The Phase Transition in Random Graphs: A Simple Proof

Subscribers:
351,000
Published on ● Video Link: https://www.youtube.com/watch?v=HtBWmw4d8tg



Duration: 1:00:10
2,957 views
44


The classical result of Erdos and Renyi shows that the random graph G(n,p) experiences sharp phase transition around p=1/n -- for any \epsilon0 and p=(1-\epsilon)/n, all connected components of G(n,p) are typically of size O(\log n), while for p=(1+\epsilon)/n, with high probability there exists a connected component of size linear in n. We provide a very simple proof of this fundamental result; in fact, we prove that in the supercritical regime p=(1+\epsilon)/n, the random graph G(n,p) contains typically a path of linear length. We also discuss applications of our technique to other random graph models and to positional games. Joint work with M. Krivelelvich




Other Videos By Microsoft Research


2016-07-27Decomposition of Speech and Sound into Modulators and Carriers
2016-07-27Micro Implants � a New Branch of Next Generation Biomedical Devices
2016-07-27Calming Tech - Explorations on Interactive Technology Design for Stress and Emotional Management
2016-07-27Dynamic Loudness Control for In-Car Audio
2016-07-27Measuring and improving the readability of network visualizations
2016-07-27Efficient Minimization of Risk Measures via Smoothing: Theory and Applications
2016-07-27Quantifying and Reducing the Overhead of Topological Quantum Error Correction in Large-Scale System
2016-07-27Extracting events of biomedical relevance from text
2016-07-27The Evolution of Pret a Voter
2016-07-27Friends don�t Lie - Inferring Personality Traits from Social Network Structure
2016-07-27The Phase Transition in Random Graphs: A Simple Proof
2016-07-27The Margulis expanders
2016-07-27Challenges in Malware Analysis
2016-07-27Synthesis of small quantum and reversible circuits with quality guarantee
2016-07-27Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction Sets
2016-07-27Internet Voting: An Idea Whose Time Has Not Come
2016-07-27The Mechanical Cryptographer: Tolerant Algebraic Side-Channel Attacks using pseudo-Boolean Solvers
2016-07-27Practice-Driven Cryptographic Theory
2016-07-27Hawaii Intern XAPfest - Intro Session #1
2016-07-27Designing a Choice Architecture for Mobile Device Privacy and Security
2016-07-27Memory Abstractions for Parallel Programming



Tags:
microsoft research