Topological Combinatorics – Ens Lyon

Topological Combinatorics – Ens Lyon

Topological Combinatorics { Ens Lyon Fr´ed´ericMeunier and MatˇejStehl´ık October 23, 2019 2 Contents 1 Preliminaries5 1.1 Notations . .5 1.2 Complexity . .5 1.3 Linear programming . .5 1.3.1 Main results . .5 1.3.2 Bases . .6 1.4 Graphs . .7 1.4.1 Basic definitions . .7 1.4.2 Subgraphs . .8 1.4.3 Coloring . .8 1.4.4 Graph homomorphism . .9 1.4.5 Directed graphs . .9 1.5 Hypergraphs . 10 1.6 Polyhedra . 11 1.7 Simplicial complexes . 11 1.8 Barycentric subdivision and posets . 12 1.9 Signed vectors . 14 2 Sperner's lemma, Tucker's lemma, and their relatives 15 2.1 Sperner's lemma . 15 2.2 Surjectivity of continuous self-maps stabilizing the faces of a polytope . 16 2.3 Shapley's lemma . 17 2.4 Ky Fan's lemma . 17 2.4.1 The general Ky Fan's lemma . 17 2.4.2 Ky Fan's lemma for signed vectors . 18 3 The Borsuk{Ulam theorem 21 3.1 Introduction . 21 CONTENTS 4 3.2 The ham sandwich theorem . 22 3.3 Borsuk graphs . 23 4 Kneser graphs 25 4.1 Introduction . 25 4.2 Fractional chromatic number . 25 4.3 Chromatic number . 26 5 Mycielski graphs 27 5.1 Introduction . 27 6 Fair divisions 29 6.1 Cake cutting . 29 6.1.1 Algorithmic features . 30 6.2 Necklace splitting . 31 6.2.1 Algorithmic features . 32 6.2.2 Generalizations . 32 7 d-intervals 33 7.1 Statement . 33 7.2 Proof . 33 CHAPTER 1 Preliminaries 1.1 Notations For any positive integer a, the set f1; : : : ; ag is denoted [a]. Let X be any X set. Given a nonnegative integer k, we denote by k the set of all subsets of cardinality k of X. 1.2 Complexity A problem is polynomial, or in P , if there exists a polynomial time algorithm solving it. A problem is NP -hard if unless P 6= NP , there is no polynomial algo- rithm solving it. The equality P = NP is unlikely. Being NP -hard can thus be thought as being intrinsically hard. 1.3 Linear programming 1.3.1 Main results A linear program is a mathematical program that can be written as min cT x s.t. Ax > b x 2 Rn: where b 2 Rm, c 2 Rn, and A is a m × n real matrix. This is the inequation form. It can equivalently be written under the standard form min cT x s.t. Ax = b n x 2 R+ 1.3. LINEAR PROGRAMMING 6 or the canonical form min cT x s.t. Ax > b n x 2 R+: The set of feasible solutions of a linear program is a polyhedron. Theorem 1.3.1. Consider a minimization linear program. If it is feasible and bounded from below, then it has an optimal solution. If it has an optimal solution, then it has an optimal solution that is a vertex of the polyhedron. If it is feasible but is not bounded from below, then there is a ray t 7! n x(t) = x0 + tq, for some x0; q 2 R , with x(t) feasible for all t 2 R+ such T that limt!+1 c x(t) = −∞. Proposition 1.3.2. Consider a linear program in any form such that b and A have only rational coefficients. If it admis an optimal solution, then it has an optimal solution with rational coefficients. Proof. This is a consequence of the second point of Theorem 1.3.1. Note that there is no conditions on the coefficients of c in Proposi- tion 1.3.2. 1.3.2 Bases Consider the system Ax = b (P) x > 0: A is an m × n matrix of rank m. Given a subset X of [n], we denote by AX the matrix obtained by keeping from A only the columns indexed by elements of X. A subset B of [n] is a basis if AB is nonsingular. Note that it implies that −1 jBj = m. A basis is feasible if AB b is nonnegative. To each basis, there is −1 an associated basic solution y defined by yB = AB b and y[n]nB = 0. Note that if the basis is feasible, then the associated basic solution is feasible. [n] B The pair (A; b) is generic if for any B 2 m , there is no y 2 R+ such that ABy = b and y has a component equal to zero. n Lemma 1.3.3. Suppose (A; b) generic and fx 2 R+ : Ax = bg bounded. [n] B Let B 2 m . If ABy = b has a solution y in R+, then AB is nonsingular (i.e. B is a feasible basis). 7 CHAPTER 1. PRELIMINARIES B Proof. Suppose for a contradiction that there is a λ 2 R+ n f0g such that n ABλ = 0. Then, for any t 2 R+, we have AB(y + tλ) = b. Since fx 2 R+ : Ax = bg is bounded, there is necessarily a t such that y + tλ has at least one component equal to 0, which contradicts the genericity assumption. n Proposition 1.3.4. Suppose (A; b) generic and fx 2 R+ : Ax = bg [n] bounded. Let L 2 m+1 . The number of feasible bases contained in L is either 0 or 2. L Proof. Let Q = fy 2 R+ : ALy = bg and let λ 2 Ker AL nf0g. Assume that there is a feasible basis B in L. We are going to show that there is exactly one feasible basis in L distinct from B. + −1 + Let x 2 RB be defined by xB = AB b. Let z 2 RL be defined by zi = xi for i 2 B and z` = 0, where ` is the unique element in L n B. Note that we have λ` 6= 0, otherwise AB would have been singular. Without loss of generality, we assume that λ` > 0. Defining L to be the set of vectors z + tλ L for t 2 R, we have Q = L\ R+. Since λ` > 0, if z + tλ 2 Q, then t > 0. When t goes to infinity, z + tλ leaves Q for some value α because of the boundness assumption. Thus, we have Q = fz + tλ : t 2 [0; α]g. Therefore, there are exactly two elements in Q having a support of size m: the one obtained for t = 0 and the one obtained for t = α. Lemma 1.3.3 allows to conclude. 1.4 Graphs 1.4.1 Basic definitions A (undirected) graph is a pair G = (V; E), where V is a finite set and E a finite family of unordered pairs uv from V . The elements of V are the vertices and the elements of E are the edges. When these sets have not been stated explicitly, we shall use V (G) and E(G) for the vertex set and the edge set of G, respectively. We use the word `family' rather than `set' for the edges to indicate that some pairs of vertices may occur more than once as an edge. Two vertices u and v are adjacent if uv is an edge. In such a case, u is a neighbor of v and vice-versa. The set of all neighbors of a vertex u is denoted N(u). An edge uv is incident to both u and v. The set of edges incident to a vertex v is denoted δ(v). The degree of a vertex v, denoted deg(v), is the number of edges incident to it: deg(v) = jδ(v)j. The following lemma, whose proof is left in exercise, will be useful. Lemma 1.4.1. The number of odd degree vertices in a graph is always even. 1.4. GRAPHS 8 A path is a sequence v0; e1; v1; e2; v2; : : : ; e`; v` where the vi's are vertices, where the ei's are edges, and where ei = vi−1vi for all i.A circuit is a path such that v0 = v`. A path (resp. circuit) is elementary if all ei are distinct. A graph is connected if there is a path between all pairs of vertices. The complete graph Kt is the graph on t vertices with and edge between each pair of distinct vertices. A subset S of vertices is stable if no two vertices in S are adjacent. The size of a largest stable set is denoted α(G). Determining its value is an NP -hard problem. G is complete if for all u; v 2 V with u 6= v we have uv 2 E (all possible edges are present). 1.4.2 Subgraphs A graph H = (V 0;E0) is a subgraph of G = (V; E) if V 0 ⊆ V and E0 ⊆ E. Given a subset X of V , we define H[X] to be the graph (X; E[X]) where E[X] is the set of all edges of E having both endpoints in X. Such a graph is a subgraph of G and is induced by X. A clique is a complete subgraph. The size of the largest clique in G is denoted !(G). Computing this quantity is an NP -hard problem. 1.4.3 Coloring A coloring of a graph G is a map c: V ! Z+. The elements in c(V ) are the colors. The coloring is proper if no adjacent vertices get the same color. A proper coloring can also be seen as a partition of the vertex set into stable sets. The chromatic number is the smallest number k such that there is a proper coloring with k colors.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    36 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us