{"@context":"https:\/\/schema.org\/","@type":"ScholarlyArticle","@id":"#article9956","name":"Vertex Isoperimetry and Independent Set Stability for Tensor Powers of Cliques","abstract":"The tensor power of the clique on t vertices (denoted by K_t^n) is the graph on vertex set {1, ..., t}^n such that two vertices x, y in {1, ..., t}^n are connected if and only if x_i != y_i for all i in {1, ..., n}. Let the density of a subset S of K_t^n to be mu(S) := |S|\/t^n. Also let the vertex boundary of a set S to be the vertices of the graph, including those of S, which are incident to some vertex of S. We investigate two similar problems on such graphs.\r\n\r\nFirst, we study the vertex isoperimetry problem. Given a density nu in [0, 1] what is the smallest possible density of the vertex boundary of a subset of K_t^n of density nu? Let Phi_t(nu) be the infimum of these minimum densities as n -> infinity. We find a recursive relation allows one to compute Phi_t(nu) in time polynomial to the number of desired bits of precision.\r\n\r\nSecond, we study given an independent set I of K_t^n of density mu(I) = (1-epsilon)\/t, how close it is to a maximum-sized independent set J of density 1\/t. We show that this deviation (measured by mu(I\\J)) is at most 4 epsilon^{(log t)\/(log t - log(t-1))} as long as epsilon < 1 - 3\/t + 2\/t^2. This substantially improves on results of Alon, Dinur, Friedgut, and Sudakov (2004) and Ghandehari and Hatami (2008) which had an O(epsilon) upper bound. We also show the exponent (log t)\/(log t - log(t-1)) is optimal assuming n tending to infinity and epsilon tending to 0. The methods have similarity to recent work by Ellis, Keller, and Lifshitz (2016) in the context of Kneser graphs and other settings.\r\n\r\nThe author hopes that these results have potential applications in hardness of approximation, particularly in approximate graph coloring and independent set problems.","keywords":["extremal combinatorics","independent sets","isoperimetry","stability"],"author":{"@type":"Person","name":"Brakensiek, Joshua","givenName":"Joshua","familyName":"Brakensiek"},"position":33,"pageStart":"33:1","pageEnd":"33:15","dateCreated":"2017-08-11","datePublished":"2017-08-11","isAccessibleForFree":true,"license":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/legalcode","copyrightHolder":{"@type":"Person","name":"Brakensiek, Joshua","givenName":"Joshua","familyName":"Brakensiek"},"copyrightYear":"2017","accessMode":"textual","accessModeSufficient":"textual","creativeWorkStatus":"Published","inLanguage":"en-US","sameAs":"https:\/\/doi.org\/10.4230\/LIPIcs.APPROX-RANDOM.2017.33","publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","citation":["http:\/\/dx.doi.org\/10.1007\/s00039-004-0478-3","http:\/\/dx.doi.org\/10.1016\/j.jcta.2007.03.010","http:\/\/dx.doi.org\/10.1007\/s004930070018","http:\/\/dx.doi.org\/10.1016\/0097-3165(91)90021-8","http:\/\/arxiv.org\/abs\/1702.04432","http:\/\/dx.doi.org\/10.4230\/LIPIcs.CCC.2016.14","http:\/\/www.combinatorics.org\/ojs\/index.php\/eljc\/article\/view\/v20i4p15","http:\/\/dx.doi.org\/10.1017\/S0963548308009309","http:\/\/dx.doi.org\/10.1007\/s00039-008-0651-1","http:\/\/www.jstor.org\/stable\/3597377","http:\/\/arxiv.org\/abs\/1702.02607","http:\/\/arxiv.org\/abs\/1612.06680","http:\/\/arxiv.org\/abs\/1604.02160","http:\/\/arxiv.org\/abs\/1702.01675","http:\/\/arxiv.org\/abs\/1610.03027","http:\/\/arxiv.org\/abs\/1610.00756","http:\/\/dx.doi.org\/10.4230\/LIPIcs.CCC.2016.15","http:\/\/dx.doi.org\/10.4230\/LIPIcs.CCC.2016.16","http:\/\/dx.doi.org\/10.1007\/s00493-008-2318-9","http:\/\/dx.doi.org\/10.1016\/j.jctb.2007.06.003","http:\/\/dx.doi.org\/10.1007\/BF01886093","http:\/\/dx.doi.org\/10.1093\/qmath\/18.1.369","http:\/\/dx.doi.org\/10.1109\/MCSE.2007.55","http:\/\/dx.doi.org\/10.1016\/j.aim.2008.03.023","http:\/\/dx.doi.org\/10.1007\/s00493-010-2401-x","http:\/\/arxiv.org\/abs\/1609.01884","http:\/\/arxiv.org\/abs\/1604.06135","http:\/\/dx.doi.org\/10.1016\/0097-3165(72)90019-2","http:\/\/msp.org\/pjm\/1972\/41-1\/p21.xhtml"],"isPartOf":{"@type":"PublicationVolume","@id":"#volume6284","volumeNumber":81,"name":"Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX\/RANDOM 2017)","dateCreated":"2017-08-11","datePublished":"2017-08-11","editor":[{"@type":"Person","name":"Jansen, Klaus","givenName":"Klaus","familyName":"Jansen"},{"@type":"Person","name":"Rolim, Jos\u00e9 D. P.","givenName":"Jos\u00e9 D. P.","familyName":"Rolim"},{"@type":"Person","name":"Williamson, David P.","givenName":"David P.","familyName":"Williamson"},{"@type":"Person","name":"Vempala, Santosh S.","givenName":"Santosh S.","familyName":"Vempala"}],"isAccessibleForFree":true,"publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","hasPart":"#article9956","isPartOf":{"@type":"Periodical","@id":"#series116","name":"Leibniz International Proceedings in Informatics","issn":"1868-8969","isAccessibleForFree":true,"publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","hasPart":"#volume6284"}}}