• Aucun résultat trouvé

Odd cutsets and the hard-core model on <span class="mathjax-formula">$\mathbb {Z}^{d}$</span>

N/A
N/A
Protected

Academic year: 2022

Partager "Odd cutsets and the hard-core model on <span class="mathjax-formula">$\mathbb {Z}^{d}$</span>"

Copied!
24
0
0

Texte intégral

(1)

www.imstat.org/aihp DOI:10.1214/12-AIHP535

© Association des Publications de l’Institut Henri Poincaré, 2014

Odd cutsets and the hard-core model on Z d

Ron Peled

a,1

and Wojciech Samotij

b,2

aSchool of Mathematical Sciences, Tel Aviv University, Tel Aviv, 69978, Israel. E-mail:peledron@post.tau.ac.il;

url:http://www.math.tau.ac.il/~peledron

bSchool of Mathematical Sciences, Tel Aviv University, Tel Aviv, 69978, Israel; and Trinity College, Cambridge CB2 1TQ, UK.

E-mail:samotij@post.tau.ac.il; url:http://www.math.tau.ac.il/~samotij Received 18 June 2011; revised 25 November 2012; accepted 01 December 2012

Abstract. We consider the hard-core lattice gas model onZd and investigate its phase structure in high dimensions. We prove that when the intensity parameter exceedsCd1/3(logd)2, the model exhibits multiple hard-core measures, thus improving the previous bound ofCd1/4(logd)3/4given by Galvin and Kahn. At the heart of our approach lies the study of a certain class of edge cutsets inZd, the so-called odd cutsets, that appear naturally as the boundary between different phases in the hard-core model.

We provide a refined combinatorial analysis of the structure of these cutsets yielding a quantitative form of concentration for their possible shapes as the dimensiondtends to infinity. This analysis relies upon and improves previous results obtained by the first author.

Résumé. Nous étudions la structure de phase, en grande dimension, d’un modèle de sphères dures sur le réseauZd. Nous prouvons que le modèle présente plusieurs mesures lorsque le paramètre de densité dépasseCd1/3(logd)2, améliorant ainsi la borne de Cd1/4(logd)3/4obtenue par Galvin et Kahn. Notre approche repose sur l’étude de certaines classes d’ensembles séparateurs dansZd, constituées d’ensembles impaires, qui délimitent la frontière entre différentes phases du modèle de sphères dures. Nous faisons une analyse combinatoire précise de la structure de ces ensembles séparateurs et obtenons une forme quantitative de la concentration des différentes formes possibles prises par ces ensembles lorsque la dimensiondtend vers l’infini. Cette analyse repose sur des méthodes obtenues auparavant par le premier auteur, tout en les améliorant.

MSC:82B20; 60C05; 05C30; 05A16

Keywords:Edge cutsets; Gibbs measures; Hard-core model; Integer lattice

1. Introduction

Thehard-core model(short forhard-core lattice gas model) was originally introduced in statistical mechanics as a simple mathematical model of a gas whose particles have non-negligible size and cannot overlap, see [3,6]. Later, the model was rediscovered in operations research in the context of certain communication networks, see [8,9]. The model has also attracted interest in ergodic theory where it is known by the name “the golden mean subshift” [13], since its topological entropy on the one-dimensional lattice is the logarithm of the golden ratio(1+√

5)/2.

LetGbe a finite graph with vertex setV and letλbe a positive real. Aconfigurationω∈ {0,1}V is calledfeasible if it is the characteristic function of some independent set inG, i.e., if for no adjacent pair{v1, v2}of vertices ofG,

1Supported by a Marie Curie Reintegration Grant SPTRF from the Commission of the European Communities.

2Supported by ERC Advanced Grant DMMCA.

(2)

it satisfiesω(v1)=ω(v2)=1. Thehard-core model onGwith activityλ is the probability measureμon{0,1}V defined by

μ(ω)=

Z1

vVλω(v) ifωis feasible,

0 otherwise,

whereZis the appropriate normalizing constant (called thepartition function) which makesμa probability measure, i.e.,Z=

ω

vλω(v), whereωranges over the set of all feasible configurations. In other words,μ(ω)is proportional toλ|{v:ω(v)=1}|ifωis a feasible configuration andμ(ω)=0 otherwise.

IfG is an infinite graph, then we call a probability measure on {0,1}V ahard-core measure if for each finite WV, everyω1∈ {0,1}W, andμ-a.e.ω2∈ {0,1}V\W, we have

μ

ω|W=ω1ω|V\W=ω2

=

ZW1

vWλω(v) ifω1ω2is feasible,

0 otherwise,

whereω1ω2is the configuration onV that agrees withω1onW and withω2onV \W. A standard compactness argument shows that for any infinite but locally finite graphGand anyλ, there exists at least one hard-core measure onGwith activityλ. One of the main questions in the study of the hard-core model is to decide, for givenGand λ, whether there is a unique or multiple hard-core measures onGwith activityλ. An important contribution to this problem was made by van den Berg and Steif [16], continuing previous work of van den Berg [15], who showed that for any connected infinite graph3G, there is a unique hard-core measure with activityλwheneverλ <1pcp(G)

c(G). Here, pc(G)stands for the site percolation threshold for the graphG.

The most-studied case of a hard-core model is that whenGis the nearest-neighbor graph of the integer latticeZd, i.e., the graph on the vertex setZd in which two vertices are adjacent if and only if theirL1-distance is equal to 1.

See Fig.1below for a simulation of the model in two dimensions. The above-mentioned result of van den Berg and Steif, combined with the simple lower boundpc(Zd)2d11, proves that ifλ < 2d12, then there is a unique hard- core measure with activityλonZd. The seminal result of Dobrushin [3] says that whend≥2 andλis sufficiently large (depending on d), then Zd admits multiple hard-core measures with activity λ; Dobrushin’s result was later rediscovered by Louth [10]. The lower bound onλproved by Dobrushin is rather weak (see the discussion in [5]) as it grows withd, quite in contrast with the popular belief that for a givenλ, the existence of multiple hard-core measures in dimensiondshould imply the existence of multiple hard-core measures in all higher dimensions. Almost 40 years had passed since Dobrushin published his result before Galvin and Kahn [5] proved that the threshold activity that implies the existence of multiple hard-core measures onZdtends to 0 asd→ ∞.

Theorem 1.1 ([5]). There exist constantsd0andCsuch that ifdd0andλCd1/4(logd)3/4,then the graphZd has multiple hard-core measures with activityλ.

The bound in Theorem1.1 is undoubtedly not best possible. It is commonly believed that multiple hard-core measures should appear when the activityλis either atΘ(1/d)or atΘ(logd/d). A natural question in this line of research is that of the existence of acritical activityλc(d)such that there are multiple hard-core measures as soon as λ > λc(d)and a unique measure ifλ < λc(d). Even though it is believed that in the case ofZd, such critical activity exists, so far it has not been proved or disproved. Interestingly, it was shown in [2] that there are graphs for which there is no such critical activity. Following [5], even if the hard-core model onZddoes not have a critical activity, one can still define a similar quantityλ(d)to be the supremum of those activitiesλfor which there is a unique hard-core measure. With this notation at hand, one can rephrase Theorem1.1asλ(d)=O(d1/4(logd)3/4)asd→ ∞.

The aim of this paper is twofold. First, using the counting and structure theorems forodd cutsetsproved by the first author in [11], we give what we think is a shorter and possibly more transparent proof of (a slightly weaker version of) the result of Galvin and Kahn.

Theorem 1.2. There are constantsd0andCsuch that ifdd0,then λ(d)Cd1/4(logd)2.

3More precisely, a countably infinite, locally finite, connected graph.

(3)

Second, we prove a refined version of one of the main results of [11], the so-calledinterior approximationtheorem for odd cutsets inZdand use it to improve the bound in Theorem1.1.

Theorem 1.3. There are constantsd0andCsuch that ifdd0,then λ(d)Cd1/3(logd)2.

We would like to point out that, mimicking the general strategy in [11], we try to separate the probabilistic and ge- ometric parts of the argument as much as possible. First of all, we hope that this makes our argument better structured and more easily comprehensible. Secondly, we aim to stress our belief that a further refinement of the geometric part will improve the bound onλ(d). Last but not least, this separation allows us to reuse most of the proof of Theorem1.2 in the proof of Theorem1.3. Finally, we remark that the ideas of using cutsets with the “odd” property and approx- imating them have been used in several previous works, e.g., in [1,4,5,12]. Moreover, the general strategy which we use in the proof of Theorems1.2and1.3closely follows that of Galvin and Kahn [5], see the more detailed discussion in Section3.

2. Preliminaries

2.1. Notation General

For a setX, we will denote the power set (the set of all subsets) ofXbyP(X)and for a positive integerk, we will abbreviate{1, . . . , k}by[k]. We always write log for the natural logarithm.

Graph theory

Given a graphH, we will denote its vertex and edge sets byV (H )andE(H ), respectively. For the sake of clarity, for two vertices v, wV (H ), we will sometimes writevw for the unordered pair{v, w}. IfWV (H ), then we will writeH[W]for the graph induced byH onW andH\W forH[V (H )\W]. IfFE(H ), then we will write H\F for the graph obtained from H by removing from it all edges inF. For everyvV (H ), theneighborhood ofv, denotedN (v), is the set of all vertices that are adjacent tov; for a setSV (H ), we letNH(S)=

vSN (v).

The distance between two verticesv, wV (H ), denoted distH(v, w), is the length of the shortest path connectingv andwinH or∞if there is no such path. A setWV (H )isconnectedif each pair of vertices inW is connected by a path, i.e., if distH(v, w) <∞for everyv, wW. Sometimes we will drop the subscriptH to keep things less cluttered, provided that the graphH is clear from the context. Theconnected componentof a vertexv(a connected setW) is the largest connected subset ofV (H )that contains the vertexv(the setW). For a positive integerk, thekth power ofH, denotedHk, is the graph on the vertex setV (H )whose two verticesvandware adjacent if and only if distH(v, w)k. Finally, we will write(H )for the maximum degree ofH.

The graphZd

Since this graph is clearly connected and bipartite, it is natural to refer to its two color classes as the even and the odd vertices, denotedVevenandVoddrespectively. The setVeven(Vodd) consists of those lattice points whose coordinates sum up to an even (odd) number. Recall that two verticesv, w∈Zdare adjacent if and only ifw=v+f for some f ∈ZdwhoseL1-norm is equal to 1. It is therefore convenient to denote all such vectorsf, i.e., all{−1,0,1}-vectors with exactly one non-zero coordinate, byf1, . . . , f2d. For example, observe thatN (v)= {v+fj: j∈ [2d]}for every v∈Zd. Finally, when a feasible configurationω∈ {0,1}Zd is clear from the context,Vvac will denote the set of all vacantvertices, i.e.,Vvac= {v∈Zd: ω(v)=0}. If a vertex is not vacant, then we say that it isoccupied.

2.2. Finitized version of the problem

As observed by Galvin and Kahn [5], the problem of showing the existence of multiple hard-core measures can be finitized as follows. Let Gn be the subgraph of Zd induced on the set of lattice points in[−n, n]d and define the

(4)

boundary Bn of this subgraph by Bn= [−n, n]d\ [−(n−1), n−1]d. Letμn be the (unique) hard-core measure onGn with activityλ, letμevenn beμn conditioned on the eventω(v)=1 for allvBnVeven, and defineμoddn accordingly. As shown in [5], there are positive constantscandC such that the following holds. If for every fixed x∈Zdand sufficiently largen,

μevenn

ω(x)=1

< c/d ifxVodd and μoddn

ω(x)=1

< c/d ifxVeven,

then there are multiple hard-core measures onZd with activity λ, provided that λ > C/d. In view of the above, Theorem1.3will be a direct consequence of the next theorem, whose proof is the main part of this paper.

Theorem 2.1. There exist constantsd0andC such that ifdd0,λCd1/3(logd)2,n≥2,andxis an arbitrary even vertex ofGn,then

μoddn

ω(x)=1

< c/d.

Moreover,the same result holds when the roles of even and odd vertices are reversed.

Remark. We will first prove Theorem 2.1under the stronger assumption that λCd1/4(logd)2,which implies Theorem1.2.Later,we will refine our approach and prove it for the stated regime.

2.3. Tools

In this section, we collect two auxiliary lemmas that will be used in the proof of our main result. Both are fairly standard and can be surely found in the literature. The proofs are given only for the sake of completeness.

Lemma 2.2. LetM be an integer,letH be an arbitrary graph,and let vV (H ).The number of connected sets EV (H )such thatvEand|E| =Mdoes not exceed((H ))2M2.

Proof. For every suchE, we fix an arbitrary spanning treeTEofE. Starting fromv, we perform a depth-first search onTE, starting and ending atv and passing through every edge exactly twice. Since every spanning tree ofEhas exactlyM−1 edges, the number of possibilities for such a walk (and hence forE) is not larger than the number of

walks of length 2M−2 inH that start atv.

Our second lemma formalizes the following intuition. If an eventA in some discrete probability space(X, μ) admits an expanding transformationT:AP(X), i.e., a map for whichμ(T (a))is much larger thanμ(a)for every aA, thenμ(A)is small, provided that noxXappears in the image ofT too many times.

Lemma 2.3. LetXbe a finite set,letAX,and letμbe a probability measure onX.Suppose that there are positive numberspandqand a mappingT: AP(X)such that for eachaAand eachxX,

μ T (a)

q·μ(a) and b∈A: xT (b)p.

Thenμ(A)p/q.

Proof. Our assumptions easily imply that μ(A)=

aA

μ(a)≤ 1 q ·

aA

μ T (a)

=1 q ·

aA

xT (a)

μ(x)

=1 q ·

xX

aA: xT (a)·μ(x)p q ·

xX

μ(x)=p q.

(5)

Fig. 1. Typical configurations with odd boundary conditions forn=20,d=2, and activitiesλ=1 andλ=5, respectively. Odd and even occupied nodes are represented by black and gray circles, respectively. Even occupied nodes are surrounded by their corresponding Breaks. Simulated using coupling from the past [7].

3. Outline of the argument

Fix integersnandd and recall thatGnis the subgraph ofZdinduced on the set of lattice points in[−n, n]d. We start by observing that if the odd boundary vertices ofGn are occupied, andx is an even vertex which is occupied, there must be an “outermost” surface inGn in which the pattern “flips” from odd/occupied to even/occupied (see Fig.1).

Formally, this surface is defined in Section4.1as a set of edgesΓ having the following properties:

(i) Γ forms a minimal cutset separatingBnfromx. In other words,Γ partitionsGninto two connected components, the component of the boundary, denoted byA0(Γ ), and the component ofx, denoted byA1(Γ ).

(ii) The vertices on the outer boundary ofΓ are even and vacant and the vertices on the inner boundary ofΓ are odd and vacant.

Edge cutsets with the above properties play a prominent role in our analysis and we term them OMCut (for odd minimal edge cutsets). We remark that the idea of considering such cutsets also lies at the heart of the approach taken by Galvin and Kahn [5].

In what follows, let x be a fixed even vertex ofGn and let Ω be our “bad” event, i.e., the set of all feasible configurations with all odd boundary vertices (i.e., the vertices in the setVoddBn) andx occupied. For a given configurationωΩ we term the aboveΓ as Break(ω). A simple consequence of the above properties and the fact thatxis even is that|Break(ω)| ≥2d(2d−1)(Proposition4.5).

Our next observation is that applying the following “shift transformation” toωΩyields a feasible configuration (see Fig.2):

Shiftj(ω)(v)=

ω(v+fj) ifvA1

Break(ω) , ω(v) otherwise.

A similar transformation was used by Galvin and Kahn [5]. The key properties of this transformation are:

(i) Shiftj is measure preserving, i.e.,μodd(Shiftj(ω))=μodd(ω).

(ii) Denotingω=Shiftj(ω), every vertex in the set{vA1(Break(Γ )): (v, v+fj)∈Break(ω)}is surrounded by vacant vertices inω. Thus an arbitrary modification ofωon these vertices yields a feasible configuration.

(6)

Fig. 2. The shift transformation. Odd and even occupied nodes are represented by black and gray circles, respectively. The transformationT1 shifts the occupied nodes inside the cutset Break(ω)to the left. In the new configuration all vertices having an edge of Break(ω)on their right (represented by white circles) necessarily have no occupied neighbors and can thus be set occupied or vacant arbitrarily.

Fig. 3. Odd cutsets approximating the boundary of a cube. On the left, every second boundary vertex can be “pushed out” independently of other vertices, yielding 2(2d1−od(1))Lodd cutsets withLedges, asL→ ∞. On the right, for every odd cutset obtained in such way, we have the additional option of independently “pushing out” vertices all of whose 2d2 neighbors were “pushed out” in the first stage. Combining these two stages shows that asL→ ∞(along a subsequence) there are at least 2(2d1+cd−od(1))Lodd cutsets withLedges for somecd>0.

These two properties and an application of Lemma2.3imply that for every fixedΓ ∈OMCut, μodd

Break(ω)=Γ

(1+λ)−|Γ|/2d. (1)

At this point one is tempted to conclude the proof of Theorem2.1by the union bound over all possibleΓ ∈OMCut.

This approach unfortunately fails since the number ofΓ ∈OMCut with a given size turns out to be too large. Indeed, if we let OMCutL= {Γ ∈OMCut:|Γ| =L}then|OMCutL| ≥2(2d1+cd)Lfor somecd>0, at least on a subsequence ofLs. This can be seen by counting those cutsets which approximate closely the boundary of a large cube with sides parallel to the axes ofZd(see Fig.3), but we neither prove nor use this fact in our work.

Instead, we introduce a (very coarse) measure of regularity on OMCut (the quantityRΓ(E1(Γ ))defined in Sec- tion 4.3) and partition all cutsets into “regular” and “irregular” ones. Theorem 4.7shows that the set of irregular

(7)

cutsets is fairly small and hence the union bound (with the above estimate (1)) is sufficient to bound the probability that Break(ω)is irregular (see Theorem4.15).

In order to bound the probability that Break(ω) is regular, we partition the set of all regular cutsets into a (rela- tively) small number of classes and give an estimate on the probability of Break(ω)belonging to each such class that is strong enough to facilitate a union bound over all classes. We obtain this partition by exploiting a certain concentration of shape phenomenon. It is shown in Theorems4.8and4.9that, informally, for sufficiently larged there is a set of

“shapes” which contain a good “approximation” to every cutset in OMCutL, with the number of such shapes signifi- cantly smaller than|OMCutL|. Adapting the shift transformation to this notion of approximation (see Section4.4.2), we are able to bound the probability that Break(ω)belongs to the set of cutsets with a given shape. The bound we get is only strong enough for cutsets which are regular (see Theorems4.16and4.17), necessitating the separate treatment of irregular cutsets given above. This last part of the argument, i.e., separate treatment of regular and irregular cutsets is the main novelty in our approach.

4. The argument

4.1. Locating the cutset

Let d, n≥2 and let x be an arbitrary even vertex ofGn. Let Fnodd be the set of all feasible configurations with ω(v)=1 for allvBnVoddand letΩndenote the “bad” event, i.e., the set of allωFnoddwithω(x)=1. For the sake of clarity of the presentation, most of the time we will drop the subscriptnfromGn,Bn,μoddn ,Fnodd, andΩn.

Fix an arbitrary “bad” configuration ωΩ. Observe that all odd boundary vertices are occupied and all even boundary vertices are vacant, whereasxis an even vertex that is occupied and all its neighbors are odd and vacant. We are going to associate withωan edge cutset inGthat will mark the outermost break in the above boundary pattern, i.e., the outermost contour separating vertices that are odd and occupied from vertices that are even and occupied. More precisely, we letXbe the set of all vacant odd vertices, i.e.,X=VoddVvac, letA0be the connected component of Bin the graphG\X(note thatBis connected inGand disjoint fromX), and note thatx /A0asN (x)X. Finally, letA1be the connected component ofx in the graphG\A0 and letΓ be the set of all edges with one endpoint in A0and one endpoint inA1. By definition, every path fromxtoBmust use an edge ofΓ and no strict subsetΓΓ has this property. In other words, we may say thatΓ is aminimal edge cutsetseparatingxfromB. To summarize, we have defined a mapping Break: ΩP(E(G))that assigns to each configuration inΩ an edge cutset separatingx fromB. Below, we establish some crucial properties of this cutset.

LetΓ =Break(ω). For an arbitrary vertexvV (G), letPΓ(v)be the number of edges ofΓ that are incident tov and let

E0= vA0: PΓ(v) >0

= v /A1: PΓ(v) >0

and E1= vA1: PΓ(v) >0 .

Proposition 4.1. E0VevenVvacandE1VoddVvac.

Proof. Fix some vE1 and let w be an arbitrary vertex with {v, w} ∈Γ; at least one such vertex exists since PΓ(v) >0. Clearly,wA0and hencevXor otherwisev would also belong toA0(recall thatA0 is a maximal connected subset of vertices inG\X). It follows thatE1X=VoddVvac. Since each vertex inE0is adjacent to a vertex inE1, it immediately follows thatE0Veven. Finally, fix an arbitrarywE0. It remains to be shown thatw is vacant. SincewA0, then there is a path inA0connectingwtoBVodd. The immediate neighbor ofwon this path is an odd vertex that does not belong toXand hence it is occupied. Therefore,wmust be vacant.

Before we proceed, we have to take a little detour and introduce some terminology that will help us deal with cutsets arising in the procedure described above. Following [11], we let MCut be the set of allminimal edge cutsets separatingxandB, i.e., the set of allΓE(G)such that any path fromxtoBmust cross an edge ofΓ and no strict subsetΓΓ shares this property. For everyΓ ∈MCut, letA0(Γ )andA1(Γ )denote the connected components of BandxinG\Γ, respectively. By minimality ofΓ, every edge ofΓ must have an endpoint inA0(Γ )and an endpoint

(8)

inA1(Γ ). It follows thatA0(Γ )andA1(Γ )form a partition of the vertex set ofG. For every vertexvV (G), let PΓ(v)be the number of edges inΓ that are incident tov, and let

E0(Γ )= vA0(Γ ): PΓ(v) >0

and E1(Γ )= vA1(Γ ): PΓ(v) >0 .

Finally, we define OMCut, the set ofodd minimal edge cutsets(or simplyodd cutsets) to be the set of allΓ ∈MCut that satisfyE1(Γ )Vodd.

Since the new definitions ofA1,E0, andE1coincide with the old ones (more precisely, ifΓ =Break(ω)for some ωΩ and the procedure described at the beginning of this section defines setsA1,E0, andE1, thenA1=A1(Γ ), E0=E0(Γ ), andE1=E1(Γ )), then it is easy to see that the mapping Break assigns to each configuration inΩ an odd cutsetΓ =Break(ω)∈OMCut satisfying Proposition4.1.

We need to establish one more crucial property of the mapping Break. To this end, withΓ ∈OMCut fixed, we say that a configurationωis aninterior modificationof another configurationωif they agree everywhere but at most on the setA1(Γ )\E1(Γ ), i.e., ifω(v)=ω(v)for allv /A1(Γ )\E1(Γ ). A moment of thought assures us that the following is true about the map Break.

Proposition 4.2. Let Γ ∈OMCut and assume that Γ =Break(ω) for some configuration ωΩ. Then Γ = Break(ω)for everyωthat is an interior modification ofω.

Proof. LetX= {vVodd:ω(v)=0}and letX= {vVodd:ω(v)=0}. Sinceωis an interior modification ofω, it follows thatX\A1(Γ )=X\A1(Γ )and Proposition4.1implies thatX, XE1(Γ ). By definition, every path from BtoA1(Γ )has a vertex inE1(Γ ). It follows that the connected components ofBinG\XandG\Xare identical and hence Break(ω)=Break(ω). To see this, recall that Break(ω)depends solely on the connected component ofB in the graphG\ {vVodd: ω(v)=0}, which we denoted byA0at the beginning of this section.

4.2. Minimal edge cutsets

In this section, we give basic definitions and properties of minimal edge cutsets that will be used throughout the paper.

The following property of the setsE0(Γ )andE1(Γ ), which is a direct consequence of the results proved by Timár [14], will be crucial in our considerations.

Proposition 4.3. For everyΓ ∈MCut,the setsE0(Γ )andE1(Γ )are connected in the graphG2.

Proof. Following [14], for a graphH, anyCV (H ), and avV (H ), define the outer boundary ofCvisible from v, denoted∂Hvis(v, C), to be the set of allyNH(C)that are connected tovin the graphH\C. It follows from [14], Lemma 2, that for any connected subsetCV (G)such thatBC orBC=∅and anyvV (G)\C, the set

Gvis(v, C)is connected inG2. The reason for the assumption thatC either containsB or is disjoint fromB is that such setC, when viewed as a subset in the graphZd, satisfiesGvis(v, C)=Zvisd(v, C)for everyvV (G)\C⊆Zd. To conclude, we simply note that the setsA0(Γ )andA1(Γ )are connected,BA0(Γ ),BA1(Γ )=∅,E1(Γ )=

Gvis(x, A0(Γ )), andE0(Γ )=Gvis(b, A1(Γ ))for everybB. For everyj ∈ [2d], we let

E1,j(Γ )= vE1(Γ ): {v, v+fj} ∈Γ . We also define

E1,e(Γ )= vE1(Γ ): PΓ(v)≥2d−√ d and

E1,j,x(Γ )= vE1,e(Γ ): v+fjA1(Γ )

= vE1,e(Γ ): {v, v+fj}∈ .

(9)

The letterestands forexposedas vertices inE1,e(Γ )are exposed toΓ from many directions. The setsE1,j,E1,e, andE1,j,xwill play an important role in our considerations. We also let

Γr= vwΓ: vE1(Γ )\E1,e(Γ ) , for everyj∈ [2d], let

Γj= vwΓ: vE1(Γ )andw=v+fj

and Γrj=ΓrΓj.

Additionally, note that for eachj∈ [2d], we have that|E1,j| = |Γj|, and|E1,j\E1,e| = |Γrj|. We will repeatedly use the following simple facts.

Proposition 4.4. Let Γ ∈OMCut,let δ∈ {0,1},and let vEδ(Γ ). For every j ∈ [2d], if v+fjAδ(Γ ) (or, equivalently,{v, v+fj}∈),thenN (v+fj)Aδ(Γ ).

Proof. Assume first thatδ=1. LetvE1(Γ )and letj∈ [2d]be such thatv+fjA1(Γ ). SinceE1(Γ )Vodd, thenv+fjVeven. SinceN (w)A1(Γ )E0(Γ )for everywA1(Γ ),N (v+fj)Vodd, andE0(Γ )Veven, it

follows thatN (v+fj)A1(Γ ). The caseδ=0 follows similarly.

Proposition 4.5. For everyΓ ∈OMCut,|Γ| ≥2d(2d−1).

Proof. For everyj ∈ [2d]andi∈ [2d] \ {j}, consider the pathx, xfj, xfj+fi, . . . , xfj+fi, whereis the smallest integer such thatxfj+fiB. SinceΓ separatesxfromB, at least one edge on each such path must belong toΓ and this edge is certainly not{x, xfj}asxVevenA1(Γ )A1(Γ )\E1(Γ )and hence bothxand xfj belong toA1(Γ ). Moreover, the edges of the form{x, xfj}are the only edges belonging to more than one

of these 2d(2d−1)paths. It follows that|Γ| ≥2d(2d−1).

Proposition 4.6. For everyΓ ∈OMCutandvV (G),PΓ(v)≤2d−1.

Proof. Suppose thatPΓ(v)=2d for somevV (G). Assume first that vA1(Γ ). SinceA1(Γ ) is connected in G\Γ,xA1(Γ ), and all 2dedges incident tovbelong toΓ, it must be thatA1(Γ )=E1(Γ )= {v} = {x}. But recall thatxVeven, which contradicts the fact thatE1(Γ )Vodd(Γ is an odd cutset). Finally, asBA0(Γ )andA0(Γ ) is connected, one can quickly rule out the other possibility thatvA0(Γ )and all 2dedges incident tovare inΓ. 4.3. Counting odd cutsets

In this section, which borrows heavily from [11], we shall state three theorems that estimate the number of odd cutsets in various settings. Before we do that, we need to introduce some more notation. Following [11], for every Γ ∈OMCut,vV (G), andEV (G), we define

RΓ(v)=min PΓ(v),2d−PΓ(v) and RΓ(E)=

vE

RΓ(v).

For integersMandR, we let

OMCut(M, R)= Γ ∈OMCut:|E1(Γ )| =MandRΓ E1(Γ )

=R . A key observation that may elucidate the above definitions is that, since

2d k

= 2d

2d−k

(2d)min{k,2dk} for everykwith 0≤k≤2d,

(10)

then for everyvV (G), there are at most(2d)RΓ(v) ways to choosePΓ(v)out of the 2d edges incident tov. One might think of the parameterRΓ(E1(Γ ))as a measure of the regularity ofΓ. Note thatRΓ(E1(Γ ))≤ |Γ|and that a value ofRΓ(E1(Γ ))significantly smaller than|Γ|indicates that most verticesvinE1(Γ )havePΓ(v)close to 2d; this can be interpreted as some roughness ofΓ. The following result is a straightforward corollary of [11, Theorem 4.5].

Theorem 4.7. There exist constantsC andd0such that for all integersM,R,anddwithdd0, OMCut(M, R)≤exp

C(logd)2

d R

.

Recalling the definition ofE1,e(Γ ), we say that a setEV (G)is aninterior approximationtoΓ if

E1(Γ )\E1,e(Γ )EA1(Γ ). (2)

The following result is a straightforward corollary of [11, Theorem 4.13].

Theorem 4.8. There exist constantsCandd0such that for all integersLanddwithdd0,there exists a familyE of subsets ofV (G)satisfying

|E| ≤exp

C(logd)2 d3/2 L

and such that for everyΓ ∈OMCutwith|Γ| =L,there is anEEthat is an interior approximation ofΓ.

Remark. Theorems4.7and4.8were proved in[11]for an alternative definition ofOMCut.There, OMCutwas defined as the set of odd minimal cutsets separating two points(or a set and a point)in a discretetorus.However,the theorems apply to our setting,since we can think thatGn is embedded naturally in the discrete torusZd4nand note that then OMCut (in our definition)is a subset of the set of odd minimal cutsets separatingx from a “far away” point in this torus.In addition,in[11],the upper bound on|E|in Theorem4.8had an additional factor of2.In our application, this factor can be absorbed in the constantCby Proposition4.5.

One of the main ingredients in our proof of Theorem1.3that will allow us to improve the bound onλ(d)given by Theorem 1.2is a refined version of Theorem4.8. The main idea behind this improved interior approximation theorem is specializing the familyEfrom the statement of Theorem4.8to work only for odd cutsets with a particular distribution of edges adjacent to exposed and non-exposed vertices (i.e., the vertices inE1,eand the vertices inE1\ E1,e). To be more precise, for anyεwithd1/3ε≤1/2, recalling the definition ofΓr, we let

OMCut(ε)= Γ ∈OMCut:ε|Γ|<|Γr| ≤2ε|Γ| .

In other words, OMCut(ε) consists of those odd cutsets whose only aboutε-fraction of edges are adjacent to non- exposed vertices. Since interior approximations “detect” only non-exposed vertices, it should not come at a surprise that asεgets smaller, approximating cutsets in OMCut(ε)becomes easier. We show that the following statement is true.

Theorem 4.9. There exist constants C and d0 such that for all integers L and d with dd0, and everyε with d1/2ε≤1/2,there exists a familyEof subsets ofV (G)satisfying

|E| ≤exp C

ε(logd)2 d3/2 L

and such that for everyΓ ∈OMCut(ε)with|Γ| =L,there is anEE that is an interior approximation toΓ. Remark. In fact,our proof of Theorem4.9yields a somewhat stronger property of the family E.We show that for everyΓ ∈OMCut(ε)with|Γ| =L,there is anEEsuch that{vE1(Γ ): PΓ(v) <2d−√

εd} ⊆EA1(Γ ),see Proposition5.6.

(11)

As we remarked in theIntroduction, the proof of our main result, Theorem1.3, has been split up into the geometric part, which was presented in this section, and the probabilistic part, which we will present in the next few sections.

Since these parts are almost completely independent, we will postpone the proof of Theorem4.9to Section5and use it as a “black box” when we derive the main result.

4.4. Definition of the transformations

In this section, we define the mapping that we alluded to in Section 3 and establish its key properties. Recall the definitions ofΩ andFodd from Section4.1. Throughout this section, we fix someωΩ, letΓ =Break(ω),A1= A1(Γ ),E0=E0(Γ ),E1=E1(Γ ),E1,e=E1,e(Γ ), andE1,j=E1,j(Γ )andE1,j,x=E1,j,x(Γ )for everyj∈ [2d].

Our transformation will take one of two possible forms, depending on the shape ofΓ.

As a preparatory step, for everyj∈ [2d], we define thejthshift transformationShiftj:ΩFodd(see Fig.2) by Shiftj(ω)(v)=

ω(v+fj) ifvA1, ω(v) otherwise.

We remark that such a transformation already appeared in [5].

Proposition 4.10. The configurationShiftj(ω)is indeed feasible with the odd boundary vertices occupied.In other words, Shiftj(ω)Fodd.

Proof. SinceΓ ∈OMCut, thenBA1=∅and therefore Shiftj(ω)(v)=ω(v)=1 for everyvBVodd. It remains to check that Shiftj(ω)is feasible, i.e., for novV (G)andi∈ [2d], bothvandv+fi are occupied. If bothvand v+fi belong toA1or bothvandv+fi are not inA1, then this follows from the fact thatωis feasible. Otherwise, assume WLOG thatv /A1andv+fiA1. It follows thatvE0, so Shiftj(ω)(v)=ω(v)=0 by Proposition4.1.

Proposition 4.11. For allvE1,j andi∈ [2d],we haveShiftj(ω)(v+fi)=0.

Proof. Fix somevE1,j andi∈ [2d]. By definition,v+fjE0. Ifv+fiE0, then Shiftj(ω)(v+fi)=ω(v+ fi)=0 by Proposition 4.1. If v+fi/E0, then v+fi +fjE1 (since v+fi +fjA1 and it is adjacent to v+fj/A1). It follows that Shiftj(ω)(v+fi)=ω(v+fi +fj)=0, where the last equality again follows from

Proposition4.1.

Proposition 4.12. The shift transformation is preservesμodd,i.e.,μodd(Shiftj(ω))=μodd(ω).

Proof. Since Shiftj(ω)(v)=ω(v) for all v /A1, it suffices to show that |{vA1: Shiftj(ω)(v)=1}| = |{vA1: ω(v)=1}|. To see this, note that ifvA1 and Shiftj(ω)(v)=1, thenω(v+fj)=1 and hencev+fjA1 since otherwisev+fjE0andω(v+fj)=0 by Proposition4.1. Conversely, ifv+fjA1andω(v+fj)=1, thenv+fj/E1by Proposition4.1and hencevA1and Shiftj(ω)(v)=ω(v+fj)=1.

4.4.1. The shift transformation

We are now ready to define the first expanding transformationT1: ΩP(Fodd). First, for everyj∈ [2d], we define the transformationT1,j: ΩP(Fodd)by lettingT1,j(ω)be the set of all configurationsωof the form

ω(v)=

Shiftj(ω)(v) ifv /E1,j,

εv otherwise,

wherev)vis an arbitrary{0,1}-sequence indexed byE1,j. Propositions4.10and4.11imply that each suchωindeed belongs toFoddwhereas Proposition4.12implies that

μodd

T1,j(ω)

=(1+λ)|E1,j|μodd(ω).

(12)

Next, observe that|Γ| =2d

j=1|Γj|and hence|Γj| ≥ |Γ|/(2d)for somej; in fact, sinceΓ ∈OMCut, we have that

|Γj| = |Γ|/(2d)for allj, see [11], but we will not need this. We define the transformationT1byT1(ω)=T1,j(ω), wherej=j (Γ )=j (Break(ω))is the smallest indexj satisfying|Γj| ≥ |Γ|/(2d). It follows that

μodd T1(ω)

=(1+λ)|E1,j|μodd(ω)=(1+λ)|Γj|μodd(ω)(1+λ)|Γ|/(2d)μodd(ω). (3) Finally, we show that we can “invert”T1if we know Break(ω).

Proposition 4.13. For everyΓ ∈OMCut,andωFodd,there is at most oneωΩ satisfyingΓ =Break(ω)and ωT1(ω).

Proof. WithΓ ∈OMCut fixed, letA1=A1(Γ ),E1=E1(Γ ), andj=j (Γ ). LetωΩ satisfyΓ =Break(ω)and ωT1(ω)=T1,j(ω). We show that we can recoverωfromω. By the definition ofT1,j, we haveω(v)=ω(v)for allv /A1andω(v)=ω(vfj)for allvA1such thatvfjA1. Finally, ifvA1butvfj/A1, thenvE1

andω(v)=0 by Proposition4.1.

4.4.2. The shift+erase transformations

Next, we define the second expanding transformation T2: ΩP(Fodd). First, for every j ∈ [2d] we define the transformationT2,j: ΩP(Fodd)by lettingT2,j(ω)be the set of all configurationsωof the form

ω(v)=

⎧⎨

Shiftj(ω)(v) ifv /E1,jE1,e, εv ifvE1,j\E1,e,

0 ifvE1,e,

wherev)v is an arbitrary {0,1}-sequence indexed byE1,j\E1,e. Again, Propositions4.10 and4.11imply that each suchω indeed belongs to Fodd. With the aim of computingμodd(T2,j(ω)), first let Xj(ω) denote the set of exposed vertices that are occupied in Shiftj(ω), butT2,j(ω)forces them to be vacant, i.e.,Xj(ω)= {vE1,e:ω(v+ fj)=1}, and observe thatXj(ω)E1,j,xsince ifvE1,e\E1,j,x, thenv+fjE0and henceω(v+fj)=0 by Proposition4.1. Now it is not hard to see that

μodd

T2,j(ω)

=(1+λ)|E1,j\E1,e|λ−|Xj(ω)|μodd(ω).

The transformationT2is defined byT2(ω)=T2,j(ω), wherej =j (Γ )=j (Break(ω))is the smallest indexj that maximizes the quantity|Γrj| −8|E1,j,x|. It follows that

μodd T2(ω)

=(1+λ)|E1,j\E1,e|λ−|Xj(ω)|μodd(ω)=(1+λ)|Γrj|λ−|Xj(ω)|μodd(ω). (4) We close this section by showing how we can “invert”T2if we know an interior approximationEto Break(ω)(recall the definition of an interior approximation given in (2)) and the setX(ω)=Xj (Break(ω))(ω). More precisely, we first prove that givenEand anωT2(ω), we can reconstruct Break(ω)and then, if we additionally specify the setX(ω), thenωis uniquely determined.

Proposition 4.14. For every EV (G)and ωFodd, there is at most oneΓ ∈OMCutsuch that the following holds:

(i) IfωT2(ω)for someωΩ such thatEis an interior approximation toBreak(ω),thenBreak(ω)=Γ. (ii) For everyXV (G), there is at most one ωΩ such that ωT2(ω), E is an interior approximation to

Break(ω),andXj (Γ )(ω)=X.

Proof. LetωΩ be any configuration such thatωT2(ω). We first show (i), i.e., that we can recover Break(ω)if we know thatEis an interior approximation to it. To see this, define a configurationωby

ω(v)=

ω(v) ifv /E, 0 ifvE,

Références

Documents relatifs

Pour presque tout nombre premier/?, décomposé dans X, on donne une construction de la fonction L p-adique à deux variables attachée à la courbe E/F, généralisant celle de Yager

Vavilov, Description of subgroups of the full linear group over a semilocal ring that contain the group of diagonal

The curve p(E1) is an exceptional curve meeting the boundary.. divisor of S transversally in one point. We will show that this also leads to contradiction... Suppose

Toute utilisa- tion commerciale ou impression systématique est constitutive d’une in- fraction pénale.. Toute copie ou impression de ce fichier doit conte- nir la présente mention

Let E be an elliptic curve defined over a number field F, with complex multiplication by the ring of integers (9 of an imaginary quadratic field.. In this paper

Toute utilisation commerciale ou impression systématique est constitutive d’une infrac- tion pénale.. Toute copie ou impression de ce fichier doit contenir la présente mention

Toute utilisation commerciale ou impression systématique est constitutive d’une infrac- tion pénale.. Toute copie ou impression de ce fichier doit contenir la présente mention

Toute utilisation commerciale ou impression systématique est constitutive d’une infrac- tion pénale.. Toute copie ou impression de ce fichier doit contenir la présente mention