Skip to main content
Springer logoLink to Springer
. 2021 Oct 14;185(2):8. doi: 10.1007/s10955-021-02819-w

Large Deviations for Subcritical Bootstrap Percolation on the Erdős–Rényi Graph

Omer Angel 1, Brett Kolesnik 2,
PMCID: PMC8550067  PMID: 34720186

Abstract

We study atypical behavior in bootstrap percolation on the Erdős–Rényi random graph. Initially a set S is infected. Other vertices are infected once at least r of their neighbors become infected. Janson et al. (Ann Appl Probab 22(5):1989–2047, 2012) locates the critical size of S, above which it is likely that the infection will spread almost everywhere. Below this threshold, a central limit theorem is proved for the size of the eventually infected set. In this work, we calculate the rate function for the event that a small set S eventually infects an unexpected number of vertices, and identify the least-cost trajectory realizing such a large deviation.

Keywords: Bootstrap percolation, Phase transition, Random graphs, Large deviations, Discrete calculus of variations

Introduction

Bootstrap percolation was originally proposed by physicists [12, 29] to model the phase transition observed in disordered magnets. Since then a large literature has developed, motivated by beautiful results, e.g. [8, 10, 22, 31], and a variety of applications across many fields, see e.g. [1, 2] and references therein.

In this work, we consider the spread of an infection by the r-neighbor bootstrap percolation dynamics on the Erdős–Rényi [15] graph Gn,p, in which any two vertices in [n] are neighbors independently with probability p. Although we focus on this special case, we think our methods could be useful in studying the large deviations of any Markovian growth or exploration process. For instance, we have more recently used these methods to study the performance of the greedy independent set algorithm on sparse random graphs [26].

In bootstrap percolation, some subset S0[n] is initially infected. Other vertices are infected once at least r of their neighbors become infected. Most of the literature has focused on the typical behavior. Of particular interest is the critical size at which point a uniformly random initial set S0 is likely to infect most of the graph. Less is known about the atypical behavior, such as when a small set S0 is capable of eventually infecting many more vertices than expected (e.g. influencers or superspreaders in a social network, viral marketing, etc.).

For analytical convenience, we rephrase the dynamics in terms of an exploration process (cf. [23, 30, 32]) in which vertices are infected one at a time. At any given step, vertices are either susceptible, infected or healthy. All susceptible vertices become infected eventually, and then remain infected. When a vertex is infected, some of the currently healthy vertices may become susceptible. The process ends once a stable configuration has been reached in which no vertices are susceptible.

More formally, at each step t, there are sets It and St of infected and susceptible vertices. Vertices in [n]\(ItSt) are currently healthy. Initially, I0=. In step t1, some vertex vtSt-1 is infected. All remaining edges from vt are revealed. To obtain St from St-1, we remove vt and add all neighbors of vt with exactly r-1 neighbors in It-1. We then add vt to It-1 to obtain It. The process ends at step t=min{t1:St=} when no further vertices can be infected. For technical convenience, we set |St|=0 for all tt. Let I=It denote the eventually infected set. Since one vertex is infected in each step tt, we have |It|=t and |St||St-1|-1 for all such t. In particular, t=|I|. Clearly, I does not depend on the order in which vertices are infected.

Janson et al. [23] (cf. [34]) identifies the critical size of S0, for all r2 and

p=((r-1)!/n)1/rϑ1/r-1,1ϑ(n)n, 1

in the case that S0 is selected uniformly at random. By the symmetry of Gn,p, this is the same as for a given set S0 (independent of Gn,p) of the same size. More specifically, a sharp threshold is observed. If more than (1-1/r)ϑ vertices are initially susceptible, then all except o(n) many vertices are eventually infected. Otherwise, the eventually infected set is much smaller, of size O(ϑ)n.

Theorem 1

([23] Theorem 3.1) Let p be as in (1) and α0. Put αr=(1-1/r)α. Suppose that a set S0=S0(n) (independent of Gn,p) of size |S0|αrϑ is initially susceptible. If α>1, then with high probability |I|n. If α<1, then with high probability |I|φαϑ, where φα[αr,α] uniquely satisfies

φα-φαr/r=αr. 2

The extreme cases pc/n and pc/n1/r are also addressed in [23], where the model behaves differently. We assume (1) throughout this work.

Moreover, in the subcritical case, a central limit theorem is proved in [23] (see Theorem 3.8). In this work, we study large deviations from the typical behavior in the subcritical case α<1.

Definition 2

For β<φα (resp. β>φα), let P(S0,β) denote the tail probability that the initial susceptibility of S0[n] in Gn,p results in some number |I|βϑ (resp. |I|βϑ) of eventually infected vertices.

Informally, P(S0,β) is the probability that the number |I| of eventually infected vertices is at least as atypical as βϑ.

Theorem 3

Let p be as in (1), α[0,1) and βφα[αr,1]. Suppose that a set S0=S0(n) (independent of Gn,p) of size |S0|αrϑ is initially susceptible. Then

limn1ϑlogP(S0,β)=ξ(α,β),

where

ξ(α,β)=-βr/r+(β-αr)[1+log(βr/(r(β-αr))]βαα/r-(r-2)(β-α)+(r-1)log(ββ/ααr)β>α. 3

For any given α[0,1), ξ(α,β) is increasing in β[αr,φα), decreasing in β(φα,1] (see Appendix A.2), and ξ(α,φα)=0 by (2), in line with Theorem 1. See Fig. 1.

Fig. 1.

Fig. 1

For r=2 and α=2/3, the rate function -ξ(α,β) is plotted as a function of β

The asymptotically optimal trajectory y^α,β(x) for |Sxϑ|/ϑ is given at (9) below (see also Fig. 2). The rate function ξ(α,β) is found by substituting this into the associated cost function (8). Detailed heuristics are given in Sect. 1.5 below. See Sect. 2 for the proof of Theorem 3.

Fig. 2.

Fig. 2

In both figures, r=2 and α=2/3. The typical, zero-cost trajectory appears as a dotted line. Least-cost, deviating trajectories y^α,β for β=1/3,2/5 appear at left and β=1/2,2/3,5/6 at right

The point ϑ (associated with β=1) is critical. As such, we simply have that ξ(α,β)=ξ(α,1) for β>1. The reason for this is that the underlying branching process (the Binomial chain |St| discussed in Sects. 1.4 and 1.5 below) governing the dynamics becomes critical upon surviving to time t=ϑ. Surviving beyond this point, supposing that it has been reached, is no longer exponentially unlikely. In other words, the optimal (asymptotic) trajectory y^(x) that |Sxϑ|/ϑ typically follows in order to survive beyond x=1 is equal to y^α,1(x) on [0, 1] (this has cost -ξ(α,1)). From then on (x>1), there is a zero-cost path that y^(x) can follow.

We note here that in [23] (see Theorem 3.1) it is shown that |I|/ϑ converges to the typical value φα in probability. By Theorem 3 (and the Borel–Cantelli lemma) it follows that this convergence holds almost surely.

Related Work

Torrisi et al. [33] established a full large deviations principle in the supercritical case, α>1, where typically |I|n. As discussed in [33], the main step in this regard is establishing sharp tail estimates (as in our Theorem 3 above). The full large deviations principle then follows by “elementary topological considerations.” Although we have not pursued it, we suspect that a full large deviations principle also holds in the present subcritical setting.

In closing, let us remark that it might be interesting to investigate the nature of Gn,p, conditioned on the event that a given S0 eventually infects a certain number of vertices, or on the existence of such a set S0.

Motivation

We came to this problem in studying H-bootstrap percolation on Gn,p, as introduced by Balogh et al. [11], where all edges in Gn,p are initially infected and any other edge in an otherwise infected copy of H becomes infected. In the case that H=K4, there is a useful connection with the usual r-neighbor bootstrap percolation model when r=2. Theorem 3 (when r=2 and ϑ=Θ(logn)) plays a role (together with [9, 27]) in locating the critical probability pc1/3nlogn, where it becomes likely that all edges in Kn are infected eventually. This solves an open problem in [11].

Contagious Sets

A susceptible set S0 is called contagious if it infects all of Gn,p eventually (i.e., I=[n]). Such sets have been studied for various graphs (e.g. [13, 18, 19, 28]). Recently, Feige et al. [16] considered the Gn,p case.

By Theorem 1, Gn,p has contagious sets of size Θ(ϑ), however, there exist contagious sets that are much smaller. In [16], upper and lower bounds are obtained for the minimal size m(Gn,p,r) of a contagious set in Gn,p. More recently [9], we showed that

pc[(r-1)!/n]1/r[(logn)/(1-1/r)2]1/r-1 4

is the sharp threshold for contagious sets of the smallest possible size r.

For p<pc, Theorem 3 yields lower bounds for m(Gn,p,r) that sharpen those in [16] by a linear, multiplicative factor in r. Of course, finding sets of this size (if they exist) is a difficult and interesting problem (cf. the NP-complete problem of target set selection from viral marketing [14, 25]).

Corollary 4

Suppose that, for some 1ϑn,

p=[(r-1)!/n]1/r[ϑ/(1-1/r)2]1/r-1.

Then, with high probability,

m(Gn,p,r)(1-o(1))rϑ/log(n/ϑ).

This result follows by an easy union bound, applying Theorem 3 in the case that α=0 and β=1, see Appendix A.4.

By [9] this lower bound is sharp for p close to pc, that is, when ϑlogn. The methods in [9] might establish sharpness at least for ϑO(logn).

Binomial Chain

As in [23], we study the bootstrap percolation dynamics using the Binomial chain construction based on the work of Scalia-Tomba [30] (cf. Selke [32]). We only state here in this section the properties of this framework that we require, and refer the reader to Sect. 2 of [23] for the details.

Let Nt be the number of vertices that have become susceptible during some time s(0,t], so that |St|=Nt-t+|S0|. By revealing edges (incident to infected vertices) on a need-to-know basis, the process Nt can be expressed as the sum of n-|S0| independent and identically distributed processes, each of which is 0 until some NegBin(r,p) time, and then jumps to 1 (and remains at 1 thereafter). Informally, when a vertex is infected, it gives all of its neighbors a “mark.” A vertex, which was not initially susceptible, is susceptible or infected at a given time if it has received at least r marks by this time. In this way (see [23, 30]), it can be shown that |St| is a Markov process, with

|St|Bin(n-|S0|,πt)-t+|S0| 5

where πt=P(Bin(t,p)r). Moreover, its increments are distributed as

|St|-|Ss|Bin(n-|S0|,πt-πs)-(t-s). 6

Heuristics

We first briefly recall the heuristic for Theorem 1 given in Sect. 6 of [23]. By the law of large numbers, with high probability |St|E|St|. A calculation shows that if |S0|>(1-1/r)ϑ then E|St|>t for t<n-o(n). On the other hand, if |S0|αrϑ, for some α<1, then we have E|Sφαϑ|0. To see this, note that pt=O[(ϑ/n)1/r]1 for tO(ϑ) since ϑn. Hence (see e.g. Sect. 8 of [23]) we have

πt=(pt)rr![1+O(pt+1/t)]

and so

E|Sxϑ|/ϑxr/r-x+αr. 7

Next, we describe a natural heuristic, using the Euler–Lagrange equation, that allows us to anticipate the least-cost, deviating trajectories (the functions y^α,β in (9) below), which lead to Theorem 3. The proof, given in Sect. 2 below, makes this rigorous by a discrete analogue of the Euler–Lagrange equation. We think this method will be of use in studying the tail behavior of other random processes.

Consider a trajectory y(x)0 from αr to 0 over [0,β]. Suppose that |Sxϑ|/ϑ has followed this trajectory until step t-1=xϑ. In the next step t, some vertex vtSt-1 is infected. There are approximately a Poisson with mean nprt-1r-1xr-1 (this approximation holds by (1) and standard combinatorial estimates) number of vertices that are neighbors with vt and r-1 of the t-1 vertices infected in previous steps s<t. Such vertices become susceptible in step t. Therefore, to continue along this trajectory, we require this Poisson random variable to take the value

1+ϑ[y(x+1/ϑ)-y(x)]1+y(x).

(The “+1” accounts for the vertex vtSt-1 that is infected in step t, and so removed from the next susceptible set St.) As is well-known, this event has approximate log probability -Γxr-1(1+y(x)), where

Γλ(u)=-u[1-λ/u+log(λ/u)]

is the Legendre–Fenchel transformation of the cumulant-generating function of a mean λ Poisson. Hence |Sxϑ|/ϑy(x) on [0,β] with approximate log probability

ϑ0β(1+y(x))1-xr-11+y(x)+logxr-11+y(x)dx 8

(cf. (13) below). Maximizing this integral is particularly simple, since the integrand depends on y, but not y. The Euler–Lagrange equation implies that the least-cost trajectory satisfies

ddxlogxr-11+y(x)=0y(x)=(β-αr)(x/β)r-x+αr,

except where possibly the boundary constraint y(x)0 might intervene.

Since, as noted above, |St||St-1|-1 for all t, we may assume that βαr. That is, any trajectory y(x) of |Sxϑ|/ϑ decreases no faster than -x. Also note that (α-αr)/αr=1/(rαr-1), and that for any larger b>1/(rαr-1) the function bxr-x+αr has no zeros in [0, 1].

As it turns out, the least-cost trajectory from αr to 0 over [0,β] is

graphic file with name 10955_2021_2819_Equ9_HTML.gif 9

where αβ=min{α,β}. Setting β=φα, we recover by (2) the typical, zero-cost trajectory (7). See Fig. 2. Substituting (9) into (8), we obtain ϑξ(α,β) after some basic calculus (see Appendix A.1 below).

Proof of Theorem 3

Before turning to the proof, let us recall Theorem 3 and the definitions involved. We fix some α[0,1) and βφα[αr,1] (with φα as defined at (2)). We assume that |S0|/ϑαr=(1-1/r)α as n, where S0=S0(n) is the initially susceptible set. Recall that I=It is the eventually infected set, where t is the first time t that |St|=0 (no susceptible vertices). Finally, recall that Theorem 3 identifies the limit of (1/ϑ)logP(S0,β), where P(S0,β) is the tail probability that |I|βϑ if β<φα or |I|βϑ if β>φα.

Upper bounds for P(S0,β) are established in Sect. 2.1 (β<φα) and Sect. 2.2 (β>φα) below. The main idea is to use a discrete version of the Euler–Lagrange equation to identify the asymptotically optimal trajectory y^(x) of the process |Sxϑ|/ϑ realizing the associated event (|I|βϑ or |I|βϑ depending on β). It turns out that y^=y^α,β (see (9) above). More specifically, we use the following result, which is a special case of Theorem 5 in Guseinov [20]. See also [37, 17, 24] and references therein for earlier related results and background.

Let Δxi=xi+1-xi denote the forward difference operator.

Lemma 5

Fix a,bR, a function f(uv) with continuous partial derivatives fu and fv, and evenly spaced points x0x1xm. Then the maximizer y^ of

i=0m-1f(xi+1,Δyi/Δxi)Δxi,

over trajectories with y0=a and ym=b, satisfies fv(xi+1,Δy^i/Δxi)c for some constant c.

The proof of this result amounts to adding a Lagrange multiplier to constrain iΔyi and then comparing the derivative to 0. A more general version, more closely resembling the regular Euler–Lagrange equation, appears in [20]. This allows for more complicated functions f(xi,xi+1,yi,yi+1,Δyi/Δxi) and points xi that need not be evenly spaced. The proof is analogous to that of its continuous counterpart, using summation by parts instead of integration by parts, for instance.

Finally, in Sect. 2.3, we establish asymptotically equivalent lower bounds for P(S0,β) by considering specific trajectories y that are asymptotically equivalent to y^α,β. This altogether verifies the asymptotic optimality of y^α,β and the convergence of (1/ϑ)logP(S0,β).

Upper Bounds When β<φα

We begin with the simpler case that β<φα. The opposite case β>φα follows by an elaboration of these arguments (see Sect. 2.2 below). Since β<φα, note that P(S0,β) is simply the probability that |Sxϑ|=0 for some xβ, as this occurs if and only if |I|βϑ.

To begin, we discretize the unit interval [0, 1] as follows. Let m=ϑ/(logϑ)2. Consider the points xi=(i/ϑ)(logϑ)2, for i=0,1,,m. Note that the points xiϑ are evenly spaced integers. Also note that xm1, since ϑ1.

Let Yn denote the set of trajectories yi=|Sxiϑ|/ϑ such that

  1. all yiϑZ,

  2. y0ϑ=|S0|,

  3. all Δyi/Δxi-1, and

  4. yi=0 for all xiβ.

Note that we can assume (3) since, as discussed above, |St||St-1|-1 for all t. Since |St| is Markov,

P(S0,β)yYni=0m-1P|Sxi+1ϑ|ϑ=yi+1||Sxiϑ|ϑ=yi.

By (3) and (4) it follows that all yiβ for any yYn. Hence |Yn|ϑm. Therefore, taking a union bound,

P(S0,β)ϑmi=0m-1P|Sxi+1ϑ|ϑ=y^i+1||Sxiϑ|ϑ=y^i,

where y^ maximizes the product over yYn. Noting that (m/ϑ)logϑ1, we find altogether that

1ϑlogP(S0,β)o(1)+1ϑi=0m-1logP|Sxi+1ϑ|ϑ=y^i+1||Sxiϑ|ϑ=y^i. 10

We now turn to the issue of identifying y^Yn. By (5) it follows that

Δ|Sxiϑ|Bin(n-|S0|,Δπ(xiϑ))-ϑΔxi. 11

Hence, using the standard bound nk(en/k)k and 1-xe-x,

P|Sxi+1ϑ|ϑ=yi+1||Sxiϑ|ϑ=yi=P(Bin(n-|S0|,Δπ(xiϑ))=ϑ(Δxi+Δyi)enΔπ(xiϑ)ϑ(Δxi+Δyi)ϑ(Δxi+Δyi)[1-Δπ(xiϑ)]n-|S0|-ϑ(Δxi+Δyi)enΔπ(xiϑ)ϑ(Δxi+Δyi)ϑ(Δxi+Δyi)e-nΔπ(xiϑ)×e(|S0|+ϑ(Δxi+Δyi))Δπ(xiϑ). 12

(We have written the upper bound in this way so as to compare with the lower bound at (18) below.)

Before substituting this upper bound into (10), we collect the following technical result. The proof is elementary, though somewhat tedious, see Sect. Appendix A.5 below. Note that by (1), 1ϑ1/p.

Lemma 6

We have that

rnϑΔπ(xiϑ)Δ(xir)=1+Opϑ+1logϑ1.

Altogether, we find that

1ϑi=0m-1logP|Sxi+1ϑ|ϑ=yi+1||Sxiϑ|ϑ=yio(1)+i=0m(Δxi+Δyi)1-Δ(xir)/rΔxi+Δyi+logΔ(xir)/rΔxi+Δyi.

Since logx-x is increasing for x(0,1] and Δ(xir)/rxi+1r-1Δxi, it follows by (10) that

1ϑlogP(S0,β)o(1)+i=0m-1f(xi+1,Δy^i/Δxi)Δxi, 13

where

f(u,v)=(1+v)1-ur-11+v+logur-11+v 14

(cf. (8) above) and y^Yn maximizes the sum in (13).

In order to apply Lemma 5, we lift the restriction that all yiϑZ, and maximize

i=0m-1f(xi+1,Δyi/Δxi)Δxi

over yRm+1 with (i) y0=αr, (ii) Δyi/Δxi-1 and (iii) yi=0 for all xiβ. By Lemma 5, the maximizer y^=y^(n) satisfies

Δfv(xi+1,Δy^i/Δxi)0

between any two given points where y^>0. Since

fv(u,v)=logur-11+v

this implies that 1+Δy^i/Δxi=bxi+1r-1, for some constant b, between any two points xj<xk where y^i>0 for j<i<k. On the other hand, if both y^j=y^k=0, then necessarily y^i=0 for j<i<k. By standard results on the Euler approximation of differential equations (see e.g. Theorems 7.3 and 7.5 in Sect. I.7 of [21]), it follows that, on all segments where y^i>0, the discrete derivative Δy^i/Δxi is within O(1/m) of the function bxr-1-1, for some b=b(n).

Altogether, in the limit, it suffices to consider trajectories that take the form (β-αr)(x/β)r-x+αr (until they hit 0), for some β[αr,β], since (as discussed in Sect. 1.5) these are the only functions y(x)=bxr-x+αr for which (i) y(0)=αr, (ii) y(x)-1 and (iii) y(x)=0 for some xβ. Hence, by the above considerations, and the continuity of f, we find that

lim supn1ϑlogP(S0,β)supβ[αr,β]0βf(x,y^α,β(x))dx. 15

To conclude, we observe, by Appendices A.1 and A.2, that the right hand side equates to

supβ[αr,β]ξ(α,β)=ξ(α,β).

Upper bounds When β>φα

The case β>φα follows by the same method of proof, however, there are two additional technical complications. Specifically, (i) the set of relevant trajectories Yn in this case (defined below) no longer satisfies |Yn|[O(ϑ)]m, and (ii) to obtain an upper bound for (1/ϑ)logP(S0,β), as in (15) above, we need to take a supremum over a more complicated set of trajectories. This latter issue is due in part to the fact that is not a priori clear that the optimal trajectory y^ should hit 0 before x=1 (that is, that y^ is one of y^α,β). This indeed turns out to be the case, however, even so, y^α,β is slightly more complicated (defined piecewise) when β>α.

First note that, for β>φα, P(S0,β) is the probability that |Sxϑ|>0 for all x<β. Therefore, in this case, we take Yn to be the set of yi=|Sxiϑ|/ϑ for which

  1. all yiϑZ,

  2. y0ϑ=|S0|,

  3. all Δyi/Δxi-1, and

  4. yi>0 for all xi<β.

We no longer have that |Yn|[O(ϑ)]m. However, for tO(ϑ), by (5) and Chernoff’s bound,

1ϑlogP(|St|(1+δ)ϑ)-O(δ2).

Therefore, for A sufficiently large, the log probability that any |St|>Aϑ while tO(ϑ) is less than ϑξ(α,β). Hence, arguing as the previous section, we find that

lim supn1ϑlogP(S0,β)supyYf(x,y(x))dx, 16

where Y is the set of non-negative trajectories y(x) that start at y(0)=αr and take the form bxr-x+a, for some b0, wherever they are positive. However, it suffices to consider a smaller set than Y. Indeed, observe that the maximizer y^Y is non-increasing. This is intuitive, since the process is sub-critical while the total number of infected vertices remains less than ϑ. To see this formally, note that (i) the derivative of any trajectory bxr-x+a is brxr-1-10 for any x1 unless b>1/r, and (ii) we have by (14) that

f(x,brxr-1-1)=[br-1-brlog(br)]xr-1

is decreasing in b>1/r. Hence, it suffices to consider trajectories which take the form (β-αr)(x/β)r-x+αr until they hit 0 at some β[αr,α], and then, if β<β, are 0 thereafter until x=β. (Note that, for any b>1/(rαr-1), the function bxr-x+αr has no zeros and, since α<1, is increasing eventually on [0, 1].) Therefore, by Appendix A.1,

lim supn1ϑlogP(S0,β)supβ[αr,α]0βf(x,yα,β(x))dx+1β<βββf(x,0)dx=supβ[αr,α]ξ(α,β)+1β<βββf(x,0)dx

By basic calculus (see Appendix A.3) it can be shown that the right hand side is bounded by ξ(α,β).

Lower Bounds

The lower bound is much simpler. As discussed above, it essentially suffices to consider any trajectory y(x)y^α,β(x) which contributes to P(S0,β), and show that the scaled log probability that |Sxϑ|/ϑ follows this trajectory is asymptotic to ξ(α,β).

Once again, there is some asymmetry in the cases β<φα and β>φα due to the definition of P(S0,β). For β<φα, we note that if, for instance, all |Sxiϑ|/ϑ=y~i, where

y~i=1ϑy^α,β(xi)ϑ1xiβ-Δxi/ϑ,

then |I|βϑ. The indicator present here ensures that |Sxϑ| hits 0 by x=β. On the other hand, if β>φα, set

y~i=1ϑy^α,β(xi)ϑ+Δxi1xi<β.

Then if all |Sxiϑ|/ϑ=y~i we have |I|βϑ. The indicator in this case ensures that |St|>0 between increments while t<βϑ.

Next, we show that

lim infn1ϑi=0m-1logP|Sxi+1ϑ|ϑ=y~i+1||Sxiϑ|ϑ=y~iξ(α,β), 17

since then, by Sect. 2.1 and 2.2, it follows that

limn1ϑlogP(S0,β)=ξ(α,β),

as stated in Theorem 3.

To this end, note that by (11) and the standard bounds nk(n-k)k/k!, k!ek(k/e)k and (1-x)ne-xn(1-nx2), it follows that

P|Sxi+1ϑ|ϑ=yi+1||Sxiϑ|ϑ=yienΔπ(xiϑ)ϑ(Δxi+Δyi)ϑ(Δxi+Δyi)e-nΔπ(xiϑ)×(1-n(Δπ(xiϑ))2)eϑ(Δxi+Δyi)1-|S0|+ϑ(Δxi+Δyi)nϑ(Δxi+Δyi) 18

(cf. (12)). Therefore, in a similar way as for (13) above (however instead using Δ(xir)/rxir-1Δxi), we find that

1ϑi=0m-1logP|Sxi+1ϑ|ϑ=y~i+1||Sxiϑ|ϑ=y~io(1)+i=0m-1f(xi,Δy~i/Δxi)Δxi,

where f, once again, is as defined at (14). Therefore, by the choice of y~i, it can be seen (using Appendix A.1) that

lim infn1ϑi=0m-1logP|Sxi+1ϑ|ϑ=y~i+1||Sxiϑ|ϑ=y~i0βf(x,y^α,β(x))=ξ(α,β),

yielding (17), and thus concluding the proof of Theorem 3.

Acknowledgements

Omer Angel and Brett Kolesnik would both like to acknowledge the support of NSERC of Canada.

Appendix A: Technical Results

This section contains several technical results, all of which follow by elementary methods.

A.1: Rate Function ξ

We show that

0βf(x,y^α,β(x))dx=ξ(α,β),

where y^α,β and f are as in (9) and (14) above (that is, the cost of the least-cost trajectory y^α,β(x) over [0,β] is -ξ(α,β)).

First note that, whenever yα,β(x)>0,

1+yα,β(x)=r(β-αr)βrxr-1,

in which case

f(x,y^α,β(x))=rxr-1(β-αr)βr1-βrr(β-αr)+logβrr(β-αr).

Hence, if βα,

0βf(x,y^α,β(x))dx=(β-αr)1-βrr(β-αr)+logβrr(β-αr)=ξ(α,β).

On the other hand, note that

f(x,0)=1-xr-1+(r-1)logx

and so

f(x,0)dx=-xr/r-(r-2)x+(r-1)xlogx.

Therefore, if β>α, then we find (after some algebraic simplifications) that

0βf(x,y^α,β(x))dx=ξ(α,α)+αβf(x,0)dx=α-αrr+(r-1)log(αα/r)-βr-αrr-(r-2)(β-α)+(r-1)logββαα=-βr-αr-(r-2)(β-α)+(r-1)logββααr=ξ(α,β).

A.2: Shape of ξ

We note here that ξ(α,β) is increasing in β[αr,φα) and decreasing in β(φα,1] (as in Fig. 1 above). When βα,

βξ(α,β)=logβr/rβ-αr+r(1-αr/β)-βr-1.

Therefore, if β[αr,φα], by (2) and logx1-1/x,

βξ(α,β)1-βr-1βr/r(αr-β+βr/r)0.

On the other hand, if β[φα,α], by (2) and logxx-1,

βξ(α,β)(r-1)(α-β)β(β-αr)(αr-β+βr/r)0.

Finally, if β[α,1], note that

βξ(α,β)=1-βr-1+(r-1)logβ1-β+logβ0.

A.3: An Inequality Involving ξ

We show that, for any β>φα and β[αr,α],

ξ(α,β)+1β<βββf(x,0)dxξ(α,β).

If ββ the result is immediate, since by Appendix A.2 we have ξ(α,β)ξ(α,β) in this case. Hence, assuming that β<β, we show that

ββf(x,0)dxξ(α,β)-ξ(α,β).

If β>α, then

ξ(α,α)+αβf(x,0)dx=ξ(α,β),

so we may further assume that βα. As has already been noted above, f(x,0)=1-xr-1+(r-1)logx, and so

f(x,0)dx=-xr/r-(r-2)x+(r-1)xlogx.

Hence by (3) it suffices to show that

ξ(α,x)-f(x,0)dx=(r-1)(x-xlogx)+(x-αr)logxrr(x-αr)

is increasing in xαr. Differentiating the above expression with respect to x, we obtain (after some straightforward simplifications)

r(x-αr)x-logr(x-αr)x-10,

yielding the claim.

A.4: Lower Bound for m(Gn,p,r)

Proof of Theorem 4

For δ>0, let tδ=(1-δ)rϑ/log(n/ϑ). We show that, with high probability, Gn,p has no contagious sets smaller than tδ. Note that

ξ(0,1)ϑ/(1-1/r)2=-rϑ.

The expected number of subsets S0[n] of size |S0|=tδ which if initially susceptible cause |I|ϑ/(1-1/r)2 vertices to be infected eventually is at most

ntδe-rϑ(1+o(1))(ne/tδ)tδe-rϑ(1+o(1))=e-rϑψ,

where

ψ=1+o(1)-(1-δ)log(ne/tδ)/log(n/ϑ).

Since

log(ne/tδ)log(n/ϑ)+Ologlog(n/ϑ),

ψ>0 for all large n, and the result follows.

A.5: Increments of π

Proof of Lemma 6

Recall that

m=Θ1Δxi=Θϑ(logϑ)2.

When i=0, we have Δπ(xiϑ)=π(x1ϑ) since x0=0. By the estimates discussed in Sect. 1.5,

rnϑπ(x1ϑ)=x1r1+Opϑ+1(logϑ)2.

Next, we assume that i1. Then xi+1O(xi) and, for all r,

1Δ(xi)xi-1ΔxiO(1). 19

For the lower bound, first note that

P(Bin(xi+1ϑ,p)>r)>P(Bin(xiϑ,p)>r)

and so

Δπ(xiϑ)>ΔP(Bin(xiϑ,p)=r).

Hence, using (1) and (19) (and the standard bounds (n-k)knkk!nk and (1-x)y1-xy) we find

rnϑΔπ(xiϑ)(1-p)xiϑ-rxi+1-rϑr(1-p)ϑΔxi-xirΔ(xir)(1-pϑ)1-xi+1rΔ(xir)pϑΔxi+r2xi+1ϑ=Δ(xir)1-Opϑ+1(logϑ)2.

The upper bound requires slightly more attention. Note that, by the choice of m, logmx1ϑ. Therefore logmxiϑ for all large n. Hence, for all large n,

Δπ(xiϑ)<P(Bin(xi+1ϑ,p)>logm)+=rlogmΔP(Bin(xiϑ,p)=).

Since pϑ1m, for all large n,

P(Bin(xi+1ϑ,p)>logm)ϑ(xi+1pϑ)1+logm.

Therefore, by (1), (19) and the choice of m,

rnϑΔ(xir)PBin(xi+1ϑ,p)>logmOnΔxi(pϑ)1+logmpϑ.

Next, by (19), it follows that, for all logm and large n,

ΔP(Bin(xiϑ,p)=)(pϑ)!xi+1-xi1-xiϑ(pϑ)!Δ(xi)1+ϑΔxi.

Therefore, by (1) and (19), for all large n,

rnϑ=rlogmΔP(Bin(xiϑ,p)=)=rlogmr!(pϑ)-r!Δ(xi)1+ϑΔxiΔ(xir)1+logmϑΔxi1+>0O(pϑ)Δ(xir)1+Opϑ+1logϑ.

Altogether, we find that

rnϑΔπ(xiϑ)=Δ(xir)1+Opϑ+1logϑ

as claimed.

Footnotes

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Contributor Information

Omer Angel, Email: angel@math.ubc.ca.

Brett Kolesnik, Email: bkolesnik@ucsd.edu.

References

  • 1.Adler J. Bootstrap percolation. Physica A. 1991;171:453–470. doi: 10.1016/0378-4371(91)90295-N. [DOI] [Google Scholar]
  • 2.Adler J, Lev U. Bootstrap percolation: visualizations and applications. Braz. J. Phys. 2003;33:641–644. doi: 10.1590/S0103-97332003000300031. [DOI] [Google Scholar]
  • 3.Agarwal R, Ahlbrandt C, Bohner M, Peterson A. Discrete linear Hamiltonian systems: a survey. Dyn. Syst. Appl. 1999;8(3–4):307–333. [Google Scholar]
  • 4.Ahlbrandt, C.D.: Discrete variational inequalities, general inequalities, 6 (Oberwolfach, : Internat. Ser. Numer. Math., vol. 103. Birkhäuser, Basel 1992, 93–107 (1990)
  • 5.Ahlbrandt CD. Equivalence of discrete Euler equations and discrete Hamiltonian systems. J. Math. Anal. Appl. 1993;180(2):498–517. doi: 10.1006/jmaa.1993.1413. [DOI] [Google Scholar]
  • 6.Ahlbrandt, C.D., Hooker, J.W.: A variational view of nonoscillation theory for linear differential equations. Differential and integral equations (Iowa City, Iowa, 1983/Argonne, Ill., 1984), Univ. Missouri-Rolla, Rolla, MO, pp. 1–21 (1985)
  • 7.Ahlbrandt, C.D., Peterson, A.C.: Discrete Hamiltonian systems, Kluwer Texts in the Mathematical Sciences, vol. 16, Kluwer Academic Publishers Group, Dordrecht, Difference equations, continued fractions, and Riccati equations (1996)
  • 8.Aizenman M, Lebowitz JL. Metastability effects in bootstrap percolation. J. Phys. A. 1988;21(19):3801–3813. doi: 10.1088/0305-4470/21/19/017. [DOI] [Google Scholar]
  • 9.Angel O, Kolesnik B. Sharp thresholds for contagious sets in random graphs. Ann. Appl. Probab. 2018;28(2):1052–1098. doi: 10.1214/17-AAP1325. [DOI] [Google Scholar]
  • 10.Balogh J, Bollobás B, Duminil-Copin H, Morris R. The sharp threshold for bootstrap percolation in all dimensions. Trans. Am. Math. Soc. 2012;364(5):2667–2701. doi: 10.1090/S0002-9947-2011-05552-2. [DOI] [Google Scholar]
  • 11.Balogh J, Bollobás B, Morris R. Graph bootstrap percolation. Random Struct. Algorithm. 2012;41(4):413–440. doi: 10.1002/rsa.20458. [DOI] [Google Scholar]
  • 12.Chalupa J, Leath PL, Reich GR. Bootstrap percolation on a Bethe lattice. J. Phys. C. 1979;21:L31–L35. doi: 10.1088/0022-3719/12/1/008. [DOI] [Google Scholar]
  • 13.Coja-Oghlan, A., Feige, U., Krivelevich, M., Reichman, D.: Contagious sets in expanders. In: Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, SIAM, Philadelphia, PA, pp. 1953–1987 (2015)
  • 14.Domingos, P., Richardson, M.: Mining the network value of customers. In: Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (New York, NY, USA), KDD ’01, Association for Computing Machinery, pp. 57–66 (2001)
  • 15.Erdős, P., Rényi, A.: On random graphs. I. Publ. Math. Debrecen 6, 290–297 (1959)
  • 16.Feige U, Krivelevich M, Reichman D. Contagious sets in random graphs. Ann. Appl. Probab. 2017;27(5):2675–2697. doi: 10.1214/16-AAP1254. [DOI] [Google Scholar]
  • 17.Fort T. Finite Differences and Difference Equations in the Real Domain. Oxford: Clarendon Press; 1948. [Google Scholar]
  • 18.Freund D, Poloczek M, Reichman D. Contagious sets in dense graphs. Eur. J. Combin. 2018;68:66–78. doi: 10.1016/j.ejc.2017.07.011. [DOI] [Google Scholar]
  • 19.Guggiola A, Semerjian G. Minimal contagious sets in random regular graphs. J. Stat. Phys. 2015;158(2):300–358. doi: 10.1007/s10955-014-1136-2. [DOI] [Google Scholar]
  • 20.Guseinov, G.-S.: Discrete calculus of variations, Global analysis and applied mathematics. In: AIP Conf. Proc., vol. 729, Amer. Inst. Phys., Melville, NY, pp. 170–176 (2004)
  • 21.Hairer, E., Nørsett, S.P., Wanner, G.: Solving Ordinary Differential Equations. I, 2nd ed., Springer Series in Computational Mathematics, vol. 8. Springer, Berlin, Nonstiff problems (1993)
  • 22.Holroyd AE. Sharp metastability threshold for two-dimensional bootstrap percolation. Probab. Theory Relat. Fields. 2003;125(2):195–224. doi: 10.1007/s00440-002-0239-x. [DOI] [Google Scholar]
  • 23.Janson S, Łuczak T, Turova T, Vallier T. Bootstrap percolation on the random graph Gn,p. Ann. Appl. Probab. 2012;22(5):1989–2047. doi: 10.1214/11-AAP822. [DOI] [Google Scholar]
  • 24.Kelley, W.G., Peterson, A.C.: Difference Equations, 2nd ed. An Introduction with Applications. Harcourt/Academic Press, San Diego (2001)
  • 25.Kempe J, Kleinberg D, Tardos É. Maximizing the spread of influence through a social network. Theory Comput. 2015;11:105–147. doi: 10.4086/toc.2015.v011a004. [DOI] [Google Scholar]
  • 26.Kolesnik, B.: Large deviations of the greedy independent set algorithm on sparse random graphs. Random Struct. Algorithms. arXiv:2011.04613
  • 27.Kolesnik, B.: The sharp K4-percolation threshold on the Erdös–Rényi random graph. Electron. J. Probab. arXiv:1705.08882
  • 28.Morris, R.: Minimal percolating sets in bootstrap percolation. Electron. J. Combin. 16(1), Research Paper 2, 20 (2009)
  • 29.Pollak M, Riess I. Application of percolation theory to 2d–3d Heisenberg ferromagnets. Physica Status Solidi (b) 1975;69(1):K15–K18. doi: 10.1002/pssb.2220690138. [DOI] [Google Scholar]
  • 30.Scalia-Tomba G-P. Asymptotic final-size distribution for some chain-binomial processes. Adv. Appl. Probab. 1985;17(3):477–495. doi: 10.2307/1427116. [DOI] [Google Scholar]
  • 31.Schonmann RH. On the behavior of some cellular automata related to bootstrap percolation. Ann. Probab. 1992;20(1):174–193. doi: 10.1214/aop/1176989923. [DOI] [Google Scholar]
  • 32.Sellke T. On the asymptotic distribution of the size of a stochastic epidemic. J. Appl. Probab. 1983;20(2):390–394. doi: 10.2307/3213811. [DOI] [Google Scholar]
  • 33.Torrisi GL, Garetto M, Leonardi E. A large deviation approach to super-critical bootstrap percolation on the random graph Gn,p. Stoch. Process. Appl. 2019;129(6):1873–1902. doi: 10.1016/j.spa.2018.06.006. [DOI] [Google Scholar]
  • 34.Vallier, T.: Random graph models and their applications, Ph.D. thesis, Lund University (2007)

Articles from Journal of Statistical Physics are provided here courtesy of Springer

RESOURCES