical side, the construc- conjecture may be salvageable, and what additional insight tion of cycle-factors in the middle levels graph and the odd into the structure of the subset lattice have we gained from graph (two intensively studied families of vertex-transitive studying this problem through interval partitions. This graphs) that consist of cycles of the same length. talk will summarize some recent results in this area.

Torsten M¨utze, Veit Wiechert, Christoph Standke MitchelT.Keller Technische Universit¨at Berlin London School of Economics and Political Science [email protected], [email protected], Department of Mathematics DM16 Abstracts 51

[email protected] nite forest of PLFT Calkin-Wilf-trees. The roots of these trees are called orphans. In this talk, we will provide a com- Stephen Young binatorial formula for the number of orphan PLFTs (with Pacific Northwest National Lab fixed determinant) and show how these trees are connected [email protected] to the original Calkin-Wilf tree. This is joint work with Sandie Han, Ariane M. Masuda, and Satyanand Singh.

CP11 Johann Thiel New York City College of Technology - CUNY On Zeros of a Polynomial in a Finite Grid: The [email protected] Alon-F¨uredi Bound

The Alon-F¨uredi Theorem gives a sharp upper bound on Satyanand Singh the number of zeros of a multivariate polynomial over an New York City College of CUNY integral domain in a finite grid in terms of the degree of [email protected] the polynomial. We give a generalization of their theorem, which provides a sharp upper bound when the degrees of Sandie Han, Ariane Masuda the polynomial in each variable are also taken into account. NYCCT of CUNY We show how this implies well-known results of DeMillo- [email protected], [email protected] Lipton, Schwartz and Zippel.

John Schmitt CP12 Middlebury College Involution Factorizations of Random Permutations Middlebury, VT Chosen from the Ewens Distribution [email protected] Given a permutation σ of [n], let Nn(σ) denote the number Anurag Bishnoi of ways to write σ as a product of two involutions of [n]. If Ghent University we endow Sn with the Ewens distribution, then the random [email protected] variables Nn are asymptotically lognormal. The proof is based upon the observation that, for most permutations Pete L. Clark σ, Nn(σ) is well approximated by Bn(σ), the product of University of Georgia the cycle lengths of σ. Asymptotic lognormality of Nn can [email protected] therefore be deduced from Erd˝os and Tur´an’s theorem that Bn is itself asymptotically lognormal.

Aditya Potukuchi Charles D. Burnette Rutgers University Department of Mathematics [email protected] Drexel University [email protected] CP11 The (u,v) Calkin Wilf Tree CP12 Plane Permutations and their Applications In this paper we consider a refinement, due to Nathanson, of the Calkin-Wilf tree. In particular, we study the prop- Plane permutations are motivated by a new way to look at erties of such trees associated with the matrices Lu = one-face fatgraphs. Surprisingly, a natural transposition 10 T and Rv = Lv ,whereu and v are nonnegative action on plane permutations allows us to study several u 1 other interesting problems. As consequences, we obtain integers. We extend several known results of the origi- several recurrences for enumerating hypermaps. We also nal Calkin-Wilf tree. In this presentation emphasis will be obtain lower bounds for sorting (signed) permutations by placed on the symmetric and skew symmetric properties in transpositions, block-interchanges and reversals in a uni- this setting. fied way. Furthermore, all these bounds can be interpreted as topological genus of certain fatgraphs associated to per- Satyanand Singh mutations. New York City College of CUNY [email protected] Ricky X. Chen Virginia Tech Sandie Han, Ariane Masuda [email protected] NYCCT of CUNY [email protected], [email protected] Christian Reidys Los Alamos National Laboratory Johann Thiel [email protected] New York City College of Technology - CUNY [email protected] Andrei Bura Virginia Tech [email protected] CP11 Orphans in Forests of Linear Fractional Transfor- mations CP12 Grids, Diamonds, and the Comb Algorithm Nathanson showed that the set of positive linear fractional transformations (PLFTs) can be partitioned into an infi- In this talk, we briefly survey tools from discrete Morse 52 DM16 Abstracts

theory useful for analyzing the independence complex of [email protected] graphs. More specifically, we develop particular matching tree algorithms applied to certain grid graphs that obey cell-counting recursions connecting back to other seemingly CP13 unrelated combinatorial sequences. On the Largest Number of Colorings of a Graph

Wesley K. Hough Let Ck(n) be the family of all connected k-chromatic graphs University of Kentucky of order n. We discuss recent results on the following prob- [email protected] lem: given a natural number x ≥ k, what is the maximum number of x-colorings among graphs in Ck(n)?

CP12 Aysel Erey, Jason Brown Dalhousie University Generalizations of ErdOs-Ko-Rado˝ Theorem to [email protected], [email protected] {0, ±1}-Vectors

We discuss two generalizations of Erd˝os-Ko-Rado theorem CP13 to vectors with coordinates from the set {0, ±1}.Inthe Short Containers in Modified Line Digraphs first case we deal with vectors that have fixed number of 1’s and -1’s, while in the second case we fix only the number A container of a graph gives a measure of the minimum of nonzero coordinates. Consider families of such vectors distance from any node to several other nodes through which additionally avoid ”small” scalar products. In sev- node disjoint paths. For a class of Uniform Modified Line eral scenarios we determine the maximum of the size of Digraphs good upper bounds on the container length is such families. Several interesting tools from extremal set determined in terms of the number of nodes and degree. theory arise while solving these problems. Small bounds on the w-wide and w-star diameters results in good applications to fault tolerant networks based on Andrey Kupavskii these graphs. Moscow Institute of Physics and Technology [email protected] Prashant D. Joshi Cadence Design Systems [email protected] Peter Frankl Renyi Institute [email protected] Frank Hsu Department of Computer and Information Science Fordham University, New York, NY 10023 [email protected] CP12 Saturation Multiplicity of Graphs Arunabha Sen Arizona Status University Given a graph F , a graph G is F -saturated if G does not Tempe, AZ 85281 contain a copy of F , but the addition of any edge to G [email protected] completes a copy of F . In this talk we explore the average number of copies of F that are completed when a single Said Hamdioui edge is added to an F -saturated graph G,whichwecall Delft University of Technology the F -saturation multiplicity of G. We will focus on the [email protected] extreme values of this parameter when F is fixed, in par- ticular the maximum value when F is a tree. This is joint Koen Bertels work with Derrick Stolee. Delft University of Technology Delft, Netherlands Paul Wenger [email protected] Rochester Institute of Technoloy [email protected] CP13 Large Induced Forests in Planar and Subcubic CP13 Graphs of Girth 4 and 5 Characterization of Unit Interval Bigraphs of Open An induced forest in a graph is an induced subgraph with and Closed Intervals no cycles. We prove lower bounds on the number of ver- tices in the largest induced forest of a subcubic graph with The class of finite intersection graphs of the open and girth at least 4 or 5 or of a planar graph with girth at least closed real intervals of unit length is a strict superclass of 5. The bounds for subcubic graphs extend a result of Alon, the well-known class of unit interval graphs. Rautenbach Mubayi and Thomas. The bounds for planar graphs im- and Szwarcfiter characterized this class of graphs. Analo- prove a result of Dross, Montassier, and Pinlou and confirm gously we show that the finite intersection bigraphs of open a case of one of their conjectures. The lower bounds are and closed intervals of unit length are a strict superclass tight for infinitely many graphs. Joint work with Chun- of the class of unit interval bigraphs. We also characterize Hung Liu. this class of bigraphs in terms of forbidden bigraphs. Thomas Kelly Ashok K. Das University of Waterloo Dept. of Pure Mathematics, University of Calcutta. India [email protected] DM16 Abstracts 53

Chun-Hung Liu graphs are also unit disk graphs. Our results lead us to Department of Mathematics propose a conjecture that the class of co-bipartite unit disk graphs is closed under bipartite complementation. [email protected] Victor Zamaraev University of Warwick CP13 Mathematics Institute When Every Minimal Separator is Complete Mul- [email protected] tipartite Aistis Atminas Complete multipartite graphs range from complete graphs The Open University, Department of Mathematics and (with every partite set a singleton) to edgeless graphs (with Statistic a unique partite set). Requiring every minimal vertex sep- [email protected] arator to be one of these extremes characterizes, respec- tively, the classical chordal graphs and the recently stud- ied unichord-free graphs. I will discuss what happens when CP14 minimal separators are just required to be complete multi- On Ordered Ramsey Numbers of Bounded-Degree partite or special cases that arise from generalizing chordal Graphs graphs and generalizing unichord-free graphs. The ordered Ramsey number of an ordered graph G is the Terry McKee minimum N such that every 2-coloring of the ordered KN Wright State University contains a monochromatic copy of G. We show that there Department of Mathematics & Statistics are 3-regular graphs on n vertices with the ordered Ramsey [email protected] numbers superlinear in n, regardless of the ordering. This solves a problem of Conlon, Fox, Lee, and Sudakov. We also prove that the above statement does not hold for 2- CP13 regular graphs. A New Proof of Seymour’s 6-Flow Theorem Martin Balko,V´ıt Jel´ınek, Pavel Valtr Tutte’s famous 5-flow conjecture asserts that every bridge- Charles University in Prague less graph has a nowhere-zero 5-flow. Seymour proved that [email protected]ff.cuni.cz, [email protected]ff.cuni.cz, every such graph has a nowhere-zero 6-flow. We give two [email protected]ff.cuni.cz new proofs of Seymour’s Theorem. Both are roughly equal to Seymour’s in terms of complexity, but they offer an al- ternative perspective which we hope will be of value. CP14 Ramsey Goodness of Bounded Degree Trees Robert Samal Charles University Given a connected graph G and a graph H with chromatic Computer Science Institute number χ(H) and size of the smallest color class in an [email protected]ff.cuni.cz optimal coloring σ(H), it is easy to show that the Ramsey number R(G, H) ≥ (|G|−1)(χ(H) − 1) + σ(H). When Matt DeVos equality occurs G is called H-good, a notion introduced Simon Fraser University by Burr and Erd˝os in 1983. In this paper, we show that [email protected] any bounded degree tree T is H-good, provided that |T |≥ Ω(|H| log4 |H|). This substantially improves an old result Edita Rollova of Erd˝os, Faudree, Rousseau, and Schelp, who proved it 4 University of West Bohemia, Pilsen when |T |≥Ω(|H| ). Faculty of Applied Sciences [email protected] Igor Balla ETH Zurich [email protected] CP13 On Forbidden Induced Subgraphs for Unit Disk Alexey Pokrovskiy Graphs Mathematics department Freie Universitat Berlin, Germany A unit disk graph is the intersection graph of disks of equal [email protected] radii in the plane. The class of unit disk graphs is heredi- tary, and therefore can be characterized in terms of mini- Benjamin Sudakov mal forbidden induced subgraphs. In spite of quite active ETH Zurich study of unit disk graphs very little is known about minimal [email protected] forbidden induced subgraphs for this class. We found only finitely many minimal non unit disk graphs in the litera- ture. In this paper we study in a systematic way forbidden CP14 induced subgraphs for the class of unit disk graphs. We OnlineRamseyTheoryforC3 develop several structural and geometrical tools, and use them to reveal infinitely many new minimal non unit disk Online Ramsey theory is a study on the online version graphs. Further we use these results to investigate struc- of Ramsey theory. Given a fixed graph H and a class C ture of co-bipartite unit disk graphs. In particular, we give of graphs, an online Ramsey game for H on C is a game structural characterization of those co-bipartite unit disk between two players Builder and Painter with the follow- graphs whose edges between parts form a C4-free bipar- ing rules: On each round, Builder draws a new edge with tite graph, and show that bipartite complements of these the constraint that the resulting graph must be in C and 54 DM16 Abstracts

Painter colors the new edge either red or blue. Builder Regular Graphs wins if Builder can force Painter to make a monochro- matic copy of H at some point of the game, and Painter We consider the Widom-Rowlinson model of two types of wins if a monochromatic copy of H can be avoided for- interacting particles on d-regular graphs. We prove a tight ever. Online Ramsey game was first investigated in 2004 by upper bound on the expected fraction of vertices occupied Grytczuk, Haluszczak, and Kierstead where they studied by a particle in a random configuration from the model. online Ramsey game on forests, k-colorable graphs, out- The bound is achieved uniquely by unions of complete erplanar graphs, and planar graphs. Recently, Petˇr´ıˇckov´a graphs on d +1 vertices, Kd+1’s. As a corollary, Kd+1 continued the study on planar graphs further by disproving also maximizes the normalized partition function of the aconjecturebyGrytczuk,Haluszczak, and Kierstead. We Widom-Rowlinson model over the class of d-regular graphs, focus on characterizing the classes where Builder wins the proving a conjecture of Galvin. online Ramsey game for C3 on F -free graphs when F -free graphs is the class of graphs not containing F as a sub- graph; we succeed the characterization except for when F Emma Cohen is one particular graph. We also prove that Builder wins Georgia Institute of Technology the online Ramsey game for C3 on K4-minor-free graphs; [email protected] this extends a result by Grytczuk, Haluszczak, and Kier- stead. Will Perkins University of Birmingham Hojin Choi, Ilkyoo Choi, Jisu Jeong, Sang-Il Oum [email protected] KAIST [email protected], [email protected], Prasad Tetali [email protected], [email protected] School of Mathematics, Georgia Institute of Technology Atlanta, Ga 30332-0160 [email protected] CP14 Bounded Colorings of Multipartite Graphs CP15 The problem of finding properly colored and rainbow Hamilton cycles in an edge-coloring of Kn was initiated The Graded Lexicographic Polytope and Two New in 1976 by Bollob´as and Erd˝os. We study its multipartite Families of Dantzig Figures analogues, giving optimal sufficient conditions for a color- ing c of the complete m-partite graph to contain a properly A Dantzig figure is a d-polytope with 2d facets that has an colored or rainbow copy of a given graph G with maximum isolated pair of vertices. We contribute two new families of degree Δ. Our bounds exhibit a surprising transition in Dantzig figures and also analyze their diameters and vol- the growth rate, showing that the problem is fundamen- d ume. The first family is the convex hull of {x ∈ Z : x  θ}, tally different in the regimes Δ  m and Δ  m. + foranyfixedintegervectorθ and  being the grevlex mono- mial order. We characterize its vertices and obtain its H- Nina Kamcev, Benny Sudakov representation using a cone lemma for general polyhedra. ETH Zurich This polytope has a unique isolated pair of vertices. The D-Math second family we analyze is the divisible knapsack poly- [email protected], [email protected] tope, whose H-representation is well-known. Jan Volec University of Warwick Akshay Gupte, Svetlana Poznanovic [email protected] Department of Mathematical Sciences Clemson University [email protected], [email protected] CP14 Diagonal Forms of Incidence Matrices Arising from Bipartite Graphs and Applications to Zero-Sum CP15 Ramsey Problems Local Polyhedrality of Integer Hulls of Strict Con- vex Sets Let G be a subgraph of Kn,n.LetN(G) be the incidence matrix with edges against isomorphic copies of G in Kn,n.I will present a general formula for a diagonal form of N(G) A strict convex set is called a costrict convex set if it is for every G, and give a new proof of Caro and Yuster’s either closed or relatively open. We will show that the in- results on zero-sum (mod 2) bipartite Ramsey numbers. teger hull(closed convex hull of integer points) of a costrict Finding diagonal forms also interests Chandler, Sin, Xiang, convex set is locally polyhedron if the integer hull is con- and Wilson, while zero-sum Ramsey problems also interest tained in it. Bialostocki, Dierker, and Alon. Umakanta Pattanayak Wing Hong Tony Wong IIT BOMBAY Kutztown University of Pennsylvania [email protected] [email protected] Vishnu Narayanan Assistant professor, Industrial Engineering and CP15 Operations On the Widom-Rowlinson Occupancy Fraction in Research, Indian Institute of Technology Bombay DM16 Abstracts 55

[email protected] [email protected]

CP15 MS1 Discrete Curvature and Abelian Groups Signature Codes for Multiple-Access Channels - Part II We discuss a discrete Bochner-type inequality on graphs, and explore its merit as a notion of curvature in discrete In this talk we give an overview of rather old and very re- spaces. An appealing feature of this version of the so-called cent results related to the performance of signature codes Γ2-calculus is that it is straightforward to compute the for the following most interesting and well-investigated ex- curvature parameter for several specific graphs of interest, amples of noiseless multiple-access channels: adder chan- particularly, abelian groups. We develop this notion by nel, M-frequency channel with and without intensity infor- deriving Buser-type inequalities, providing a tight bound mation, disjunctive (or superimposed) channel. We discuss on the Cheeger constant in terms of the spectral gap for not only results on signature codes for these channels but graphs with nonnegative curvature. their applications also, namely, adder and disjunctive chan- nels to group testing, and M-frequency channel to multi- Peter Ralli media fingerprinting. Georgia Institute of Technology [email protected] Grigory Kabatiansky Russian Academy of Sciences [email protected] CP15 Reconstructing a Finite Topological Space from Quotient-Spaces MS1 Signature Codes for Multiple-Access Channels - Given a topology defined on a finite set T with n points, Part I consider the n-1 quotient-spaces obtained by identification of one point of T with each one of the other n-1 points. In this talk we give an overview of rather old and very re- We look at the inverse problem: Given (up to homeomor- cent results related to the performance of signature codes phism) the topologies on the quotient-spaces, reconstruct for the following most interesting and well-investigated ex- the topology on T. amples of noiseless multiple-access channels: adder chan- nel, M-frequency channel with and without intensity infor- J. M S. Simoes-Pereira mation, disjunctive (or superimposed) channel. We discuss University of Coimbra, Coimbra, Portugal not only results on signature codes for these channels but [email protected] their applications also, namely, adder and disjunctive chan- nels to group testing, and M-frequency channel to multi- media fingerprinting. MS1 On Polar and Reed-Muller Codes via Independence Grigory Kabatiansky Russian Academy of Sciences This talk overviews our recent results with A. Shpilka and [email protected] A. Wigderson on RM codes, and Y. Wigderson on polar codes, for the BEC and the BSC. In particular, we discuss how the probability of sampling independent columns in MS1 the parity-check matrix can be estimated in some regimes, Decoding Reed-Muller Codes from Random Errors yielding results for both channels. Reed-Muller codes encode an m-variate polynomial of de- Emmanuel Abbe gree r by its evaluations over all points in {0, 1}m.Inthis Princeton University talk we will see an efficient algorithm for correcting ran- [email protected] dom errors in Reed-Muller codes far beyond the minimal distance, and discuss its connections with recent advances regarding decoding erasures in Reed-Muller codes. Based MS1 on a joint work with Ramprasad Saptharishi and Amir Sh- Generalized Hamming Weights of Projective Reed- pilka. Muller Codes Ben Lee Volk An important parameter of a linear error-correcting code C Technion is its minimum distance. This parameter has been gener- [email protected] alized to what is known as generalized (Hamming) weights of a code. The r-th generalized Hamming weight is the minimum support of an r-dimensional subcode of C.The MS2 first generalized weight is exactly the minimum distance. Extremal Properties of Vertex Attributes in Trees Projective Reed–Muller codes are natural extensions of the usual Reed–Muller codes. In this talk I will discuss re- For tree T and vertex v, define the eccentricity ecc(v):= cent work together with M. Datta and S.R. Ghorpade on maxu∈V (T ) d(u, v), the distance d(v):= u∈V T d(u, v) the generalized weights of these codes. In particular for ( ) ≤ and the number of subtrees F (v) containing vertex v.Each the projective Reed–Muller codes PRMq(d, m)withd q defines a “middle” of the tree consisting of the vertices we determined the r-th generalized Hamming weights for with the maximum (or minimum) value. First, we ex- r ≤ m +1. plore the interactions of ecc(v) and the total eccentricity Ecc(T ):= ecc(v) by examining extremal values Peter Beelen v∈V (T ) ecc(v) Ecc(T ) Technical University of Denmark and structures for the ratios ecc(u) and ecc(v) . Analogous 56 DM16 Abstracts

studies have been done for distance [Barefoot, Entringer, along with many questions. Sz´ekely, Discrete Appl. Math. 80 (1997), 37-56] and num- ber of subtrees [Sz´ekely, Wang, Electron. J. Combin. 20 Hua Wang (2013) 1-20]. We also compare the three different middles, Georgia Southern University, GA determining how far apart they can appear in a single tree [email protected] and characterizing many of the extremal structures.

Heather C. Smith MS2 Georgia Institute of Technology Species Tree Estimation in the Presence of Incom- 686 Cherry Street NW, Atlanta, GA 30332 plete Lineage Sorting [email protected] Species tree estimation in the presence of gene tree incon- Laszlo Szekely gruence is one of the challenges in mathematical phyloge- University of South Carolina netics. However, coalescent-based estimation methods are [email protected] impacted by gene tree estimation error, so that they can be less accurate than the traditional approach of concate- Hua Wang nation in many cases. I will also present two new methods, Georgia Southern University, GA ASTRAL (Mirarab et al., Bioinformatics 2014) and sta- [email protected] tistical binning (Mirarab et al., Science 2014, Bayzid et al., PLOS One 2015) for estimating species trees in the Shuai Yuan presence of gene tree conflict due to ILS. Statistical bin- University of South Carolina ning and weighted statistical binning are used to improve [email protected] gene tree estimation, while ASTRAL is a coalescent-based method that is provably statistically consistent and that can construct very accurate large species trees. Finally, I MS2 will present theoretical results investigating whether statis- tically consistent accurate species tree estimation is possi- Subtrees of Trees: Labeled and Unlabeled ble when gene trees have estimation error, and discuss the This talk surveys results on subtrees (in particular quar- controversy about statistical binning (Liu and Edwards, tet trees) of binary phylogenetic trees, and results on the Science 2015, Mirarab et al. Science 2015). number of subtrees (or isomorphism types of subtrees) for Tandy Warnow all subtrees and for subtrees of particular size. University of Illinois at Urbana-Champaign Laszlo Szekely Department of Computer Science University of South Carolina [email protected] [email protected] MS3 MS2 New Results on Packing Odd Trails The Number of Automorphisms of Random Trees There is no packing-covering duality for odd edge-disjoint By means of an asymptotic analysis of generating func- (u, v)-paths: a graph with no two edge-disjoint (u, v)-paths tions, we determine the limiting distribution of the order may need an arbitrarily large number of edges to cover all of the automorphism group of a random labeled tree. To such paths. In contrast, the relaxed problem of packing be precise, we show that the of the number of au- odd trails does have an approximate duality. We first show tomorphisms, suitably renormalized, converges weakly to that a graph has either k edge-disjoint odd (u, v)-trails or a standard normal distribution. This result is also further a set of at most 6k edges intersecting all such trails. Then, extended to other random tree models. we present a new, alternate proof for Eulerian graphs that yields a sharper bound. Benedikt Stufler LMU Munich Ross Churchley,BojanMohar stufl[email protected] Simon Fraser University [email protected], [email protected] Stephan Wagner Stellenbosch University, South Africa Hehui Wu [email protected] University of Mississippi [email protected]

MS2 Extremal Ratio Questions in Binary Trees MS3 Decomposing 4-Regular Random Graphs into The values of various important topological indices, when Claws considered as a local function associated with vertices of trees, tend to achieve the extrema at leaves or in the “mid- In 2006 Bar´at and Thomassen conjectured that every dle’ of a tree. To consider the extremal ratios of such values planar 4-regular 4-edge-connected graph has an edge de- turns out to be a much more difficult question than general composition into claws; shortly after, Lai constructed a extremal problems. Such problems were considered for the counterexample. Using the small subgraph conditioning distance function and number of subtrees in general trees. method of Robinson and Wormald, we show that a.a.s. a We examine the same questions on binary trees as an effort random 4-regular graph has an edge decomposition into to generalize this study. Some new results will be provided claws. If time permits, then we will explore more general DM16 Abstracts 57

star decomposition results. Bojan Mohar Simon Fraser University Michelle Delcourt [email protected] University of Illinois at Urbana-Champaign [email protected] MS4 Luke Postle The Packing/Covering Conjecture University of Waterloo [email protected] I’ll introduce the Packing/Covering Conjecture (also known as the Infinite Matroid Intersection Conjecture), which is the most important open problem in the theory MS3 of infinite matroids. I’ll explain why it is interesting and what progress has been made on solving it. Finding Immersions of Digraphs with Parity Re- strictions Nathan Bowler University of Hamburg We introduce the concept of odd immersion of a directed [email protected] graph D, which is an immersion where the length of the image of every arc in D has prescribed parity. We explore plausible settings for the problem of finding an odd immer- MS4 sion of a digraph and present results about it. The Cunningham-Geelen Method in Practice: Sebastian Gonzalez Hermosillo Branch-Decompositions and Integer Programming Simon Fraser University T Consider the integer program max(c x : Ax = b, x >=0, ) Simon Fraser University where A is non-negative and the column-matroid of A (de- [email protected] noted by M(A)) has constant branch width. Cunningham and Geelen introduce a pseudo-polynomial time algorithm Bojan Mohar for solving this integer program that takes a branch de- Simon Fraser University composition T of M(A) as input. We describe a heuristic [email protected] for finding T and report on computation results of a C++ implementation of this algorithm, where the input branch decomposition T is produced by this heuristic. MS3 Notions of Convergence for Sequences of Graphs Susan Margulies Department of Mathematics There are various notions of convergence for graph se- United States Naval Academy quences. Some involve local properties of the graph, and [email protected] some involve more global properties. Implications between these convergences give rise to implications between cer- Illya Hicks tain properties of graphs. In some cases, local properties Rice University end up implying global properties of graphs. We discuss [email protected] some recent results in this area.

Laszlo M. Lovasz MS4 MIT Excluded Minors for Matroids of Rank Three [email protected] As a means to characterize matroids, the subject of ex- cluded minors has been actively investigated. A class of MS3 matroids representable over finite fields is known to have Normal Graph Covers a finite number of excluded minors, while there are other matroids having infinitely many excluded minors. In this A graph is normal if it admits a clique cover C and a stable talk, given a class of matroids with infinitely many ex- set cover S such that each clique in C and each stable set cluded minors, we ask the question: does the number of in S have a vertex in common. The pair (C, S)isanor- excluded minors for the class become finite when we im- mal cover of the graph. We present the following extremal pose the rank of the matroids to be three? property of normal covers. For positive integers c, s,ifa graph with n vertices admits a normal cover with cliques Sonoko Moriyama of sizes at most c and stable sets of sizes at most s,then Nihon University ≥ [email protected] c + s log2(n). For infinitely many n, we also give a construction of a graph with n vertices that admits a nor- mal cover with cliques and stable sets of sizes less than Hidefumi Hiraishi 0.87 log2(n). When c or s are small, we can describe all University of Tokyo normal graphs with the largest possible number of vertices [email protected] that allow a normal cover with cliques of sizes at most c and stable sets of sizes at most s. However, such extremal graphs remain elusive even for moderately small values of MS4 c and s. A Matroid Analogue of a Theorem of Brooks for Graphs David Gajser University of Ljubljana Brooks proved that the chromatic number of a loopless con- [email protected] nected graph G is at most the maximum degree of G un- 58 DM16 Abstracts

less G is an odd cycle or a clique. This talk will present an [email protected], [email protected] analogue of this theorem for GF (q)-representable matroids when q is prime, thereby verifying a natural generalization of a conjecture of Peter Nelson. MS5 Precoloring Extension for Planar Graphs James Oxley Louisiana State University Aksenov proved that in a planar graph G with at most one [email protected] triangle, every precoloring of a 4-cycle can be extended to a 3-coloring of G. We give an exact characterization of pla- nar graphs with two triangles in that some precoloring of a MS4 4-cycle does not extend. We apply this characterization to When Matroids are Highly Connected solve the precoloring extension problem from two 4-cycles in a triangle-free planar graph in the case that the precol- A general theme in matroid structure theory is that highly ored 4-cycles are separated by many disjoint 4-cycles. As a connected matroids exhibit more structure than matroids corollary, we prove that there exists a constant D>0such with a low-order separation. We will explore several exam- that if H is a planar triangle-free graph and S ⊆ V (H) ples of this, focussing mostly on matroids that have high consists of vertices at pairwise distances at least D,then branch-width. every precoloring of S extends to a 3-coloring of H.This gives a positive answer to a conjecture of Dvoˇr´ak, Kr´al’ Stefan van Zwam and Thomas, and implies an exponential lower bound on Centrum Wiskunde & Informatica, The Netherlands the number of 3-colorings of triangle-free planar graphs of University of Waterloo, Canada bounded maximum degree. [email protected] Zdenek Dvorak Computer Science Institute MS5 Charles University, Prague [email protected]ff.cuni.cz Planar Graphs of Girth at Least Five are Square (Δ + 2)-Choosable Bernard Lidicky, Bernard Lidicky We prove a conjecture of Dvoˇr´ak, Kr´al, Nejedl´y, and Iowa State University, Ames, IA Skrekovskiˇ that planar graphs of girth at least five are [email protected], [email protected] square (Δ + 2)-colorable for large enough Δ. In fact, we prove the stronger statement that such graphs are square (Δ + 2)-choosable and even square (Δ + 2)-paintable. This MS5 is joint work with Marthe Bonamy and Luke Postle. Clique Immersion in Graph Products

Marthe Bonamy Immersion is a containment relation in graphs that is sim- LaBRI, Universit´e de Bordeaux, and CNRS ilar to the well-known minor relation, but is incomparable. [email protected] In this talk, we ask: given a graph G1 with a Kt-immersion and a graph G2 with a Kr-immersion, what is the largest ∗ ∗ Daniel Cranston clique immersion in G1 G2 (where defines a particular Virginia Commonwealth University graph product)? Jointly with Collins and Heenehan, we Department of Mathematics and Applied Mathematics have best possible results for certain products, and con- [email protected] jectures for others. All is considered in the context of an immersion-analog of Hadwiger’s Conjecture, due to Abu- Khazm and Langston, which says that when χ(G) ≥ k, G Luke Postle should contain a Kk-immersion. University of Waterloo [email protected] Jessica McDonald Department of Mathematics and Statistics Auburn University MS5 [email protected] Two-Coloring Number of Planar Graphs

Two-coloring number (also known as arrangeability) is an MS5 interesting graph parameter related to acyclic chromatic Common Vertex of Longest Cycles of Special number and game chromatic number, but also appearing Chordal Graphs in the contexts of structural and Ramsey graph theory. Kierstead and Trotter proved that two-coloring number of It is conjectured that all longest cycles in any 2-connected planar graphs is bounded by 10, and this bound was im- chordal graph have a common vertex, where a chordal proved to 9 by Kierstead et al. in 2009. We show that two- graph can be considered as the intersection graphs of a coloring number of planar graphs is bounded by 8, which collection of subtrees of a host tree. We prove the case is tight. that the host tree has at most two vertices with degree at least three. Zdenek Dvorak Computer Science Institute Hehui Wu Charles University, Prague University of Mississippi [email protected]ff.cuni.cz [email protected]

Adam Kabela, Tomas Kaiser Shaohui Wang University of West Bohemia Department of Mathematics DM16 Abstracts 59

University of Mississippi h not divisible by t + 1, we determine the function for all [email protected] values of p.Forh ≥ 2t(t +1)+1andh divisible by t +1, the function is obtained for all but small values of p.We Guantao Chen also obtain some results for smaller values of h. Department of Mathematics & Statistics Georgia State University Zhanar Berikkyzy, Ryan R. Martin [email protected] Iowa State University [email protected], [email protected]

MS6 Chelsea Peck On Graphs Decomposable into Induced Matchings Madison, Wisconsin of Linear Sizes [email protected]

A Ruzsa-Szemeredi graph is a graph on n vertices whose edge set can be partitioned into induced matchings of size MS6 cn. The study of these graphs goes back more than 35 How Unproportional Must a Graph Be? years and has connections with number theory, combina- torics, complexity theory and information theory. In this Let uk(G, p)bethemaximumoverallk-vertex graphs F of talk we will discuss the history and some recent devel- by how much the number of induced copies of F in G differs opments in this area. In particular, we show that when from its expectation in the Erd˝os-R´enyi random graph with c>1/4, there can be only constantly many matchings. the same number of vertices as G and with edge probability On the other hand, for c =1/4, the maximum number of p. This may be viewed as a measure of how close G is to be- induced matchings is logarithmic in n. Thisisjointwork ing p-quasirandom. For a positive integer n and 0

Humberto Naves MS6 Institute for Mathematics and its Applications Turan Numbers of Small Subdivisions University of Minnesota [email protected] Existence of subdivisions in a graph has been extensively studied. Here, we study the density threshold for the ex- Oleg Pikhurko istence of a subdivision with bounded size. Let H be a University of Warwick given graph and p a positive even integer at least 2. Let [email protected] ex(n, H ≤p) denote the maximum number of edges in an n-vertex graph that does not contain a subdivision of H in Alex Scott whicheachedgeofH is subdivided at most p − 1times. ≤p 1+10/p Oxford Jiang showed that ex(n, H )=O(n ). Here we [email protected] substantially improve the bound for bipartite graphs H. We show that for any bipartite graph H, ex(n, H ≤p)= O(n1+2.76/p). On the other hand, random graphs show 2 MS6 ≤p ≥ 1+1/p−2/mp+1/m p that ex(n, Km,m) Ω(n ). We also give Locally Common Graphs and Locally Sidorenko sharper bounds for some small values of p and some related Graphs results. Our method uses a combination of dependent ran- dom choice and other combinatorial arguments. This is AgraphH is common if, in any two-edge-coloring of Kn, joint work with Jie Ma. the number of monochromatic copies of H is asymptoti- cally at least the expected number in a uniform random Tao Jiang coloring. Erd˝os conjectured in 1962 that every clique is Department of Mathematics common, and Burr and Rosta in 1980 further conjectured Miami University that all graphs are common. Thomason disproved these [email protected] conjectures by showing that no Kt with t ≥ 4 is common. Sidorenko and independently Erd˝os and Simonovits conjec- tured that every bipartite graph H is common and further MS6 has the following stronger property: the minimum possible On the Edit Distance of Powers of Cycles number of copies of H in a graph on n vertices with fixed edge density p is asymptotically the expected number in The edit distance between two graphs on the same labeled the random graph G(n, p). Lov´asz began the study of the vertex set is defined to be the size of the symmetric dif- n local Sidorenko property and locally common graphs, and ference of the edge sets, divided by n/2 . The edit dis- proved that bipartite graphs have the local Sidorenko prop- tance function of a hereditary property H is a function of erty. We discuss recent work extending this result, proving p ∈ [0, 1] that measures, in the limit, the maximum normal- that a graph has the local Sidorenko property if and only if ized edit distance between a graph of density p and H.Itis it has even girth. We also discuss further progress toward also, again in the limit, the edit distance of the Erd˝os-R´enyi characterizing the locally common graphs. random graph G(n, p)fromH. In this talk, we address the t th edit distance function for Forb(H), where H = Ch,thet Fan Wei power of the cycle of length h.Forh ≥ 2t(t +1)+1and Stanford University 60 DM16 Abstracts

[email protected] NTU, Singapore [email protected]

MS7 Gregory J. Puleo The Role of Completely Regular Codes University of Illinois [email protected] Neumaier conjectured in 1992 that the only completely reg- ular code with |C| > 2 and minimum distance at least eight is the extended binary Golay code. A slightly corrected MS7 version of this conjecture remains open. In recent work Maximally Recoverable Codes - Part II with W.S. Lee, J.H. Koolen, and H. Tanaka, we classify all linear completely regular codes whose dual codes have Data storage applications require erasure-correcting codes weights 0,t,2t, . . .. This family of codes forms a beautiful with prescribed sets of dependencies between data symbols chapter in the theory of association schemes. and parity symbols (topology). A code as above is max- imally recoverable, if it corrects all erasure patterns that William J. Martin are information theoretically correctable given the depen- Department of Mathematical Sciences dency constraints. Applications furthermore need codes Worcester Polytechnic Institute over small finite fields in order to facilitate encoding and [email protected] decoding operations. In this talk we present the first super- polynomial lower bound for the field size of maximally re- coverable codes (in any topology) and survey the state of MS7 the art in code constructions. Locally Repairable Codes and Index Coding Parikshit Gopalan Given an n-vertex graph G(V ≡{1, 2,...,n},E), let Microsoft N(i) ≡{j ∈ V :(i, j) ∈ E} be the set of neighbors [email protected] of vertex i.AlsoletH(X) be the Shannon entropy of the random variable X. For identical random variables Guangda Hu Xi,i ∈ V with finite support, consider the solution of Princeton University the optimization problem: max H(X1,...,Xn) such that [email protected] H(Xi|{X(j),j ∈ N(i)})=0,foralli ∈ V . Thisisthe optimum rate of a locally repairable code over the graph Shubhangi Saraf G. On the other hand, consider the solution of the follow- Massachusetts Institute of Technology ing optimization problem: min H(Y )whereY is such that [email protected] H(Xi|Y,{X(j),j ∈ N(i)})=0,foralli ∈ V . Thisiscalled the optimum index coding rate for the graph G.Bothof these quantities have been subject to a lot of recent re- Carol Wang search in the information and coding theory communities. Carnegie Mellon University In this talk we will present several new results regarding [email protected] these two quantities, including bounds and constructions. Sergey Yekhanin Arya Mazumdar Microsoft University of Massachusetts [email protected] [email protected] MS7 MS7 Maximally Recoverable Codes - Part I DNA Profile Codes Data storage applications require erasure-correcting codes We consider the problem of storing and retrieving informa- with prescribed sets of dependencies between data symbols tion from synthetic DNA media. The mathematical basis and parity symbols (topology). A code as above is max- of the problem is the construction and design of sequences imally recoverable, if it corrects all erasure patterns that that may be discriminated based on their collection of sub- are information theoretically correctable given the depen- strings observed through a noisy channel. This problem of dency constraints. Applications furthermore need codes reconstructing sequences from traces was first investigated over small finite fields in order to facilitate encoding and in the noiseless setting under the name of “Markov type’ decoding operations. In this talk we present the first super- analysis. Here, we explain the connection between the re- polynomial lower bound for the field size of maximally re- construction problem and the problem of DNA synthesis coverable codes (in any topology) and survey the state of and sequencing, and introduce the notion of a DNA storage the art in code constructions. channel. We analyze the number of sequence equivalence classes under the channel mapping and propose new asym- Parikshit Gopalan metric coding techniques to combat the effects of synthesis Microsoft and sequencing noise. In our analysis, we make use of re- [email protected] stricted de Bruijn graphs and Ehrhart theory for rational polytopes. Guangda Hu Princeton University Olgica Milenkovic [email protected] UIUC [email protected] Shubhangi Saraf Massachusetts Institute of Technology Han Mao Kiah [email protected] DM16 Abstracts 61

Carol Wang Noah Giansiracusa Carnegie Mellon University University of Georgia [email protected] USA [email protected] Sergey Yekhanin Microsoft [email protected] MS8 Tropical Ideals

MS8 The past few years have seen a significant effort to give tropical geometry a solid algebraic foundation. In this talk Metric Graphs with Prescribed Gonality I will introduce tropical ideals, which are homogeneous ide- als over the tropical semiring in which each graded piece is We prove that in the moduli space of genus-g metric graphs ”matroidal”. I will discuss joint work with Diane Macla- the locus of graphs with gonality at most d has the classical gan studying some of their main properties, and in par- dimension min3g-3,2g+2d-5. Here, gonality is geometric ticular showing that their underlying varieties are always gonality rather than divisorial gonality, i.e., it is the min- finite polyhedral complexes. This supports the proposal imal degree of a non-degenerate harmonic map to a tree that subschemes of tropical projective space should be de- that satisfies the Riemann-Hurwitz condition everywhere. fined by tropical ideals. Our theorem follows from a careful parameter count to es- tablish the upper bound and a construction of sufficiently Felipe Rincon many graphs with gonality at most d to establish the lower University of Oslo bound. In particular, we give an elementary (combina- Norway torial) proof of the fact that for each combinatorial type [email protected] given by a trivalent graph of genus g, there is an open cone in edge-length space where the metric graph has gonality Diane Maclagan equal to (g+2)/2 rounded upwards. University of Warwick [email protected] Filip Cools K.U. Leuven fi[email protected] MS9 Monochromatic Covers and Partitions of Random Jan Draisma Graphs Eindhoven University of Technology, The Netherlands Department of Mathematics and Computer Science Suppose the edges of a graph G are colored with r colors. [email protected] How many monochromatic trees (or cycles, or paths) are needed to partition (or cover) the vertex set? When G = Kn, these types of questions have been addressed by many MS8 authors. For example, Haxell and Kohayakawa proved that A Tropical Bott-Samelson Variety from Matroids r monochromatic trees suffice to partition the vertex set of Over Valuation Rings Kn when n is sufficiently large. In this talk, we will discuss such questions when G is a random graph. Matroids over a valuation ring, in the sense of Fink and Moci, are complicated objects, by comparison with ma- Deepak Bal troids over the tropical hyperfield in the recent sense of Montclair State University Baker – while the latter contain only the data of a tropical [email protected] linear space, the former contain much more. We review ma- troids over a valuation ring, discuss their parameter space, MS9 and explain how this space can be interpreted as a flavour of tropical Bott-Samelson variety. Covering by Monochromatic Subgraphs – A Survey In 1970, Ryser conjectured that every r-edge colored com- Alex Fink plete graph can be covered with at most r − 1 monochro- Queen Mary University of London matic components. In 1989, Gy´arf´as conjectured that ev- UK ery r-edge colored can be partitioned into a.fi[email protected] at most r monochromatic paths (and later Erd˝os, Gy´arf´as, and Pyber conjectured that the same result should hold for MS8 cycles). We will survey the current status of these conjec- tures and highlight some avenues of research which have A Grassmann Algebra for Matroids developed as a result of their study.

I’ll discuss joint work with J.H. Giansiracusa in which we Louis Debiasio introduce an exterior algebra in the idempotent setting Miami University which plays the role for tropical linear spaces (and hence for [email protected] valuated matroids) that the exterior algebra does for linear spaces over a field. In the special case of the Boolean semi- field, this yields a mulitlinear-algebraic cryptomorphism for MS9 matroids. Partitioning a Graph into a Cycle and a Sparse Graph Jeffrey Giansiracusa Swansea University Lehel conjectured that any graph G can be partitioned into [email protected] cycle C1 in G and cycle C2 in the complement of G.This 62 DM16 Abstracts

was proved by Bessy and Thomass´e (after previously being [email protected] proven for large graphs byLuczak,  R¨odl, and Szemer´edi, and by Allen). We’ll discuss strengthenings of this conjec- Jared Howell ture which replace C2 by an induced subgraph of G with Memorial University of Newfoundland small maximum degree. In particular G can be partitioned Corner Brook Campus ≤ 1 | |− into a cycle C and a set A satisfying Δ(G[A]) 2 ( A 1). [email protected] Alexey Pokrovskiy ETH Zurich MS10 [email protected] Walker-Breaker Game

MS9 We consider a variation on Maker-breaker games. Walker walks along the edges of a graph, claiming them as her Monochromatic Paths in Graphs and Hypergraphs own, while Breaker in turn deletes edges. We discuss the question of how many vertices can Walker visit before she Gyarfas conjectured any r-edge coloured complete graph gets stuck. We also discuss a paper by Clements and Tran can be partitioned into r monochromatic paths, and the on creating cycles. conjecture has been confirmed for r ≤ 3. This talk is about extensions of the Gyarfas’ conjecture to hypergraphs, for Lisa Espig the two colour case. This is based on joint work with Bus- Carnegie Mellon University tamante and Han. [email protected] Maya Stein Universidad de Chile Alan Frieze [email protected] Carnegie Mellon University Department of Mathematical Sciences [email protected] MS10 The Game of Zombies and Survivors on Graphs Michael Krivelevich Tel Aviv University In the game of Zombies and Survivors, a set of zombies at- [email protected] tempts to eat a lone survivor loose on a given graph. The zombies randomly choose their initial location, and always Wesley Pegden move directly toward the survivor via randomly chosen Courant Institute geodesics. We provide an update on the zombie number [email protected] of a graph for families such as toroidal graphs, as well as new results on the introduction of deterministic cops (or necromancers) in the game. MS11 Anthony Bonato The Erd˝os-Hajnal Conjecture and Structural The- Ryerson University ory of H-Free Graphs [email protected] The celebrated Erd˝os-Hajnal conjecture formulated in 1989 states that for every undirected graph H there exists MS10 (H) > 0 such that every H-free n-vertex graph contains (H) CopsandRobberwithDecoys either a clique or a stable set of order at least n .Inits equivalent directed version undirected graphs are replaced We introduce a variation in which the robber side con- by tournaments and cliques/stable sets by transitive sub- sists of a robber and a decoy which are indistinguishable tournaments. Even though the conjecture is still open, very to the cops except under certain conditions. The robber recently several new techniques were proposed to prove can throw the decoy to a neighbouring vertex on any move many difficult special cases of the conjecture. In partic- beyond his first. The decoy disappears after the cops’ next ular, the conjecture was proven to be true for infinitely move. We characterize decoy copwin graphs if the cop can many prime tournaments. Furthermore, the weaker ver- distinguish between the robber and decoy only when on sion of the conjecture, where one excludes both H and the the same vertex as one of them. complement of H, was proven to be true for all trees on at most six vertices. In this talk I will summarize these results Nancy E. Clarke as well as explain some of the aforementioned techniques. Acadia University Finally, I will explain how the conjecture and techniques [email protected] developed to prove the conjecture can be applied in other fields of computer science such as machine learning.

MS10 Krzysztof M. Choromanski Watching Block Intersection Graphs Google Research New York [email protected] The watchman’s walk on a graph G is a minimum closed dominating walk on G. We give bounds on the length of a watchman’s walk on the block intersection graphs of MS11 Steiner triple systems, and show that the minimum bound Title Not Available is attainable for all orders of STS(v). Abstract not available Danny Dyer Memorial University of Newfoundland Vladimir Nikiforov DM16 Abstracts 63

Department of Mathematical Sciences, University of [email protected] Memphis Memphis, TN 38152-3240 , United States [email protected] MS12 Biclustered Matrix Completion

MS11 We consider the problem of performing matrix comple- tion with side information on row-by-row similarities and The Clique Number and the Smallest Q-Eigenvalue column-by-column similarities. We build upon recent pro- of Graphs posals for matrix estimation with smoothness constraints with respect to row and column graphs. In this talk, we Let qmin(G) stand for the smallest eigenvalue of the signless address the unaddressed issue in model selection in these Laplacian of a graph G of order n. This talk presents some approaches, namely how to choose an appropriate amount results on the following extremal problem: How large can row and column smoothing. We also discuss how to exploit qmin (G) be if G is a graph of order n, with no complete the sparsity structure of the problem to scale up the esti- subgraph of order r + 1? It is shown that this problem is mation and model selection procedure. We present simu- related to the well-known topic of making graphs bipartite. lation results and an application to predicting associations Using known classical results, several bounds on qmin are in high-dimensional imaging-genomics studies. obtained, thus extending previous work of Brandt for reg- ular graphs. This is joint work with Leonardo de Lima and Eric Chi Carla Oliveira. Department of Statistics North Carolina State University Vladimir Nikiforov eric [email protected] Department of Mathematical Sciences, University of Memphis Memphis, TN 38152-3240 , United States MS12 [email protected] On the Origin of Locality in Algorithms for Graph Analysis on Massive Graphs Leonardo De Lima Federal Center of Technological Education Abstract not available Rio de Janeiro, Brazil [email protected] David F. Gleich Purdue University [email protected] Carla Oliveira Mathematics Department, National School of Statistics Rio de Janeiro, Brazil MS12 [email protected] Sampling Paths in Graphs: A Simple Technique for Not So Simple Problems

MS11 Consider the following important graph analysis problems: (i) given a graph G, estimate the number of triangles in Improperly Coloring Kt+1 Minor-Free Graphs G. (ii) Estimate the frequency of small subgraphs (espe- cially cliques) in G. Seemingly unrelated, consider these We show that every t ≥ 0thereexistsct such that, if a other problems. (i) Given a set of high-dimensional points, graph G has no Kt minor, then its vertex set can be +1 rapidly answer nearest neighbor queries (ii) Given two ma- partitioned into at most t parts such that every part in- trices, determine the largest entries in their product. Sur- duces a subgraph with maximum component of size ≤ ct. prisingly, a fairly simple technique provides algorithms for This relaxation of Hadwiger’s conjecture improves previous all these problems. That technique is path sampling, where results of Kawarabayashi and Mohar, Wood, and Liu and we set up data structures to, well, sample paths in graphs. Oum, who proved that the conclusion holds for partitions This method leads to provable algorithms that have excel- into 31(t +1)/2, 7t/2 − 1/2 and 3t parts, respectively lent practical performance. This talk will give a survey of this method and its connection to numerous data analysis Sergey Norin problems. McGill University [email protected] C. Seshadhri Univ. California Santa Cruz Zdenek Dvorak [email protected] Computer Science Institute Charles University, Prague [email protected]ff.cuni.cz MS12 Accurate Inferences Beyond the Empirical Distri- bution MS11 We consider the problem of making accurate inferences Turan Number of Hypergraphs via Lagrangians about a complex distribution, in the regime in which the amount of data (i.e the sample size) is too small for the Abstract not available empirical distribution of the samples to be an accurate rep- resentation of the underlying distribution. Our first result Yuejian Peng is that given n samples drawn from an arbitrary distribu- Hunan University tion over a discrete support, one can accurately recover 64 DM16 Abstracts

the unlabelled vector of probabilities of all domain ele- [email protected] ments whose true probability is greater than 1/(n log n). Stated differently, one can learn–up to relabelling–the por- tion of the distribution consisting of elements with proba- MS13 bility greater than 1/(n log n). This result has several curi- Pseudometrically Constrained Centroidal Voronoi ous implications, including leading to an optimal algorithm Tessellations and its Application to Acquisition De- for ”de-noising” the empirical distribution of the samples, sign in MRI and implying that one can accurately estimate the number of new domain elements that would be seen given a new This talk will outline a new centroidal Voronoi tessellation larger sample, of size up to n* log n. (Extrapolation be- that can be used to generate highly uniform and antipo- yond this sample size is provable information theoretically dally symmetric point set on the unit sphere and to show its impossible, without additional assumptions on the distri- application in acquisition design for MRI. This methodol- bution.) While these results are applicable generally, we ogy includes a novel pseudometric and a new strategy for highlight an adaptation of this general approach to some tessellating the sphere. The time complexity of the pro- problems in genomics (e.g. quantifying the number of un- posed tessellations is effectively linear, i.e., on the order of observed protein coding variants), and discuss some future the number of generators (or points on the unit sphere). directions. This talk is based on two joint works, one with Paul Valiant, and one with Paul Valiant and James Zou. Cheng G. Koay National Intrepid Center of Excellence Neuroimaging Gregory Valiant Research Stanford [email protected] [email protected]

MS13 MS12 An Algorithm for Computing CVTs for Any Can- tor Distribution A Story of Principal Component Analysis in the Distributed Model Abstract not available

We consider an illustrative problem in distributed machine Mrinal K. Roychowdhury learning - computing a low rank approximation in the arbi- University of Texas Rio Grande Valley trary partition model. In this model each of s servers holds [email protected] annxdmatrixAi, where each entry is an O(lognd)-bit word, and we let A = A1 + ... + As. We would like each server to output the same k x d matrix V, so that V is MS13 an approximation to the top k principal components of Fast Methods for Computing Centroidal Voronoi A, in the sense that projecting onto V provides a (1 + )- Tessellations approximate low rank approximation. We give the first communication optimal protocol for this problem, namely A Centroidal Voronoi tessellation (CVT) is a Voronoi tes- a protocol with communication O(skd)+poly(sk/)words, sellation in which the generators are the centroids for each improving upon several previous works, and show how to Voronoi region. CVTs have many applications to computer implement the protocol in input sparsity time up to low graphics, image processing, data compression, mesh gener- order terms. Importantly our results do not make any con- ation, and optimal quantization. Lloyds method, the most dition number assumptions, yet still achieve the desired bit widely method used to generate CVTs, converges very complexity. Based on work with Christos Boutsidis and slowly for larger scale problems. Recently quasi-Newton Peilin Zhong. methods using the Hessian of the associated energy as a preconditioner are developed to speed up the rate of con- David Woodruff vergence. In this work a graph Laplacian preconditioner IBM Almaden Research Center, USA and a two-grid method are used to speed up quasi-Newton [email protected] schemes. The proposed graph Laplacian is always sym- metric, positive definite and easy to assemble, while the Hessian, in general, may not be positive definite nor easy MS13 to assemble. The two-grid method, in which an optimiza- tion method using a relaxed stopping criteria is applied on Quantization for Uniform Distributions on Equilat- a coarse grid, and then the coarse grid is refined to gen- eral Triangles erate a better initial guess in the fine grid, will further speed up the convergence and lower the energy. Numerical We approximate the uniform measure on an equilateral tests show that our preconditioned two-grid optimization triangle by a measure supported on n points. We find the methods converges fast and has nearly linear complexity. optimal sets of points (n-means) and corresponding ap- proximation (quantization) error for n ≤ 4, give numerical Huayi Wei optimization results for n ≤ 21, and a bound on the quan- Xiangtan University tization error for n →∞. [email protected]

Carl Dettmann James C. Hatele University of Bristol Irvine, CA, USA [email protected] [email protected]

Mrinal K. Roychowdhury Long Chen University of Texas Rio Grande Valley University of California at Irvine DM16 Abstracts 65

[email protected] [email protected]

MS13 MS14 Computing Linear Systems on Metric Graphs Application of Centroidal Voronoi Tessellation in Continuous Optimization A linear system |D| of a divisor D on metric graphs is a set of effective divisors. It has the structure of a cell complex. Abstract not available We introduce the anchor divisors in it - they serve as the landmarks for us to compute the f-vector of the complex Zijun Wu and find all cells in the complex. A linear system can also Beijing Institute for Scientific and Engineering Computing be identified as a tropical convex hull of rational functions. [email protected] We compute the extremal generators of the tropical convex hull using the landmarks. We apply these methods to some examples - namely the canonical linear systems on K4 and MS14 K3,3. Stochastic Mean Payoff Games are Tropical Bo Lin Semidefinite Programs UC Berkeley USA Semidefinite programming consists in minimizing a linear [email protected] form over a spectrahedron, i.e., over a set defined by a lin- ear matrix inequality. Such optimization problems make sense over any real closed field, and in particular, over the MS14 field of Puiseux series with real coefficients. This leads to The Membership Problem for Tropical Secant Va- the notion of tropical spectrahedron, defined as the image rieties by the nonarchimedean valuation (leading exponent) of a spectrahedron over the field of Puiseux series. We pro- Let V be a tropical variety; the kth secant set of V is the vide a combinatorial characterization of a class of tropical set of tropical sums of k-tuples of elements in V. Secant spectrahedra arising as images of nonarchimedean spectra- sets of different tropical varieties are known under differ- hedra given by generic matrices that have a Metzler-type ent names and find their applications in different contexts sign pattern. Moreover, we show that solving the tropical of mathematics. For instance, the Barvinok rank arises semidefinite feasibility problems associated to this class is from computer science and corresponds to the case when equivalent to solving stochastic mean payoff games with V is the set of rank-one matrices. When V is the set of perfect information, a well known unsettled problem in al- tree metrics, we get a concept useful in phylogenetics and gorithmic game theory, belonging to NP ∩ coNP but not known as a mixture of trees. I am going to describe briefly known to be polynomial. some applications in which membership problems for trop- ical secant sets are important. I will present my results Xavier Allamigeon on the computational complexity of these problems, and I INRIA and CMAP, Ecole Polytechnique, CNRS will present counterexamples to several conjectures on this [email protected] topic. Yaroslav Shitov Stephane Gaubert Moscow State University INRIA and CMAP, Ecole Polytechnique Russia [email protected] [email protected] Mateusz Skomra INRIA Saclay / Ecole Polytechnique MS15 [email protected] Towards an Excluded-Minor Characterization of the Hydra-5 Matroids

MS14 This talk will give an overview of excluded-minor charac- Tropical Polynomial System Solving via Combina- terizations of classes of representable matroids, and outline torial Homotopy Continuation the progress made towards an excluded-minor characteri- zation of the class of Hydra-5 matroids.

We report on progress on solving systems of n topical poly- Ben Clark nomials in n unknowns. Our method uses homotopy con- Louisiana State University tinuation, meaning that solutions are tracked as the coef- [email protected] ficients of the system vary generically. Careful attention to the coefficients gives an algorithm which is memoryless and exact, while it at the same time has complexity bounds MS15 similar to those of a recent algorithm by Malajovich. As Templates for Minor-Closed Classes of Binary Ma- in the numerical algebraic geometry case, all isolated trop- troids ical solutions are obtained. Finally we explain why quick generation of circuits of point configurations is important Matroids conforming to a frame template are obtained by for the practical performance of the algorithm. altering a graphic matroid in a certain way. We introduce a partial order on binary frame templates and a list of min- Anders Jensen imal nontrivial templates in this partial order. An appli- TU-Kaiserslautern cation of this result is that all sufficiently highly connected Germany 1-flowing matroids are either graphic or cographic. Other 66 DM16 Abstracts

applications can be made to growth rates of minor-closed Factorization for FPGAs classes of binary matroids. A hardware and power efficient sparse matrix operation Kevin M. Grace design system is presented for QR factorization for FPGA Louisiana State University systems. Sparse matrices appear in many applications such [email protected] as digital signal processing, digital image processing, power system analysis, and finite element systems. In this paper, Stefan van Zwam a new memory storage system and resource reuse method- Centrum Wiskunde & Informatica, The Netherlands ology are proposed to minimize hardware area and scale University of Waterloo, Canada down system memory. System verification of the design is [email protected] done using MATLAB and C++. The design system can perform any size QR factorization and verification.

MS15 Semih Aslan Bounding the Beta Invariants of 3-Connected Ma- Texas State University troids [email protected]

The beta invariant of a matroid M, denoted by β(M), is − r(M) − |A| MS16 defined as β(M)=( 1) A⊆E(M)( 1) r(A). Crapo showed that M is connected if and only if β(M) > 0. Oxley Connections Between Power Domination and Zero determined all matroids with beta invariants at most four. Forcing We study the bounds of the beta invariants for 3-connected matroids. We also study the binary matroids with small Zero forcing is a process on a graph that starts with a 2- beta invariants. coloring of its vertices, traditionally black and white. Zero forcing continues as long as it is possible to change the color Sooyeon Lee of a vertex by the application of the following rule: every Mississippi State University black vertex with exactly one white neighbor changes the [email protected] color of its white neighbor to black. If at the end of the process all vertices are black, the initial set of black ver- Haidong Wu tices is called a zero forcing set. The zero forcing problem University of Mississippi consists of finding zero forcing sets of minimum cardinal- [email protected] ity. Power domination is a graph process in which initially a set of vertices observe its closed neighborhood. The pro- cess continues as long as the following rule can be applied: MS15 an observed vertex with exactly one un-observed neighbor Unavoidable Minors for Disjoint Bases in a Matroid observes the un-observed vertex. If at the end of this pro- cess all vertices are observed, the initial set of vertices is I will discuss a Ramsey theorem that gives one of two un- a power dominating set. The power domination problem avoidable minors in a matroid with two disjoint bases, and consists of finding power dominating sets of minimum car- the links that this result has to matroid structure theory. dinality. In this talk we will show the relation between This is joint work with Jim Geelen. these two processes and its contribution to the advance- ment of research in both problems. Some results are joint Peter Nelson work with several co-authors. University of Waterloo Canada Daniela Ferrero [email protected] Texas State University at San Marcos [email protected]

MS15 Enumerating Matroids of Fixed Rank MS16 A Minimum Rank Interpretation for Power Domi- We give lower and upper bounds on the number of matroids nation of fixed rank. The upper bound relies heavily on the theory of matroid erections, developed by Crapo and Knuth, to Using Kirchoff’s Law, it is possible to accurately moni- encode each matroid as a stack of paving matroids. Our tor an entire power network while only directly monitoring bound is obtained by relating this stack to an antichain the current and voltage at selected locations. Ideally, one that completely determines the matroid. Along the way, would like to be able to reliably observe the entire network we obtain that the essential flats of a matroid give a concise using as few Phasor Measurement Units (PMUs) as possi- description of matroids. ble. Power domination is a combinatorial interpretation of the PMU placement problem. Given a graph G =(V,E), Jorn van Der Pol and a set S ⊂ V , the power domination process loosely TU Eindhoven worksasfollows. S and N(S) can be “observed’. There [email protected] after, any vertex u becomes observed if it has an observed neighbor v with N(v)−u all observed. The power domina- Rudi Pendavingh tion number, γP (G), is the size of the minimum set S which Technische Universiteit Eindhoven allows all vertices of G to eventually be observed. Recent [email protected] work on the minimum rank problem on graphs in linear al- gebra has introduced a similar iterative process known as zero-forcing. The main application of the zero-forcing pro- MS16 cess is to generate bounds on many variations of the mini- Fast and Efficient High Order Sparse Matrix QR mum rank problem. In this work, an analogous rank mini- DM16 Abstracts 67

2 mization problem is presented which provides a bounds on edges contains at least 2n /9 edges that occur in C2k+1. power domination. Given a graph G, we describe a family We disprove√ this conjecture for k = 2 by showing a graph 2 of matrices, P(G)wheremaxP ∈P(G) dim ker P ≤ γP (G). with (2 + 2)n /16 edges in pentagons. We prove that Examples and applications are also provided. asymptotically this is the best possible constant in this case. For the remaining case of k ≥ 3, we prove that Daniela Ferrero asymptotically the conjecture is true. The main tool used Texas State University at San Marcos in the proofs is the flag algebra method applied in a specific [email protected] two-colored setting.

Leslie Hogben Ping Hu Iowa State University, University of Illinois at Urbana-Champaign American Institute of Mathematics [email protected] [email protected] Jan Volec Franklin Kenter University of Warwick Rice University [email protected] [email protected] Andrzej Grzesik Michael Young Jagiellonian University Iowa State University [email protected] [email protected] MS17 MS16 Graph Limits - Finite Forcibility and Computabil- Searching for a 3-Separation Formula: Where to ity Begin? Agraphonisananalyticrepresentationofaconvergent A 2-separation of a graph G is a pair of edge-disjoint sub- sequence of dense graphs. Finitely forcible graphons, i.e. graphs (G1,G2) such that |V (G1) ∩ V (G2)| =2andwhose graphons that are defined uniquely by a finite number of union is G. In 2008 van der Holst gave a formula for density constraints, are important because of their close the maximum nullity/minimum rank of a graph with a 2- connection to extremal graph theory. We will present a separation. A graph with a vertex of degree 3 has a simple unified framework for constructing finitely forcible graph 3-separation. We will discuss the conditions under which a limits that have a complex structure. Our framework in- formula for the max nullity/min rank exists in this special cludes several earlier constructions of such graphons using case of a 3-separation. more specific methods.

John Sinkovic Jacob Cooper, Daniel Kral, Taisa Martins Department of Combinatorics and Optimization University of Warwick University of Waterloo [email protected], [email protected], [email protected] [email protected]

MS16 MS17 On the Northeast Property of Signed Graphs with Are Short Cycles Fractalizers? Loops AgraphG is a fractalizer if every graph maximizing the A signed graph (G, Σ) satisfies the Northeast Property if number of induced copies of G is a balanced iterated blow- for each real symmetric matrix A on (G, Σ), with p positive up of G itself. Fox, Huang and Lee have shown that almost eigenvalues, q negative eigenvalues, and p + q

with a large set of tight configurations. sequences if at each position their letters are equal or adja- cent. We consider a variation of the problem where edges Roman Glebov in the power graphs are removed between sequences which Hebrew University of Jerusalem differ in more than a fraction δ of coordinates. The pro- [email protected] posed generalization can be interpreted as the problem of determining the highest rate of zero undetected-error Andrzej Grzesik communication over a link with adversarial noise, where Jagiellonian University only a fraction δ of symbols can be perturbed and only [email protected] some substitutions are allowed. We derive lower bounds on achievable rates with a graph-theoretic generalization Ping Hu of the Gilbert-Varshamov bound. We relate optimal rates University of Illinois at Urbana-Champaign for different graphs using graph homomorphisms. [email protected] Daniel Cullina UIUC Jan Volec [email protected] University of Warwick [email protected] MS18 MS17 Estimating the Capacity of the 2-D Hard Square Some Progress on the Diamond Problem Constraint Using Generalized Belief Propagation - Part II For two posets P =(P, ≤)andP  =(P , ≤), we say P   × is a subposet of P if there exists an injection f : P → P Abinarym n array is said to satisfy the hard square that preserves the partial ordering, meaning that whenever constraint if no row or column of the array contains ones u ≤ v,wehavef(u) ≤ f(v)inP . For a poset P , define in consecutive positions. Let N(m, n)denotethenumber La(n, P ) to be the size of the largest P -free family (i.e. no of such arrays. The capacity of the hard square constraint →∞ 1 member of the family contains P as a subposet) of subsets is the limit, as m, n ,ofthequantity mn log N(m, n). of [n]. Define π(P ) to be the following limit: Determining this capacity exactly is a long-standing open problem; its numerical value is known up to ten decimal La(n, P ) places. Sabato and Molkaraie (2012) empirically demon- π(P ) := lim   . n→∞ n strated that the capacity of the hard square constraint can n/2 be approximated extremely well using the generalized be- lief propagation (GBP) algorithm. They did not, however, The diamond, denoted by D ,isaposetoffourelements 2 give an analytical explanation for their observations. In a,b,c,d such that a

MS18 MS18 Inclusion Matrices and the MDS Conjecture Estimating the Capacity of the 2-D Hard Square k An arc is an ordered family of vectors in Fq in which every Constraint Using Generalized Belief Propagation - subfamily of size k is a basis. The MDS conjecture (Segre, Part I k 1955) states that if k ≤ q,thenanarcinFq has size at most × q + 1, unless q is even and k =3ork = q − 1, in which Abinarym n array is said to satisfy the hard square case it has size at most q + 2. Using inclusion matrices, constraint if no row or column of the array contains ones we propose a conjecture which would imply that the MDS in consecutive positions. Let N(m, n)denotethenumber conjecture is true for almost all values of k when q is odd. of such arrays. The capacity of the hard square constraint →∞ 1 is the limit, as m, n ,ofthequantity mn log N(m, n). Ameera Chowdhury Determining this capacity exactly is a long-standing open Carnegie-Mellon University problem; its numerical value is known up to ten decimal [email protected] places. Sabato and Molkaraie (2012) empirically demon- strated that the capacity of the hard square constraint can be approximated extremely well using the generalized be- MS18 lief propagation (GBP) algorithm. They did not, however, Rate-Distance Tradeoff for Codes Above Graph give an analytical explanation for their observations. In Capacity this talk, we outline an approach for analyzing GBP with a view to giving guarantees for the accuracy of the GBP es- The capacity of a graph is defined as the rate of expo- timate of the capacity of the hard square constraint. More nential growth of independent sets in the strong powers generally, our approach provides a means of analyzing the of the graph. In the strong power an edge connects two performance of GBP in estimating the partition function DM16 Abstracts 69

of any Ising model on the 2-D lattice. This is joint work gists as polynomial equalities relating the probabilities of with Eric Chan, Sidharth Jaggi and Pascal Vontobel at the the different outcomes of an evolutionary process. This Chinese University of Hong Kong. led to many beautiful and interesting links between alge- braic geometry, statistics, and discrete optimization prob- Navin Kashyap lems for phylogenetic inference. We analyze methods for Indian Instutute of Science phylogenomic inference-the inference of a phylogeny using [email protected] data from multiple loci in a collection of genomes-by em- phasizing the role of algebraic inequalities between gene probabilities instead of equalities. We also discuss current MS18 obstacles to the use of invariant-based approaches on real Uncertainty Principle and Stronger Hypercontrac- and simulated phylogenomic data. tivity on the Hypercube Ruth Davidson We show a sharp form of uncertainty principle for the hy- University of Illinois Urbana Champaign − percube. Namely, if there is a function with (1 1)fraction [email protected] of its energy contained in a Hamming ball of relative radius ρ1 and (1 − 2) fraction of its Fourier transform’s energy contained in a ball of radius ρ2,then MS19 2 2 Strings, Trees, and RNA Folding (1 − 2ρ1) +(1− 2ρ2) < 1+o(1) Under a suitable abstraction, complex biological problems as n →∞regardless of 1,2 > 0. In fact, the same holds true if one of the balls is replaced with any subset can reveal surprising mathematical structure. Modeling of equal cardinality. Conversely, when this inequality does RNA folding by plane trees, we prove combinatorial the- not hold, there are functions satisfying (ρ ,ρ ) conditions orems yielding insight into the structure and function of 1 2 large RNA molecules. We also obtain new insights into with arbitrary small 1,2 and n →∞.Thekeystepof our proof relies on sharpening the standard hypercontrac- the meander enumeration problem, building on results for tive inequality on the hypercube. It is noticed that the plane trees and noncrossing partitions motivated by the bi- latter is only tight for functions close to a constant and ology of RNA folding. These results illustrate the fruitful thus could be sharpened for functions with small support. interaction between discrete mathematics and molecular Sharpening is made possible by leveraging the strengthen- biology. ing of the Gross’s log-Sobolev inequality by Samorodnit- Christine Heitsch sky’2008 (arXiv:0807.1679). School of Mathematics Yuri Polyanskiy Georgia Tech MIT [email protected] [email protected] MS19 Alex Samorodnitsky The Hebrew University of Jerusalem Branching Polytopes for Parametric Analysis of The Institute of Computer Science RNA Secondary Structure Prediction [email protected] To perform the necessary function, the RNA nucleotide chain must fold into a specific three-dimensional func- MS19 tional shape. The energy function in the Nearest Neigh- bor Thermodynamic Model, the prevalent model for RNA Analysis of Breast Cancer Genome Data Using Dis- secondary structure prediction, depends on hundreds of crete Computational Topology parameters. Three of these are used to score multi- Cancer genomes are characterized by their genomic insta- branch loops, which are often incorrectly predicted by the bility and the presence of chromosome aberrations (i.e. model. We construct branching polytopes for RNA se- morphological alterations of the genome). In our previ- quences which via their normal fan allow for a full para- metric analysis of the branching part of the model and give ous work we have shown that the β0 number can be used to identify copy number chromosome aberrations, such as insights into the robustness of the secondary structure pre- amplifications and deletions, associated with the different diction. molecular subtypes of breast cancer. In this work I will dis- Svetlana Poznanovikj cuss the applications and interpretation of β1 in the iden- tification of copy number changes in breast cancer with Mathematical Sciences emphasis in aberrations found in the Her2 amplified sub- Clemson University type. [email protected]

Javier Arsuaga Department of Mathematics and Molecular and Cellular MS19 Biolog Convexity in Tree Spaces University of California, Davis [email protected] We study the geometry of metrics and convexity structures on the space of phylogenetic trees, here realized as the trop- ical linear space of all ultrametrics. The CAT(0)-metric of MS19 Billera-Holmes-Vogtman arises from the theory of orthant Using Inequality-Based Gene Tree Invariants in spaces. While its geodesics can be computed by the Owen- Phylogenomic Inference Provan algorithm, geodesic triangles are complicated and can have arbitrarily high dimension. Tropical convexity Phylogenetic invariants were introduced in 1987 by biolo- and the tropical metric are better behaved, as they exhibit 70 DM16 Abstracts

properties that are desirable for geometric statistics. the complexity of deciding the existence of a sequence of flips between two given satisfying assignments using Schae- Bo Lin fer’s framework for classification of Boolean formulas. We UC Berkeley build on it to provide a trichotomy for the complexity of USA finding the shortest sequence of flips and show that it is [email protected] either in P, NP-complete, or PSPACE-complete. Our re- sult adds to the growing set of complexity results known Bernd Sturmfels for shortest reconfiguration sequence problems by provid- University of California, Berkeley ing an example where the shortest sequence can be found [email protected] in polynomial time even though the sequence flips vari- ables that have the same value in both s and t.Thisis Xiaoxian Tang in contrast to most reconfiguration problems studied so University of Bremenn far, where polynomial-time algorithms for computing the realrootclassfi[email protected] shortest path were known only for cases where the path modified no more than the symmetric difference of s and Ruriko Yoshida t. Our proof uses Birkhoff’s representation theorem on a Statistics set system that we show to be a distributive lattice. The University of Kentucky technique provides insights and can perhaps be used for [email protected] other reconfiguration problems as well.

Amer Mouawad MS20 University of Bergen, Norway Kempe Equivalence of Colourings of Graphs [email protected]

Let G be a graph with colouring α.Leta and b be two Naomi Nishimura, Vinayak Pathak colours. Then a connected component of the subgraph in- University of Waterloo duced by those vertices coloured either a or b is known as a [email protected], [email protected] Kempe chain. A colouring of G obtained from α by swap- ping the colours on the vertices of a Kempe chain is said to have been obtained by a Kempe change. Two colourings Venkatesh Raman Institute of Mathematical Sciences, Chennai of G are Kempe equivalent if one can be obtained from the [email protected] other by a sequence of Kempe changes. In this talk, I will survey some of the existing results, cover common proof techniques and mention some open problems in this area. MS20 Carl Feghali School of Engineering and Computing Sciences Reconfiguring Graph Homomorphisms and Colour- Durham University, UK ings [email protected] The starting point for this talk is the following question: MS20 given two proper k-colourings of a graph G, is it possi- ble to transform one colouring into the other by changing Invitation to Combinatorial Reconfiguration the colour of one vertex at a time so that every interme- Reconfiguration problems arise when we wish to find a diate colouring is proper k-colouring? The computational step-by-step transformation between two feasible solutions complexity for this problem exhibits a rather surprising di- ≤ of a combinatorial problem such that all intermediate re- chotomy: it is polynomial if k 3 and PSPACE-complete ≥ sults are also feasible. They are PSPACE-complete for if k 4. We consider the analogous problem for graph most NP-complete underlying problems, and in P for homomorphisms, which generalize graph colourings. Here, several polynomial-time solvable underlying problems, al- the complexity is only known for some restricted families though there are exceptions to both general patterns. In of ‘target graphs’ H including (1) C4-free graphs, (2) ‘cir- this talk, I will give a broad introduction and invite you to cular cliques’ and (3) odd wheels. We discuss some of the this exciting new topic. ideas behind the proofs of these results and propose several avenues for future research. Takehiro Ito Graduate School of Information Sciences Richard Brewster Tohoku University, Japan Department of Mathematics and Statistics [email protected] Thompson Rivers University [email protected] MS20 Sean Mcguinness Shortest Reconfiguration Paths in the Solution Thompson Rivers University Space of Boolean Formulas [email protected] Given a Boolean formula and a satisfying assignment, a flip is an operation that changes the value of a variable in Benjamin Moore the assignment so that the resulting assignment remains Simon Fraser University satisfying. We study the problem of computing the short- [email protected] est sequence of flips (if one exists) that transforms a given satisfying assignment s to another satisfying assignment t Jonathan A. Noel of an input Boolean formula. Earlier work characterized University of Oxford DM16 Abstracts 71

[email protected] decomposition if the copies of F in G can be non-negatively weighted so that every edge in G iscontainedincopiesofF with total weight 1. We will show that if G has a large min- MS20 imum codegree then it has a fractional F -decomposition, Kempe Reconfiguration and Potts Antiferromag- and discuss improvements to these techniques. This is joint nets work with Barber, K¨uhn, Lo and Osthus.

The Potts model plays an important role in Statistical Me- Richard Montgomery chanics: it is very simple to formulate, but highly nontriv- University of Cambridge ial. Many unusual features occur in its antiferromagnetic [email protected] regime; in particular, the existence of critical points at zero temperature. Monte Carlo Markov chains have been Ben Barber very often used to study the properties of this model. The University of Bristol Wang–Swendsen–Koteck´y (WSK) cluster algorithm is the [email protected] most popular to simulate Potts antiferromagnets. More- over, at zero temperature, this algorithm is equivalent to Kempe reconfiguration. We shall review whether the zero- Daniela Kuhn, Deryk Osthus, Allan Lo temperature WSK algorithm is irreducible or not on sev- University of Birmingham eral regular graphs embedded on a torus. Non-bipartite [email protected], [email protected], graphs are the most challenging ones: in some physically [email protected] important cases, the algorithm fails to be irreducible.

Jesus Salas MS21 Escuela Politecnica Superior − Exact Minimum Codegree Threshold for K - Universidad Carlos III de Madrid, Spain 4 Factors [email protected] Given hypergraphs F and H,anF -factor in H is a set of vertex-disjoint copies of F which cover all the vertices MS21 − Perfect Matchings in Hypergraphs in H.LetK4 denote the 3-uniform hypergraph with 4 vertices and 3 edges. We show that for sufficiently large The problem of determining the minimum d-degree thresh- n ∈ 4N, every 3-uniform hypergraph H on n vertices with − − old for finding a perfect matching in k-uniform hypergraphs minimum codegree at least n/2 1containsaK4 -factor. has attracted much attention in the last decade. It is also This bound is sharp and our result resolves a conjecture of closely related to the Erd˝os Matching Conjecture. We will Lo and Markstr¨om. introduce the problem, survey the existing results, and mention some recent progress. Andrew Treglown University of Birmingham, UK Jie Han [email protected] Universidade de Sao Paulo [email protected] Jie Han Universidade de Sao Paulo [email protected] MS21 Turan Problems for Sparse Hypergraphs Allan Lo Given an r-graph H, the Turan number ex(n, H)ofH is University of Birmingham the maximum size of an r-graph on n vertices that does [email protected] not contain H as a subgraph. We focus on r-graphs H with ex(n, H) on the order of O(nr−1). One class of such Yi Zhao r-graphs are hypertrees. But there are also non-tree hy- Georgia State University pergraphs H for which ex(n, H) falls in this range. Tu- [email protected] ran problems for such hypergraphs are often extensions of some classic problems from extremal set theory and there- fore tools from extremal set theory have proven to be quite MS21 effective. One theme of study that is sometimes key to the Codegree Thresholds for Hypergraph Covering corresponding Turan problem is to understand how the size of a hypergraph is related to the size of its shadow at the Given two 3-uniform hypergraphs (3-graphs) F and G,we absence of a given subhypergraph. We discuss some recent say that G has an F -covering if we can cover V (G)by results and pose some problems. copies of F .Theminimum codegree of G is the largest Tao Jiang integer d such that every pair of vertices from V (G)iscon- Department of Mathematics tained in at least d triples from E(G). Define c2(n, F )tobe Miami University the largest minimum codegree among all n-vertex 3-graphs [email protected] G that contain no F -covering. Determining c2(n, F )isa natural problem intermediate (but distinct) from the well- studied Tur´an problems and tiling problems. In this talk MS21 we determine c2(n, K4) exactly and the associated extremal Fractional Clique Decompositions of Dense Graphs configurations for sufficiently large n,whereK4 denotes the and Hypergraphs complete 3-graph on 4 vertices. We also obtain bounds on c2(n, F ) which are apart by at most 2 in the cases where − − For any hypergraph F , a hypergraph G has a fractional F - F is K4 (K4 withoneedgeremoved),K5 ,andthetight 72 DM16 Abstracts

cycle C5 on 5 vertices. profiles as the number of vertices in T goes to infinity and showed that it is convex for each k,andsocanbedescribed Victor Falgas-Ravry by defining inequalities. This differs from the setting of Vanderbilt University general graphs and their induced subgraphs on k vertices, [email protected] where the set of limit profiles is nonconvex and difficult to understand. We discuss what’s known about k-profiles of Yi Zhao trees, and some open problems in the area. In particular, Georgia State University we give a partial characterization of the set of 5-profiles. [email protected] Sebastien Bubeck Microsoft Research MS22 [email protected] Inducibility in Binary Trees and Tanglegram Cross- ing Numbers Katherine Edwards Princeton University We study the distribution of rooted k-leaf induced binary [email protected] subtrees of n-leaf rooted binary trees; in particular the in- ducibility of a fixed rooted k-leaf binary tree, which is the Horia Mania limit superior of the proportion of such trees amongst all k- UC Berkeley leaf binary trees, as n incresases. We apply these results to [email protected] estimate the tanglegram crossing number of a random tan- glegram. Biologists connected tanglegram crossing num- bers to horizontal gene transfers and to parasites switching Cathryn Supko hosts. McGill University [email protected] Eva Czabarka Department of Mathematics University of South Carolina MS22 [email protected] The Maximum Quartet Distance Between Phylo- genetic Trees Laszlo Szekely University of South Carolina A conjecture of Bandelt and Dress states that the maxi- mum quartet distance between any  two phylogenetic trees [email protected] 2 n on n leaves is at most ( 3 + o(1)) 4 . Using the machinery of flag algebras we improve the currently known bounds Stephan Wagner regarding this conjecture, in particular  we show that the Stellenbosch University, South Africa n maximumisatmost(0.69 + o(1)) . We also give fur- [email protected] 4 ther evidence that the conjecture is true by proving that the maximum  distance between caterpillar trees is at most 2 n MS22 ( 3 + o(1)) 4 . Efficient Quartet Systems in Phylogenetic Applica- Humberto Naves tions Institute for Mathematics and its Applications University of Minnesota Sets of quartet trees displayed by larger phylogenetic trees [email protected] are often the inputs for species tree and supertree recon- struction methods. Our Efficient Quartet System (EQS) represents a tree by a subset of its displayed quartets. We Noga Alon prove that the EQS encoding of a tree T contains all of the Tel-Aviv University combinatorial information of T , and test EQS-dependent [email protected] pipelines on simulated datasets to show EQS is a promising tool for fast, accurate species tree and supertree estimation. Benny Sudakov ETH Zurich [email protected] Ruth Davidson University of Illinois Urbana Champaign [email protected] MS22 The Shape of Treespace MaLyn Lawhorn, Joseph P. Rusinko, Noah Weber Winthrop University Trees are a canonical structure for representing evolution- [email protected], [email protected], we- ary histories. Many popular criteria for optimal trees are [email protected] computationally hard. The underlying structure of the spaces of trees yields rich insights that can improve the search for optimal trees, both in accuracy and running MS22 time, and the analysis and visualization of results. We On Local Profiles of Trees review the past work on analyzing and comparing trees by their shape as well as recent work that incorporates trees We discuss the local profiles of trees. The k-profile of a tree with weighted branch lengths. T is the probability distribution pk(T ) over its subtrees on k vertices. That is, if a k-subtree is drawn at random from Katherine St. John T it is isomorphic to each k-tree with probability prescribed Computer Science by pk(T ). Bubeck and Linial studied the limit set of k- City University of New York DM16 Abstracts 73

[email protected] [email protected]

MS23 MS23 Finding Planted Graphs with Few Eigenvalues Us- Convex Optimization for Clustering: Theoretical ing the Schur Horn Relaxation Guarantees and Practical Applications

Extracting structured planted subgraphs inside large We consider the problem of finding clusters in an un- graphs is a fundamental question that arises in a range weighted graph when it is partially observed. We analyze of domains. We describe a tractable approach based on two convex programs based on low-rank matrix recovery convex optimization to recover certain families of graphs using nuclear norm minimization. For the commonly used embedded in larger graphs containing spurious edges. Our Stochastic Block Model, we obtain explicit bounds on the method relies on tractable semidefinite descriptions of the problem parameters that are sufficient to guarantee the ex- spectrum of a matrix, and we give conditions on the eigen- act recovery of the clusters. We corroborate our theoretical structure of a planted graph in relation to the noise level findings through extensive simulations. We also apply our under which our algorithm succeeds. algorithms to the problem of crowdsourcing inference using real data. Utkan Onur Candogan California Institute Of Technology Ramya Korlakai Vinayak,SametOymak Electrical Engineering Department California Institute of Technology [email protected] [email protected], [email protected]

Venkat Chandrasekaran Babak Hassibi California Institute of Technology Electrical Eng. Dept [email protected] Caltech, Pasadena, CA [email protected] MS23 Chordal Structure in Computational Algebra MS24 A Lattice Point Counting Generalisation of the Chordal structure and bounded treewidth allow for effi- Tutte Polynomial cient computation in linear algebra, graphical models, con- straint satisfaction, and many other areas. It is natural to analyze to what extent chordality might help in compu- The Tutte polynomial for matroids is not directly appli- tational algebra. To this end, we propose new techniques cable to polymatroids. For instance, deletion-contraction to approach two important problems: solving polynomial properties do not hold. We construct a polynomial for equations and computing permanents. Besides the theo- polymatroids which behaves similarly to the Tutte polyno- retical developments, we illustrate the suitability of our mial of a matroid, and in fact contains the same informa- methods in examples arising from graph colorings, sensor tion as the Tutte polynomial when we restrict to matroids. localization and cryptography. We also show that, in the matroid case, our polynomial has coefficients of alternating sign, with a combinatorial interpretation closely tied to the Dawson partition. Diego Cifuentes, Pablo A. Parrilo Massachusetts Institute of Technology [email protected], [email protected] Amanda Cameron Queen Mary University of London [email protected] MS23 Alex Fink Graph Profiles: Algorithms and Approximation Queen Mary University of London Guarantees UK a.fi[email protected] We present a novel distributed algorithm for computing graph profiles, vectors that describe a big graphs connec- tivity properties by counting all of its 3-node and 4-node MS24 induced subgraphs. Our algorithm is a local message pass- ing scheme in which each vertex computes its 4-profile in On Representations of Frame Matroids Over Fields parallel using primarily local information. We also estab- lish novel concentration results showing that global graph We show that everything one wishes to know about ma- profiles retain good approximation quality even when the trix representations of frame matroids is provided by gain graph is sparsified substantially. functions (or, group-labellings) on graphs. We show that for every field K, every matrix representation over K of a Ethan R. Elenberg, Karthikeyan Shanmugam, Michael frame matroid M is projectively equivalent to a represen- Borokhovich tation arising from a gain function on a graph, and that The University of Texas at Austin the projective equivalence classes of its matrix representa- [email protected], [email protected], tions are essentially in one-to-one correspondence with the [email protected] switching equivalence classes of gain functions.

Alex Dimakis Daryl Funk University of Texas at Austin Victoria University of Wellington 74 DM16 Abstracts

[email protected] Louisiana State University [email protected]

MS24 Bicircular Matroids Representable Over GF (4) or MS25 GF (5) Reed’s Conjecture and Strong Edge Coloring

Given a graph G, the bicircular matroid B(G)isamatroid The chromatic number of a graph is trivially bounded from on the edge set of G whose circuits are the edge sets of min- above by the maximum degree plus one, and from below imal subgraphs of G that are connected and contain two by the size of a largest clique. Reed proved in 1998 that cycles. Given a bicircular matroid B(G)andq ∈{4, 5},we compared to the trivial upper bound, we can always save characterize when the bicircular matroid B(G)isGF (q)- a number of colors proportional to the gap between the representable by precisely describing the structure of G. maximum degree and the size of a largest clique. A key step These descriptions yield polynomial-time algorithms with in the proof deals with how to spare colors in a graph whose input G to certify if B(G)isorisnotGF (q)-representable. every vertex ”sees few edges” in its neighborhood. We improve the existing approach, and discuss its applications to Reed’s theorem and strong edge coloring. Tyler Moss West Virginia University Institute of Technology Marthe Bonamy Department of Mathematics LaBRI, Universit´e de Bordeaux, and CNRS [email protected] [email protected]

Deborah Chun Thomas Perrett West Virginia University Institute of Technology Technical University of Denmark [email protected] [email protected]

Daniel Slilaty Luke Postle Department of Mathematics and Statistics University of Waterloo Wright State University [email protected] [email protected]

Xiangqian Zhou MS25 Wright State University Colorings of Plane Graphs [email protected] One of the oldest topics studied in graph theory concerns coloring vertices of graphs drawn in the plane. In this talk, MS24 we will survey open problems and results on several clas- Matroids with Many Small Circuits and Many sical types of vertex colorings of plane graphs, i.e., graphs Small Cocircuits embedded in the plane. In particular, we will focus on cyclic colorings and report about our recent results ob- A consequence of Tuttes Wheels-and-Whirls Theorem is tained on this type of coloring. that the only 3-connected matroids in which every element is in both a 3-element circuit and a 3-element cocircuit are Daniel Kral the well-known wheels and whirls. Miller showed that a University of Warwick sufficiently large 3-connected matroid in which every pair [email protected] of elements is contained in a 4-element circuit and a 4- element cocircuit must be spikes. Here we investigate a similar family of graphs and matroids, those having each MS25 element in a 4-cocircuit and each pair in a 4-circuit, and Generalizations of Reed’s Conjecture give a complete characterization of their members. In 1998, Reed conjectured that the chromatic number is Simon Pfeil at most halfway between its trivial lower bound, the clique Louisiana State University number, and its trivial upper bound, the maximum degree Department of Mathematics plus one. In this talk, we discuss results on various general- [email protected] izations of this conjecture to list coloring, correspondence coloring, local versions and maximum average degree.

MS24 Luke Postle The Binary Matroids Whose Only Odd Circuits are University of Waterloo Small [email protected]

This talk generalizes a graph-theoretical result of Maffray to binary matroids. In particular, we prove that a con- MS25 nected simple binary matroid M has no odd circuits other Maximal k-Edge-Colorable Subgraphs, Vizing’s than triangles if and only if M is affine, M is M(K4)orF7, Theorem, and Tuza’s Conjecture or M is the cycle matroid of a graph consisting of a col- lection of triangles all of which share a common edge. We If M is a maximal matching in a graph G and F is the set then show similar results for larger odd circuits on binary of vertices not covered by M,thenF is an independent set. matroids. We generalize this observation to maximal k-edge-colorable subgraphs M:ifF is the set of vertices having degree less Kristen Wetzler than k in M,theneachvertexv ∈ F satisfies dF (v) ≤ DM16 Abstracts 75

dM (v). This implies Vizing’s Theorem on edge-coloring lemma (SRAL). The input to this lemma is a graph G of and a special case of Tuza’s Conjecture about triangles. edge density p and parameters   δ. The goal is to con- struct an -regular partition of G while having the freedom Gregory J. Puleo to add/remove up to δ|E(G)| edges. As we show here, this University of Illinois weaker variant of the regularity lemma already suffices for [email protected] proving the graph removal lemma and the hypergraph reg- ularity lemma, which are two of the main applications of the (standard) regularity lemma. This of course raises the MS25 following question: can one obtain quantitative bounds for A Topological Approach Related to Hedetniemi’s SRAL that are significantly better than those associated Conjecture with the regularity lemma? Our first result answers the above question affirmatively by proving an upper bound × Hedetniemi’s conjecture says that χ(G H)=for SRAL given by a tower of height Oδ(log 1/p). This al- min(χ(G),χ(H)). More generally, we can look for graphs lows us to reprove Fox’s upper bound for the graph removal K (called multiplicative graphs) such that G × H has a lemma. Our second result is a matching lower bound for homomorphism to K iff G or H has. We generalize a topo- SRAL showing that a tower of height Ω(log 1/p) is unavoid- logical approach to the conjecture, showing in particular able. We in fact prove a more general multi-colored lower that all graphs K with no C4 subgraph are multiplicative, bound which is essential for proving lower bounds for the providing the first high-chromatic examples. hypergraph regularity lemma. Marcin Wrochna Asaf Shapira,GuyMoshkovitz Institute of Informatics Tel Aviv University University of Warsaw asafi[email protected], [email protected] [email protected]

MS26 MS26 Degenerate Hypergraphs Off-Diagonal Hypergraph Ramsey Numbers

A hypergraph H =(V,E) consists of a vertex set V and an In this talk, we present several new results in hypergraph ⊆ V edge set E 2 ;theedgesinE are not required to all have Ramsey theory. In particular, we give lower bounds on the the same cardinality. The set of all cardinalities of edges classical Ramsey number rk(s, n), for k, s fixed and n tend- in H is denoted by R(H), the set of edge types. For a fixed ing to infinity, which nearly settles a question of Erd˝os and hypergraph H of edge type R,theTur´ an density π(H)is 1 Hajnal from 1972. We also show, using different methods, n→∞ G defined to be lim max n F ∈E(Gn) n ,wherethe (|F |) a super-exponential lower bound for the Ramsey number maximum is taken over all H-free hypergraphs Gn on n r4(5,n), which represents the first significant progress on vertices satisfying R(Gn) ⊆ R. A hypergraph H is called this problem since it was considered by Erd˝os and Haj- degenerate if π(H)=|R(H)|−1. For the special case of r- nal. Several other results may be presented if time permits. uniform hypergraphs, it is well-known that H is degenerate This is joint work with Dhruv Mubayi. if and only if H is r-partited. However, it is an intrigue question to classify degenerate non-uniform hypergraphs. Andrew Suk This is a preliminary report on what we know and what University of Illinois at Chicago we don’t know on this problem. [email protected]

Linyuan Lu, Shuliang Bai University of South Carolina MS26 [email protected], [email protected] On a Conjecture of Erd˝os on Triangle-Free Graphs

MS26 Erd˝os conjectured that a triangle-free graph G of chro- ≥ 2−ε Exploring with Flag Algebras matic number k k0(ε) contains cycles of at least k different lengths as k →∞. In this talk I outline a We will discuss progress on two conjectures in extremal proof of a stronger statement, namely: every triangle-free graph theory: the first one due to Grossman, Harary and graph G of chromatic number k ≥ k0(ε) contains cycles of 1 − 2 Klawe on Ramsey numbers of double stars, and the second 64 (1 ε)k log k consecutive lengths, and a cycle of length one due to Erd˝os, Gallai and Tuza on triangle-independent 1 − 2 at least 4 (1 ε)k log k. As there exist triangle-free graphs sets. In both cases computer assisted computations, em- of chromatic number k with at most roughly 4k2 log k ver- ploying Razborov’s flag algebras, were used to explore the tices for large k, these results are tight up to a constant problem. However, the proofs of the main results are factor. computer-free. Jacques Verstraete Sergey Norin, Yue Ru Sun University of California-San Diego McGill University [email protected] [email protected], [email protected] Alexandr Kostochka MS26 University of Illinois, Urbana-Champaign A Sparse Regular Approximation Lemma [email protected]

We introduce a new variant of Szemer´edi’s regularity Benny Sudakov lemma which we call the sparse regular approximation ETH Zurich 76 DM16 Abstracts

[email protected] mentioned results to the broader context of log-schemes.

Oliver Lorscheid MS27 IMPA Anticanonical Tropical del Pezzo Cubic Surfaces Brazil Contain Exactly 27 Lines [email protected]

Since the beginning of tropical geometry, a persistent chal- lenge has been to emulate tropical versions of classical re- MS27 sults in algebraic geometry. The well-know statement “any Bitangents of Tropical Plane Quartic Curves smooth surface of degree 3 in P 3 contains exactly 27 lines” is known to be false tropically. Work of Vigeland from A smooth plane quartic curve over an algebraically closed 2007 provides examples of cubic surfaces with infinitely field has 28 bitangent lines. In this talk, I will prove the cor- many lines and gives a classification of tropical lines on responding result for the tropical world: a tropical smooth general smooth tropical surfaces in TP3.Inthistalkwe place quartic curve has 7 tropical bitangent lines, up to a explain how to correct this pathology. The novel idea is to natural equivalence. The proof of this result will consider consider the embedding of a smooth cubic surface in P 44 plane tropical curves both as embedded piecewise linear via its anticanonical bundle. The tropicalization induced subsets of the Euclidean plane, and as abstract graphs with by this embedding contains exactly 27 lines under a mild lengths on the edges. genericity assumption. More precisely, smooth cubic sur- faces in P 3 are del Pezzo’s, and can be obtained by blowing up P 2 at six points in general position, which we identify Matthew Baker with six parameters over a field with nontrivial valuation. Georgia Institute of Technology Our genericity assumption requires the valuations of these [email protected] six parameters not to vanish identically. Yoav Len Maria Angelica Cueto Universit¨at des Saarlandes [email protected] USA [email protected] Ralph Morrison KTH Anand Deopurkar Sweden Columbia University [email protected] [email protected] Nathen Pflueger Brown University MS27 pfl[email protected] A Versatile Technique for the Construction of Spec- tra Qingchun Ren Google The construction of the spectrum of a commutative ring [email protected] via lattice theory goes back to at least 1969, in a paper of D. Kirby, and Johnstone had developed this perspective into his theory of coverages by the early ’80s. Nevertheless, MS27 the full strength of this viewpoint is still under-appreciated outside of point-free topology and universal algebra. I will Tropical Skeletons and the Section of Tropicaliza- briefly explain the tools involved in presenting a uniform tion construction of a wide variety of spectra, including prime ideal spectra of monoids and semirings, and the adic spec- Given a subvariety X of a torus T over a nonarchimedean trum of an affinoid. field K, a basic question is to relate Trop(X) to some kind of skeleton of the Berkovich analytification Xan of Andrew Dudzik X. One way to formulate this problem is to ask if there exists a continuous section of the tropicalization map s: University of California, Berkeley a [email protected] Trop(X)− >Xn, and if this section is unique. I will discuss a result which asserts the answer is yes, on the multiplicity-1 locus. I’ll also discuss an extension of this MS27 result to subvarieties of toric varieties, which turns out to be surprisingly subtle. Scheme Theoretic Tropicalization

Recent work of Jeff and Noah Giansiracusa exhibits a Walter Gubler scheme theoretic structure for tropicalizations of classical Universit¨at Regensburg varieties in terms of so-called semiring schemes. This works [email protected] well in the framework of closed subvarieties of toric vari- eties, and Maclagan and Rincon recover the structure of Joseph Rabinoff a polyhedral complex from the scheme theoretic tropical- Georgia Institute of Technology ization of a variety embedded into a torus. In this talk, I USA will review these ideas and show how these results can be rabinoff@math.gatech.edu extended by using blue schemes. This leads to an intrin- sic notion of a tropicalization, independent from an em- Annette Werner bedding into an ambient space, and generalizes the above Goethe-Universit¨at Frankfurt DM16 Abstracts 77

[email protected] weakening of it for r =3.

Shoham Letzter MS28 University of Cambridge [email protected] Unavoidable Patterns in Words

th Define the n Zimin word Zn by Z1 = x1 and Zn = MS28 Zn− xnZn− . A theorem of Zimin says that for any n 1 1 Ramsey Numbers of Sparse Graphs and Monochro- there exists (n) such that any word of length (n)con- matic Partitions tains a copy of Zn, where one word W is said to contain another word V = v1 ...vt if there are non-empty words Abstract not available W1,...,Wt such that Wi = Wj if vi = vj and W1 ...Wt is asubwordofW . We study the quantitative aspects of this Jozef Skokan theorem, proving surprisingly tight bounds on (n). London School of Economics [email protected] David Conlon University of Oxford [email protected] MS28 Decompositions of Edge-Colored Infinite Graphs Jacob Fox into Monochromatic Connected Pieces Stanford University [email protected] The aim of this presentation is to survey results and open problems on vertex decompositions of edge-colored infinite complete graphs into monochromatic trees or paths. In Benjamin Sudakov particular, we focus on a solution to a question of R. Rado: ETH Zurich the vertex set of every r-edge colored infinite complete [email protected] graph can be partitioned into r monochromatic paths of different colors (with r finite). The corresponding problem MS28 for finite graphs is still wide open. Monochromatic Cycle Partitioning of 2-Edge- Daniel Soukup Colored Graphs with Minimum Degree 2n/3 Renyi Institute [email protected] It is conjectured the vertex set of any 2-edge-colored graph G with minimum degree at least 2|V (G)|/3canbeparti- tioned into 3 monochromatic cycles. This is sharp, since MS29 there are graphs of lower minimum degree for which this is Fully-Active Cops and Robbers not true. We prove that apart from o(|V (G)|) vertices, the vertex set of any 2-edge-colored graph G with minimum We discuss fully-active Cops and Robbers, a variant of Cops degree at least (2/3+)|V (G)| can be partitioned into 3 and Robbers in which players can’t sit still: on their re- such cycles. spective turns, every cop and the robber must move to an adjacent vertex. In this talk, we determine how many cops Peter Allen, Julia B¨ottcher it takes to win this game on products of trees, products London School of Economics of cycles, and outerplanar graphs. We also explore the re- [email protected], [email protected] lationship between the fully-active game and classic Cops and Robbers. Richard Lang Ilya Gromovikov Universidad de Chile Mathematics Department [email protected] Dawson College [email protected] Jozef Skokan London School of Economics Bill Kinnersley [email protected] University of Rhode Island [email protected] Maya Stein Universidad de Chile Ben Seamone [email protected] Mathematics Department Dawson College [email protected] MS28 Monochromatic Cycle Partitions MS29 Erd˝os, Pyber and Gy´arf´as conjectured that if Kn is r- Fundamental Conjectures on Eternal Domination edge-coloured, then its vertices may be partitioned into r monochromatic cycles. For r =2,muchmoreistrue: Eternal domination concerns the perpetual, dynamic main- we prove that if G is a 2-coloured graph on n vertices with tenance of a dominating set while an adversary attempts to minimum degree 3n/4, then its vertices may be partitioned destroy it. Stated another way, it concerns the minimum into two monochromatic cycles. This settles a conjecture number of mobile guards needed to defend a graph from by Balogh et al. Pokrovskiy showed that the above con- any sequence of attacks at vertices. Three fundamental jecture is false for r ≥ 3. Nevertheless, we prove a slight conjectures and partial results are discussed: one relating 78 DM16 Abstracts

the eternal domination number to the clique covering num- [email protected] ber, one related to criticality, and one regarding an upper bound in terms of order. MS29 Chip Klostermeyer On the Zero-Visibility Cops and Robber Game University of North Florida [email protected] The zero-visibility cops-and-robber game is a variant of the classical cops-and-robber game, in which the robber is invisible. We show that the zero-visibility cop-number of MS29 a graph is bounded above by its pathwidth and cannot be bounded below by any nontrivial function of the pathwidth. The Firefighter Problem for All Orientations of the We give an algorithm that computes the zero-visibility cop- Cubic Grid number of a tree in linear time. We also show that the corresponding decision problem is NP-complete even for Let G be a directed graph in which, at time t =0,a starlike graphs. fire breaks out at vertex r. At each subsequent time, t =1, 2,..., the firefighter defends d ≥ 1 undefended ver- Dariusz Dereniowski tices which have not yet been reached by the fire, and then Gdansk University of Technology the fire spreads from all vertices it has reached to all of [email protected] their undefended out-neighbours. We show that, if G is an orientation of the infinite cubic grid, then, by defending Danny Dyer, Ryan Tifenbach one vertex per time step, in a finite number of steps it is Memorial University of Newfoundland possible for the firefighter to stop the fire from spreading [email protected], [email protected] beyond the vertices it has already reached. Boting Yang Gary MacGillivrary Dept. of Computer Science University of Victoria University of Regina [email protected] [email protected]

MS29 MS30 The Robot Crawler Graph Process Quadrangular Embeddings of Complete Graphs

Information gathering by crawlers on the web is of practical A quadrangular embedding of a complete graph is a min- interest. We consider a simplified model for crawling com- imal quadrangulation of a surface. Divisibility conditions plex networks such as the web graph, which is a variation of based on Euler’s formula give necessary conditions for such the robot vacuum edge-cleaning process of Messinger and embeddings to exist. In 1989 Hartsfield and Ringel showed Nowakowski. In our model, a crawler visits nodes via a that the embeddings exist in half of the possible cases. We deterministic walk determined by their weightings which show existence in the remaining cases. change during the process deterministically. The mini- Mark Ellingham mum, maximum, and average time for the robot crawler Department of Mathematics to visit all the nodes of a graph is considered on various Vanderbilt University graph classes such as trees, multi-partite graphs, binomial [email protected] random graphs, and graphs generated by the preferential attachment model. Wenzhong Liu Anthony Bonato Nanjing University of Aeronautics and Astronautics, Ryerson University China [email protected] [email protected]

Calum MacRury Dong Ye Dalhousie University Department of Mathematical Sciences [email protected] Middle Tennessee State University [email protected] Jake Nicolaidis, Xavier Perez Gimenez Ryerson University Xiaoya Zha [email protected], [email protected] Middle Tennessee State University [email protected] Pawel Pralat Ryerson University MS30 Department of Mathematics 3-Flows with Large Support [email protected] Tutte’s 3-Flow Conjecture says that every 4-edge- Rita Mar´ıa del R´ıo-Chanona connected graph should have a nowhere-zero 3-flow. The Universidad Nacional Autonoma de Mexico 4-edge-connectivity assumption cannot be weakened – K4 [email protected] is an example of a 3-edge-connected graph that does not have a nowhere-zero 3-flow. However, K4 is minimal in − Kirill Ternovsky the sense that K4 has a nowhere zero 3-flow. Since K4 Ryerson University has 6 edges in total, this means that we are able to give DM16 Abstracts 79

K4 a 3-flow in which 5/6 of the edges are nonzero. With non-zero cycles) or alternatively, there exists a set of at DeVos, Pivotto, Rollov´aandS´ˇamal, we can show that this most f(k) vertices intersecting every such cycle. We also is the worst case in general – that is, if G is any 3-edge- give a sufficient condition on the group labels which allows connected graph, then G has a 3-flow with support size at us to conclude that the doubly non-zero cycles are pairwise 5 | | disjoint. Our theorem implies the all the aforementioned least 6 E(G) . As a corollary, this implies that every pla- nar graph has an assignment of three colours to its vertices packing results on cycles as well as several new results. so that at most a sixth of its edges join vertices of the same This is joint work with Felix Joos and Tony Huynh. colour. Paul Wollan Jessica McDonald University of Rome ”La Sapienza” Department of Mathematics and Statistics [email protected] Auburn University [email protected] MS30 A Polyhedral Description of Kernels MS30 Minimum Degree and Dominating Paths Let G be a digraph and let π(G) be the linear system con- sisting of nonnegativity, stability, and domination inequal- A dominating path is a path P such that every ver- ities. We call G kernel ideal (resp. kernel Mengerian) if tex outside P has a neighbor on P . From a result of π(H) defines an integral polytope (resp. π(H) is totally Broersma [1988], an n-vertex connected graph G with dual integral) for each induced subgraph H of G. The pur- δ(G) > (n − 4)/3 contains a dominating path. We seek pose of this talk is to show that G is kernel ideal iff it short dominating paths. For δ(G) >an,wherea>1/3 is kernel Mengerian iff it contains none of three forbidden and n is sufficiently large, G has a dominating path with structures. (Joint work with Qin Chen and Xujin Chen) length at most logarithmic in n (the base depends on a).  For constant s and c < 1, an s-vertex dominating path Wenan Zang  − /s is guaranteed by δ(G) ≥ n − 1 − c n1 1 when n is suf- Department of Mathematics ficiently large but not by δ(G) ≥ n − c(s ln n)1/sn1−1/s University of Hong Kong (where c>1). [email protected]

Ralph Faudree University of Memphis MS31 Department of Math Sciences Reparametrization Covariant Invariants of Time [email protected] Series and Cyclicities

Ronald Gould Recovering the causal structure of processes evolving in Dept. of Mathematics and Computer Science time (such as gene expressions or protein interactions or Emory University trophic networks or business cycles in an economy) is an [email protected] important component of their analysis. Often the network interaction patterns cannot be directly discerned from the Michael Jacobson models, and need to be inferred from (often, noisy) mea- University of Colorado, Denver surements. We introduce a novel invariant (cyclicity) of = time series of observed activities in networks of interacting [email protected] entities. Cyclicity is the first of a hierarchy of invariants stable with respect to the time reparametrizations. We Douglas B. West prove several convergence theorems, and illustrate with real Zhejiang Normal University and University of Illinois life examples. Departments of Mathematics [email protected] Yuliy Baryshnikov University of Illinois at UrbanaChampaign Department of Mathematics MS30 [email protected] Packing Cycles in Doubly Group Labeled Graphs

A classic result says that every graph either contains k MS31 disjoint cycles or there exists a set of at most ck log k ver- Network-Based Personalization at Twitter tices intersecting every cycle in the graph(for some fixed constant c). This result has been generalized to numerous Personalization is at the core of a variety of Twitter prod- other problems where we want the cycles to satisfy some ucts — timeline ranking, user recommendations, tweet no- additional property: for example, the cycles all have odd tifications/emails, and search to name a few — and many length, or the cycles intersect a specified set of vertices, or of these are powered by personalized computations on the the cycles have both odd length and intersect a specified Twitter network (or graph). This network-based person- set of vertices, etc. We consider a model of group labeled alization is challenging to scale since it involves running graphs with two group labels on every edge. A doubly non- personalized graph algorithms such as personalized page- zero cycle is one which has non-zero weight for each of the rank for hundreds of millions of users. In this talk, we’ll two group labels. We look at the problem of finding many give an overview of Twitter’s graph processing systems that disjoint doubly non-zero cycles. We show that there exists enable these applications. a function f such that every such group labeled graph ei- ther has k doubly non-zero cycles such that each vertex is Aneesh Sharma in at most two of them (a half integral packing of doubly Twitter Inc. 80 DM16 Abstracts

[email protected] cuss some of the many problems that remain open. (Joint with Allen, Ehrenm¨uller, Taraz.)

MS31 Julia Boettcher, Peter Allen Network Meso-Structure – Behind the Complexity London School of Economics Curtain [email protected], [email protected]

One particularly challenging problem in ”Big Data Anal- Julia Ehrenmueller, Anusch Taraz ysis” has been understanding and analyzing complex net- Hamburg University of Technology works, which naturally model relationships in many types [email protected], [email protected] of data (e.g. friendships in a social network or protein/gene interactions in a biological one). Although efficient graph algorithms with guaranteed performance and solution qual- MS32 ity are impossible in general networks (according to compu- Towards Disproving the Erd˝os-Hajnal Conjec- tational complexity), recent work has identified a multitude ture... of parameterized algorithms that exploit specific forms of sparse graph meso-structure to drastically reduce running The celebrated Erd˝os-Hajnal conjecture formulated in 1989 time. On the other hand, much of the work on real-world states that for every undirected graph H there exists networks as ”big data” has focused on either coarse, global (H) > 0 such that every H-free n-vertex graph contains properties (e.g., diameter) or very localized measurements either a clique or a stable set of order at least n(H).Inits (e.g., clustering coefficient) – metrics which are insufficient equivalent directed version undirected graphs are replaced for ensuring efficient algorithms. We discuss recent work by tournaments and cliques/stable sets by transitive sub- on bridging the gap between network science and structural tournaments. The conjecture is still open. It turns out that graph algorithms, answering questions like: Do real-world random graph theory is a useful tool for finding strong up- networks exhibit meso-structure that enables efficient algo- per bounds on the so-called Erd˝os-Hajnal coefficients that rithms? Is it observable empirically? Can this sparse struc- may lead to the counterexample of the conjecture. In this ture be proven for popular random graph models? How talk I will explain random graph theory techniques that re- does such a framework help? cently provided mathematicians with the strongest known upper bounds on the aforementioned Erd˝os-Hajnal coeffi- Blair Sullivan cients. I will also explain how these techniques combined North Carolina State University with some recent positive results give tight asymptotics of [email protected] the Erd˝os-Hajnal coefficients for infinite classes of prime tournaments for which the conjecture was proven just very recently. MS32 The Ramsey-Tur´an Problem with Small Indepen- Krzysztof M. Choromanski dence Number Google Research New York [email protected] Let s be an integer, f = f(n) a function, and H a graph. Define the Ramsey-Tur´an number RT s(n, H, f)as the maximum number of edges in an H-free graph G of MS32 order n with αs(G) 0and1/2 <δ<1, ([n],En), we would like to find vertex 1, using only ‘lo- δ 1+δ−ε RT s(n, Ks+1,n )=Ω(n ) for all sufficiently large s. cal’ information about the graph; that is, by exploring the This is nearly optimal, since a trivial upper bound yields neighborhoods of small sets of vertices. Borgs et. al gave δ 1+δ 4 RT s(n, Ks+1,n )=O(n ). Furthermore, the range of δ an O(log n) algorithm, which is local in the sense that at is as large as possible. each step, it needs only to search the neighborhood of a set of vertices of size O(log4 n). We give an algorithm to find Patrick Bennett vertex 1, which w.h.p. runs in time O(ω log n)andwhich University of Toronto is local in the strongest sense of operating only on neigh- [email protected] borhoods of single vertices. Here ω = ω(n) is any function that goes to infinity with n. Andrzej Dudek Department of Mathematics Alan Frieze Western Michigan University Carnegie Mellon University [email protected] Department of Mathematical Sciences [email protected]

MS32 Wesley Pegden Universality and Resilience in Pseudorandom Courant Institute Graphs [email protected]

There has recently been much progress on universality and resilience results concerning spanning or almost span- MS32 ning substructures in random graphs. For pseudorandom An Occupancy Method for Bounding Partition graphs much less was known. The (new) blow-up lemma Functions and Counting Matchings for pseudorandom graphs leads to very general new results in this direction. In this talk I will present these results, We consider the monomer-dimer model of a random match- describe how their proofs use the blow-up lemma, and dis- ing in a d-regular graph. By solving a local optimization DM16 Abstracts 81

problem, we prove a tight bound on the occupancy frac- properly contains the regular matroids. tion: the expected fraction of edges in the random match- ing. This is turn shows that over all d-regular graphs on Sandra Kingan the same number of vertices, a union of Kd,d’s maximizes Brooklyn College the partition function of the model and the total number CUNY of matchings. As a corollary we prove the ‘Asymptotic [email protected] Upper Matching Conjecture’ of Friedland, Krop, Lundow, and Markstrom. MS33 Ewan Davies, Matthew Jenssen A Class of Infinite Convex Geometries London School of Economics [email protected], [email protected] Various characterizations of finite convex geometries are well known. This note provides similar characterizations Will Perkins for possibly infinite convex geometries whose lattice of University of Birmingham closed sets is strongly coatomic and spatial. Some classes School of Mathematics of examples of such convex geometries are given. [email protected] James B. Nation University of Hawaii Barnaby Roberts [email protected] London School of Economics [email protected] Kira Adaricheva Nazarbayev University [email protected] MS33 Deletions, Contractions, and Connectivity MS34 Let M be a 3-connected matroid. Some theorems regard Constructive Algorithm for Path-Width of Ma- the cardinality and structure of the set of elements e such troids that M/e (resp. M\e,si(M/e), co(M\e)) is 3-connected. In other hand, some of the so-called splitter theorems, in We present a fixed parameter tractable algorithm to con- the form: for 3-connected matroids M>Nsatisfying cer- struct a linear layout of width at most k, if it exists, for tain hypothesis, there exists e in E(M) such that M/e or input subspaces of a finite-dimensional vector space over F. M\e (resp...) is 3-connected with an N-minor. We propose As corollaries, we obtain a fixed parameter tractable algo- an unification of both types of theorems. rithm to produce a path-decomposition of width at most k for an input F-represented matroid of path-width at most Joao Paulo Costalonga k, and a fixed-parameter tractable algorithm to find a lin- Federal University of Esprito Santo State - Vit´oria ear rank-decomposition of width at most k for an input Brazil graph of linear rank-width at most k. In both corollar- [email protected] ies, no such algorithms were known previously. Also, as corollaries, we give an algorithm that computes the linear rank-width for an input graph of bounded rank-width, and MS33 an algorithm that computes the path-width for an input F- Matroids, Antimatroids and Groups representable matroid of bounded branch-width. Our ap- proach is based on dynamic programming combined with Given a finite group, does there exist a matroid, resp. an- the idea developed by Bodlaender and Kloks (1996) for timatroid, whose group of automorphisms is isomorphic to their work on path-width and tree-width of graphs. the given group? The answer is positive for matroids, even for projective planes (Mendelsohn, 1972; Babai, 1977). For Jisu Jeong antimatroids and even for really represented ones, we de- KAIST rive a positive answer from our recent, simple proof of a [email protected] result of Schulte and Williams (2015) stating the existence of a convex polytope with preassigned group. Eun Jung Kim CNRS, LAMSADE-Universite Paris Dauphine Jean-Paul Doignon [email protected] Universite Libre de Bruzelles Belgium Sang-Il Oum [email protected] KAIST [email protected] MS33 Strong Splitter Theorem and its Applications MS34 The Directed Grid Theorem The Splitter Theorem is a central result in matroid theory since it provides a useful induction tool for characteriz- The grid theorem, originally proved by Robertson and Sey- ing excluded minor classes. In this talk I will present a mour in Graph Minors V in 1986, is one of the fundamental strengthening of the Splitter Theorem called the Strong results in the study of graph minors. It it is the basis for Splitter Theorem. The Strong Splitter Theorem is joint several other structure theorems developed in the graph mi- work with Manoel Lemos. Building on Seymour’s charac- nors project and has found numerous applications in algo- terization of regular matroids, I used the Strong Splitter rithmic graph structure theory, for instance in bidimension- Theorem to characterize a class of binary matroids that ality theory. In the mid-90s, Reed and Johnson, Robertson, 82 DM16 Abstracts

Seymour and Thomas, independently, conjectured an anal- compositions one can first canonically decompose a graph ogous theorem for directed graphs, i.e. the existence of a into parts corresponding to its maximal tangles. These function f : N → N such that every digraph of directed tangles may be viewed as describing objects resembling tree-width at least f(k) contains a directed grid of order k. “k-connected components”. Using the notion of treelike In an unpublished manuscript from 2001, Johnson, Robert- decompositions, it is then sometimes possible to further de- son, Seymour and Thomas give a proof of this conjecture compose said parts in a canonical fashion. We describe how for planar digraphs. In 2014, the conjecture was confirmed they can be constructed and used to test isomorphism of in full generality by Kawarabayashi and Kreutzer. In this graphs of bounded rank width (or equivalently of bounded talk we will give an introduction to directed tree width and clique width) in polynomial time. (This is joint work with present the main ideas of the proof of the directed grid the- Martin Grohe) orem. We will also present some applications of this result to Erds-Psa problems for directed graphs. This is joint Pascal Schweitzer work with Ken-ichi Kawarabayashi, National Institute of RWTH Aachen Informatics, Tokyo. [email protected]

Ken-ichi Kawarabayashi National Institute of Informatics MS34 JST, ERATO, Kawarabayashi Project The Splitter Game on Nowhere Dense Classes of k [email protected] Graphs

Stephan Kreutzer Nowhere dense classes of graphs were introduced by Neetril Technical University Berlin and Ossona de Mendez as a very general model of uniform [email protected] sparseness in graphs. All familiar classes of sparse graphs such as planar graphs, bounded degree graphs and classes that exclude minors or topological minors are nowhere MS34 dense. The concept of nowhere denseness turns out to Fixed-Parameter Tractable Canonization and Iso- be very robust and seems to capture a natural property morphism Test for Graphs of Bounded Treewidth of graphs, as witnessed by the fact that nowhere dense classes can equivalently be characterized in several com- We give a fixed-parameter tractable algorithm that, given a pletely different ways arising independently in diverse con- parameter k and two graphs G1,G2, either concludes that texts. The Splitter game offers a very intuitive charac- one of these graphs has treewidth at least k, or determines terisation of nowhere dense classes of graphs. The game whether G1 and G2 are isomorphic. The running time of 5 was introduced by Grohe et al. to efficiently solve the the algorithm on an n-vertex graph is 2O(k log k) · n5,and first-order model-checking problem of first-order logic on this is the first fixed-parameter algorithm for Graph Iso- nowhere dense classes of graphs. In the game, two players morphism parameterized by treewidth. Our algorithm in recursively decompose local neighbourhoods of a graph. A fact solves the more general canonization problem. We winning strategy for one of the players can then be trans- 5 namely design a procedure working in 2O(k log k) · n5 time lated into a structural decomposition of local neighbour- that, for a given graph G on n vertices, either concludes hoods. In this talk, we will survey algorithmic applications that the treewidth of G is at least k, or: (i) finds in an of the Splitter game. We will furthermore discuss a connec- isomorphic-invariant way a graph c(G) that is isomorphic tion between the Splitter game and generalized colouring to G; (ii) finds an isomorphism-invariant construction term numbers that provides strong new bounds on the length of — an algebraic expression that encodes G together with a the game on restricted classes of graphs. tree decomposition of G of width less than k.Hence,the isomorphism test reduces to verifying whether the com- Sebastian Siebertz Technische Universit¨at Berlin puted isomorphic copies or the construction terms for G1 [email protected] and G2 are equal.

Daniel Lokshtanov University of Bergen MS35 [email protected] Hypergraph Embeddings

Marcin Pilipczuk, Michal Pilipczuk Trying to generalise a 2-graph proof using the Regularity University of Warsaw Method to k-graphs usually fails. A reason is that ‘regu- [email protected], [email protected] larity inheritance’ is guaranteed for 2-graphs, but not for k-graphs with k ≥ 3. We prove a ‘regularity inheritance Saket Saurabh lemma’ which roughly says that this failure is a rare occur- IMS rence. This makes the natural generalisations work, and [email protected] also allows us to handle sparse hypergraphs. In this talk, I will explain what the above means, what it is good for, and why it is true. MS34 Peter Allen, Julia Boettcher, Ewan Davies, Jozef Skokan Canonical Decompositions and Isomorphism Test- London School of Economics ing [email protected], [email protected], Decompositions play a central role in graph theory in par- [email protected], [email protected] ticular in the structural theory of graphs with a forbid- den minor. In order for decompositions to be applicable to graph isomorphism testing, it is necessary that the de- MS35 compositions are canonical. To obtain such canonical de- Spectra of Random Symmetric Hypermatrices and DM16 Abstracts 83

Random Hypergraphs of universal hypergraphs.

We discuss progress on the problem of asymptotically de- Samuel Hetterich, Olaf Parczyk, Yury Person scribing the complex homogeneous adjacency eigenvalues Universitaet Frankfurt of random and complete uniform hypergraphs. There is [email protected], [email protected] a natural conjecture arising from analogy to random ma- frankfurt.de, [email protected] trix theory that connects these spectra to that of the all- ones hypermatrix. To approach the question, we provide a bound on the spectral radius of the symmetric Bernoulli hyperensemble. MS36 Techniques for Solving the Sudoku Puzzle Joshua Cooper University of South Carolina Department of Mathemeatics Solving Sudoku puzzles is one of the most popular pas- [email protected] times in the world. Puzzles range in difficulty from easy to very challenging; the hardest puzzles tend to have the most empty cells. The current work explains and compares MS35 three algorithms for solving Sudoku puzzles: backtracking, simulated annealing, and alternating projections. All three { } The Codegree Threshold of abc, abd, abe, cde are generic methods for attacking combinatorial optimiza- tion problems. We use Sudoku as a plot device to discuss Let F be a fixed 3-uniform hypergraph (3-graph). The the pros and cons of each. codegree threshold of F is the smallest d such that every n-vertex 3-graph G with minimum codegree at least d +1 must contain a copy of F as a subgraph. In this talk I Eric Chi will discuss our determination of the codegree threshold of Department of Statistics {abc, abd, abe, cde} and characterization of the associated North Carolina State University extremal configurations. eric [email protected]

Victor Falgas-Ravry Kenneth Lange Vanderbilt University UCLA [email protected] [email protected]

Edward Marchant Trinity College, Cambridge MS36 [email protected] A Comparison of Approaches for Solving Hard Graph-Theoretic Problems Oleg Pikhurko University of Warwick [email protected] To formulate conjectures likely to be true, a number of base cases must be determined. However, computational Emil Vaughan complexity often makes this approach difficult. To work Queen Mary, University of London around computational issues, a variety of methods are ex- [email protected] plored. These are a parallelized approach using Matlab, a quantum annealing approach using the D-Wave computer, and using SMT solvers. We address the challenges of com- MS35 puting solutions to an NP-hard problem with respect to each of these methods. Hamilton Cycles in Hypergraphs

For large n, we give a precise characterisation of all 4- Victoria Horan graphs H on n vertices with minimum codegree δ(H) ≥ Arizona State University n/2 − n (i.e. a little below the existence threshold) which [email protected] do not admit a Hamilton 2-cycle. This gives the exact Dirac-type threshold for such a cycle. Moreover, we may use this characterisation to find a Hamilton 2-cycle in H MS36 (or output that no such cycle exists) in polynomial time. By contrast, we show that the analogous problem for tight Using the D-Wave Machine for Combinatorial Hamilton cycles is NP-hard. Problems

Frederik Garbe, Richard Mycroft D-Wave Systems manufactures quantum annealing proces- University of Birmingham sors that physically seek minimum-energy spin configura- [email protected], [email protected] tions in the Ising model – an NP-hard problem – using su- perconducting processors operating near absolute zero. To solve other NP-hard problems with this system, we need MS35 to avoid a variety of pitfalls that appear when “polynomial Universal Hypergraphs reduction” becomes more than a pencil-and-paper exercise. I will talk about graph minors, constraint satisfaction, and An F(n, Δ)-universal hypergraph H contains a copy of any how to get the most out of this computer. hypergraph on at most n vertices with maximum vertex degree bounded by Δ. We study universality of random Andrew D. King hypergraphs and also provide almost optimal constructions Columbia University 84 DM16 Abstracts

[email protected] ing this talk we will discuss variations of these results if we also incorporate quantitative information about the inter- section (such as its volume or diameter). MS36 Algorithms for Combinatorial Generation Pablo Soberon Northeastern University Abstract not available [email protected]

Joe Sawada University of Guelph MS38 School of Computer Science Online Sprinkling [email protected] In this talk I present a new perspective due to Vu and my- self of generating random structures, referred to as ”online MS36 sprinkling”. Using this method, with several coauthors we The Graph Isomorphism Problem and Adiabatic solve few packing problems in random graphs and hyper- Algorithms graphs for almost optimal probabilities, such as: Packing perfect matchings in hypergraphs (with Vu), packing loose The graph isomorphism problem is a long standing un- cycles (with Luh, Nguyen and Montealegre), packing arbi- solved problem both in classical and quantum computing trarily oriented Ham cycles in directed graphs (with Long), theory. In this talk we give a brief introduction about the packing given spanning trees in Gnp (with Samotij), and reasons behind known hardnesses of the general and special more. classes of graph isomorphism both in classical and quantum paradigms. Finally, we introduce a new quantum approach Asaf Ferber to attempt the problem and report the progress. Yale University [email protected] Omar Shehab Department of Computer Science and Electrical Engineering MS38 University of Maryland, Baltimore County Independence of Random Sets in Hypergraphs [email protected] The independence density of a countable graph, introduced byBonato,Brown,Kemkes,andPralat, is the probability MS37 that a subset of vertices is independent when each vertex Bounds on Equiangular Lines and on Related is included independently with probability 1/2. The in- Spherical Codes dependence density of a countable hypergraph is defined d similarly. In this talk, I will present new results on some We will prove that every set of lines in R whose pairwise generalizations and on the sets of real numbers that are angles are all equal to some fixed α has at most cαd lines. independence densities of some countably infinite hyper- We will explain connection of this result to problems on graph. Joint work with P. Balister and B. Bollob´as. multiplicity of graph eigenvalues, and to constructions of strongly regular graphs. Karen Gunderson University of Manitoba Boris Bukh Department of Mathematics Carnegie Mellon University [email protected] [email protected]

MS38 MS37 Using P´olya Urns to Show Normal Limit Laws for Geometric Discrepancy and its Applications Fringe Subtrees in m-ary Search Trees and Prefer- Discrepancy theory has been developed into a diverse and ential Attachment Trees fascinating field, with numerous closely related areas and We study fringe subtrees in m-ary search trees and in pref- applications. We present a size-sensitive and near-optimal erential attachment trees, by putting them in the context discrepancy bound for geometric set systems. Our anal- of generalised P´olya urns. We show that for both of these ysis exploits the so-called ”entropy method” and ”partial random tree models, the number of fringe subtrees that coloring”, combined with the existence of small packing are isomorphic to an arbitrary fixed tree T converges to a numbers. As a main application, we define the notion of normal distribution; more generally, we also prove multi- ”Epsilon-approximations”, initially introduced in learning variate normal distribution results for random vectors of theory, their construction using discrepancy, and their role such numbers for different fringe subtrees. in ”approximate range search”. Cecilia Holmgren Esther Ezra Uppsala University Georgia Tech Department of Mathematics [email protected] [email protected]

MS37 Svante Janson Quantitative Helly-Type Results Uppsala University [email protected] Helly-type results describe how local properties affect the intersection structure of a family of convex sets in Rd.Dur- Matas Sileikis DM16 Abstracts 85

Charles University genotypes. Finding optimal treatment plans translate to [email protected] discrete optimization problems.

Kristina Crona MS38 Department of Mathematics and Statistics Unsatisfiability Proofs of Random (2,3)-SAT Re- American University quire Much Space [email protected]

Random boolean formulas appear to be intractible. When the density is a little below the satisfiability threshold, it MS39 may be impossible to find a satisfying solution in poly- Emergent Dynamics from Network Connectivity: nomial time. When the density is above the satisfiability A Minimal Model threshold, even far above, it may be impossible to provide an efficient proof that a formula is unsatisfiable. There has Many networks in the brain exhibit internally-generated been extensive research showing that there are no short patterns of activity – that is, emergent dynamics that are proofs using certain proof systems, most commonly reso- shaped by intrinsic properties of the network rather than lution. Recently, a new line of study has focused on the inherited from an external input. While a common fea- amount of space required for a proof: w.h.p. every reso- ture of these networks is an abundance of inhibition, the lution proof that a random k-SAT formula is unsatisfiable general mechanisms underlying pattern generation remain requires Θ(n2)space,fork ≥ 3. This is considered large unclear. In this talk I will introduce a new model, Toy Re- since every unsatisfiable k-SAT formula has a proof using current Networks (TRNs), consisting of simple threshold- O(n2) space. In this talk, we extend the result to a random linear neurons with binary inhibitory interactions. The dy- mixture of 2-clauses and 3-clauses. namics of TRNs are thus controlled solely by the structure of an underlying directed graph. By varying the graph, Patrick Bennett, Michael Molloy we observe a rich variety of emergent patterns including: University of Toronto multistability, neuronal sequences, and complex rhythms. [email protected], [email protected] These patterns are reminiscent of population activity in cortex, hippocampus, and various central pattern genera- tors for locomotion. I will then explain how our new math- MS38 ematical results allow us to predict many features of the How to Determine if a Random Graph with a Fixed dynamics by examining properties of the underlying graph. Degree Sequence has a Giant Component Finally, I’ll show examples illustrating how these theorems enable us to engineer complex networks with prescribed For a fixed degree sequence D =(d1, ..., dn), let G(D)be dynamic patterns. a uniformly chosen (simple) graph on {1, ..., n} where the vertex i has degree di. We determine whether G(D)hasa Carina Curto giant component, essentially imposing no conditions on D. Department of Mathematics We simply insist that the sum of the degrees in D which are The Pennsylvania State University not 2 is at least λ(n) for some function λ going to infinity [email protected] with n. This is a relatively minor technical condition, and the typical structure of G(D)whenD does not satisfy this condition, is simple and also discussed. MS39 A Topological Language of Rna Structures Felix Joos University of Birmingham We introduce a novel, context-free grammar (CFG) for [email protected] the analysis of RNA structures including pseudoknots (pk- structures). RNA structures are considered in a fatgraph Guillem Perarnau model and classified by their topological genus, in partic- McGill University ular, secondary structures have exactly genus zero. The [email protected] grammar acts on an arc-labeled RNA secondary structures, called λ-structures, that correspond one-to-one to pk- structures together with additional information (blueprint) Dieter Rautenbach about its construction from a secondary structure. The Universit¨at Ulm blueprint can be interpreted as a specific sequence of [email protected] transpositions of the backbone by which a pk-structure canbemadecross-free.Basedonthegrammar,wede- Bruce Reed sign an O(n log(n)) runtime algorithm which samples pk- McGill University structures having fixed genus according to the probability [email protected] distribution implied by an RNA dataset. Wenda Huang, Christian Reidys MS39 Biocomplexity Institute Predict, Prevent and Manage Antimicrobial Drug Virginia Tech Resistance: Discrete and Algebraic Approaches [email protected], [email protected] Antibiotic resistance and HIV drug resistance depend on mutations which accumulate in drug environments. There MS39 are usually constrains for the order in which mutations Convex Hulls in Phylogenetic Tree Space accumulate. Some resistance mutations are only selected for in the presence of other mutations, and some muta- The space of metric phylogenetic trees, as constructed by tions never co-occur. The patterns can be represented by Billera, Holmes, and Vogtmann, is a polyhedral cone com- a directed graph where the nodes are labeled by digital plex. This space is non-positively curved, so the geodesic 86 DM16 Abstracts

(shortest path) between two trees is unique. We give a the spread of strategies through a graph under this model, polynomial-time algorithm for computing convex hulls in and its limiting configuration. In particular, for some spe- the space of trees with 5 leaves. This algorithm extends cific graphs and parameter choices, we show how the final to any 2D CAT(0) polyhedral complex with a single ver- proportion of the different strategies depends on the initial tex. We also discuss some unexpected properties of these configuration, the cheating advantage, and the topology of convex hulls. the graph. This is joint work with Christopher Duffy and with Santiago Guzman Pro. Megan Owen Department of Mathematics and Computer Science Jeannette Janssen Lehman College Dalhousie University [email protected] [email protected]

MS39 MS40 Complexity of the Single Cut-Or-Join Model for Cops and Robbers and Barricades Genome Rearrangement We investigate a variant of the familiar game of Cops and Represent a genome with an edge-labelled, directed graph Robbers where the robber is allowed to place barricades. having maximum total degree two. Perhaps the simplest A barricade blocks a vertex so that neither player is able model, computationally, for genome rearrangement is the to enter it. We consider various rules for the placements of single cut-or-join model. Here, a genome can mutate via a barricades, and consider examples in trees and other graph cut, which divides a degree two vertex into two degree one families. In addition, we present a structural and algorith- vertices, or a join, which merges two degree one vertices mic characterization of barricade-cop-win graphs, which is into one degree two vertex. Despite the simplicity, deter- analogous to the cop-win characterization of Nowakowski mining the number of most parsimonious median scenar- and Winkler. ios remains #P-complete. We will discuss this and other complexity results that arise from an abstraction of this Erin Meger, Anthony Bonato problem. Ryerson University [email protected], [email protected] Istvan Miklos Renyi Institute [email protected] MS40 Searching Graph Products Heather C. Smith Georgia Institute of Technology We consider the traditional graph searching model in which 686 Cherry Street NW, Atlanta, GA 30332 there exists an infinitely fast, hidden intruder. To search [email protected] a graph, it is necessary to formulate and execute a search strategy; a sequence of actions designed so that, upon their completion, all edges of the graph have been cleared of the MS40 invisible intruder. We provide the first nontrivial lower bound for the search number of the Cartesian product of Cops, Robbers, and Infinite Graphs graphs, by considering the pathwidth of graph products. This talk will be a short survey of our work on the cops- Margaret-Ellen Messinger and-robber game on infinite graphs, with emphasis on the Mount Allison University infinite rather than cops-and-robber. The results come [email protected] from collaboration with Bonato, Gordinowicz,, Laviolette Sauer, Woodrow as well as from work of Polat, Chastand and Lehner. MS40 Gena Hahn To Catch a Falling Robber : Departement d’Informatique et recherche operationelle We consider a Cops-and-Robber game played on the sub- Universite de Montreal sets of an n-set. The robber starts at the full set; the cops [email protected] start at the empty set. In each round, each cop moves up one level by gaining an element, and the robber moves MS40 down one level by discarding an element. The question is how many cops are needed to ensure catching the robber The Prisoner’s Dilemma Game on Graphs when the robber reaches the middle level. Alan Hill posed n/2 One of the oldest scenarios studied in economic game the- the problem  and provided a lower bound of 2 for even n n −n/2 n/2 ory is the Prisoners Dilemma: a simple game where two and n/2 2 (which is asymptotic to 2 / πn/2) participants have the option to cooperate, with a modest for odd n. Until now, no nontrivial upper bound was pay-off for both, or cheat, with a large advantage for the known. In this paper, we prove an upper bound that is cheater. Unless, of course, both parties cheat, in which case within a factor of O(ln n) of this lower bound. their pay-off is zero. Now imagine that this game is played among a large group of participants, and over a sustained Pawel Pralat period of time. In particular, imagine that the group is con- Ryerson University nected via a friendship network. Participants can change Department of Mathematics their strategy (cooperate or cheat) based on what they ob- [email protected] serve from their friends (neighbours in the network). If a participant has a friend who got a larger pay-off, then they Douglas B. West will change their strategy to that of the friend. We study Zhejiang Normal University and University of Illinois DM16 Abstracts 87

Departments of Mathematics immersion containment in 4-edge-connected graphs. More [email protected] precisely, we prove that for every graph H,thereexistsa function f such that for every 4-edge-connected graph G, Bill Kinnersley either G contains k pairwise edge-disjoint subgraphs each University of Rhode Island immersing H,orthereexistasetofatmostf(k)edges [email protected] of G intersecting all such subgraphs. The theorem is best possible in the sense that the 4-edge-connectivity cannot be replaced by the 3-edge-connectivity. MS41 On Box-Perfect Graphs Chun-Hung Liu Department of Mathematics AgraphG is called box-perfect if the polytope of stable Princeton University sets of G is box-TDI (totally dual integral). All box-perfect [email protected] graphs are perfect but not the other way around. The study of box-perfect graphs was initiated by Edmonds and Cameron. In this talk we survey known results on box- MS41 perfect graphs and we also present a few new ones. Tiling Directed Graphs with Tournaments

Guoli Ding The Hajnal–Szemer´edi theorem is a celebrated theorem in LSU extremal graph theory. It states that for any integer r ≥ 1 [email protected] and any multiple n of r,ifG is a graph on n vertices and δ(G) ≥ (1 − 1/r)n,thenG can be partitioned into n/r vertex-disjoint copies of the complete graph on r vertices. MS41 We will discuss a very general analogue of this result for Degree Sum and Dominating Paths large directed graphs.

A vertex dominating path in a graph is a path P such that Cyzgrinow Andrzej every vertex outside P has a neighbor on P . In 1988 H. Arizona State University Broersma stated a result implying that every n-vertex k- [email protected] connected graph G such that σ(k+2)(G) ≥ n − 2k − 1con- tains a dominating path. We show that every n-vertex DeBiasio Louis ≥ 2n k-connected graph with σ2(G) k+2 + f(k)containsa Miami University dominating path of length at most O(|T |), where T is [email protected] a minimum dominating set of vertices. The main re- sult is that every n-vertex k-connected graph such that Theodore Molla ≥ 2n σ2(G) k+2 + f(k) contains a path of length at most Department of Mathematics O(|T |) through any set of T vertices where |T | = o(n). University of Illinois at Urbana-Champaign [email protected] Ronald Gould Dept. of Mathematics and Computer Science Andrew Treglown Emory University University of Birmingham, UK [email protected] [email protected]

Jill Faudree University of Alaska Fairbanks MS41 [email protected] Clique Degrees in Random Graphs

Ralph Faudree One of the first theorems one may learn in graph theory University of Memphis is that every graph on at least two vertices contains two Department of Math Sciences vertices of equal degrees. One can define the Kr-degree of a [email protected] vertex as the number of Krs that vertex lies in. Inspired by the previous theorem, we ask if a similar statement is true Paul Horn for Kr-degrees. The answer is no, finding a graph with all University of Denver different Kr-degrees is an interesting exercise. But is this [email protected] outcome typical? To this end, we study the question for random graphs.

Michael Jacobson Anton Bernshteyn University of Colorado, Denver University of Illinois Urbana = [email protected] [email protected] Christopher Cox MS41 Carnegie Mellon University [email protected] Packing and Covering Immersions in 4-Edge- Connected Graphs Paul Horn AgraphG immerses another graph H if H can be obtained University of Denver from a subgraph of G by splitting off edges and removing [email protected] isolated vertices. In this talk, we will sketch a proof of an edge-variant of the Erd˝os-P´osa property with respect to the Franklin Kenter 88 DM16 Abstracts

Rice University Fahrbach [email protected] Georgia Institute of Technology [email protected], [email protected], Bernard Lidicky, Bernard Lidicky [email protected], [email protected] Iowa State University, Ames, IA [email protected], [email protected] MS42 Humberto Naves Sampling on Lattices with Free Boundary Condi- Institute for Mathematics and its Applications tions Using Randomized Extensions University of Minnesota Many statistical physics models are defined on an infinite [email protected] lattice by taking appropriate limits of finite lattice regions, where a key consideration is how the boundaries are de- Florian Pfender fined. For several models on planar lattices, such as 3- Dept. of Math & Stat Sciences colorings and lozenge tilings, efficient sampling algorithms University of Colorado Denver are known for regions with fixed boundary conditions,where fl[email protected] the colors or tiles at the boundary are pre-specified [Luby, Randall, and Sinclair, 2001], but much less is known about Michael Tait sampling when these regions have free boundaries,where University of California San Diego we want to include all configurations one could see within [email protected] a finite window. We introduce a method using random- ized extensions to relate sampling problems on lattice re- gions with free boundaries to a constant number of sam- MS42 pling problems on larger regions with fixed boundaries. We On Sampling Crossing-Free Geometric Structures demonstrate this principled approach to sample 3-colorings of regions of Z 2 and lozenge tilings of regions of the trian- We initiate a study of sampling and approximate counting gular lattice, building on arguments for the fixed bound- algorithms for graph structures with geometric constraints. ary cases. Our approach also yields an efficient algorithm We consider geometric graphs where the vertices are given for sampling 3-colorings with free boundary conditions on by points in the plane and edges connect pairs of vertices regions with one reflex corner, the first such result for a by straight line segments. Wettstein [SoCG 2014] gave an ∗ n nonconvex region. This approach generalizes to a broad O (2 ) algorithm counting crossing-free perfect matchings class of mixed boundary conditions, significant because it in complete geometric graphs. We design polynomial-time allows us to establish self-reducibility. As a consequence, randomized approximation counting algorithms for several we give the first algorithm to approximately count the total types of instances and show rapid mixing of the correspond- number of 3-colorings of rectangular lattice regions. ing Markov chains. Sarah Cannon, Dana Randall Ivona Bezakova, Wenbo Sun Georgia Institute of Technology Rochester Institute of Technology [email protected], [email protected] [email protected], [email protected]

MS42 MS42 Reverse Cycle Walking and its Applications Sampling Integer Partitions Using Biased Markov Chains We study the problem of constructing a block-cipher on a “possibly-strange” set S using a block-cipher on a larger We present the first provably efficient Markov chain for set T. Such constructions are useful in format-preserving generating random integer partitions of n. While there are encryption. Previous work has solved this problem using a other methods for generating random partitions, these re- technique called cycle walking, first formally analyzed by quire knowledge of the exact number of partitions and can- Black and Rogaway. We introduce an alternative to cycle not be adapted to restricted families of partitions. Our al- walking that we call reverse cycle walking, which lowers the 9/4 gorithm runs in expected time O(n ) with optimal space worst-case number of times we must apply the block-cipher / O(n1 2 log n) and generates samples exactly from the uni- on T from Θ(N)toΘ(logN). Our analysis of reverse cycle form distribution. We use a correspondence between par- walking relies heavily on Markov chain analysis techniques. titions and Ferrers diagrams, which are staircase walks in the plane, and sample from the set of Ferrers diagrams within a fixed region. In addition, our algorithm can be Sarah Miracle adapted to sample from other classes of integer partitions, Georgia Institute of Technology such as those with bounded numbers of pieces, maximal [email protected] size, or bounded Durfee square. In these cases the Markov chain is always guaranteed to converge in time O (n2.5)and Scott Yilek space O (n1/2), allowing us to generate samples of varying University of St. Thomas size efficiently. The expected time to produce a partition [email protected] of n depends on well-believed conjectures that the parti- tion numbers are log-concave (for sufficiently large n)for these restricted settings. We test this conjecture as we run MS42 the algorithm, so we generate partitions of n efficiently, or Cycle Basis Markov Chain for the Ising Model gain evidence that this conjecture is not true, an idea used previously in the context of self-avoiding walks. Studying the ferromagnetic Ising model with zero applied field reduces to sampling even subgraphs X of G with prob- Prateek Bhakta, Dana Randall, Ben Cousins, Matthew ability proportional to λ|E(X)|. In this paper we present a DM16 Abstracts 89

class of Markov chains for sampling even subgraphs, which on n vertices. In particular, we show that 5n/2 − 15/2 ≤ contains the cl