# Random 2-SAT solution components and a fitness landscape.

1 IntroductionWe are interested in the connective properties of a random subgraph of the discrete cube [Q.sup.n]. This random subgraph [Q.sup.F] is induced on those vertices that correspond to literal assignments that satisfy a 2-CNF formula F = [F.sub.p] that is randomly determined by letting each clause be included in F with probability p. Let [N.sub.n] be the number of connected components in [Q.sub.F].

Theorem 1 Let F, [Q.sub.F] and [N.sub.n] be randomly determined as above. If p = c/2n and c < 1 is constant, then [N.sub.n] converges weakly to N = [2.sup.[PSI]] where [PSI] is a Poisson random variable with mean

[lambda] = -1/2 (ln(1-c) + c).

In particular, the probability that there is a unique cluster converges to

[e.sup.-[lambda] = [square root of (1 - c)[e.sup.c]]

Our interest in the component structure is motived by the theory of fitness landscapes. The notion of fitness landscapes was introduced by a theoretical evolutionary biologist, Sewall Wright in [17] (see also [14, 11]). The study of fitness landscapes has proved extremely useful both in biology and well outside of it. In the standard interpretation, a fitness landscape is a relationship between a set of genes (or a set of quantitative characters) and a measure of fitness (e.g. viability, fertility, or mating success). In Wright's original formulation the set of genes (or quantitative characters) is the property of an individual. However, the notion of fitness landscapes can be generalized to the level of a mating pair, or even a population of individuals [11]. For further information one can look at the book Fitness Landscapes and the Origin of Species [11] or the paper [13], which is a sort of biological sister to our discussion here.

It turns out that k-SAT is also of interest to physicists working in statistical mechanics and it is somewhat surprising that the component structure for random 2-SAT has not been examined previously because the component structure for 3-SAT has been explored. Replica symmetry breaking is a method from statistical mechanics that is not strictly rigorous, but has been used to find two phase transitions in 3-SAT [5]. In one phase, all satisfying assignments form a single component in the n-cube. In the next, the number of components is exponential in n. In the final phase, there are no satisfying assignments. Since our result shows that the number of components is stochastically bounded for 2-SAT, it seems that the structures are quite different for 2-SAT and 3-SAT.

We organize the remainder as follows. In Section 2 we introduce notation and provide the necessary background and results in both 2-SAT and fitness landscapes. We also describe the connection between the two topics. Section 3 pertains to the number of clusters and contains the proof of our result.

2 Background

2.1 Fitness Landscapes

The particular model of fitness landscapes that we consider here begins with an idealized collection of all genotypes that are haploid and diallelic at n loci. A haploid organism is one for which there is only one copy of each chromosome. Alleles are the potential versions of a gene at a specified locus. In our model, for any specified n loci, there exists a list L of all the unordered pairs of strictly distinct alleles that are incompatible. Each genotype for these n loci is viable if none of its allele pairs is incompatible and inviable otherwise. Each list L is an instance of a fitness landscape on the given genotype space.

We are primarily interested in two questions relating to a given list L: how many viable genotypes are there and how well connected are they through single locus mutations? With regards to connectivity, we say that two genotypes are in the same cluster if and only if they are connected by a path of single locus mutations through viable genotypes. Thus, each cluster of viable genotypes corresponds to a collection of genotypes which can each evolve into any other genotype in the cluster without passing through an inviable genotype and without altering two or more alleles simultaneously. Since there are n loci and two alleles at each locus, our genotype space is in bijection with the set of binary strings of length n or the vertices of the discrete cube [Q.sup.n]. In addition, since the only allowed mutations are single locus mutations (which are equivalent to bit flips) we can represent these mutations by edges in [Q.sup.n]. The viable genotypes and mutations between them form an induced subgraph of [Q.sup.n] and the clusters are the connected components.

2.2 2-SAT

We begin with n Boolean variables [[xi].sub.1],..., [[xi].sub.n]. For each 1 [less than or equal to] i [less than or equal to] n, the two truth values of [[xi].sub.i] are referred to as the positive literal and the negative literal of [[xi].sub.i]. We will be using a non-standard notation to refer to these literals. We let 0 be the negative literal and 1 be the positive literal and then put the index in the subscript, i.e., for 1 [less than or equal to] i [less than or equal to] n

[O.sub.i] is the negative literal of [[xi].sub.i] [1.sub.i] is the positive literal of [[xi].sub.i]

The negation of any literal x is denoted [bar.x]. Thus, [bar.[O.sub.i]] = [1.sub.i] and [bar.[1.sub.1] = [0.sub.i]. Literals of distinct variables are said to be strictly distinct. An assignment of n strictly distinct literals to n Boolean variables is referred to as a truth assignment to the n variables.

A 2-clause c = x [disjunction] y is the disjunction of two literals x and y. Generally these literals need not be distinct, but here we assume x and y are strictly distinct. Thus, there are

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]

possible 2-clauses. Suppose we have some number m [greater than or equal to] 0 of 2-clauses [c.sub.1],..., [c.sub.m]. Then

F = [c.sub.1] [conjunction] ... [conjunction] [c.sub.m]

is a 2-SAT formula. Again, we assume that the clauses are distinct. If there is some literal assignment to the n variables for which the formula F is TRUE, then it is said to be satisfied or SAT. Determining if a formula is satisfiable is known as the 2-SAT problem.

The 2-SAT problem is the simplest of the k-SAT problems. For any k [greater than or equal to] 2, a k-SAT formula is the conjunction of m disjunctions where the number of literals per disjunction is k. The k-SAT problem, like the 2-SAT problem, is to determine whether or not a given formula is satisfiable. Of course, one can consider other types of satisfiability problems as well. Satisfiability problems in general have been important in theoretical computer science since 1971, when Cook established that they are NP-complete [9]. The most studied type of satisfaction problem is k-SAT because most other models were proven to generate easy-to-satisy formulas. The 2-SAT problem, unlike k-SAT problems for k > 2, is not NP-complete. In fact, solutions can be found in linear time [3].

2.3 2-SAT as a Fitness Landscape

Let each Boolean variable [[xi].sub.i] be associated with a genetic locus i and let the literals [0.sub.i] and [1.sub.i] and 1 represent the two alleles at that locus. Also, let us write that xy is an incompatibility if the alleles x and y are incompatible. Then, notice that if a formula F contains the clause [bar.x] [conjunction] [bar.y] then no satisfying assignment to n variables contains both x and y. Mapping each clause [bar.x] V [bar.y] to the corresponding incompatibility xy leads to a bijection between the set of 2-SAT formulas and the set of lists of incompatibilities. It follows that if L is a list of incompatibilities and F is the 2-SAT formula with the corresponding clauses, then a genotype with no allele pairs on L is associated with a literal assignment that satisfies the formula F and vice versa. Consequently, we can let F refer to either the formula or the list of incompatibilities without distinction and we can think of the biological questions in terms of 2-SAT or the other way around.

2.4 Random 2-SAT and Results

Determining the probability that a randomly chosen formula F is satisfiable is a random 2-SAT problem. Throughout this paper, F is chosen by letting each possible clause be included independently with probability

[p = c/2n].

where c > 0. In general, c may depend on n, but all results stated here hold only for constant c. The reason p is written as c/2n is that there is a phase transition from satisfiable to unsatisfiable where the expected number of clauses is asymptotically equivalent to the number of literals 2n.

Theorem 2 Let [member of] > 0 be constant and F be a formula chosen randomly as described above. Then the following statements hold with probability approaching 1 as n tends to infinity.

* If c [greater than or equal to] 1 + [member of] then F is not satisfiable.

* If c [less than or equal to] 1 - [member of] then F is satisfiable.

This is the fundamental result for random 2-SAT and was proved independently by three different groups around 1992 [8, 10, 12]. The model examined in these papers is actually slightly different, but is asymptotically equivalent to ours in that both exhibit the same phase transition at equivalent critical values. This equivalence and the best current results are described in [7], where [member of] > 0 is allowed to vary with n and the size of the finite scaling window is described.

We are also interested in the number of satisfying assignments in the SAT phase. The following result is proved in [13].

Theorem 3 The number of satisfying assignments to a satisfiable 2-SAT formula is at least

exp(([e.sup.-2c] + [ce.sup.-4c]) log 2 - [delta])n)

where c < 1 and [delta] > 0 are constants.

And now for the context of random 2-SAT. Random satisfiability problems became popular as a way to study the hardness of "typical" formulas. A particularly interesting fact about random k-SAT problems is that all random k-SAT problems undergo a phase transition similar to the transition for 2-SAT. More on this can be found in [1], which is a nice paper on both the latest research on k-SAT and some general satisfiability context.

2.5 Digraphs

2.5.1 The Standard Digraph for 2-SAT

Every 2-SAT formula F can be associated to a directed graph [D.sub.F] as defined by Aspvall et al [3]. The proofs of Theorem 2 and the remainder of our discussion here are based on this digraph.

* The vertex set of [D.sub.F] is the set of literals {[0.sub.1],..., [0.sub.n], [1.sub.1],..., [1.sub.n]}.

* For each clause x [conjunction] y in F the directed edges [bar.x] [right arrow] and [bar.y] x are included in [D.sub.F].

To clarify this definition, consider the clause x [conjunction] y: a literal assignment including [bar.x] must include y to be satisfying and an assignment with literal [bar.y] must have x. Thus, the two edges in the definition correspond to the two implications naturally associated with the clause x V y: x [??] y and y [??] [bar.x].

If there is a directed path from x to y in [D.sub.F] it is denoted by x [??]+ y. Notice that this path is in [D.sub.F] if and only if the path [bar.y] [??] [bar.x] is also in [D.sub.F]. Also, like the edges of [D.sub.F], these paths do correspond to logical implications corresponding to the satisfiability of F. The set of literals and edges that can be reached from x is referred to as the out-graph [D.sup.+.sub.F] (x) and the literal set of [D.sup.+.sub.F] is denoted

[L.sup.+](x) = [L.sup.+.sub.F](x) = {y : x [??] y}.

These are the literals that must be present in any satisfying assignment with literal x. Of course, an assignment may have all the literals in [L.sup.+] (x) and yet still not be satisfying due to an unrelated clause. On the other hand, those literals that require x to be present in any satisfying assignment are denoted

[L.sup.-](x) = [L.sup.-.sub.F](x) = {y : y [??] x}.

and the corresponding graph is called the in-graph of x and denoted [D.sup.-](x).

We say that two vertices x and y in a digraph are weakly connected if there is an undirected path from x to y in the digraph, i.e., x and y are weakly connected in the digraph if they are connected in the undirected (multi)graph that is formed by replacing directed edges with undirected edges. The components of this undirected graph formed from [D.sub.F] are called the weak components of [D.sub.F]. Notice that x and y may be in the same weak component without having a directed path from x to y or from y to x.

Suppose that y [member of] [L.sup.+.sub.F](x)[intersection][L.sup.-.sub.F](x), so x [??] y and y [??]. In this case x and y are said to be strongly connected. Consider the set of literals

[C.sub.F](x) = {y : x [??] y [??] x}

that are strongly connected to x. The subgraph of [D.sub.F] induced by these literals is a strongly connected component. We will refer to both the strongly connected component and its set of literals as the strong component of x. We follow the convention that x [??] x for every vertex x [epsilon] [D.sub.F] so that every vertex is a member of a strong component and [C.sub.F](x) is well defined for every literal and the set of all 2n literals can be partitioned into strong components of [D.sub.F]. When a strong component consists of a single literal we will say that the strong component is trivial. Otherwise the strong component is considered to be nontrivial. The set of all strong components can be partially ordered. Let

[C.sub.F](x)[less than or equal to][C.sub.F](y) if x [??] y,

which also implies that x' [??] y' for any x' [member of] [L.sup.-.sub.F](x) [contains or equal to][C.sub.F](x) and y' [member of] [L.sup.+.sub.F](y)[contains or equal to] [C.sub.F](y).

For any set of literals M, we define

[bar.M] = {[bar.y]: y [member of] M}.

When M [intersection] [bar.M] = 0, we say that M and [bar.M] are complementary. Notice that if y [member of] [C.sub.F](x), then [bar.y] [member of] [C.sub.F]([bar.x]) so [C.sub.F] ([bar.x]) = [C.sub.F] (x) for every literal x. We also see that

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII].

If there is a literal x such that [C.sub.F](x) = [bar.[C.sub.F](x)], then there are literals y, z [not member of] {x, [bar.x]} (not necessarily distinct) such that

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]

and we say that x (and each y [member of] [C.sub.F] (x)) is on a contradictory cycle in [D.sub.F]. Notice that this cycle need not be simple (have the same number of literals as edges). Since the literal x depends upon its complement [bar.x] to be satisfying and vice versa, neither literal can be assigned to the corresponding variable and there are no satisfying assignments. On the other hand, it can be shown that if there are no contradictory cycles, then there is at least one satisfying assignment (see [7] for example). This is perhaps the most fundamental result in the study of 2-SAT.

Theorem 4 A formula F is satisfiable if and only if there is no contradictory cycle in [D.sub.F].

2.5.2 The Digraph of the Partial Ordering of Strong Components [O.sub.F]

Since a formula F is satisfiable exactly when there is no literal x such that [C.sub.F](x) = [bar.[C.sub.F](x)], we see that having a satisfiable formula is equivalent to having every strong component of the digraph being a member of a complementary pair {[C.sub.F](x), p(x), Cp(x)}. It follows that, given any satisfiable formula F and any strong component C of [D.sub.F], a necessary (but not sufficient) condition for an assignment to be satisfying is that it must have either have all the literals of C or else all of the literals of [bar.C]. This means that, while there are [2.sup.[absolute value of C]] potentially satisfying (partial) assignments to the variables of C, we know that there are actually only two possible combinations of the literals on these variables that might correspond to satisfying assignments. To indicate the assignment of all literals in C (or C) we will simply state that we have assigned C (or [bar.C]). Now suppose that there are s complementary strong component pairs determined by a satisfiable formula F, and {[C.sub.1], [bar.[C.sub.1]} ... {[C.sub.s], [bar.[C.sub.s]} is a listing of these. Then every satisfying assignment must satisfy

([C.sub.1] v [[bar.[C.sub.1])[conjunction] ... [conjunction]([C.sub.s][disjunction][bar.[C.sub.s]). (1)

It follows that there are no more than [2.sup.s] assignments that satisfy F. In this manner, it makes sense to think of complementary strong components as a tool for reducing the dimension of the solution space.

Continuing in this vein, we find it helpful to consider the directed graph corresponding to the partial order on the strong components of [D.sub.F], which we will denote by [O.sub.F]. The vertex set of [O.sub.F] is the set of strong components of [D.sub.F] and there are edges X [right arrow] Y in [O.sub.F] exactly when X and Y are strong components of [D.sub.F] such that there exist literals x in X and y in Y such that x [right arrow] y is an edge of [D.sub.F]. Thus the edges of [O.sub.F] correspond to implications that are represented in [D.sub.F]. Moreover, the implications corresponding to [O.sub.F] in conjunction with the statement (1) form a statement that is logically equivalent to F. In much of Section 3 we will effectively ignore the internal structure of the strong components that determines (1) and focus our attention on the ordering of the strong components represented in [O.sub.F].

We will relax our language a bit and write that a collection of strong components C = {[C.sub.1],..., [C.sub.i]} is a partial assignment to indicate that all the literals in [[union].sub.i][C.sub.i] have been assigned. Similarly, we will use [L.sup.+](C) to refer to [L.sup.+]([[union].sub.i][C.sub.i]), and so on. Given two partial assignments C and D, we notice that C [union] D is a partial assignment without contradiction if and only if [L.sup.+] (C) U [L.sup.+] (D) is strictly distinct. A related result is

Lemma 5 If X is a collection of strong components such that [L.sup.+](X) = X and Y is any collection of strong components that is strictly distinct from X, then [L.sup.+] (y) [union] [bar.X] = 0. Thus, under the given premises, X [union] Y can be assigned without contradiction if and only if [L.sup.+] (y) is strictly distinct.

Proof: If this were not the case, then there are strong components X [member of] X and Y [member of] y such that Y [less than or equal to] [bar.X], which is equivalent to X [less than or equal to] [bar.Y]. Since X = [L.sup.+] (X) this means that [bar.Y] [member of] X; which means that X and Y were not strictly distinct. This result allows us to make the assignment X

for any collection of strong components that satisfies X = [L.sup.+](X) and then consider partial assignments to the remaining variables without consideration of the variables of X.

Clearly, we are interested in the structure of the partial order [O.sub.F]. A chain is a totally ordered subset of a partially ordered set, which means that any two elements in the chain are comparable in order. An antichain is a subset A of a partially ordered set such that any two elements in A are incomparable. A maximal (anti)chain is an (anti)chain that is not a proper subset of any other (anti)chain. A maximum (anti)chain is an (anti)chain that has cardinality at least as large as every other (anti)chain. The height of a partial order is the cardinality of a maximum chain. The width of a partial order is the cardinality of a maximum antichain. We will use the term complementary antichains to refer to a pair {A, [bar.A]} where A is a strictly distinct collection of strong components where each element in A is incomparable to every other element in A [union] [bar.A]. We will refer to the cardinality of a maximum complementary antichain as the complementary width of [O.sub.F].

Lemma 6 Suppose F is satisfiable. If {A, [bar.A]} is a pair of complementary antichains in [O.sub.F] where A = {[C.sub.1],..., [C.sub.l]}, and X = {[X.sub.1],..., [X.sub.l]} is any partial assignment where [X.sub.i] [member of] {[C.sub.i], [bar.[C.sub.i]} for 1 [less than or equal to] i [less than or equal to] l, then there exists a satisfying assignment containing X.

Proof: Notice that [L.sup.+](X) is strictly distinct. Indeed, if not, then there is a component Z such that there exist [X.sub.i] and [X.sub.j] from X such that [X.sub.i] [less than or equal to] Z and [X.sub.j] < [bar.Z]. And so we have [bar.Z] [less than or equal to] [bar.[X.sub.i]], which gives us [X.sub.j] [less than or equal to] [bar.[X.sub.i]]. Since this contradicts the complementary nature of A, the outgraph is strictly distinct and we can select all the literals of [L.sup.+](X) for a partial assignment A that is without contradictions. Notice that A = [L.sup.+](A) = [L.sup.+] (X), so [bar.A] = L -([bar.A]). Thus, once we have selected A, we can not choose a strong component Y from L-([bar.A]) (because we have already chosen the complements). This means that the choice between any strong component pair {Y, [bar.Y]} beyond A can be made independent of A. Thus, we can simply invoke the satisfiability of F to be sure that there exists some satisfying assignment containing A which of course contains X.

Corollary 7 Suppose F is satisfiable. If k is the complementary width of [O.sub.F], then there are at least [2.sup.k] assignments that satisfy F.

Proof: Let A be a maximum complementary antichain. We observe that there are [2.sup.k] distinct partial assignments X as described in Lemma 6 that correspond to A. Thus, Lemma 6 ensures the existence of 2k distinct assignments that satisfy F.

3 The Number of Components

The purpose of our discussion here is ultimately to study the number of connected components of [Q.sub.F]. Besides our innate mathematical interest in structure, we are also interested in connected components of [Q.sub.F] for biological reasons. Recall that in our biological model, literals correspond to alleles, so complementary strong components represent alternate strategies for survival. If we anthropomorphize evolution, then we can think of the evolution of an organism as a sequence of choices between these alternate strategies. We imagine the set of satisfying assignments as the collection of all possible viable strategies for survival. We are interested in the topology of [Q.sub.F] as opposed to a more dense graph because allowing for edges only between assignments that differ on a single variable corresponds with allowing evolutionary pathways through single allele mutations only. If one considers our primary result, Theorem 1 in light of Theorem 3, we see that exponentially many solutions are organized into a stochastically bounded number of components. In the biological model, this means that each viable genotype is connected by single site mutations to an exponential number of other viable genotypes; whereas the number of these clusters, which are not connected to each other is very likely to be small.

We begin our study in Section 3.1 by considering the structure of [Q.sub.F] for a fixed formula F. We will see that this structure is somewhat difficult to describe when a formula F gives rise to a complicated partial order [O.sub.F]. In Section 3.2 we consider the random picture and prove Theorem 1. The proof of this result is based on the fact that in a random setting where satisfiability is asymptotically almost sure, the partial order [O.sub.F] is asymptotically almost surely an anti-chain.

3.1 The Deterministic Setting

Consider two satisfying assignments U and V in QF that differ by only one strong component pair {C, [bar.C]}. We take the perspective that moving from U to V is achieved by changing the literals of C in U to the literals of its complement [bar.C] in V. We will use the notation V = U [*] C to denote this evolution. In other words, U [*] C = (U - C) [union] C. In general, two satisfying assignments U and V may differ by several strong component pairs. We will write X = U - V to denote the collection of strong components in U whose complements are in V. We will also write V = U [*] X to indicate that V is the assignment that results from starting with U and changing X to [bar.X].

Lemma 8 If U and V are any two F satisfying assignments, then there exist satisfying assignments [U.sub.0], [U.sub.1], [U.sub.2],..., [U.sub.l] such that [U.sub.0] = U, [U.sub.l] = V and [U.sub.i+1] = [U.sub.i] [*] [C.sub.i] for 0 [less than or equal to] i < i < l where [C.sub.1], ..., [C.sub.l] is some ordering of the strong components of U - V.

Proof: We begin by making the following definitions:

C = U - V

P = the graph of the partial order of C [union] [bar.C]

B = {C [member of] C | [L.sub.[bar.p](C) = 0}.

Notice that B is defined so that for any X [subset or equal to] B, we have [L.sup.+.sub.P]([bar.X]) = [bar.X]. Thus, if y = u - X, then Lemma 5 applies and U [??] X is satisfying for any X [subset or equal to] B. Thus, given any ordering of the components in C, we can generate a sequence of satisfying assignments from U to U [??] B following this order. To be concrete, let [C.sub.1], [C.sub.2],..., [C.sub.l] be the components in B in the order induced by the original order of the literals, i.e., [C.sub.1] has the least literal among all literals in B and [C.sub.2] has the least literal among all literals in B - [C.su.1] and so on. Then, each of [U.sub.0], [U.sub.1], [U.sub.2],..., [U.sub.m] is a satisfying assignment, where [U.sub.0] = U, [U.sub.m] = U [??] B and [U.sub.i] [??] B and [U.sub.i+1] = [U.sub.i] [??] [C.sub.i] for 0 [less than or equal to] i < m.

We can complete our proof via induction on the depth of P. Our base case is that P has depth one. In this case, B = C and [U.sub.m] = V, so we are done. If the depth of P is k, then the depth of the partial order on C - B is k - 1, so we can apply the inductive hypothesis to [U.sub.m] and V and concatenate the satisfying assignments found there to the satisfying assignments [U.sub.0], [U.sub.1], [U.sub.2],..., [U.sub.m] and we have our proof.

Corollary 9 Suppose F is a satisfiable 2-formula and that U and V are any two distinct satisfying assignments in [Q.sub.F]. Then U and V are connected in [Q.sub.F] if and only if U - V consists entirely of trivial strong components.

Proof: We use the notation from the proof of Lemma 8. In the case that U - V consists entirely of trivial strong components, the sequence [U.sub.0], [U.sub.1], [U.sub.2],..., [U.sub.m] is a path in [Q.sub.n]. Since [Q.sub.F] is induced from [Q.sub.n], it follows that this path connects U to V in [Q.sub.F].

For the converse, suppose that there is a nontrivial strong component C [member of] U - V. Consider the subcubes of [Q.sub.n] formed by fixing the literals corresponding to C and [bar.C] respectively, but varying over both literals on all other variables. Since the pair is nontrivial, any assignment in one subcube differs from any assignment in the other subcube for at least two variables. Moreover, there are no satisfying assignments outside these subcubes because every satisfying assignment has to have all the literals of C or else all the literals of [bar.C]. Since U and V are in different subcubes they are not connected in [Q.sub.F].

It is important to realize that Lemma 8 and Corollary 9 apply only under the assumption that U and V are both satisfying assignments. It is certainly possible that U is a satisfying assignment, while the assignment V is unsatisfying even though U and V differ by only one strong component pair. A few example formulas and the corresponding graphs are provided in Figure 1. In the figure, we refer to incompatibilities as opposed to disjunctions, so we remind the reader that an incompatibility xy is equivalent to the disjunction [bar.x] V [bar.y]. Incompatibilities are useful when studying the structure of [Q.sub.F] because we simply remove the subcubes of Qn that are specified by the list of incompatibilities.

From Corollary 9 we see that to study the component structure of [Q.sub.F] one must understand the partial order on the nontrivial strong components. In particular, if there are no nontrivial strong components in [D.sub.F] on which two assignments differ, then the components are not in distinct components of [Q.sub.F]. From Corollary 7, we see that we will have satisfying assignments with every combination of strong components from a maximum complementary antichain and its complement. But this tells us nothing about the component structure of [Q.sub.F]. If we want to count the number of components in [Q.sub.F], then we need to identify satisfying assignments in distinct components of [Q.sub.F]. To accomplish this, we will look at complementary antichains of nontrivial strong components. We will use the term nontrivial complementary width to refer to the greatest cardinality among the complementary antichains consisting entirely of nontrivial strong components of [D.sub.F]. We will use the term nontrivial height to refer to the greatest number of nontrivial strong components within a single chain of [D.sub.F]. The term nontrivial complementary height will mean the greatest number of nontrivial strong components in a maximal chain that is complementary. Notice that we first make a list of all maximal chains and then consider only those that are complementary to find one with a maximum number of nontrivial strong components.

Theorem 10 Suppose that F is a satisfiable formula with nontrivial width j. Also, let k be the number o0f complementary pairs of nontrivial strong components determined by F and let N be the number of connected components in [Q.sub.F]. Then [2.sup.j] [less than or equal to] N < [2.sup.k]. Furthermore

1. If the nontrivial height of [O.sub.F] is one, then N = [2.sup.k].

2. If the nontrivial height of [O.sub.F] is greater than one, then [2.sup.j] [less than or equal to] N < [2.sup.k].

[FIGURE 1 OMITTED]

3. If there are complementary weak components containing chains of nontrivial height greater than one, then [2.sup.j] < N < [2.sup.k].

Proof: The weak upper bound follows directly from Corollary 9. The weak lower bound follows directly from Corollaries 7 and 9. Result 1 follows from the fact that j = k if there are no order relations between nontrivial strong components. On the other hand, if there are nontrivial strong components [C.sub.1] and [C.sub.2] such that [C.sub.1] < [C.sub.2], then j < k. For the remainder of the proof, we suppose that this is the case.

Since [C.sub.1] < [C.sub.2] there is no satisfying assignment with [C.sub.1] and [C.sub.2], so N < [2.sup.k]. Thus, the strict upper bound in 2 and 3 holds. Notice that this allows for [C.sub.2] = [C.sub.1]; in which case there is no satisfying assignment with [C.sub.1]. All that remains is to show that the strict lower bound holds in the case that C1 and C2 are strictly distinct and C1 and C2 are not related to [C.sub.1] or [C.sub.2].

We consider Lemma 5 and use the notation there for X. We notice that [L.sup.+] ([C.sub.1]) is strictly distinct, so if we set X = [L.sup.+]([C.sub.1]), then we see that there will be a satisfying assignment with [C.sub.1] and [C.sub.2]. Similarly, if we set X = [L.sup.+]([C.sub.2]) [union] [L.sup.+]([[bar.C].sub.1]) we find another satisfying assignment. The same can also be said for X = [L.sup.+]([[bar.C].sub.2]). Thus, we have satisfying assignments with each of [[bar.C].sub.1][[bar.C].sub.2],[[bar.C].sub.1][[bar.C].sub.2] and [C.sub.1][C.sub.2], but not with [C.sub.1][C.sub.2]. We clearly have that these three possible combinations fall strictly between two and four. We also notice that any satisfying assignment must have one of these three combinations. It follows that [2.sup.j] < N < [2.sub.k].

3.2 The Random Setting

In this subsection, we prove the primary result of this paper, Theorem 1. Throughout, F and consequently [D.sub.F], are randomly determined as described in Section 1. When a strong component is comprised of exactly i [greater than or equal to] 2 edges and i literals, we will refer to the strong component as a simple cycle of order i, or more succinctly, as an i-cycle. The proof of Theorem 1 follows easily from Theorem 10 and the following lemmas.

Lemma 11 With probability 1 - O([n.sup.-1]), every nontrivial strong components is a simple cycle.

Lemma 12 With probability 1 - O([n.sup.-1]), the set of all nontrivial strong components is an antichain.

Lemma 13 The distribution on complementary simple cycle pairs converges to a Poisson distribution with parameter [lambda] = - (ln(1 - c) + c)/2.

Proof: (of Theorem 1 under the assumption of Lemmas 11, 12 and 13.) If Lemmas 11 and 12 are true, then it follows from Theorem 10 that we are a.a.s. that the number of components in [Q.sub.F] is [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] where [X.sub.n] is the random number of complementary simple cycle pairs. If Lemma 13 is true then [X.sub.n] converges weakly to a Poisson random variable [PSI] with parameter [lambda] = - (ln(1 - c) + c)/2. Together, these imply that the number of connected components in [Q.sub.F] converges weakly to [2.sup.[PSI]], and that the probability that there is a unique cluster converges to [e.sup.-[lambda]] = [square root of (1 - c)[e.sup.c]].

All that remains is to show that Lemmas 11, 12 and 13 are true. Before beginning these proofs, we will attempt to provide some context for the results in this section. From a combinatorial perspective (or even simply from a descriptive perspective), Theorem 10 is quite unsatisfactory. We would like to know what happens when the nontrivial height of P is not one. A cursory examination of various partial orders on nontrivial strong components of [D.sub.F] leads to the conclusion that categorizing all the possible scenarios would be quite involved and is certainly beyond our scope here. The good news is that Lemmas 11 and 12 show that from a probabilistic perspective, none of these complexities are important because, as the number of variables becomes large, we are asymptotically almost sure that the nontrivial height will be one.

This should come as no surprise to someone well versed in random graph theory because of the similarity between [D.sub.F] and a standard directed random graph on 2n vertices where each edge appears with probability p. One can also relate [D.sub.F] to a standard undirected random graph [G.sub.p'] where p' = 2p - [p.sub.2] as was done in [7]. It is well known [6, 4, 15] that for p = O([n.sup.-1]), the number of simple cycle pairs of any fixed length in directed or undirected random graphs converges weakly to a Poisson distribution. What we must show is that the total number of simple cycle pairs of all lengths converges weakly to the Poisson distribution with parameter [lambda] = -(ln(1 - c) + c)/2 when p = c/2n and c < 1. While this result doesn't seem to be published for the 2-SAT digraph, it has been shown [16, 2] that in the standard random graph, [G.sub.p*]: where p* = c/n, the total number of simple cycles converges weakly to a Poisson distribution with parameter - 1/2 (ln(1 - c) + c + [c.sup.2]/2). The proof we provide for [D.sub.F] closely resembles the proof in Section 4.3 of [2].

We now establish our notation and make some preliminary observations. Let [[GAMMA].sub.i,n] be the set of (unordered) complementary i-cycle pairs on the 2n literals and define [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]. Then, for each [alpha] [member of] [[GAMMA].sub.n]

let

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]

We remind that reader that for any literals [y.sub.1], [y.sub.2],..., [y.sub.1] we can make the following statement about cycles in [D.sub.F]:

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII].

Since every [alpha] [member of] [[GAMMA].sub.i,n] is a complementary pair of directed cycles on strictly distinct literals, [p.sub.[alpha]] = [p.sub.i] for all [alpha] [member of] [[GAMMA].sub.i,n]. We next define

[X.sub.i,n] = [summation over ([alpha][member of][[[GAMMA].sub.i,n])] and [[mu].sub.i,n] = E([X.sub.i,n]).

Again, by the complementary nature of [D.sub.F] , we get

Notice that for any fixed i, [(n).sub.i]/[n.sup.i] = (1 - 1/n)(1 - 2/n) ... (1 - (i - 1)n). Thus, [[mu].sub.i,n] monotonically increases with n and converges to [c.sup.i]/2i. Next, we define

[X.sub.n] = [n.summation over (i=2)][X.sub.n] and [[lambda].sub.n] = E([X.sub.n]).

Notice that [X.sub.n] n is the random variable that counts the total number of simple cycle pairs in [D.sub.F]. Thus, [[lambda].sub.n] is the expected total number of simple cycle pairs in [D.sub.F]. If c < 1, then

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]

This immediately implies that if c < 1 and [omega] = [omega](n) [right arrow] [infinity], then

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]. (2)

Thus, the probability that the length of the longest cycle will diverge with n converges to 0. Nevertheless, our proof technique will require that we control cycles of unbounded length. We discuss the reason for this after completing this proof. For now, we define for any 2 [less than or equal to] m [less than or equal to] n

[T.sub.m,n] = [m.summation over (i=2)][X.sub.i,n] and [[lambda].sub.m,n] = E([T.sub.m,n]).

We also introduce the notation [[PSI].sub.m,n] for the Poisson random variable with mean [[lambda].sub.m,n]. Now that we have established some notation we proceed with the proofs.

Proof: (of Lemma 11.) We observe that any strong component of order i [greater than or equal to] 3 that is not a simple cycle contains at least a simple cycle a and a path [beta] with first and last literals in [alpha]. Suppose [alpha] [member of] [[GAMMA].sub.i,n] and [beta] is a path with j > 0 edges and both endpoints in [alpha]. Then the expected number of such ordered pairs ([alpha], [beta]) in [D.sub.F] is bounded above by

Since c < 1, the sum over 1 [less than or equal to] j [less than or equal to] n - i and then over 2 [less than or equal to] i [less than or equal to] n is O([n.sup.-1]). We have actually counted at least two ordered pairs for each of the potential nonsimple components because exactly one of the paths of [alpha] with endpoints in common with [beta] will form a cycle with [beta], which will be counted as some cycle [alpha]' with the other path as [beta]'. Thus, for any [D.sub.F], the number of nonsimple strong components is not more than one half of the number of ordered pairs considered here. Thus, the expected number of ordered pairs we have estimated is at least twice the expected number of nonsimple strong components, which is greater than the probability that there exists a nonsimple strong component.

Proof: (of Lemma 12.) Notice that if there are strong components A and C such that A [less than or equal to] C, then there are directed cycles [alpha] [subset or equal to] [gamma][subset or equal to] C such that [alpha] and [gamma] are connected by a directed path [beta]. Similar to the proof of Lemma 12, it is sufficient to show that the expected number of such ordered triples ([alpha], [beta], [gamma]) is O([n.sup.-1]). To identify ([alpha], [beta], [gamma]) we select a and mark a literal of a that is common to [beta]; and then select gamma] remaining literals of [beta] in order, the last of which is the first literal of [gamma]; and then select the remaining literals of [gamma] in order. Assuming that [alpha] is an i-cycle, [beta] is a path with j > 0 edges, and [gamma] is a k-cycle, we have must choose i + j + k - 1 literals in order. Thus, there are no more than [(2n).sub.i+j+k-1] < [(2n).sup.i+j+k-1] such triples. Notice that there are necessarily i + j + k edges in the subgraph corresponding to ([alpha], [beta], [gamma]). Thus, [c.sup.i+j+k-1]p is an upper bound for the expected number of such configurations. Since c < 1 we can sum over i, j, and k to get the desired result.

Proof: (of Lemma 13) We will prove the weak convergence of [X.sub.n] to [PSI] by demonstrating that for any subset A of the positive integers we can make [absolute value of P([X.sub.n] [member of] A) - P([PSI] [member of] A)] arbitrarily small by taking n to be large enough. An upper bound for [absolute value of P([X.sub.n] [member of] A) - P([PSI} [member of] A)] is provided by

[absolute value of P([X.sub.n] [member of] A) - P([T.sub.m,n] [member of] A)] (3)

+ [absolute value of P([T.sub.m,n] [member of] A) - P([[PSI].sub.m,n] [member of] A)] (4)

+ [absolute value of P([[PSI].sub.m,n] [member of] A) - P([PSI] [member of] A)]. (5)

Thus, to prove the weak convergence of [X.sub.n] to [PSI] it is enough to show that we can choose n and m (which may depend on n) to make (3), (4) and (5) arbitrarily small.

We first consider (5). From (2), we see that when m diverges with n, [[lambda[.sub.m,n] will become arbitrarily close to [lambda]. Thus, we have the weak convergence of [[PSI].sub.m,n] to [PSI] and (5) must vanish for any m that diverges with n.

We now focus on (3). Notice that (3) is bounded above by P([X.sub.n] [not equal to] [T.sub.m,n]), which is in turn bounded above by the expected number of events that distinguish [X.sub.n] from [T.sub.m,n]. Notice that by (2) the probability that there are any i-cycles for i > m vanishes as m diverges. Notice also that by Lemma 11 we have for any m, that the probability that there is a strong component that is not a simple cycle is O([n.sup.-1]). Lastly, by Lemma 12 the probability that there are two nontrivial strong components that are ordered is O([n.sup.-1]) for any m. Thus, the probability that [X.sub.n] [not equal to] [T.sub.m,n] vanishes as n and m diverge.

The supremum over all A of (4) is half the total variation between the law of [T.sub.m,n] and [[PSI].sub.m,n]. Thus, the bound for (4) and the proof of Lemma 13 is complete provided that the following lemma is true.

Lemma 14 There exists an m = m(n) that is unbounded such that the total variation between the law of [T.sub.m,n] and Poisson random variable with mean [[lambda].sub.m,n] is O([n.sup.-1]).

Proof: There is a family of methods called the Stein-Chen or Chen-Stein method for bounding the total variation between two distributions. A thorough treatment of these methods can be found in [4]. Of particular interest here is Corollary 2.C.5, on pg. 26. of [4], which we restate using our current notation and the following definition. Let [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]

Lemma 15 Suppose that for each [alpha] [member of] [[GAMMA].sup.m.sub.n], [[GAMMA].sup.m.sub.n] can be partitioned into [[GAMMA].sup.0.sub.[alpha]], [[GAMMA].sup.i.sub.[alpha]] such that [I.sub.[alpha]] and [I.sub.[beta]] are independent for all [beta] [member of] [[LAMBDA].sup.i.sub.[alpha]]. Then the total variation between the laws of [T.sub.m,n] and [[PSI].sub.m,n] is not more than

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]

For any [alpha], there certainly is a set [[GAMMA].sup.0.sub.[alpha]] of all complementary cycle pairs that are distinct from [alpha] and yet not independent of [alpha]. Moreover, since [[lambda].sub.m,n] is bounded below, our proof will be complete when we can find an unbounded m = m(n) for which the sums are both O([n.sup.-1]).

Consider the first sum

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII].

Since this sum is O([n.sup.-2]) for any m [less than or equal to] n, we can address the second sum. If [I.sub.[alpha]] and [I.sub.[beta]] are not independent, then they share some edge and the event that [I.sub.[alpha]] = 1 increases the probability that = [I.sub.[beta]] = 1, so E([I.sub.[alpha]][I.sub.[beta]]) > [p.sub.[alpha]] [p.sub.[beta]] and we need only show convergence of

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (6)

Let [alpha] [member of] [[LAMBDA].sub.i,n] and let [beta] be such that the edges of [beta] that are shared with those of [alpha] are found on j disjoint paths in each member of the pair and such that there are k literals on each member of [beta] which are not on the paths common to both [alpha] and [beta]. Then, the probability that any such fixed pair ([alpha], [beta]) is present in [D.sub.F] is [p.sup.i+j+k]. Notice that there are j more edges than literals in such an ([alpha], [beta]) configuration. This is what causes the expectation in question to converge to 0. Now for the details.

We will count the number of such pairs by first fixing [alpha], and then examining the number of possible shared paths. Notice that by choosing 2j literals in one member of [alpha] we fix the endpoints for one of two possible collections of j shared paths. Thus, the number of ways to choose j paths from an i-cycle is [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] where 1 [less than or equal to] j [less than or equal to] [i/2]. This fixes j pairs of complementary paths from the members of [alpha] that will be shared with [beta], but it does not determine which of the complementary paths will be chosen for a given member of [beta]. There are [2.sup.j] binary sequences that are in one-to-one correspondence with the possible assignments of j paths to the first member of [beta]. Thus there are [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] ways to select the j paths from [alpha] that will be shared with one of the members of [beta].

Next we consider the k additional literals in each member of [beta]. There are no more than n - 2j variables that do not correspond to the shared paths. Moreover, [beta] is a complementary pair of simple cycles, which must have strictly distinct literals in each member of the pair. Thus, there are at most [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] possible ways to choose the remaining literals for one of the members of [beta].

Together, the literals and paths make for j + k objects to be ordered on a cycle, and there are (j + k -1)! ways to do this. Notice that we did not make use of the restriction that two paths are not allowed to be consecutive in this ordering if there is only one edge between them on [alpha]. Thus we are overestimating once again. The choices above, along with the [(n).sub.j][2.sup.i-1]/i choices for [alpha] provide an upper bound for the total number of ordered pairs ([alpha], [beta]). There is just one last bit of counting to mention. We have double counted everything. That is, when we started selecting the k additional literals for one of the members of [beta], it matters which of the members these k literals go with; but we could get the same structure by selecting the complementary k literals and the complementary member of [alpha]. Thus, all together we have i + j + k - 1 total factors of 2, which we will group together with the powers of p.

The computations on the following page are mostly self explanatory, but we mention that to obtain (12) and (13) we begin with the Robbins-Feller Stirling approximation and then simplify a bit to get

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII].

Then we use j [less than or equal to] i/2 [less than or equal to] m to get

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII].

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (7)

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (8)

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (9)

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (10)

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (11)

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (12)

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (13)

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (13)

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (14)

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (15)

If we look at expression (15) we see that given any positive constant c < 1 we can choose m = m(n) so that for large enough n, we have m/n sufficiently small to satifty

c(1 + [square root of cm/2e(1 - c)n)] < 1.

Once this inequality is satisfied, the sum over i in the last line above will be bounded above by a constant, and it follows that the expectation for this m = m(n) will be O([n.sup.-1]), which proves Lemma 14.

As was previously stated, Lemma 13 follows from Lemma 14 and this is all that remained to prove Theorem 1.

Corollary 16 If 0 < c < [c.sub.max], where [c.sub.max] [approximately equal to] 0.6375 is the solution to

c(1 + [square root of cm/2e(1 - c)n)] < 1,

then the rate of convergence of [X.sub.n] to [[PSI].sub.n,n] is O([n.sup.-1]).

Proof: If c < [c.sub.max], then the proof of Lemma 13 applies with m = n and we have a rate of convergence of O([n.sup.-1]) for [X.sub.n] to [[PSI].sub.n,n].

4 Discussion

The proof provided here of Lemma 13 relies on the use of truncated random variables and also fails to provide a bound on the distance between [X.sub.n] and [[PSI].sub.n,n] for a significant range of c values. If the proof of Lemma 14 could be improved to provide some rate of convergence f (n) that holds for m = n and all c < 1 , then there would be no need for truncated random variables and the overall rate of convergence would be no slower than f (n). However, it may be difficult to find such a proof because there is reason to believe that the Chen-Stein method can not be applied to this problem. In [2], they provide numerical evidence (pg. 413) that [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] E([I.sub.[alpha]] [I.sub.[beta]]) diverges with m = n for sufficiently large values of c. If this is true, then for these values of c, the second moment of [X.sub.n] diverges with n and the Chen-Stein method will not be able to provide a rate of convergence for [X.sub.n] to [[PSI].sub.n,n].

Acknowledgements

The author would like to thank Janko Gravner for suggesting this model and for his advisement in general. The author would also like to thank Jaikumar Radhakrishnan for suggesting the use of antichains. This work was in part supported by the National Science Foundation grant DMS-0204376.

References

[1] Dimitris Achlioptas and Yuval Peres. The threshold for random k-SAT is [2.sup.k] log 2 O(k). J. Amer. Math. Soc., 17(4):947-973 (electronic), 2004.

[2] R. Arratia, L. Goldstein, and L. Gordon. Poisson approximation and the chen-stein method. Statistical Science, 5(4):403-124, 1990.

[3] Bengt Aspvall, Michael F. Plass, and Robert Endre Tarjan. A linear-time algorithm for testing the truth of certain quantified Boolean formulas. Inform. Process. Lett., 8(3):121-123, 1979.

[4] A. D. Barbour, L. Holst, and S. Janson. Poisson Approximation. Oxford University Press, 1992.

[5] G. Biroli, R. Monasson, and M. Weigt. A variational description of the ground state structure in random satisfiability problems. Eur. Phys. J., B 14:551-568, 2000.

[6] B. Bollobas. Random graphs, volume 73. Cambridge Univ Pr, 2001.

[7] Bela Bollobas, Christian Borgs, Jennifer T. Chayes, Jeong Han Kim, and David B. Wilson. The scaling window of the 2-SAT transition. Random Structures Algorithms, 18(3):201-256, 2001.

[8] V. Chvatal and B. Reed. Mick gets some (the odds are on his side). Proc. 33rd Symp Foundations of Computer Science, pages 620-627, 1992.

[9] Stephen A. Cook. The complexity of theorem-proving procedures. In STOC '71: Proceedings of the third annual ACM symposium on Theory of computing, pages 151-158, New York, NY, USA, 1971. ACM.

[10] W. Fernandez de la Vega. On random 2-SAT. unpublished manuscript, 1992.

[11] S. Gavrilets. Fitness Landscapes and the Origin of Species. Monographs in Population Biology. Princeton University Press, 2004.

[12] Andreas Goerdt. A threshold for unsatisfiability. In Mathematical foundations of computer science 1992 (Prague, 1992), volume 629 of Lecture Notes in Comput. Sci., pages 264-274. Springer, Berlin, 1992

[13] Janko Gravner, Damien Pitman, and Sergey Gavrilets. Percolation on fitness landscapes: Effects of correlation, phenotype, and incompatibilities. Journal of Theoretical Biology, 248(4):627-645, 2007

[14] S. A. Kauffman. The origins of order. Oxford University Press, Oxford, 1993.

[15] I. Palasti. On the threshold distribution function of cycles in a directed random graph. Studia Scientiarum Mathematicarum Hungarica, 6:67-73, 1971.

[16] L. Takacs. On the limit distribution of the number of cycles in a random graph. Journal of Applied Probability, pages 359-376, 1988.

[17] S. Wright. The roles of mutation, inbreeding, crossbreeding and selection in evolution. In D. F. Jones, editor, Proceedings of the Sixth International Congress on Genetics, volume 1, pages 356-366, Austin, Texas, 1932.

Damien Pitman ([dagger])

State University of New York, College at Cortland, USA

received 5th September 2008, revised 13th October 2009, 25th June 2010, 3rd November 2010, 21st May 2011,, accepted 23rd May 2011.

([dagger]) Email: Damien.Pitman@Cortland.edu 1365-8050 (c) 2011 Discrete Mathematics and Theoretical Computer Science (DMTCS), Nancy, France

Printer friendly Cite/link Email Feedback | |

Author: | Pitman, Damien |
---|---|

Publication: | Discrete Mathematics and Theoretical Computer Science |

Article Type: | Report |

Geographic Code: | 4EUFR |

Date: | Jun 1, 2011 |

Words: | 9617 |

Previous Article: | Parameterized problems related to Seidel's switching. |

Next Article: | Avoidance colourings for small nonclassical Ramsey numbers. |

Topics: |