2017
DOI: 10.1007/s10955-017-1902-z
|View full text |Cite
|
Sign up to set email alerts
|

Scaling Limits and Generic Bounds for Exploration Processes

Abstract: We consider exploration algorithms of the random sequential adsorption type both for homogeneous random graphs and random geometric graphs based on spatial Poisson processes. At each step, a vertex of the graph becomes active and its neighboring nodes become explored. Given an initial number of vertices $N$ growing to infinity, we study statistical properties of the proportion of explored nodes in time using scaling limits. We obtain exact limits for homogeneous graphs and prove an explicit central limit theor… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

1
19
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 10 publications
(20 citation statements)
references
References 20 publications
1
19
0
Order By: Relevance
“…Thanks to the great amount of independence and symmetry of the collection of edges in a sparse ER graph G(N, c/N ), the greedy exploration algorithm is characterized by Z N k k a simple one-dimensional Markov process. As a consequence, a functional law of large numbers described by a differential equation can be employed to get the macroscopic size of the constructed independent set when the number of nodes goes to infinity (see Bermolen et al (2017a) and the references in McDiarmid (1990)). Diffusion approximations for the process and central limit theorem derived from it for the size T * N of the associated independent set are also known, see Bermolen et al (2017a).…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Thanks to the great amount of independence and symmetry of the collection of edges in a sparse ER graph G(N, c/N ), the greedy exploration algorithm is characterized by Z N k k a simple one-dimensional Markov process. As a consequence, a functional law of large numbers described by a differential equation can be employed to get the macroscopic size of the constructed independent set when the number of nodes goes to infinity (see Bermolen et al (2017a) and the references in McDiarmid (1990)). Diffusion approximations for the process and central limit theorem derived from it for the size T * N of the associated independent set are also known, see Bermolen et al (2017a).…”
mentioning
confidence: 99%
“…As a consequence, a functional law of large numbers described by a differential equation can be employed to get the macroscopic size of the constructed independent set when the number of nodes goes to infinity (see Bermolen et al (2017a) and the references in McDiarmid (1990)). Diffusion approximations for the process and central limit theorem derived from it for the size T * N of the associated independent set are also known, see Bermolen et al (2017a). However, there is to the best of our knowledge no characterization of a large deviation principle (LDP) for both the discrete time Markov process Z N k k and the random variable T * N , which can give various types of useful information both on the greedy exploration and on the independent sets landscape.…”
mentioning
confidence: 99%
“…graphs with few loops, can be also tractable. For instance, the RSA model on the sparse Erdős-Rényi random graphs with b = 1 has been studied, see [39][40][41][42]. It would be interesting to determine the full counting statistics of the occupation number for this RSA model.…”
Section: Discussionmentioning
confidence: 99%
“…, n} at which all vertices are either labeled excited or unaffected. Borrowing terminology from [20,33,34], the resulting state is called a jamming limit, and T n is a so-called hitting time. Compared to the QMMRG, we note that a vertex that is unaffected within the RSA process corresponds to an atom that is still in a ground state because it has not excited yet, and moreover, this atom has not yet been blocked by another atom.…”
Section: Modelsmentioning
confidence: 99%
“…Theorems 1-3 also contribute to the mathematical perspective. The study of exploration processes of the RSA type on random graphs has seen interest in recent years [20,[32][33][34][35][36][37][38]. The tools necessary from probability theory to analyze said processes include e.g.…”
Section: Introductionmentioning
confidence: 99%