In graph theory, an expander graph is a sparse graph that has strong connectivity properties, quantified using vertex, edge or spectral expansion. Expander constructions have spawned research in pure and applied mathematics, with several applications to complexity theory, design of robust computer networks, and the theory of error-correcting codes.
Intuitively, an expander graph is a finite, undirected multigraph in which every subset of the vertices that is not "too large" has a "large" boundary. Different formalisations of these notions give rise to different notions of expanders: edge expanders, vertex expanders, and spectral expanders, as defined below.
A disconnected graph is not an expander, since the boundary of a connected component is empty. Every connected graph is an expander; however, different connected graphs have different expansion parameters. The complete graph has the best expansion property, but it has largest possible degree. Informally, a graph is a good expander if it has low degree and high expansion parameters.
The edge expansion (also isoperimetric number or Cheeger constant) of a graph on vertices is defined as
h(G)=
min | ||||||
|
|\partialS| | |
|S| |
,
where
\partialS:=\{\{u,v\}\inE(G) : u\inS,v\notinS\},
E(A,B)=\{\{u,v\}\inE(G) : u\inA,v\inB\}
In the equation, the minimum is over all nonempty sets of at most vertices and is the edge boundary of, i.e., the set of edges with exactly one endpoint in .[1]
Intuitively,
min{|\partialS|}=minE({S},\overline{S})
Notice that in, the optimization can be equivalently done either over or over any non-empty subset, since
E(S,\overline{S})=E(\overline{S},S)
h(G)=min\emptyset
E({S | |
, |
\overline{S})}{min\{|S|,|\overline{S}|\}}.
The vertex isoperimetric number (also vertex expansion or magnification) of a graph is defined as
hout(G)=
min | ||||||
|
|\partialout(S)| | |
|S| |
,
The vertex isoperimetric number of a graph is defined as
hin(G)=
min | ||||||
|
|\partialin(S)| | |
|S| |
,
\partialin(S)
When is -regular, a linear algebraic definition of expansion is possible based on the eigenvalues of the adjacency matrix of, where is the number of edges between vertices and .[2] Because is symmetric, the spectral theorem implies that has real-valued eigenvalues . It is known that all these eigenvalues are in and more specifically, it is known that if and only if is bipartite.
More formally, we refer to an -vertex, -regular graph with
maxi|λi|\leqλ
Spectral expansion can be two-sided, as above, with
maxi|λi|\leqλ
maxiλi\leqλ
Because is regular, the uniform distribution
u\in\Rn
If we set
λ=max\{|λ2|,|λn|\}
λ=maxv
\|Av\|2 | |
\|v\|2 |
,
\|v\|2=\left(\sum
n | |
i=1 |
2\right) | |
v | |
i |
1/2
v\in\Rn
The normalized versions of these definitions are also widely used and more convenient in stating some results. Here one considers the matrix, which is the Markov transition matrix of the graph . Its eigenvalues are between −1 and 1. For not necessarily regular graphs, the spectrum of a graph can be defined similarly using the eigenvalues of the Laplacian matrix. For directed graphs, one considers the singular values of the adjacency matrix, which are equal to the roots of the eigenvalues of the symmetric matrix .
The expansion parameters defined above are related to each other. In particular, for any -regular graph,
hout(G)\leh(G)\led ⋅ hout(G).
When is -regular, meaning each vertex is of degree, there is a relationship between the isoperimetric constant and the gap in the spectrum of the adjacency operator of . By standard spectral graph theory, the trivial eigenvalue of the adjacency operator of a -regular graph is and the first non-trivial eigenvalue is . If is connected, then . An inequality due to Dodziuk and independently Alon and Milman states that[5]
\tfrac{1}{2}(d-λ2)\leh(G)\le\sqrt{2d(d-λ2)}.
h(G)\le\sqrt{d2-
2}. | |
λ | |
2 |
Similar connections between vertex isoperimetric numbers and the spectral gap have also been studied:[7]
hout(G)\le\left(\sqrt{4(d-λ2)}+1\right)2-1
hin(G)\le\sqrt{8(d-λ2)}.
There are four general strategies for explicitly constructing families of expander graphs.[8] The first strategy is algebraic and group-theoretic, the second strategy is analytic and uses additive combinatorics, the third strategy is combinatorial and uses the zig-zag and related graph products, and the fourth strategy is based on lifts. Noga Alon showed that certain graphs constructed from finite geometries are the sparsest examples of highly expanding graphs.[9]
Algebraic constructions based on Cayley graphs are known for various variants of expander graphs. The following construction is due to Margulis and has been analysed by Gabber and Galil.[10] For every natural number, one considers the graph with the vertex set
Zn x Zn
Zn=Z/nZ
(x,y)\inZn x Zn
(x\pm2y,y),(x\pm(2y+1),y),(x,y\pm2x),(x,y\pm(2x+1)).
Then the following holds:
Theorem. For all, the graph has second-largest eigenvalue.λ(G)\leq5\sqrt{2}
See main article: article and Ramanujan graph. By a theorem of Alon and Boppana, all sufficiently large -regular graphs satisfy
λ2\ge2\sqrt{d-1}-o(1)
λ<2\sqrt{d-1}
λ=
max | |
|λi|<d |
|λi|\le2\sqrt{d-1}.
Lubotzky, Phillips, and Sarnak (1988), Margulis (1988), and Morgenstern (1994) show how Ramanujan graphs can be constructed explicitly.[13]
In 1985, Alon, conjectured that most -regular graphs on vertices, for sufficiently large, are almost Ramanujan.[14] That is, for, they satisfy
λ\le2\sqrt{d-1}+\varepsilon
In 2003, Joel Friedman both proved the conjecture and specified what is meant by "most -regular graphs" by showing that random -regular graphs have
λ\le2\sqrt{d-1}+\varepsilon
\tau=\left\lceil
\sqrt{d-1 | |
+1}{2} |
\right\rceil.
Marcus, Spielman and Srivastava,[20] [21] gave a construction of bipartite Ramanujan graphs based on lifts.
See main article: articles and Zig-zag product. Reingold, Vadhan, and Wigderson introduced the zig-zag product in 2003.[22] Roughly speaking, the zig-zag product of two expander graphs produces a graph with only slightly worse expansion. Therefore, a zig-zag product can also be used to construct families of expander graphs. If is a -graph and is an -graph, then the zig-zag product is a -graph where has the following properties.
Specifically,
\phi(λ1,
λ | ||||
|
2 | |
(1-λ | |
2)λ |
2+
1 | |
2 |
2 | |
\sqrt{(1-λ | |
1 |
2 | |
+4λ | |
2}. |
Note that property (1) implies that the zig-zag product of two expander graphs is also an expander graph, thus zig-zag products can be used inductively to create a family of expander graphs.
Intuitively, the construction of the zig-zag product can be thought of in the following way. Each vertex of is blown up to a "cloud" of vertices, each associated to a different edge connected to the vertex. Each vertex is now labeled as where refers to an original vertex of and refers to the th edge of . Two vertices, and are connected if it is possible to get from to through the following sequence of moves.
An -lift of a graph is formed by replacing each vertex by vertices, and each edge by a matching between the corresponding sets of
r
O(\sqrt{dlog3d})
Bilu and Linial conjectured that the bound
O(\sqrt{dlog3d})
2\sqrt{d-1}
There are many results that show the existence of graphs with good expansion properties through probabilistic arguments. In fact, the existence of expanders was first proved by Pinsker[27] who showed that for a randomly chosen vertex left regular bipartite graph, for all subsets of vertices with high probability, where is a constant depending on that is . Alon and Roichman [28] showed that for every, there is some such that the following holds: For a group of order, consider the Cayley graph on with randomly chosen elements from . Then, in the limit of getting to infinity, the resulting graph is almost surely an -expander.
The original motivation for expanders is to build economical robust networks (phone or computer): an expander with bounded degree is precisely an asymptotic robust graph with the number of edges growing linearly with size (number of vertices), for all subsets.
Expander graphs have found extensive applications in computer science, in designing algorithms, error correcting codes, extractors, pseudorandom generators, sorting networks and robust computer networks. They have also been used in proofs of many important results in computational complexity theory, such as SL = L and the PCP theorem . In cryptography, expander graphs are used to construct hash functions.
In a 2006 survey of expander graphs, Hoory, Linial, and Wigderson split the study of expander graphs into four categories: extremal problems, typical behavior, explicit constructions, and algorithms. Extremal problems focus on the bounding of expansion parameters, while typical behavior problems characterize how the expansion parameters are distributed over random graphs. Explicit constructions focus on constructing graphs that optimize certain parameters, and algorithmic questions study the evaluation and estimation of parameters.
See main article: article and Expander mixing lemma. The expander mixing lemma states that for an -graph, for any two subsets of the vertices, the number of edges between and is approximately what you would expect in a random -regular graph. The approximation is better the smaller is. In a random -regular graph, as well as in an Erdős–Rényi random graph with edge probability, we expect edges between and .
More formally, let denote the number of edges between and . If the two sets are not disjoint, edges in their intersection are counted twice, that is,
E(S,T)=2|E(G[S\capT])|+E(S\setminusT,T)+E(S,T\setminusS).
Then the expander mixing lemma says that the following inequality holds:
\left|E(S,T)-
d ⋅ |S| ⋅ |T| | |
n |
\right|\leqλ\sqrt{|S| ⋅ |T|}.
\chi(G)\leqO\left(
d | |
log(1+d/λ) |
\right).
\left\lceillog
n | |
log(d/λ) |
\right\rceil.
See main article: article and Expander walk sampling. The Chernoff bound states that, when sampling many independent samples from a random variable in the range, with high probability the average of our samples is close to the expectation of the random variable. The expander walk sampling lemma, due to and, states that this also holds true when sampling from a walk on an expander graph. This is particularly useful in the theory of derandomization, since sampling according to an expander walk uses many fewer random bits than sampling independently.
See main article: article and Sorting network.
Sorting networks take a set of inputs and perform a series of parallel steps to sort the inputs. A parallel step consists of performing any number of disjoint comparisons and potentially swapping pairs of compared inputs. The depth of a network is given by the number of parallel steps it takes. Expander graphs play an important role in the AKS sorting network, which achieves depth . While this is asymptotically the best known depth for a sorting network, the reliance on expanders makes the constant bound too large for practical use.
Within the AKS sorting network, expander graphs are used to construct bounded depth -halvers. An -halver takes as input a length permutation of and halves the inputs into two disjoint sets and such that for each integer at most of the smallest inputs are in and at most of the largest inputs are in . The sets and are an -halving.
Following, a depth -halver can be constructed as follows. Take an vertex, degree bipartite expander with parts and of equal size such that every subset of vertices of size at most has at least neighbors.
The vertices of the graph can be thought of as registers that contain inputs and the edges can be thought of as wires that compare the inputs of two registers. At the start, arbitrarily place half of the inputs in and half of the inputs in and decompose the edges into perfect matchings. The goal is to end with roughly containing the smaller half of the inputs and containing roughly the larger half of the inputs. To achieve this, sequentially process each matching by comparing the registers paired up by the edges of this matching and correct any inputs that are out of order. Specifically, for each edge of the matching, if the larger input is in the register in and the smaller input is in the register in, then swap the two inputs so that the smaller one is in and the larger one is in . It is clear that this process consists of parallel steps.
After all rounds, take to be the set of inputs in registers in and to be the set of inputs in registers in to obtain an -halving. To see this, notice that if a register in and in are connected by an edge then after the matching with this edge is processed, the input in is less than that of . Furthermore, this property remains true throughout the rest of the process. Now, suppose for some that more than of the inputs are in . Then by expansion properties of the graph, the registers of these inputs in are connected with at least registers in . Altogether, this constitutes more than registers so there must be some register in connected to some register in such that the final input of is not in, while the final input of is. This violates the previous property however, and thus the output sets and must be an -halving.