Percolation Randomgraphs Rev
Percolation Randomgraphs Rev
on the phase transition of the largest connected component and the distances in
random graphs. The random graph models studied here are inspired by applica-
tions, and we shall highlight real-world networks that these random graphs aim
to model to some extent.
The fields that this contribution covers, percolation and random graph the-
ory, have attracted tremendous attention in the past decades, and enormous
progress has been made. It is impossible to cover all material appearing in the
literature, and we believe that one should not aim to do so. Thus, we have strived
to cover the main results which have been proved, as well as recent results in
which we expect that more progress shall be made in the (near?) future, and we
list open problems which we find of interest. We have tried to give particular
attention to results that are of interest to the stochastic geometry community,
thus giving detailed accounts of the recent progress on two-dimensional perco-
lation and percolation on tesselations, as well as on continuum percolation and
random geometric graphs and its relations to telecommunications. We hope that
this contribution gives an idea of the breadth and depth of these fields, as well
as on the challenges for the future.
We now start by introducing some notation. Let G = (V, E) be a graph, where
V is the vertex set and E ⊆ V × V is the edge set. For percolation, the number
of vertices, denoted by |V|, is naturally infinite, while for random graphs, |V| is
naturally finite. A random network is obtained by a certain rule that determines
which subset of the edges E is occupied, the remaining edges being vacant. Let
v ∈ V, and denote by C(v) the set of vertices which can be reached from v by
occupied edges. More precisely, for u ∈ V, we say that u ←→ v when there exists
a path of occupied edges that connects u and v, and we write
C(v) = {u ∈ V : u ←→ v}. (1.1)
The central question in the study of random networks involves the cluster size
distributions, i.e., for percolation whether there exists an infinite connected com-
ponent, and for random graphs what the distribution is of the largest connected
component.
1.2 Percolation
In this section, we discuss percolation. For more details, see the books (Grimmett,
1999), (Hughes, 1996), (Kesten, 1982) and (Bollobás and Riordan, 2006b). For
an expository account of recent progress with a long list of open problems, we
refer to (Kesten, 2002). There is a nice account of the history of percolation in
(Hughes, 1996, Section 1.1.1), the foundation of percolation as a mathematical
discipline being generally ascribed to (Broadbent and Hammersley, 1957).
For quasi-transitive graphs, it might appear that this definition depends on the
choice of v for which θ(p) = θv (p). However, since θv (p) = 0 for some v implies
that θv (p) = 0 for all v, in fact, pc (G) is independent of the choice of v. The above
critical value is sometimes written as pc (G) = pH (G) in honor of Hammersley,
who defined it in (Hammersley, 1961).
An important question is whether the critical value is non-trivial, i.e., whether
pc ∈ (0, 1). We shall study this question in detail below. When θ(p) > 0, then
a natural question is how many infinite connected components there can be.
Denote this number of infinite connected components by N . We shall now prove
that, for any infinite graph, N ∈ {0, 1, ∞} a.s., and that N is constant a.s.
4 Percolation and random graphs
Pp (E ∩ F ) ≥ Pp (E)Pp (F ), (1.5)
the FKG-inequality gives the same conclusion under weaker assumptions on the
measure involved. In words, for increasing events E and F , the occurrence of
E makes the simultaneous occurrence of F more likely. For example, the FKG-
inequality yields that, for every x, y, u, v, ∈ V, we have Pp (x ←→ y, u ←→ v) ≥
Pp (x ←→ y)Pp (u ←→ v). The intuition for the FKG-inequality is that if the
increasing event E holds, then this makes it more likely for edges to be occupied,
and, therefore, it becomes more likely that the increasing event F also holds.
Thus, Pp (F |E) ≥ Pp (F ), which is equivalent to (1.5). See (Häggström, 2007) for
a Markov chain proof of the FKG-inequality.
The BK-inequality gives, in a certain sense, an opposite inequality. We shall
only state it in the case of increasing events, for which it was proved in (van den
Berg and Kesten, 1985). The most general version is proved in (Reimer, 2000).
For K ⊆ E and ω ∈ {0, 1}E , we write ωK (e) = ω(e) for e ∈ K, and ωK (e) = 0
otherwise. Let E and F again be increasing events, and write
Pp (E ◦ F ) ≤ Pp (E)Pp (F ). (1.7)
For example, the event {x ←→ y} ◦ {u ←→ v} is the event that there are edge-
disjoint occupied paths from x to y and from u to v, and (1.7) implies that
Pp ({x ←→ y} ◦ {u ←→ v}) ≤ Pp (x ←→ y)Pp (u ←→ v). Intuitively, this can be
understood by noting that, if x ←→ y and u ←→ v must occur disjointly, then we
can first fix an occupied path connecting x and y in a certain arbitrary manner,
and remove the occupied edges used in this path. Then {x ←→ y} ◦ {u ←→ v}
occurs when in the configuration with the edges removed, we still have that
u ←→ v. Since we have removed the edges in the occupied path from x to y, this
event now has smaller probability than Pp (u ←→ v).
Many objects we shall study are increasing or decreasing. For example, |C(v)|
is obviously increasing. The number of infinite connected components N is an
example of a random variable that is neither increasing nor decreasing, and we
shall see the complications of this fact later on.
We next discuss an important tool to study probabilities which goes under
the name of Russo’s formula (Russo, 1981). Let E be an increasing event. Then
we say that the bond (u, v) is pivotal for the event E when E occurs when the
6 Percolation and random graphs
Clearly, we have that χ(p) = ∞ for p > pc , since then, with probability θ(p) > 0,
we have that |C(v)| = ∞. Further, p 7→ χ(p) is clearly increasing. Define the
critical value pT = pT (G) by
On Zd , when the model is translation invariant, we have that τpf (x, y) = τpf (y −
x, 0) ≡ τpf (y − x). Also for transitive G, the two-point function is characterized
by τpf (x) = τpf (o, x), where o is an appropriately chosen origin in the model. In
terms of τpf (x), we can identify χf (p) as
X
χf (p) = τpf (x). (1.13)
x∈V
Percolation 7
We shall also be interested in the mean number of clusters per vertex κ(p), which
is defined as
κ(p) = Ep [1/|C(v)|]. (1.14)
where we write |x| = d(o, x) for the distance of x to an appropriately chosen origin
o ∈ V. For many graphs G, there are several ways of defining the correlation
length, many of them being equivalent in the sense that they are bounded above
and below by finite and positive constants times ξ(p) defined in (1.15). The
correlation length measures the dependence between finite clusters at a given
distance. If d(x, y) ξ(p) and, for p > pc , x and y are in different finite clusters,
then we can think of C(x) and C(y) as being close to independent, while if
d(x, y) ξ(p), then C(x) and C(y) are quite dependent.
θ(p) ∼ (p − pc )β , as p ↓ pc , (1.16)
8 Percolation and random graphs
for some β > 0. The value of β is expected to be different for different G, but
(1.16) remains valid. The symbol ∼ in (1.16) can have several meanings, which
we now elaborate on. We say that the critical exponent β exists in the logarithmic
form if
log θ(p)
lim = β, (1.17)
p↓pc log (p − pc )
while β exists in the bounded-ratios form if there exist 0 < c1 < c2 < ∞ such
that, uniformly for p ≥ pc ,
c1 (p − pc )β ≤ θ(p) ≤ c2 (p − pc )β , (1.18)
Finally, we say that β exists in the asymptotic form if, as p ↓ pc , there exists a
c > 0 such that
θ(p) = c(p − pc )β (1 + o(1)). (1.19)
The existence of a critical exponent is a priori unclear, and needs a mathematical
proof. Unfortunately, in general such a proof is missing, and we can only give
proofs of the existence in special cases, which we shall discuss below in quite
some detail. Indeed, the existence of the critical exponent β > 0 is stronger than
continuity of p 7→ θ(p), which is unknown in general, and is arguably the holy
grail of percolation theory. Indeed, p 7→ θ(p) is clearly continuous on [0, pc ), and
it is also continuous (and even infinitely differentiable) on (pc , 1] by the results
of (van den Berg and Keane, 1984) (for infinite differentiability of p 7→ θ(p) for
p ∈ (pc , 1], see (Russo, 1978)). Thus, continuity of p 7→ θ(p) is equivalent to the
statement that θ(pc (G)) = 0.
We now introduce several more critical exponents. The critical exponent γ
for the expected cluster size is given by
More precisely, we can think of (1.20) as defining the critical exponents γ, γ 0 > 0
defined by
0
χ(p) ∼ (p − pc )−γ , p ↑ pc , χf (p) ∼ (p − pc )−γ , p ↓ pc , (1.21)
with the predicted equality γ = γ 0 . For (1.20) and (1.21), we are implicitly
assuming that pT (G) = pc (G), this equality shall be discussed in more detail
below.
Further, ν, ν 0 are defined by
0
ξ(p) ∼ (p − pc )−ν , p ↑ pc , ξ(p) ∼ (p − pc )−ν , p ↓ pc , (1.22)
the assumption that δ ≥ 1 following from the prediction that χ(pc ) = ∞. Further,
we define the exponent ρ > 0 by
Finally, η is defined by
X
τpc (x) ∼ n2−η ,
Epc |C ∩ B(n)| = n → ∞, (1.27)
x:|x|≤n
The validity of the scaling relations in (1.28) is widely accepted, but few proofs
exist, in particular since the existence of the critical exponents is in general un-
known. We can intuitively understand the scaling relations in (1.28) by assum-
ing the existence of certainscaling functions, which describe certain percolation
10 Percolation and random graphs
where the sum is over all neighbors e of o, I(o,e) is the indicator that the edge (o, e)
is occupied, and CBP (e) is the forward cluster of e. The random vector {I(o,e) }e∼o
forms a collection of r independent Bernoulli random variables with success
probability p, and {|CBP (e)|}e∼o is an i.i.d. sequence independent of {I(o,e) }e∼o .
Equation (1.31) allows us to deduce all information concerning |C(o)| from the
information of |CBP (e)|. Also, for each e, |CBP (x)| satisfies the formula
X
|CBP (x)| = 1 + I(x,e) |CBP (e)|, (1.32)
e∼x:h(e)>h(x)
However, for related results for percolation on a tree, the connection to branching
processes in (1.32) is vital. We defer the proof that γ 0 = 1 to later.
12 Percolation and random graphs
Let θBP (p) = Pp (|CBP (x)| = ∞). Then θBP (p) is the survival probability of a
branching process with a binomial offspring distribution with parameters r − 1
and p. Thus, θBP (p) satisfies the equation
r−1 r−1
θBP (p) = 1 − 1 − p + p(1 − θBP (p)) = 1 − 1 − pθBP (p) . (1.37)
To compute θBP (p), it is more convenient to work with the extinction probability
ζBP (p) = 1 − θBP (p), which is the probability that the branching process dies out.
The extinction probability ζBP (p) satisfies
r−1
ζBP (p) = 1 − p + pζBP (p) . (1.38)
This equation can be solved explicitly when r = 2, when the unique solution is
θBP (p) = 0 for p ∈ [0, 1) and θBP (1) = 1, so that pc = 1. When r = 3, we obtain
that
p2 ζBP (p)2 + (2p(1 − p) − 1)ζBP (p) + (1 − p)2 = 0, (1.39)
so that
1 − 2p(1 − p) ± |2p − 1|
ζBP (p) = . (1.40)
2p2
Since ζBP (0) = 1, ζBP (1) = 0, we must have that
1 − 2p(1 − p) − |2p − 1|
ζBP (p) = , (1.41)
2p2
so that ζBP (p) = 1 for p ∈ [0, 1/2], while, for p ∈ [1/2, 1],
As a result, we have the explicit form θBP (p) = 0 for p ∈ [0, 1/2] and
1 − p 2 2p − 1
θBP (p) = 1 − = , (1.43)
p p2
for p ∈ [1/2, 1], so that pc = 1/2. In particular, p 7→ θBP (p) is continuous, and,
for p ↓ pc ,
θBP (p) = 8(p − pc )(1 + o(1)). (1.44)
It is not hard to see that (1.44) together with (1.31) implies that
In order to study χfBP (p) = Ep [|CBP (x)|1l{|CBP (x)|<∞} ] for p > pc = 1/(r − 1),
we make use of the fact that
and the conditional law of percolation on the tree given that |CBP (x)| < ∞ is
percolation on a tree with p replaced by the dual percolation probability pd given
by
pd = p(1 − θBP (p)). (1.47)
The crucial fact is that pd < pc (Tr ), which follows from the equality 1 − θBP (p) =
ζBP (p), (1.38) and the fact that
r−1 r−2
(r − 1)pζBP (p) = (r − 1)p 1 − p + pζBP (p) < (r − 1)p 1 − p + pζBP (p)
d
= (1 − p + ps)r−1 , (1.48)
ds s=ζBP (p)
which, since ζBP (p) is the smallest solution of (1 − p + ps)r−1 = s, implies that
the derivative of (1 − p + ps)r−1 at s = ζBP (p) is strictly bounded above by 1 for
p > pc (Tr ). Thus, by conditioning a supercritical cluster in percolation on a tree
to die out, we obtain a subcritical cluster at an appropriate subcritical pd which
is related to the original percolation parameter. This fact is sometimes called the
discrete duality principle.
We conclude that
1
χfBP (p) = (1 − θBP (p))Ep |C| |C| < ∞ = (1 − θBP (p))
.
1 − (r − 1)p(1 − θBP (p))
(1.49)
Using that β = 1 in the asymptotic sense then gives that
Cγ 0 + o(1)
χfBP (p) = . (1.50)
p − pc
so that ν = 1/2 in the asymptotic sense by (1.50). We refrain from proving that
ν 0 = ν, and only remark that this follows again by using the duality used in
(1.47).
14 Percolation and random graphs
so that η = 0. We can compute δ by using the random walk hitting time theorem,
see (Grimmett, 1999, Prop. 10.22) and (van der Hofstad and Keane, 2007), where
a very simple proof is given applying to general branching processes. This result
yields that
Pp (|CBP (x)| = k) = P(X1 + . . . + Xk = k − 1), (1.53)
where {Xi }∞
i=1 is an i.i.d. sequence of binomial random variables with parameter
r − 1 and success probability p. Thus,
k(r − 1) k−1
Pp (|CBP (x)| = k) = p (1 − p)k(r−1)−(k−1) . (1.54)
k−1
To prove that δ = 2, we note that for p = pc = 1/(r−1), by a local limit theorem,
we obtain
1
Ppc (|CBP (x)| = k) = (Cδ + o(1)) √ , (1.55)
k3
so that, by summing over k ≥ n, we obtain δ = 2 in an asymptotic sense. We
can compute ρ by noting that
θn = Ppc (∃y ∈ CBP (x) such that h(y) = n + h(x)) (1.56)
satisfies the recursion relation
1 − θn = (1 − pc θn−1 )r−1 . (1.57)
pc (Tr ) = 1/(r − 1) implies that
It is not hard to see that (1.57) together with p
θn = (Cρ + o(1))/n.√Thus ρ = 1/2, since |x| = h(x) and Ppc (o ←→ ∂B(n)) =
θ√n ∼ (Cρ + o(1))/ n.
2
The computation of the key objects for percolation on a tree is feasible due to the
close relationship to branching processes, a topic which has attracted substan-
tial interest in the probability community. See (Athreya and Ney, 1972), (Harris,
1963) and (Jagers, 1975) for detailed discussions about branching processes. As
it turns out, the computations on a tree also have direct consequences for per-
colation on general graphs, with and without loops. We shall now discuss some
of these consequences, the first being that pc > 0 on any graph with bounded
degree:
Theorem 1.2. (Percolation threshold is strictly positive) Let G = (V, E)
be a graph for which the degree of every vertex is bounded by r. Then, for every
x ∈ V, and p < 1/(r − 1),
Ep [|C(x)|] < ∞. (1.58)
In particular, for transitive graphs G with degree equal to r, pc (G) ≥ pT (G) ≥
1/(r − 1).
Percolation 15
Therefore,
X ∞
XX ∞
X
Ep [|C(x)|] = τp (x, y) ≤ pn cn (x, y) = pn cn (x), (1.60)
y∈V y∈V n=0 n=0
where cn (x) denotes the number of n-step self-avoiding walk paths starting at
x. Since the degree of G is bounded by r, we have that, uniformly in x ∈ V,
cn (x) ≤ r(r − 1)n−1 . (1.61)
Thus, we arrive at
∞
X r 1
Ep [|C(x)|] ≤ pn r(r − 1)n−1 = , (1.62)
n=0
r − 1 1 − p(r − 1)
so that Ep [|C(x)|] < ∞ for p < 1/(r − 1). This completes the proof. 2
For percolation on a tree, it is not hard to see that the number of infinite clusters
N equals infinity a.s. To see this, fix a root o of the tree Tr . For any vertex v
unequal to o, let u be the unique vertex in Tr that is closer to the root. Then, the
probability that the bond (u, v) is vacant is strictly positive. If p > pc = 1/(r−1),
then with probability θBP (p) > 0, the vertex v will lie in an infinite component.
Thus, with strictly positive probability, there will be at least two bonds (o, e1 )
and (o, e2 ) that are vacant, and of which e1 and e2 lie in an infinite cluster. Thus,
Pp (N ≥ 2) > 0, so that, since N ∈ {0, 1, ∞} a.s., we must have that N = ∞ a.s.
We conclude that percolation on a tree is very well understood, that all of its
critical exponents exist in an asymptotic sense and can be explicitly identified.
Moreover, for p ≤ pc (Tr ) = 1/(r − 1), there is no infinite connected component,
while, for p ∈ (pc , 1), there are infinitely many of them. For p = 1, there is
a unique infinite cluster. We now proceed to study percolation on graphs with
loops, starting with the paradigm example of G = Zd .
1.2.3 Percolation on Zd .
In this section, we study percolation on Zd . We start by proving that the phase
transition is non-trivial:
Theorem 1.3. (Phase transition on Zd is non-trivial) For nearest-neighbor
1
percolation on Zd with d ≥ 2, pc (Zd ) ∈ [ 2d−1 , 1).
16 Percolation and random graphs
Proof The lower bound on pc (Zd ) is immediate from Theorem 1.2, so that we
are left to prove that pc (Zd ) < 1. For this, we must prove that, on Zd , θ(p) > 0
for p sufficiently close to 1. We first show that it suffices to prove this for d = 2.
For this, we fix p ∈ (0, 1) and note that |C| = |C(o)| for percolation on Zd
with parameter p is stochastically larger than |C| = |C(o)| for percolation on Z2
with parameter p, since by only using the nearest-neighbor edges in Z2 × {~0d−2 },
where ~0d−2 ∈ Zd−2 denotes the origin in Zd−2 , we obtain a cluster which is not
larger than the one using all nearest-neighbor edges in Zd . Thus, it suffices to
prove that θ(p) > 0 for p sufficiently close to 1 for d = 2.
We shall make use of duality, a notion which is crucial for d = 2 (see also
Section 1.2.4 below). For a set of vertices A, let the boundary edges of A be
∂e A = {{x, y} : x ∈ A, y 6∈ A}. Clearly, for C(o) the cluster of the origin, we
have that all edges in ∂e C(o) are vacant. Define the dual lattice L∗ consist of the
vertices Vd = {x + (1/2, 1/2) : x ∈ Z2 } and an edge exists between x + (1/2, 1/2)
and y + (1/2, 1/2) if and only if x and y are nearest-neighbors in Z2 . We note
that each edge in L∗ intersects precisely one nearest-neighbor edge in Zd . We
perform percolation on L∗ by identifying the status of the edge e ∈ L∗ by the
status of the unique edge it intersects in Zd . Then, the set of vacant edges ∂e C
is identified with a set of vacant edges in L. We next study the structure of the
set of edges.
We call a path ω = (ω0 , . . . , ωn ) a self-avoiding polygon of length n on L
when ωi ∈ Vd , ω0 = ωn and when ωi 6= ωj for every 0 ≤ i < j ≤ n for which
i, j 6= 0, n. A self-avoiding polygon separates L∗ into the outside and the inside of
the polygon, and we say that a self-avoiding polygon surrounds a point x ∈ Z2
when the point lies on the inside of the polygon. For Z2 , we observe that if
|C(o)| < ∞, then there must be a self-avoiding polygon ω = (ω1 , . . . , ωn ) of
length n ≥ 4 on L∗ which surrounds the origin o = (0, 0) of which each edge is
vacant in L∗ . This is worked out in detail in (Kesten, 1982, Page 386). Thus,
∞
X
1 − θ(p) ≤ mn (1 − p)n , (1.63)
n=4
when p < 1 is sufficiently close to 1. Thus, for such p, we have that θ(p) > 0,
proving that p > pc (Z2 ). 2
Having established that the phase transition is non-trivial, the natural question
is what the critical value is. Below, we shall give some results on critical values,
Percolation 17
1986) does not rely on a lattice structure, but rather on the fact that the bound-
a
ary of a ball of size n grows not faster than ecn for some a < 1. These extensions
will be relevant below.
We have seen that, in general, the number of infinite clusters N is a.s. con-
stant, and that N ∈ {0, 1, ∞} a.s. When p < pc , then clearly N = 0 a.s. This
leaves the question what the value of N is in the supercritical regime. On the
tree, we have seen that N = ∞ a.s., and the main question is whether this can
also occur on finite-dimensional lattices. This question was beautifully answered
by (Burton and Keane, 1989) using a geometric argument. A nice survey of the
implications of the Burton-Keane proof can be found in (Meester, 1994).
A first proof of this result appeared in (Aizenman, Kesten and Newman, 1987).
Proof As discussed on page 3, we only need to rule out the possibility that
N , the number of infinite clusters, is equal to +∞ a.s. Indeed, when θ(p) = 0,
then N = 0 a.s., while if θ(p) > 0, then the proportion of vertices in infinite
clusters will be strictly positive, so that N ≥ 1 a.s. Since N is a.s. constant and
N ∈ {0, 1, ∞} a.s., we conclude that N = 1 a.s. when N < ∞.
We will argue by contradiction. We call x ∈ V a trifurcation when it satisfies
(1) |C(x)| = ∞;
(2) there are precisely three occupied edges incident to x;
(3) the removal of the three edges incident to x splits the infinite cluster C(x)
into precisely three disjoint infinite clusters, and no finite clusters.
B(n) is finite, and letting R(n) denote the number of edges in B(n), we obtain
that
Pp (Jx,y,z ) ≥ (min{p, 1 − p})R(n) = ε > 0. (1.69)
Finally, since, for all fixed x, y, z, the events Jx,y,z and Kx,y,z are independent,
we obtain that
X X
Pp (I0 ) ≥ Pp (Jx,y,z ∩ Kx,y,z ) = Pp (Jx,y,z )Pp (Kx,y,z )
x,y,z∈∂B(n) x,y,z∈∂B(n)
X
≥ε Pp (Kx,y,z ) = εPp (MB(n) (0) ≥ 3) ≥ ε/2 > 0, (1.70)
x,y,z∈∂B(n)
By (1.71), we obtain
|B(n)|ε/2 ≤ |∂B(n + 1)|, (1.73)
for some ε > 0, which causes a contradiction when n → ∞ whenever |∂B(n +
1)|/|B(n)| → 0. As we see, this argument applies more generally than merely on
Zd . 2
Theorems 1.3, 1.4 and 1.5 answer many of the important questions for percola-
tion, namely, the phase transition is non-trivial, it is unique in the sense that
pc (Zd ) = pT (Zd ) and the infinite cluster, when it exists, is unique. However,
the critical behavior is less well understood. One of the fundamental questions
in percolation is whether there is an infinite component at criticality, i.e., is
θ(pc ) = 0, so that p 7→ θ(p) is continuous? Remarkably, this question is in gen-
eral wide open, even though in d = 2 and in high dimensions, it is affirmatively
20 Percolation and random graphs
answered. We shall discuss these special cases in more detail below. In general,
the behavior of percolation systems at criticality is still ill understood, and there
are no general arguments for the existence of critical exponents. Proofs so far
concentrate on proving the existence by computing their values.
Interestingly, several relations can be drawn between the critical exponents
on the tree and the ones on Zd . This is the content of the following theorem:
Theorem 1.6. (Inequalities for critical exponents on Zd ) For nearest-neighbor
bond percolation on Zd , β ≤ 1, γ ≥ 1 and β ≥ 2/δ, when, for each of the inequal-
ities, we assume that the critical exponent in question exists.
We note that on Tr , the bounds in Theorem 1.6 hold with equality, since
β = γ = 1, δ = 2. In general, the equalities are thus changed to inequalities. We
shall prove that γ ≥ 1 below, making use of Russo’s formula as well as the BK-
inequality. See (Hughes, 1996, Sections 4.3 and 4.4) for a more complete account
of inequalities for critical exponents.
Proof that γ ≥ 1. We use Russo’s formula (1.8) to obtain
d X
τp (x) = Pp ((u, v) is pivotal for o ←→ x). (1.74)
dp
(u,v)∈E
d X X
χ(p) = Pp ((u, v) is pivotal for o ←→ x). (1.75)
dp
x∈V (u,v)∈E
We next note that if (u, v) is pivotal for o ←→ x, then there exist two disjoint
paths of occupied bonds connecting 0 and u, and v and x, respectively. Thus,
{o ←→ u} ◦ {v ←→ x} occurs. By the BK-inequality (1.7), we obtain
d X X
χ(p) ≤ τp (u)τp (x − v) = rχ(p)2 , (1.76)
dp
x∈V (u,v)∈E
where r is the degree of the graph G. To make (1.76) precise, one has to overcome
a few technicalities, since Russo’s formula in (1.8) can only be applied to events
E depending on a finite number of bonds, which is not the case for {o ←→ x}.
For details, see e.g., (Heydenreich, van der Hofstad and Sakai, 2008).
To complete the argument, note that we can rewrite (1.76) as
d
χ(p)−1 ≥ −r. (1.77)
dp
Integrating (1.77) over [p, pc ], and noting that χ(pc )−1 = 0 by Theorem 1.4, we
obtain that
χ(pc )−1 − χ(p)−1 = −χ(p)−1 ≥ −r(pc − p), (1.78)
Percolation 21
so that
1
χ(p) ≥ . (1.79)
r(pc − p)
This proves that γ ≥ 1 if γ exists. 2
As remarked before, no general arguments exist that critical exponents exist.
As we shall explain in more detail below, there are results that guarantee their
existence in special cases, and that the critical exponents satisfy the scaling
relations.
For percolation on Zd , apart from the scaling relations in (1.28), theoretical
physics arguments predict that for low enough dimensions, two further scaling re-
lations going under the name hyperscaling relations, which involve the dimension
d, hold:
dρ = δ + 1, dν = 2 − α. (1.80)
More precisely, it is predicted that the scaling relations in (1.28) hold for all d,
while the hyperscaling relations in (1.80) only hold for d below the so-called upper
critical dimension. Above the upper critical dimension, the critical exponents
are equal to the ones on the tree as appearing in Theorem 1.1. There has been
some work in the direction of establishing the scaling and hyperscaling relations.
In (Borgs, Chayes, Kesten and Spencer, 1999), it is shown that if the critical
exponent ρ exists in the logarithmic sense, and if the probability at criticality
p = pc that there is an easy-way crossing in the cube [0, n]×[0, 3n]d−1 is uniformly
bounded by 1 − ε for some ε > 0, then also δ and η exist in the logarithmic sense,
and satisfy dρ = δ + 1 and 2 − η = d(δ − 1)/(δ + 1). The latter equation is, when
we assume the scaling relations in (1.28), equivalent to dν = 2 − α.
In (Tasaki, 1987a), (Tasaki, 1987b) and (Chayes and Chayes, 1987) it is shown
that when the critical exponents take on the values on a tree, then d ≥ 6,
suggesting that the upper critical dimension is at least 6.
After this discussion on percolation on Zd in general dimension, we now move
to two special cases where much more is rigorously known, two dimensions and
high dimensions.
state the version of the RSW Theorem from (Russo, 1981). We first introduce
some notation. We let Rn,k (p) be the probability that there is an occupied path
from left to right crossing the rectangle [0, kn] × [0, n].
Theorem 1.8. (RSW Theorem) For any p ∈ (0, 1) and n, k ≥ 1 with n even,
and for percolation on the square lattice Z2 , the following bounds hold:
h q i6 h q i12
Rn,2 (p) ≥ Rn,1 (p) 1− 1 − Rn,1 (p) , Rn,3 (p) ≥ Rn,1 (p)3 1− 1 − Rn,1 (p) .
(1.81)
We start by proving the RSW Theorem:
Proof of the RSW Theorem 1.8. The main tool will be the Harris-inequality in
(1.5). We start by deducing the second inequality from the first. We note that if
we take the two rectangles [0, 2n]×[0, n] and [n, 3n]×[0, n], then their intersection
is [n, 2n] × [0, n]. Further, if there are left-to-right crossings in [0, 2n] × [0, n] and
in [n, 3n]×[0, n], and a top-to-bottom crossing in [n, 2n]×[0, n], then there is also
a left-to-right crossing in [0, 3n] × [0, n]. Let LRn,1 , LRn,2 , TBn,3 be the events
that the three respective crossings exist. Then,
Now, LRn,1 , LRn,2 and TBn,3 are all increasing events with
Thus, we arrive at
Rn,3 (p) ≥ Rn,1 (p)Rn,2 (p)2 , (1.84)
showing that the first inequality in (1.81) implies the second.
To see the first inequality in (1.81), in exactly the same way as above, we can
show that
Rn,2 (p) ≥ Rn,1 (p)Rn,3/2 (p)2 . (1.85)
We shall frequently make use of a clever consequence of Harris’ inequality, some-
times called the square root trick. This trick states that, for any two increasing
events A1 and A2 with equal probability Pp (A1 ) = Pp (A2 ), we have
q
Pp (A1 ) ≥ 1 − 1 − Pp (A1 ∪ A2 ). (1.86)
al = {0} × [0, n/2]. Then, by (1.86), and the fact that there is a left-to-right
crossing in [0, n] × [0, n] precisely when Hu ∪ Hl holds, we have
q
Pp (Hu ) ≥ 1 − 1 − Rn,1 (p). (1.88)
Applying the Harris’ inequality once more and noting that both G and Hu are
increasing, we obtain that
Now, for a fixed s, Fs only depends on edges in [0, 3n/2] × [0, n] that are above
0 0
sr ∪ sr , while Es only depends on edges in [0, n] × [0, n] that are below sr ∪ sr ,
so that Es and Fs are independent. Thus,
X
Pp (G) ≥ Pp (Fs )Pp (Es ). (1.93)
s∈Sl
For fixed s, denote by Fs0 the event that there exists a path in [n/2, 3n/2] × [0, n]
0
connecting the top of [n/2, 3n/2]×[0, n] to the path sr , and which always remains
24 Percolation and random graphs
0
above sr ∪sr . Then, clearly, Pp (Fs ) = Pp (Fs0 ) and both Fs and Fs0 are increasing,
so that by the square root trick (1.86), we have
q q
Pp (Fs ) ≥ 1 − 1 − Pp (Fs ∪ Fs0 ) ≥ 1 − 1 − Rn,1 (p), (1.94)
since Pp (Fs ∪ Fs0 ) ≤ Rn,1 (p). Thus, using that the union over s ∈ Sl of Es equals
Hu ,
h q iX h q i
Pp (G) ≥ 1 − 1 − Rn,1 (p) Pp (Es ) = 1 − 1 − Rn,1 (p) Pp (Hu ). (1.95)
s∈Sl
p
[1 − 1/2]6 /2 > 0 uniformly in n ≥ 1. We shall see that this is sufficient to
show that θ(1/2) = 0. Followed by the proof of θ(1/2) = 0, we shall discuss some
further consequences of duality.
Proof that θ(1/2) = 0 for bond percolation on the two-dimensional square lattice.
Fix n ≥ 1, and let Gn be the event that there exists an occupied path from
∂[−n, n] × [−n, n] to ∂[−3n, 3n] × [−3n, 3n], where we write ∂[a, b] × [c, d] for the
boundary of the rectangle [a, b] × [c, d]. Then,
k
Y k
Y
P1/2 (o ←→ ∂B(3k )) ≤ P1/2 (∩kl=1 G3l ) = P1/2 (G3l ) = [1 − P1/2 (Gc3l )],
l=1 l=1
(1.99)
since the events {G3l }∞ l=1 depend on the occupation status of disjoint sets of
bonds, and are therefore independent. By duality, the event Gcn occurs pre-
cisely when there is a dual path of vacant edges in [−3n, 3n] × [−3n, 3n] \
[−n, n] × [−n, n] surrounding the square [−n, n] × [−n, n]. Denote this event
by O(n). Then, P1/2 (Gcn ) = P1/2 (O(n)). The event O(n) is a subset of the event
that there exists left-to-right crossings in the rectangles [−3n, 3n] × [n, 3n] and
[−3n, −3n] × [−n, −3n], and top-to-bottom crossings in the rectangles [n, 3n] ×
[−3n, 3n] and [−n, −3n] × [−3n, 3n]. The probability of each of these events is
equal to Rn,3 (1/2). By Harris’ inequality, the crossings are positively correlated:
By Theorem 1.8 and since Rn,1 (1/2) ≥ 1/2, we obtain that Rn,3 (1/2) ≥ a for
some explicit a > 0, and uniformly in n ≥ 1, so that
k
Y
P1/2 (o ←→ ∂B(3k )) ≤ (1 − a) = (1 − a)k . (1.101)
l=1
Duality can be used in several more convenient ways. For example, we can define
˜ by the limit
an alternative correlation length ξ(p)
Chayes, Grimmett, Kesten and Schonmann, 1989) use duality to show that
˜
ξ(p) ˜ − p)/2 for p > 1/2. Thus, in particular, if ν exists, then so does
= ξ(1
0
ν and it takes the same value.
Using arguments such as duality and RSW-theory, the critical values of
several other lattices in two dimensions have been established. An example is
psite
c (T ) = 1/2, where T is the triangular lattice, which will play an important
role later on. Also site percolation on the triangular lattice turns out to be self-
dual, which explains why its critical value is 1/2.
Recently, Bollobás and Riordan adapted the RSW-ideas in such a way that
they are more generally applicable. For example, in (Bollobás and Riordan,
2006c), they used this new methodology to give a simpler proof of the Harris-
Kesten Theorem. The adapted RSW-methods have also been crucial in order
to prove that certain critical values for site percolation on certain tesselations
equal 1/2. For example, take a Poisson point process. For each vertex in R2 ,
attach it to the closest point(s) in the Poisson point process. This divides R2
in cells, and we draw an edge between two cells when they share a line of their
respective boundaries. Then, when we color the cells independently green with
probability p and yellow with probability 1 − p, (Bollobás and Riordan, 2006a)
shows that the critical value of the occurrence of an infinite green connected
component again is 1/2. In (Bollobás and Riordan, 2008), this result is extended
to other two-dimensional tesselations, such as the Johnson-Mehl tesselation and
two-dimensional slices of three-dimensional Voronoi tesselations.
In the remainder of this section, we shall work with site percolation on the tri-
angular lattice, for which in the past decade tremendous and remarkable progress
has been made. We start by giving the exact values of the critical exponents,
the values of which have been predicted early on in the physics community (see
(Nienhuis, 1984)) for general two-dimensional lattices:
Theorem 1.9. (Critical exponents on the triangular lattice) For site per-
colation on the two-dimensional triangular lattice, the critical exponents β, γ, ν, η, δ
and ρ exist in the logarithmic sense, and take on the values
5 43 4 5 91 48
β= , γ = γ0 = , ν = ν0 = , η= , δ= ρ= . (1.103)
36 18 3 24 5 5
Theorem 1.9 is one of the major breakthroughs in modern probability theory,
particularly since its proof has shed light not only on the existence and scaling
limit of two-dimensional percolation, but rather of the critical behavior of a wide
class of two-dimensional statistical physical models. So far, this technology has
not only been used for percolation, but also for loop-erased random walk and
uniform spanning trees (Schramm, 2000), and a proof for the Ising model has
been announced by Smirnov. The proof of Theorem 1.9 is a consequence of the
connection between critical percolation and so-called stochastic Loewner evolu-
tion (SLE), a topic which we will discuss in some detail below. The history is
that Schramm (Schramm, 2000) first identified a class of continuous models, so-
called SLE, which are conformally invariant models in the plane of which the
Percolation 27
and
P1/2 (A2R ) = R−5/4+o(1) , (1.105)
where A1R is the event that the origin is connected to the boundary of a ball
of radius R, while A2R is the probability that there exist two neighbors of the
origin of which one has a green connection and another has a yellow connection
to the boundary of the ball of width R. The first of these identities simply states
that ρ exists and takes the value 48/5. The fact that these two statements imply
the existence and values of the critical exponents listed in (1.103) is non-trivial
and due to (Kesten, 1987). The asymptotics in (1.104) was shown in (Lawler,
Schramm and Werner, 2002), the one in (1.105) in (Smirnov and Werner, 2001).
The equalities γ = γ 0 and ν = ν 0 follow from the self-duality of site percolation
on the triangular lattice. Theorem 1.9 identifies almost all critical exponents,
an exception being α, which has always remained to be somewhat mysterious.
While ∆ does not appear in Theorem 1.9, we believe that its derivation should
be easier than that of α.
We now discuss the recent work on the scaling limit of critical percolation
on the triangular lattice in more detail. In order to do so, we must start with
the notion of conformal invariance, a notion which is crucial in the study of
two-dimensional critical systems. We work on C, and we let D ⊂ C be a simply
connected domain. We say that a map f : C → C is conformally invariant when
it preserves angles. In order to explain when a map f is angle-preserving we
introduce some notation. Let t 7→ γ1 (t) and t 7→ γ2 (t) be two crossing curves
with γ1 (t), γ2 (t) ∈ C for all t. Suppose that γ1 and γ2 are sufficiently smooth,
then for t close to s, the curves γ1 (t) and γ2 (t) cross each other at a certain angle.
f is called a conformal map or preserves angles when the curves f (γ1 (t)) and
f (γ2 (t)) cross at the same angle as γ1 and γ2 for every pair of crossing curves γ1
and γ2 in D. Important examples of conformal maps are Möbius transformations
given by
az + b
f (z) = , (1.106)
cz + d
where a, b, c, d ∈ C with ad − bc 6= 0. Let D ⊂ C be a (sufficiently smooth)
domain, with four points P1 , P2 , P3 and P4 on the boundary which are such
28 Percolation and random graphs
exists and lies in (0, 1) when the points P1 , P2 , P3 , P4 are different. These as-
sumptions are already highly non-trivial, but the main assumption in (Lang-
lands, Pouliot and Saint-Aubin, 1994) is that the limit P (D4 ) is conformally
invariant. This is what is often meant with the assumption that the scaling limit
of percolation is conformally invariant. Let us now explain what this assumption
means in more detail. The limit P (D4 ) is conformally invariant when, for D40 be-
ing the image under a conformal map of D4 , we have that that P (D4 ) = P (D40 ).
This means that if we would consider the intersection of D40 with the discretized
lattice of width δ, and we compute the limit
(z4 − z3 )(z2 − z1 )
η= . (1.109)
(z4 − z2 )(z3 − z1 )
Percolation 29
It turns out that η ∈ (0, 1) and that two 4-marked domains on the circle can
be mapped to one another by a conformal map if and only if they have the
same cross-ratio η. Thus, 4-marked domains on the circle can be characterized
by their cross-ratios. In turn, there is a unique conformal map mapping any 4-
marked domain to a 4-marked domain on the circle, so that we can define the
cross-ratio of a general 4-marked domain to be the cross-ratio of the image under
the unique conformal map to the circle. Thus, we see that two 4-marked domains
are conformally equivalent precisely when their cross-ratios are equal, and we can
reformulate the hypothesis of (Langlands, Pouliot and Saint-Aubin, 1994) to say
that the limiting crossing probabilities are a function of their cross-ratio, i.e.,
there exists a function f : (0, 1) 7→ (0, 1) such that P (D4 ) = f (η(D4 )) when
η(D4 ) is the cross-ratio of the 4-marked domain D4 . Based on this assumption,
(Cardy, 1992) shows that in fact
3Γ(2/3) 1/3
P (D4 ) = η 2 F1 (1/3, 2/3; 4/3; η), (1.110)
Γ(1/3)2
P (D4 ) = x. (1.111)
Note that any 4-marked domain can be conformally mapped to the equilateral
triangle, the only degree of freedom being the value of x in Px = (x, 0). In
his seminal paper, Smirnov (Smirnov, 2001) showed (1.111). We shall not go
into the proof in (Smirnov, 2001), as this would take up many more pages than
were allotted to us. Instead, we give some more references to the literature.
The first idea of a possible scaling limit of critical percolation is in the seminal
paper of Schramm, which introduce the limiting stochastic process, which goes
under the name of Stochastic Loewner Evolution, or sometimes Schramm Loewner
Evolution (SLE). Now, SLE has developed into the main tool for studying two-
dimensional critical systems, and it is likely that much more progress shall be
made in this direction in the coming years. We refer to (Bollobás and Riordan,
2006b, Chapter 7) for an expository discussion of Smirnov’s proof, as well as its
consequences. Reviews on SLE and its consequences can be found in (Lawler,
2004; Lawler, 2005; Kager and Nienhuis, 2004; Werner, 2004; Werner, 2005),
and we refer there for more detailed discussions. We close this discussion by
noting that, while the physics community has always predicted that the same
critical behavior should be valid for a wide range of two-dimensional critical
percolation models, the proof on the triangular lattice is, to date, still basically
the only proof of conformal invariance for two-dimensional percolation models.
In particular, the corresponding result for two-dimensional bond percolation on
30 Percolation and random graphs
the square lattice is unknown. One reason for this is that the proof in (Smirnov,
2001) makes essential use of the three-fold rotational symmetry of the triangular
lattice, and it is, up to date, unclear how these symmetries can be replaced by
the different sets of symmetries on the square lattice.
SLE has also proved useful to understand the so-called near-critical phase of
percolation, where p = 1/2 + θδ 4/3 , a nice survey of these results, as well as of
the proof of convergence of the percolation exploration process which explored
the boundary of clusters can be found in (Camia, 2008).
The two-dimensional percolation problem is, after percolation on the tree,
the best understood percolation problem, and the results described above give a
rather complete overview of the depth and wealth of two-dimensional percolation
theory. Yet, several results are not yet known and are worth considering: (a) proof
of existence of scaling functions (see e.g., (Hughes, 1996, (4.295))); (b) a closer
investigation of near-critical percolation (see (Camia, 2008) for an overview);
(c) improvement of our understanding of universality in two-dimensional perco-
lation, for example, by proving conformal invariance of two-dimensional bond
percolation on the square lattice.
for some L sufficiently large. The main result in high dimensions is the following:
In (Aizenman and Newman, 1984), it was proved that γ = 1 when the so-
called triangle condition, a condition on the percolation model, holds. The tri-
angle condition states that
X
∇(pc ) = τpc (0, x)τpc (x, y)τpc (y, 0) < ∞, (1.113)
x,y∈V
(u,v)
Pp ((u, v) is pivotal for o ←→ x) = Ep [1l{o←→u} τ C̃ (o)
(v, x)], (1.114)
where, for a set of sites A, the restricted two-point function τ A (v, x) is the
probability that v is connected to x using only bonds with both endpoints outside
A, and C̃ (u,v) (o) consists of those sites which are connected to 0 without using
(u,v)
the bond (u, v). Clearly, τ C̃ (o)
(v, x) ≤ τ (v, x), and this reproves the upper
bound previously obtained using the BK-inequality. We note that
A
τ (v, x) − τ A (v, x) = Pp (v ←→ x), (1.115)
A
where we write that v ←→ x when every path of occupied bonds from v to x
contains a bond containing a vertex in A. Thus,
32 Percolation and random graphs
d X X
χ(p) = Ep [1l{o←→u} ]τp (v, x)
dp
x∈V (u,v)∈E
X X C̃ (u,v) (o)
− Ep [1l{o←→u} Pp (v ←→ x)]
x∈V (u,v)∈E
X X C̃ (u,v) (o)
= rχ(p)2 − Ep [1l{o←→u} Pp (v ←→ x)]. (1.116)
x∈V (u,v)∈E
which leads to
d X
χ(p) ≥ rχ(p)2 − χ(p) Ep [1l{o←→u,a} ]Pp (v ←→ a). (1.118)
dp
(u,v)∈E
so that X
Pp (o ←→ u, a)Pp (v ←→ a) ≤ χ(p)[∇(p) − 1], (1.120)
(u,v)∈E
implying that
d
χ(p) ≥ χ(p)2 [2 − ∇(pc )]. (1.121)
dp
If we know that ∇(pc ) < 2, then we can integrate the above equation in a similar
fashion as around (1.77) to obtain that γ = 1. When we only have the finiteness
of the triangle, then some more work is necessary to make the same conclusion
(see (Aizenman and Newman, 1984) for details).
In the lace expansion, the above argument is adapted to deal with τp (x)
directly, using rewrites as in (1.114)–(1.115) repeatedly, instead of using the
upper bound in (1.117). We refer to (Hara and Slade, 1990) or the monograph
(Slade, 2006) for detailed derivations of the lace expansion.
The lace expansion can also be used to prove asymptotics of the critical
value in high dimensions, either when L → ∞ for d > 6 fixed or for the nearest-
neighbor model and d → ∞. In (van der Hofstad and Sakai, 2005), the asymp-
totics of the critical point for percolation, as well as for self-avoiding walk, the
Percolation 33
contact process and oriented percolation, were investigated for d > 6 and L → ∞.
It was shown that
1 + cd Ld + o(L−d )
pc (L, Zd ) = , (1.122)
(2L + 1)d − 1
for some explicit constant cd > 0, and where pc (L, Zd ) is the critical value of
spread-out percolation with edge set E in (1.112). The best asymptotics of pc (Zd )
when d → ∞ are in (Hara and Slade, 1993; Hara and Slade, 1995; van der Hofstad
and Slade, 2005; van der Hofstad and Slade, 2006), where it is shown that, when
d → ∞, pc (Zd ) has an asymptotic expansion in terms of inverse powers of (2d)
with rational coefficients, i.e., for each n, we can write
n
X
pc (Zd ) = ai (2d)−i + O((2d)n+1 ), (1.123)
i=1
∂E V = {(u, v) : u ∈ V, v 6∈ V }. (1.125)
The notion of amenability is all about whether the size of ∂E V is of equal order as
that of V , or is much smaller. To formalize this, we denote the Cheeger constant
of a graph G by
|∂E V |
h(G) = inf . (1.126)
V ⊂V:|V |<∞ |V |
the regular tree Tr with r ≥ 3. For the regular tree Tr with r ≥ 3, it is not
hard to see that h(Tr ) = r − 2. (Benjamini and Schramm, 1996) contains cer-
tain preliminary results of percolation on non-amenable graphs, and many open
questions, some of which have been settled in the mean time. For example, (Ben-
jamini and Schramm, 1996, Theorem 1) shows that pc (G) ≤ 1/(h(G) + 1), so
that pc (G) < 1 for every non-amenable graph.
A related definition of non-amenability can be given in terms of the spectral
radius of a graph. Let pn (u, v) be the probability that simple random walk on G
starting at u ∈ V is at time n at v ∈ V. The spectral radius of G is defined as
By Kesten’s Theorem (Kesten, 1959a; Kesten, 1959b), see also (Dodziuk, 1984),
when G has bounded degree, ρ(G) < 1 precisely when h(G) > 0. This exemplifies
the fact that there is a close relationship between graph theoretic properties, and
the behavior of stochastic processes on the graph. A similar relation between the
existence of invariant site percolation and amenability of Cayley graphs is proved
in (Benjamini, Lyons, Peres and Schramm, 1999b, Theorem 1.1).
As we have seen for percolation on Zd in Theorem 1.5, in the super-critical
regime, the infinite cluster is unique. It turns out (see e.g., the discussion fol-
lowing (Kesten, 2002, Theorem 4)) that the uniqueness of the infinite cluster
is valid for all amenable graphs. As the proof of Theorem 1.5 shows, there is a
close relation between the ratio of the size of the boundary and its volume and
the uniqueness of the infinite cluster, which helps to explain the uniqueness for
all amenable graphs. On the other hand, for trees, the number of infinite com-
ponents equals N = ∞ a.s. in the supercritical phase, which can be attributed
to the fact that it we remove one edge, then a tree falls apart into two infinite
graphs which will each have at least one infinite component a.s., so that, in total
there will be infinitely many infinite clusters. Thus, this phenomenon is more
related to there not being any cycles rather than the boundary being large.
In order to investigate the number of infinite clusters, we define the unique-
ness critical value by
The proof of this theorem can be found in (Schonmann, 1999), and related
results appeared in (Häggström and Peres, 1999; Häggström, Peres and Schon-
mann, 1999). Note that, in general, not much is known for the critical cases
p = pc and p = pu .
(Benjamini and Schramm, 1996, Theorem 4) gives a criterion in terms of the
spectral radius which implies that pc < pu . Indeed, it shows that if ρ(G)pr < 1,
where r is the maximal degree of G, then there are a.s. infinitely many infinite
clusters. Thus, if ρ(G)pc r < 1, then pc < pu . Interesting examples arise by
looking at Cartesian products of graphs. Let G1 = (V1 , E1 ) and G2 = (V1 , E1 )
be two graphs, and let G = G1 × G2 have vertex set V = V1 × V2 and edge set
E = {(u1 , u2 ), (v1 , v2 )} : (u1 , v1 ) ∈ E2 or (u2 , v2 ) ∈ E2 . (1.130)
Then, clearly, when the maximal degrees of G1 and G2 , respectively, are denoted
by r1 and r2 respectively, the maximal degree of G = G1 × G2 is r1 + r2 . Also,
pc (G1 × G2 ) ≤ pc (G2 ). (Benjamini and Schramm, 1996, Corollary 1) gives many
examples of graphs with pc < pu by looking at G = G1 × Tr , where G1 is quasi
transitive and Tr is the r-regular tree of degree r ≥ 3. Indeed, by (Benjamini
and Schramm, 1996, Theorem 4), and pc (G1 × Tr ) ≤ pc (Tr ) = (r − 1)−1 , we
obtain that ρ(G)pc r < 1 when r is sufficiently large since ρ(G) → 0 as r → ∞. A
simple example of a graph where pc < pu < 1 is Z × Tr as proved in (Grimmett
and Newman, 1990).
We continue by studying the nature of the phase transition on non-amenable
graphs. The first result concerns the continuity of the phase transition for Cayley
graphs of non-amenable groups. We start by defining what a Cayley graph is.
Let Γ be a group, and let S = {g1 , . . . , gn } ∪ {g1−1 , . . . , gn−1 } be a finite set of
generators. The Cayley graph G = G(Γ) has vertex set V = Γ, and edge set
E = {{g, h} : g −1 h ∈ S}.
Theorem 1.14. (Continuity on non-amenable Cayley graphs) For perco-
lation on a Cayley graph of a finitely generated non-amenable group, there is no
infinite cluster at p = pc (G), i.e., θ(pc (G)) = 0.
This result was proved in (Benjamini, Lyons, Peres and Schramm, 1999a;
Benjamini, Lyons, Peres and Schramm, 1999b), and generalized earlier work by
(Wu, 1993) on Z × Tr with r ≥ 7. The proof makes use of the mass-transport
technique to a clever choice of the mass-transport function.
We complete this section by describing some results on critical exponents. For
this, we need to introduce the notions of planar and unimodular graphs. A graph
38 Percolation and random graphs
is called planar when it can be embedded into R2 with vertices being represented
by points in R2 and edges by lines between the respective vertices such that the
edges only intersect at their end-points. For x ∈ V, let the stabilizer of x S(x) be
the set of automorphisms of G that keep x fixed, i.e., S(x) = {γ : γ(x) = x}. The
graph G is called unimodular if |{γ(y) : γ ∈ S(x)}| = |{γ(x) : γ ∈ S(y)}| for every
x, y ∈ V. Unimodularity turns out to be an extremely useful notion, particularly
since it turns out to be imply the so-called mass-transport principle (MTP).
Indeed, let G be a transitive unimodular graph. We say that f : V×V → [0, ∞) is
diagonally invariant under the automorphisms of G when f (x, y) = f (γ(x), γ(y))
for every automorphism γ : V → V. Then, the MTP states that
X X
f (x, y) = f (y, x). (1.131)
y∈V y∈V
For a proof, see e.g. (Benjamini, Lyons, Peres and Schramm, 1999a). In most
cases, the MTP in (1.131) is used in the following way. We take φ : V × V ×
2G → [0, ∞) such that φ(x, y, ω) = φ(γ(x), γ(y), γ ◦ ω), for any configuration
ω and where γ ◦ ω is the configuration (γ ◦ ω)(x) = ω(γ(x)). We interpreted
φ(x, y, ω) as the mass which x sends to y in the configuration κ. Then, we take
f (x, y) = Ep [φ(x, y, ω)], and the MTP implies that the mass sent out by x is
equal to the amount of mass x receives, which explains the name mass transport
principle. For non-unimodular graphs, an adaptation of (1.131) holds, where the
left hand side is multiplied by w(x) and the right hand side by w(y), where
w(x) = |Sx o|/|So x|, but this relation is not as powerful. All amenable graphs are
unimodular, an example of a non-unimodular graph is the so-called grandmother
graph, which is obtained by adding a connection between any vertex of the tree
to its grandmother (i.e., the unique vertex which is two steps close to the root
than the vertex itself). See (Timár, 2006) for a wealth of related examples of
non-unimodular graphs.
Finally, the number of ends of a graph G is
E(G) = sup {number of infinite connected components of G \ S}. (1.132)
S⊂V:|S|<∞
Then, (Schonmann, 2001; Schonmann, 2002) prove that percolation has mean-
field critical exponents in the following cases:
Theorem 1.15. (Mean-field critical exponent on non-amenable graphs)
For percolation on a locally finite, connected, transitive, non-amenable graph G,
β = γ = 1, δ = ∆ = 2 in the bounded-ratio sense, in the following cases:
√
1. Graphs G for which h(G) > ( 2r2 − 1 − 1)/2, where r is the degree of the
graph;
2. Graphs G which are planar and have one end;
3. Graphs G which are unimodular and have finitely many ends.
Since percolation in high-dimensions is known to have mean-field critical
exponents, which are the critical exponents on the tree, one would expect that,
Percolation 39
n
1X
pk(n) = 1l{di =k} , (1.135)
n i=1
where di is the degree of vertex i in the network, i.e., the number of neighbors
of vertex i. Then, a real network is scale free when pk(n) is approximately propor-
tional to a power law with a certain exponent τ ∈ [1, ∞), i.e., for k sufficiently
large, we have that there is a constant C > 0 such that
pk(n) ≈ Ck −τ . (1.136)
Naturally, also the notion of a real network being scale free is inherently some-
what vague. For example, how precise must the approximation in (1.136) be?
Equation (1.136) can only be valid up to a certain point, since, for a simple
graph of size n (i.e., a graph without self-loops and multiple edges), the maximal
degree is equal to n − 1, so that the left hand side of (1.136) equals 0 for k ≥ n,
while the right hand side remains positive for all k. In practice, (1.136) is verified
by taking the logarithm on both sides and noticing that log p(n)k is close to linear
in log k:
log pk(n) ≈ log C − τ log k, (1.137)
i.e., a loglog plot of the degree sequence should be close to linear, and the slope
is given by −τ , where τ denotes the power-law exponent.
A network is highly clustered when two typical neighbors of an arbitrary
vertex are more likely to be connected to each other as well than an arbitrary
pair of vertices, i.e., many wedges are in fact closed to become triangles. When
we draw two different vertices uniformly at random from a graph of size n, the
probability that there is an edge between the drawn vertices is equal to
2E
, (1.138)
n(n − 1)
¯ where
where E is the number of edges. Note that 2E/n = d,
n
1X
d¯ = di (1.139)
n i=1
2E
is the average degree of all vertices in the network. Thus, we see that n(n−1) =
¯
d/(n − 1). In most real-world networks, the average degree is much smaller than
the size of the network, so that the probability that two uniformly drawn vertices
42 Percolation and random graphs
i.e., the proportion of wedges that forms a triangle. A network is highly clustered
2E
when CG is much larger than n(n−1) . Again, this notion is inherently imprecise,
as we do not define how much larger CG needs to be. The reason why many
networks are highly clustered is that there often is a certain group structure.
For example, in a collaboration network, if a mathematician has published with
another mathematician, then they are likely to be in the same community. Thus,
when a mathematician has published with two other mathematicians, then they
are likely to all be in the same community, which increases the likelihood that
the two mathematicians have also published together. Similar effects play a role
in the World-Wide Web and in social networks.
As explained above, all these notions are merely empirical, and we shall give
a proper mathematical definition before we introduce the mathematical random
graph models that we shall consider in this section, and which are aimed at
describing real networks. The aim of this section is not to define these notions
precisely for empirical networks, but instead to define these notions precisely for
random graph models for them. See (Albert and Barabási, 2002; Dorogovtsev and
Mendes, 2002; Newman, 2003) for reviews on complex networks, and (Barabási,
2002) for a more expository account. We do notice that these real-world complex
networks are not at all like classical random graphs (see (Alon and Spencer, 2000;
Bollobás, 2001; Janson, Luczak and Rucinski, 2000) and the references therein),
particularly since the classical models do not have power-law degrees. As a result,
the empirical findings of real-world networks have ignited enormous research
on adaptations of the classical random graph that do have power-law degree
sequences. We shall survey some of these results, and we shall start by defining
the notions of small-world, scale-free and highly-clustered random graphs in a
precise mathematical way.
Small-world, scale-free and highly-clustered random graph processes. As de-
scribed in the above motivation, many real-world complex networks are large.
Many of them, such as the World-Wide Web and collaboration networks, grow
in size as time proceeds. Therefore, it is reasonable to consider graphs of grow-
ing size, and to define the notions of scale-free, small-world and highly-clustered
random graphs as a limiting statement when the size of the random graphs tends
to infinity. This naturally leads us to study graph sequences. We shall denote a
sequence of random graphs by {Gn }∞ n=1 , where n denotes the size of the graph
Gn , i.e., the number of vertices in Gn .
Denote the proportion of vertices with degree k by Pk(n) , i.e.,
n
1X
Pk(n) = 1l (n) , (1.141)
n i=1 {Di =k}
Random graphs 43
where Di(n) denotes the degree of vertex i ∈ {1, . . . , n} in the graph Gn , and recall
that the degree sequence of Gn is given by {Pk(n) }∞ k=0 . We use capital letters in
our notation to indicate that we are dealing with random variables, due to the
fact that Gn is a random graph. This explains why there are capitals in (1.141),
but not in (1.135). Now we are ready to define what it means for a random graph
process {Gn }∞n=1 to be scale free.
We call a random graph process {Gn }∞ n=1 sparse when
for some deterministic limiting probability distribution {pk }∞ k=0 . Since the limit
pk in (1.142) is deterministic, the convergence in (1.142) can equivalently be
taken as convergence in probability or in distribution. Also, since {pk }∞ k=0 sums
up to one, for large n, most of the vertices have a bounded degree, which explains
the phrase sparse random graphs.
We further call a random graph process {Gn }∞ n=1 scale free with exponent τ
when it is sparse and when
log pk
lim =τ (1.143)
k→∞ log (1/k)
exists. Thus, for a scale-free random graph process its degree sequence converges
to a limiting probability distribution as in (1.142), and the limiting distribution
has asymptotic power-law tails described in (1.143). This gives a precise mathe-
matical meaning to a random graph process being scale free. In some cases, the
definition in (1.143) is a bit too restrictive, particularly when the probability
mass function k 7→ pk is not very smooth. Instead, we can also replace it by
log [1 − F (k)]
lim = τ − 1, (1.144)
k→∞ log (1/k)
P
where F (x) = y≤x py denotes the distribution function corresponding to the
probability mass function {pk }∞
k=0 . In particular models, we shall use the version
that is most appropriate in the setting under consideration.
We say that a graph process {Gn }∞ n=1 is highly clustered when
We finally define what it means for a graph process {Gn }∞ n=1 to be a small
world. Intuitively, a small world should have distances that are much smaller than
those in a lattice or torus. When we consider the nearest-neighbor torus Tr,d ,
then, and we draw two vertices uniformly at random, their distance will be of the
order r. Denote the size of the torus by n = (2r + 1)d , then the typical distance
between two uniformly chosen vertices is of the order n1/d , so that it grows as a
positive power of n. We shall be dealing with random graph processes {Gn }∞ n=1
for which Gn is not necessarily connected. Let Hn denote the distance between
44 Percolation and random graphs
two uniformly chosen connected vertices, i.e., we pick a pair of vertices uniformly
at random from all pairs of connected vertices, and we let Hn denote the graph
distance between these two vertices. We shall call Hn the typical distance of Gn .
Then, we say that a random graph process {Gn }∞ n=1 is a small world when there
exists a constant K such that
Note that, for a graph with a bounded degree dmax , the typical distance is at least
(1−ε) log n/ log dmax , with high probability, so that a random graph process with
bounded degree is a small world precisely when the order of the typical distance
is optimal.
For a graph Gn , let diam(Gn ) denote the diameter of Gn , i.e., the maximal
graph distance between any pair of connected vertices. Then, we could also have
chosen to replace Hn in (1.146) by diam(Gn ). However, the diameter of a graph
is a rather sensitive object which can easily be changed by making small changes
to a graph in such a way that the scale-free nature and the typical distance Hn
do not change. For example, by adding a sequence of m vertices in a line, which
are not connected to any other vertex, the diameter of the graph becomes at
least m, whereas, if m is much smaller than n, Hn is not changed very much.
This explain why we have a preference to work with the typical distance Hn
rather than with the diameter diam(Gn ).
In some models, we shall see that typical distances can be even much smaller
than log n, and this is sometimes called an ultra-small world. More precisely, we
say that a random graph process {Gn }∞ n=1 is an ultra-small world when there
exists a constant K such that
There are many models for which (1.147) is satisfied, but for which at the same
time diam(Gn )/ log n converges in probability to a positive limit. This once more
explains our preference to work with the typical graph distance Hn .
We have given precise mathematical definitions for the notions of random
graphs being scale free, highly clustered and small worlds. This has not been
done in the literature so far, and our definitions are based upon a summary of
the relevant results proved for random graph models. We believe it to be a sound
step forward to make the connection between the theory of random graphs and
the empirical findings on real-life networks.
The remainder of this section is organised as follows. In Section 1.3.2, we
study three models for random graphs without geometry that can have rather
general degree sequences, namely, inhomogeneous random graphs, the configu-
ration model and preferential attachment models. We discuss results concerning
the phase transitions and distances in such models. In Section 1.3.5, we shall
discuss random graphs with geometry. The results in Section 1.3.5 are closely
Random graphs 45
Note that the tails of a Poisson distribution are quite thin, even subexpo-
nentially thin. As a result, the Erdős-Rényi random graph process is not scale
free. This problem can be overcome by stepping away from the assumption that
the edge probabilities are equal, instead taking them unequal. This is the cel-
ebrated inhomogeneous random graph (IRG), about which the seminal paper
(Bollobás, Janson and Riordan, 2007) proves substantial results in full general-
ity. See also the references in (Bollobás, Janson and Riordan, 2007) for several
examples which have been studied in the literature, and which they generalize.
We shall not go into the precise definition of the model in (Bollobás, Janson and
Riordan, 2007), but rather look at some simpler examples which already allow
for general degree sequences.
To give the general setting, we let G(n, p) denote a general inhomogeneous
random graph, where p = {pij }1≤i<j≤n is such that pij is the probability that
the edge ij = (i, j) is occupied, and where different edges are independent. The
Erdős-Rényi random graph is retrieved when taking pij = p for all ij. We now
generalize the definition in such a way that power-law degree sequences can be
obtained. WePassign weights {wi }ni=1 to the vertices, wi being the weight of vertex
n
i. Let ln = i=1 wi be the total weight. Then, we can take
pij = 1 − e−wi wj /ln . (1.148)
In this way, we retrieve the Poisson random graph (Norros and Reittu, 2006).
Alternatively, for pij = max{wi wj /ln , 1} we retrieve the random graph with given
expected degree as studied in detail by Chung and Lu (Chung and Lu, 2002a;
Chung and Lu, 2002b; Chung and Lu, 2003; Chung and Lu, 2006b; Chung and
Lu, 2006a; Chung, Lu and Vu, 2004). Note that, in this model, if we assume that
maxni=1 wi2 < n, and if we allow for a single self-loop at vertex i with probability
wi2 /ln , the expected degree of vertex i is precisely equal to wi , which explains the
name of this model. A final example occurs when we take pij = wi wj /(ln +wi wj ),
which is called the generalized random graph (Britton, Deijfen and Martin-Löf,
2006). In (Janson, 2008), conditions are given as to when two inhomogeneous
random graph processes {G(n, p)}∞ 0 ∞
n=1 and {G(n, p )}n=1 are equivalent, i.e.,
when events have asymptotically the same probability for G(n, p) and G(n, p0 )
as n → ∞.
Since the expected degree of vertex i is close to wi , in order to obtain a
specified degree sequence in the graph, we need to pick the weights {wi }ni=1
appropriately. In the sequel, we shall take
wi = wi(n) = [1 − F ]−1 (i/n), i ∈ [n], (1.149)
−1
where [1 − F ] is the generalized inverse function of the survival function x 7→
1 − F (x) given by
(1 − F )−1 (u) = inf{s : [1 − F ](s) ≤ u}, u ∈ (0, 1). (1.150)
We call G(n, p), with p as in (1.148) and {wi }ni=1 as in (1.149) the rank-1 in-
homogeneous random graph with deterministic weights according to F . In this
Random graphs 47
case, the degrees of G(n, p) can be seen to have a mixed Poisson distribution
with mixing distribution F (Britton, Deijfen and Martin-Löf, 2006), i.e., the
asymptotic probability that a uniform vertex has degree k is
W k −W
pk = E[ e ], (1.151)
k!
where W has distribution function F (see, for example, (Britton, Deijfen and
Martin-Löf, 2006, Theorem 3.1) or (van der Hofstad, 2008, Chapter 6)). Thus,
the rank-1 inhomogeneous random graph is sparse. It is not hard to see, using
concentration techniques on a Poisson random variable, that the mixed-Poisson
distribution in (1.151) satisfies (1.143) when W is a continuous random variable
with density fW satisfying
log fW (w)
lim = τ. (1.152)
w→∞ log (1/w)
The condition in (1.152) is sufficient, but not necessary. However, it does illus-
trate that there is a close relation between the tails of a mixed Poisson random
variable and that of its mixing distribution.
Instead of taking the weights deterministic as in (1.149), we can also take wi =
Wi , where {Wi }ni=1 is an i.i.d. sequence of random variables with distribution
function F . We call G(n, p) with p as in (1.148) and {Wi }ni=1 an i.i.d. sequence of
random variables with distribution F , the rank-1 inhomogeneous random graph
with random weights according to F . The advantage of random degrees is that
the vertices in the resulting graph are exchangeable, the disadvantage is that
the edges are no longer independent, their dependence being moderated by their
random weights.
IRGs give a flexible class of models for random graphs with flexible degree
sequences of mixed Poisson form.
(b) The configuration model. The class of IRGs is a flexible class of random
graphs, allowing for rather general degree sequences. One slight disadvantage of
the model is the fact that one cannot specify the degree sequence more precisely.
For example, one cannot have fixed degrees (so-called random regular graphs),
or force the degrees to be at least 1 (which might be appropriate when using the
model for certain real networks). An alternative model, allowing for more general
degree sequences, is the configuration model (CM). We shall first introduce the
model.
Fix an integer n. Consider a sequence of degrees d1 , d2 , . . . , dn . We will con-
struct an undirected graph with P n vertices where vertex j has degree dj . Obvi-
n
ously, we will assume that ln = j=1 dj is even, since in any graph, the total
degree is twice the number of edges.
To construct the graph, we have n separate vertices and incident to vertex
j, we take dj stubs. All stubs need to be connected to another stub to build the
graph. The stubs are numbered in an arbitrary order from 1 to ln . We start by
48 Percolation and random graphs
connecting at random the first stub with one of the ln − 1 remaining stubs. Once
paired, two stubs form a single edge of the graph. We continue the procedure
of randomly choosing and pairing the stubs without replacement, until all stubs
are connected. Unfortunately, vertices having self-loops may occur. However,
self-loops are scarce when n → ∞. See (Janson, 2006) for the best results on
the simplicity of the CM. In general, it turns out that the vector of the number
of cycles of all lengths (i.e., the vector consisting of the number of self-loops,
the number of multiple edges, the number of triangles, the number of squares,
etc) converges in distribution
Pn to an independent sequence of Poisson random
variables, when νn = l1n j=1 dj (dj − 1) converges to a certain ν < ∞, and
√
maxi di = o( n). See also (Bollobás, 2001, Section 2.4). The CM with fixed
degrees has a long history. It was introduced in (Bender and Canfield, 1978) to
study uniform random graphs with a given degree sequence (see also (Bollobás,
2001, Section 2.4)). One specific example is to take the degrees all equal, in which
case we speak of a random regular graph.
Similarly to the rank-1 case of IRG described above, there are two cases
which have been studied for the CM, depending on whether the degrees are de-
terministic or random. In the case of deterministic degrees, a possible choice to
obtain a degree sequence with distribution function F is to take F the distribu-
tion function of an integer random variable, and to take the number of vertices
with degree k to be equal to dnF (k)e − dnF (k − 1)e. We shall call this the con-
figuration model with deterministic degrees according to F . For random degrees,
we can take the degrees {Di }ni=1 to be i.i.d. random variables with distribution
function F , which we shall call the configuration model with random degrees ac-
cordingPto F . In the latter case, unless D1 is even with probability 1, the sum
n
Ln = i=1 Di will be odd with probability exponentially close to 1/2. To avoid
this problem, we can increase the degree of vertex n by 1, so that the degree
of vertex n equals Dn + 1l{Dn is odd} . This hardly makes any difference to the
properties of the graph under consideration, and we will ignore this effect in the
sequel.
In (Britton, Deijfen and Martin-Löf, 2006, Theorem 2.1), it is shown that
for the CM with random degrees according to F , where F is a distribution
function of a random variable with finite (1 + ε)th moment, if we erase all self-
loops and contract all multiple edges to a single edge, the resulting graph is
simple and sparse (recall (1.142)), where pk = F (k) − F (k − 1). Thus, multiple
edges and self-loops only form a small proportion of the total number of edges.
Thus, in order to obtain a scale-free random graph process, we need to take
pk = F (k) − F (k − 1) to satisfy (1.143). In (Britton, Deijfen and Martin-Löf,
2006), also other constructions to create a CM with a prescribed degree sequence
are analyzed.
real-world networks are scale free. A possible explanation was given by Barabási
and Albert (Barabási and Albert, 1999) by a phenomenon called preferential
attachment. Preferential attachment models the growth of the network in such
a way that new vertices are more likely to add their edges to already present
vertices with a high degree. For example, in a social network, a newcomer is more
likely to get acquainted to a person who is socially active, and, therefore, is likely
to already possess a high degree. Thus, large degrees are likely to become even
larger, which explains why this model is sometimes called the Rich-get-Richer
model.
Interestingly, in certain cases, preferential attachment models (PAMs) have
power-law degree sequences, and, therefore, preferential attachment offers a con-
vincing explanation why many real-world networks have power-law degree se-
quences. As a result, many papers appeared that study such models. See e.g.
(Aiello, Chung and Lu, 2002; Bollobás, Borgs, Chayes and Riordan, 2003; Bol-
lobás and Riordan, 2003a; Bollobás and Riordan, 2003b; Bollobás and Riordan,
2004a; Bollobás and Riordan, 2004b; Bollobás, Riordan, Spencer and Tusnády,
2001; Cooper and Frieze, 2003) and the references therein. The literature pri-
marily focusses on three main questions. The first is to prove that such random
graphs are indeed scale free (Aiello, Chung and Lu, 2002; Bollobás, Borgs, Chayes
and Riordan, 2003; Bollobás and Riordan, 2003a; Bollobás and Riordan, 2003b;
Bollobás, Riordan, Spencer and Tusnády, 2001; Cooper and Frieze, 2003). The
second is to show that the resulting models are small worlds by investigating the
distances in them. See for example (Bollobás and Riordan, 2004b) for a result
on the diameter. In non-rigorous work, it is often suggested that many of the
scale-free models, such as the CM or IRGs, the models in (Bollobás, Janson and
Riordan, 2007) and the PAMs, have similar properties for their distances. Dis-
tances in the CM have been shown to depend on the number of finite moments
of the degree distribution. The natural question is therefore whether the same
applies to PAMs. A third key question for PAMs is their vulnerability, for ex-
ample to deliberate attack (Bollobás and Riordan, 2003b) or to the spread of a
disease (Berger, Bollobás, Borgs, Chayes and Riordan, 2003).
We now formulate the preferential attachment model, which is an extension of
the Barabási-Albert model, formulated rigorously in (Bollobás, Riordan, Spencer
and Tusnády, 2001), by constructing a graph process {Gm (n)}∞ n=1 . We start by
formulating the model for m = 1, for which we start with G1 (1) consisting of a
single vertex with a single self-loop. We denote the vertices of the graph Gm (n)
by v1(m) , v2(m) , . . .. We denote the degree of vertex vi(m) by Di(n) , where a self-loop
increases the degree by 2.
Then, for m = 1, and conditionally on G1 (n), the growth rule to obtain G1 (n+1)
is as follows. We add a single vertex n + 1 having a single edge. The other end
of this edge is equal to i = n + 1 with probability proportional to 1 + δ, and to
i ∈ [n] with probability proportional to Di(n) + δ, where δ ≥ −1 is a parameter
of the model. Thus,
50 Percolation and random graphs
( 1+δ
(1) (1)
n(2+δ)+(1+δ) , for i = n + 1,
P vn+1 → vi G1 (n) = (n)
Di +δ (1.153)
n(2+δ)+(1+δ) , for i = 1, 2, . . . , n.
The model with integer m > 1, is defined in terms of the model for m = 1 as
follows. We take δ ≥ −m, and then start with G1 (mn), with δ 0 = δ/m ≥ −1 by
identifying the vertices v1(1) , v2(1) , . . . , vm
(1)
in G1 (mn) to be vertex v1(m) in Gm (n),
(1) (1)
and for 1 < j ≤ n, the vertices v(j−1)m+1 , . . . , vjm in G1 (mn) to be vertex vj(m)
in Gm (n); in particular the degree Dj (n) of vertex vj(m) in Gm (n) is equal to the
(1) (1)
sum of the degrees of the vertices v(j−1)m+1 , . . . , vjm in G1 (mn). This defines
the model for integer m ≥ 1. Observe that the range of δ is [−m, ∞).
The resulting graph Gm (n) has precisely mn edges and n vertices at time n, but
is not necessarily connected. For δ = 0, we obtain the original model studied in
(Bollobás, Riordan, Spencer and Tusnády, 2001), and further studied in (Bollobás
and Riordan, 2003b; Bollobás and Riordan, 2004a; Bollobás and Riordan, 2004b).
The extension to δ 6= 0 is crucial in our setting, as we shall explain in more detail
below.
There are several related ways in which we can define the model. For example,
(1)
we disallow self-loops when m = 1 by setting the probability that vn+1 connects
(1)
to vn+1 to be 0 in (1.153), and construct the model for m > 1 as in the paragraph
above. Alternatively, we can let the m edges incident to vertex n to be attached
(m)
independently of each other (in particular, in this case, vertex vn+1 cannot to
connect to itself, so that the graph is connected). For many of the results, this
precise choice is irrelevant, and we shall stick to the model in (1.153). The last
two versions have the nice feature that they lead to connected random graphs.
We continue to discuss the degree sequence of the above preferential attach-
ment model. Recall (1.141) for the definition of the degree sequence. Much of
the available literature on PAMs centers around the proof that the asymptotic
degree sequence obeys a power law, where the exponent τ depends in a sensitive
way on the parameters of the model. Thus, the PAM is scale free. For the PAM
considered here, the power-law exponent equals τ = 3 + δ/m, so that it can take
any value τ ∈ (2, ∞) by adjusting the parameter δ > −m. It is here that we rely
on the choice of the model in (1.153). A form of bias in growing networks towards
vertices with higher degree is, from a practical point of view, quite likely to be
present in various real networks, but it is unclear why the PA scheme should be
affine as in (1.153). However, only affine PA schemes give rise to power-law degree
sequences. See (Oliveira and Spencer, 2005; Rudas, Tóth and Valkó, 2007) for
examples of PAMs with (possibly) non-linear PA-mechanisms and their degree
sequences. We now explain how the affine PA-mechanism in (1.153) gives rise
to power-law degree sequences and highlight the proof. We start by introducing
some notation.
For m ≥ 1 and δ > −m, we define {pk }∞ k=0 to be the probability distribution
given by pk = 0 for k = 0, . . . , m − 1 and, for k ≥ m,
Random graphs 51
Asymptotically, for n large, it is quite unlikely that a vertex will be hit by more
than one of the m edges added upon the addition of vertex n. Let us hence
ignore this possibility for the moment. The difference Nk(n+1) − Nk(n) between the
number of vertices with degree k at time n + 1 and time n respectively, is then
obtained as follows:
(a) Vertices with degree k in Gm (n) that are hit by one of the m edges em-
anating from vertex n are subtracted from Nk(n) . The conditional prob-
ability that a fixed edge is attached to a vertex with degree k is (k +
52 Percolation and random graphs
m(k − 1 + δ) m(k + δ)
pk = pk−1 − pk + 1l{k=m} , (1.161)
2m + δ 2m + δ
or, equivalently,
k−1+δ 2 + δ/m
pk = pk−1 + 1l{k=m} , (1.162)
k + 2 + δ + δ/m k + 2 + δ + δ/m
affine PAMs. The above argument can be made rigorous in order to show that
maxk |E[Nk(n) ] − npk | remains uniformly bounded (see e.g., (Deijfen, van den
Esker, van der Hofstad and Hooghiemstra, 2007)).
In order to prove concentration of Nk(n) , all proofs in the literature make use
of a clever martingale argument from (Bollobás, Riordan, Spencer and Tusnády,
2001). Define the Doob martingale Mt by
E[W 2 ]
ν= , (1.166)
E[W ]
where W has distribution function F . For the PAM, we let ν = m. Below, we
say that a sequence of events {En }∞
n=1 occurs with high probability (whp) when
limn→∞ P(En ) = 1. It turns out that ν = 1 plays the role of a critical value for
all these random graphs:
Theorem 1.17. (Phase transition in random graphs) (a-b) For the config-
uration model with deterministic or random degrees according to F , and
for the rank-1 inhomogeneous random graph with deterministic or random
weights according to F , the largest connected component has, whp, size
54 Percolation and random graphs
o(n) when ν ≤ 1, and size ζn(1 + o(1)) for some ζ > 0 when ν > 1, where
n is the size of the graph.
(c) For the PAM of size n, whp, the largest connected component has size o(n)
when ν = m = 1, while the probability that the PAM is connected converges
to 1 for n → ∞ when ν = m > 1.
We write Theorem 1.17(a-b) to indicate that the result holds both for the IRG
(which is model (a)) and for the CM (which is model (b)). This notation shall
be used frequently below.
The result for IRG is a special case of (Bollobás, Janson and Riordan, 2007,
Theorem 3.1). Earlier versions for the random graph with given expected de-
grees appeared in (Chung and Lu, 2002b; Chung and Lu, 2006b) (see also the
monograph (Chung and Lu, 2006a)). For the CM, the first result in the gener-
ality of Theorem 1.17 appeared in (Molloy and Reed, 1995; Molloy and Reed,
1998) under stronger conditions than mentioned here. For the sharpest result,
see (Janson and Luczak, 2007). The connectivity of PAMs was investigated for
δ = 0 in (Bollobás and Riordan, 2004b), it was extended to all δ > −m in (van
der Hofstad, 2008, Chapter 11).
In (Deijfen, van den Esker, van der Hofstad and Hooghiemstra, 2007), also
the setting where the number of edges with which a vertex enters the random
graph is random. Indeed, denote the number of edges of vertex t by Wt , then in
(Deijfen, van den Esker, van der Hofstad and Hooghiemstra, 2007) it is assumed
that {Wt }∞t=1 is an i.i.d. sequence. In general, such models are also scale-free with
power-law exponent τ = min{τP , τW }, where τP = 3 + δ/µ and µ = E[Wt ] is the
“PA exponent”, while τW is the power-law exponent of the weight distribution,
i.e.,
log P(W1 ≥ k)
lim = τW − 1. (1.167)
k→∞ log (1/k)
Thus, one can summarize this by the fact that the effect with the least corre-
sponding power-law exponent determines the power-law exponent of the graph.
It would be of interest to study the phase transition for such more general models,
and to verify r under what condition a giant component exists.
Distances in random graphs with finite variance degrees. The main results on
distances in power-law random graphs with power-law exponent τ > 3 are sum-
marized in the following theorem:
Theorem 1.18. (Distances in graphs with finite variance degrees) (a-b)
For the configuration model and the rank-1 inhomogeneous random graph
of size n, Hn / log n converges in probability to 1/ log ν, where ν is given
by (1.165) for the CM, and by (1.166) for the rank-1 IRG, when F in the
definition of the models satisfies that there exist c > 0 and τ > 3 such that
(c) For the affine PAM of size n with δ > 0, so that τ = 3 + δ/m > 3, whp,
Hn / log n is bounded above and below by positive and finite constants.
The result for the rank-1 IRG can be found in (van den Esker, van der
Hofstad and Hooghiemstra, 2006a), where it is also shown that the fluctuations
of Hn around logν n remain bounded in probability, both in the case of i.i.d.
degrees as well as for deterministic weights under a mild further condition on
the distribution function. The first result in this direction was proved in (Chung
and Lu, 2002a; Chung and Lu, 2003) for the expected degree random graph, in
the case of rather general deterministic weights. A special case of the IRG with
finite variance degrees is the Erdős-Rényi random graph with edge probability
p = λ/n, for which ν = λ.
The result for the CM can be found in (van der Hofstad, Hooghiemstra and
Van Mieghem, 2005) in the case of i.i.d. degrees, where again also the fluctuations
are determined. The results for deterministic degrees in the CM is conjectured
in (van den Esker, van der Hofstad and Hooghiemstra, 2006a), but is not proved
anywhere. We expect that the methodology in (van der Hofstad, Hooghiemstra
and Van Mieghem, 2005) can be simply adapted to this case. The result for the
affine PAM was proved in (van der Hofstad and Hooghiemstra, 2007a). Unfortu-
nately the proof of convergence in probability is missing in this case. It would be
of interest to identify the constant to which Hn / log n converges in this setting.
Distances in random graphs with finite mean and infinite variance degrees. When
τ ∈ (2, 3), the variance of the degrees becomes infinite, which is equivalent to
thePstatement that, with Di(n) denoting the degree of vertex i in the graph of size
n
n, i=1 (Di(n) )2 grows much faster than n. The following theorem shows that, in
such cases, the distances are much smaller than log n:
Theorem 1.19. (Distances in graphs with τ ∈ (2, 3)) (a-b) For the config-
uration model and the rank-1 inhomogeneous random graph, Hn / log log n
converges in probability to 2/| log (τ − 2)|, when F in the definition of the
models satisfies that there exist c > 0 and τ ∈ (2, 3) such that
(c) For the affine PAM with δ < 0 and m ≥ 2, so that τ = 3 + δ/m ∈ (2, 3),
whp Hn / log log n is bounded above by a finite constant.
Theorem 1.19 shows that all three models are ultra-small worlds when the power-
law exponent τ satisfies τ ∈ (2, 3).
The result for the rank-1 IRG is proved in (Chung and Lu, 2002a; Chung
and Lu, 2003) for the expected degree random graph, in the case of certain
deterministic weights. The result for the CM can be found in (van der Hofstad,
Hooghiemstra and Znamenski, 2007) in the case of i.i.d. degrees, where again also
the fluctuations are determined and are proved to be bounded. The restrictions
on F are somewhat weaker than (1.169), as they also allow x 7→ xτ −1 [1 − F (x)]
to be slowly varying under certain conditions on the regularly varying function.
The results in (Fernholz and Ramachandran, 2007) mentioned earlier apply in
this case as well, and show that, when the proportion of vertices with degrees
1 and 2 is positive, the diameter divided by log n converges in probability to a
positive constant. In (van der Hofstad and Hooghiemstra, 2007b), it is shown
that the diameter in the CM is bounded above by a constant times log log n
when there are no vertices of degree 1 and 2.
The result for the affine PAM was proved in (van der Hofstad and Hooghiem-
stra, 2007a). Again, it would be of interest to identify the constant to which
Hn / log log n converges in this setting.
For the affine PA-model, we refer to (Bollobás and Riordan, 2004b) for a
proof of the fact that the diameter of the PA-model diam(Gm (n)), for δ = 0,
satisfies that diam(Gm (n)) × log log n/ log n converges in probability to 1. This
result is much sharper than the ones in Theorem 1.18(c) and Theorem 1.19(c),
and it would be of interest to investigate whether the methodology used there
can be adapted to the case where δ 6= 0.
Distances in random graphs with infinite mean degrees. Only in the CM and the
IRG, it is possible that the power-law exponent of the degrees or the weights of
the vertices τ satisfies τ ∈ (1, 2). In general, this is not very realistic, as it means
that either there are extremely many multiple edges (in the CM) or the power-
law exponent in the graph does not match the value of τ (in the IRG). Distances
in infinite mean random graphs have been studied in (van den Esker, van der
Hofstad, Hooghiemstra and Znamenski, 2006b; Norros and Reittu, 2006) and
show that distances remain uniformly bounded by three. The intuition behind
this is clear: all vertices are connected to vertices with extremely high degree,
and these vertices form a complete graph, so that typical distances are at most
3. We refrain from a further discussion of random graphs with infinite mean
degrees.
Conclusion on phase transition and distances. The main tool in order to study
the phase transition and distances in the CM and IRGs is a comparison of the
neighborhood of a vertex to a two-stage (multitype) branching process. In order
to prove distance results, one then has to further investigate the growth of the
number of vertices at a given distance using limit laws for branching processes.
Random graphs 57
When (1.168) holds, the number of vertices at a given distance k grows propor-
tionally to ν k , which suggests that distances are of the order logν n, as stated in
Theorem 1.18.
Specifically, for the CM, with deterministic or i.i.d. degrees, the two-stage
branching process, which we denote by {Zk }k≥0 , starts from Z0 = 1, has offspring
distribution {fn }∞ n=1 , where fn = F (n) − F (n − 1) are the jump sizes of the
distribution F , in the first generation, and offspring distribution
(n + 1)fn+1
gn = , n ≥ 0, (1.170)
E[D]
in the second and further generations. It is not hard to verify that the parameter ν
in (1.165) is the expectation of the size-biased distribution {gn }∞
n=0 . For the rank-
1 IRG with deterministic or random weights, the branching process {Zk } has a
mixed-Poisson distribution with random parameter W in the first generation
and a mixed Poisson distribution with random parameter We , which has the
size-biased distribution of W , in the second and further generations. Thus, when
W has a continuous density w 7→ f (w), the density of We is equal to fe (w) =
wf (w)/E[W ]. It can be seen that these two mixed Poisson distribution are again
related through (1.170), and that again the parameter ν in (1.166) equals the
expectation of the size-biased distribution used as offspring distribution in the
second and further generations.
The condition ν > 1 assures that the branching process {Zk } is supercritical,
so that it can grow to a large size with positive probability (recall Theorem 1.17).
Intuitively, all vertices for which the connected component are large (say larger
than nε for some ε > 0) are connected and thus form a single giant component.
The constant ζ in Theorem 1.17 is the survival probability of the two stage
(multi-type) branching process {Zk }k≥0 . Now, for a branching process {Zk }k≥0
for which the offspring distribution has finite (1 + ε)th moment, we have that
Zk ν −k converges a.s. to a limiting random variable W that is not identically 0
(by the Kesten-Stigum Theorem). The core of the proof is to use that Hn is
the graph distance between two uniformly chosen connected vertices V1 and V2 .
Then, the neighborhood shells Zk(1,n) and Zk(2,n) consist of those vertices that are
at graph distance precisely equal to k from V1 and V2 , respectively. Hn is equal
(1,n)
to kn +1, where kn is the first time that any of the vertices in Zbk n /2c
connects to
(2,n)
a vertex in Zdkn /2e . The proof is then completed by coupling these neighborhood
shells to two independent two-stage branching processes as described above.
When (1.169) holds, then, by results of (Davies, 1978), the growth is super-
exponential, i.e., (τ −2)k log (Zk + 1) converges a.s. to a limiting random variable
Y , where Y > 0 precisely when the branching process survives. Thus, condi-
tionally on Y = y > 0, the number of individuals in generation k grows like
−k
e(τ −2) y(1+o(1)) suggesting that distances are of order log log n/| log(τ − 2)|.
The additional factor 2 in Theorem 1.19 is due to the fact that in order for two
vertices to meet, each of their neighborhoods needs to have size at least nε for
58 Percolation and random graphs
between two uniformly chosen points along the punctured circle. Then, (Barbour
and Reinert, 2001, Theorem 3.9) states that as n → ∞, Dn (2ρ)/ log ρn converges
in probability to 1 when nρ → ∞, and that ρ(Dn − log ρn/2) converges in
distribution to a random variable T satisfying
Z ∞ −y
e dy
P(T > t) = . (1.171)
0 1 + e2t
The random variable T can also be described by
2t
W (1) W (2)
P(T > t) = E[e−e ], (1.172)
where W (1) , W (2) are two independent exponential random variables with param-
eter 1. Alternatively, it can be see that T = (G1 + G2 − G3 )/2, where G1 , G2 , G3
are three independent Gumbel distributions (see (Barbour and Reinert, 2006,
Page 1242)).
Interestingly, the method of proof of (Barbour and Reinert, 2001, Theorem
3.9) is quite close to the method of proof for Theorem 1.18. Indeed, again the
parts of the graph that can be reached in distance at most t are analyzed. Let
P1 and P2 be two uniform points along the circle, so that Dn has the same
distribution as the distance between P1 and P2 . Denote by R(1) (t) and R(2) (t)
the parts of the graph that can be reached within distance t. Then, Dn = 2Tn ,
where Tn is the first time that R(1) (t) and R(2) (t) have a non-zero intersection.
The proof then consists of showing that, up to time Tn , the processes R(1) (t) and
R(2) (t) are close to certain continuous-time branching processes, primarily due to
the fact that the probability that there are two intervals that are overlapping in
quite small. Then, W (1) and W (2) can be viewed as appropriate martingale limits
of these branching processes. In (Barbour and Reinert, 2001, Theorem 4.2), also
an extension to higher dimensions is given.
The proof was extended in (Barbour and Reinert, 2006) to deal with discrete
tori where the shortcuts also contribute one to the graphs distance, so that
distances are the usual distances on discrete graphs. For this, it was necessary
that the average number of shortcuts per vertex ρ ↓ 0, a restriction that does
not appear in (Barbour and Reinert, 2001). It would be of interest to extend the
results to the case of fixed ρ as well in the discrete setting.
A related model was considered in (Turova and Vallier, 2006). Indeed, (Turova
and Vallier, 2006) studies a mixture between subcritical percolation on a finite
cube and the Erdős-Rényi random graph. Using the methodology in (Bollobás,
Janson and Riordan, 2007), it is shown that the phase transition is similar to
the one described in Theorem 1.17. It would be of interest to verify whether the
distance results in (Bollobás, Janson and Riordan, 2007) can also be used to
prove that the distances grow like logν n, where n is the size of the graph, and
ν > 1 an appropriate constant.
A scale-free percolation network. In this section, we discuss the results in (Yu-
kich, 2006) on an infinite scale-free percolation model. Note that, for a transitive
60 Percolation and random graphs
graph with fixed degree r and percolation with a fixed percolation parameter p,
the degree of each vertex has a binomial distribution with parameters r and p.
Since r is fixed, this does not allow for a power-law degree sequence. As a result,
it is impossible to have a scale-free random graph when dealing with indepen-
dent percolation, so that we shall abandon the assumption of independence of
the different edges, while keeping the assumption of translation invariance.
The model considered in (Yukich, 2006) is on Zd , and, thus, the definition
of a scale-free graph process does not apply so literally. We adapt the definition
slightly by saying that an infinite random graph is scale-free when
pk = P(Do = k), (1.173)
where Dx is the degree of vertex x ∈ Zd and o ∈ Zd is the origin, satisfies (1.143).
This is a reasonable definition, since if let Br = [−r, r]d ∩ Zd be a cube of width
r around the origin, and denote n = (2r + 1)d , then, for each k ≥ 0,
1 X
Pk(n) = 1l{Dx =k} , (1.174)
n
x∈Br
exists, so that the model is scale free with degree power-law exponent τ (recall
(1.144)). The intuitive explanation of (1.176) is as follows. Suppose we condition
on the value of Uo = u. Then, the conditional distribution of Do given that
Uo = u is equal to
X X
Do = 1l{|x|≤min{Uo−q ,Ux−q }} = 1l{|x|≤Ux−q } . (1.177)
x∈Zd x:|x|≤u−q
Note that the random variables {1l{|x|≤Ux−q } }x∈Zd are independent Bernoulli ran-
dom variables with probability of success equal to
Random graphs 61
for some explicit constant c = c(q, d). Furthermore, the conditional variance of
Do given that Uo = u is bounded above by its conditional expectation, so that
the conditional distribution of Do given that Uo = u is highly concentrated.
We omit the detail, and merely note that this can be made precise by using
standard large deviations result. Assuming sufficient concentration, we obtain
that the probability that Do ≥ k is asymptotically equal to the probability that
U ≤ uk , where uk is determined by the equation that
−(qd−1)
E[Do |Uo = uk ] = cuk (1 + o(1)) = k, (1.180)
The result in Theorem 1.20 shows that distances in the scale-free percolation
model are much smaller than those in normal percolation models. It would be
of interest to investigate whether the limit dGq (o, x)/ log log |x| exists, and, if so,
what this limit is.
While Theorem 1.20 resembles the results in Theorem 1.19, there are a few
essential differences. First of all, Gq is an infinite graph, whereas the models con-
sidered in Theorem 1.19 are all finite. It would be of interest to extend Theorem
1.20 to the setting on finite tori, where the Euclidean norm |x − y| in (1.175)
is replaced by the Euclidean norm on the torus, and the typical distance Hn is
considered. This result is not immediate from the proof of Theorem 1.20. Sec-
ondly, in Theorems 1.18 and 1.19, it is apparent that the behavior for τ > 3 is
rather different compared to the behavior for τ ∈ (2, 3). This feature is missing
62 Percolation and random graphs
where Dv(t) denotes the degree of vertex v ∈ Vt in Gt . The m edges are connected
to vertices (y1 , . . . , ym ) conditionally independently given (Gt , xt+1 ), so that, for
all v ∈ Vt (xt+1 ),
Dv(t)
P(yi = v) = , (1.184)
max(Dt (xt+1 ), αmAr t)
while
Dt (xt+1 )
P(yi = xt+1 ) = 1 − , (1.185)
max(Dt (xt+1 ), αmAr t)
where Ar is the area of Br (u), α ≥ 0 is a parameter, and r is a radius which shall
be chosen appropriately. Similarly to the situation of geometric random graphs,
the parameter r shall depend on the size of the graph, i.e., we shall be interested
in the properties of Gn when r = rn is chosen appropriately. The main result
in (Flaxman, Frieze and Vera, 2006) is the study of the degree sequence of the
arising model. Take rn = nβ−1/2 log n, where β ∈ (0, 1/2) is a constant. Finally,
let α > 2. Then, there exists a probability distribution {pk }∞
k=m such that, whp,
where {pk }∞k=m satisfies (1.143) with τ = 1 + α ∈ (3, ∞). The precise result is in
(Flaxman, Frieze and Vera, 2006, Theorem 1(a)) and is quite a bit sharper, as
detailed concentration results are proved as well. Further results involve the proof
of connectivity of Gn and an upper bound on the diameter when r ≥ n−1/2 log n,
m ≥ K log n for some large enough K and α ≥ 0 of order O(log (n/r)). In
(Flaxman, Frieze and Vera, 2007), these results were generalized to the setting
where, instead of a unit ball, a smoother version is used.
In (Aiello, Bonato, Cooper, Janssen and Pralat, 2007), a spatial preferential
attachment model with local influence regions is studied, as a model for the
Web graph. The model is directed, but it can be easily adapted to an undirected
setting. The idea behind the model in (Aiello, Bonato, Cooper, Janssen and
Pralat, 2007) is that for normal preferential attachment models, new vertices
should be aware of the degrees of the already present vertices. In reality, it is
quite hard to observe the degrees of vertices, and, therefore, in (Aiello, Bonato,
Cooper, Janssen and Pralat, 2007), vertices instead have a region of influence
in some metric space, for example the torus [0, 1]m for some dimension m, for
which the metric equals
d(x, y) = min{kx − y + uk∞ : u ∈ {0, 1, −1}m }. (1.187)
When the new vertex arrives, it is uniformly located somewhere in the unit cube,
and it connects to each of the older vertices in which region of influence they land
independently and with fixed probability p. These regions of influence evolve as
time proceeds, in such a way that the volume of the influence region of the vertex
i at time t is equal to
A1 Di(t) + A2
R(i, t) = , (1.188)
t + A3
where now Di(t) is the in-degree of vertex i at time t, and A1 , A2 , A3 are param-
eters which are chosen such that pA1 ≤ 1. One of the main results of the paper
is that this model is a scale-free graph process. Indeed, denote
k−1
pk Y jA1 + A2
pk = , (1.189)
1 + kpA1 + pA2 j=0 1 + A2 + pA2
then (Aiello, Bonato, Cooper, Janssen and Pralat, 2007, Theorem 1.1) shows
that whp, for k ≤ (n1/8 / log n)4pA1 /(2pA1 +1) , the degree sequence of the graph
of size n satisfies (recall (1.141))
Pk(n) = pk (1 + o(1)), (1.190)
and {pk }∞k=0 satisfies (1.143) with τ = 1 + 1/(pA1 ) ∈ [2, ∞). Further results
involve the study of maximal in-degrees and the total number of edges.
For a relation between preferential attachment graphs with so-called fertility
and aging, and a geometric competition-induced growth model for networks, we
refer to (Berger, Borgs, Chayes, D’Souza and Kleinberg, 2004; Berger, Borgs,
Chayes, D’Souza and Kleinberg, 2005) and the references therein.
64 Percolation and random graphs
1.4 Acknowledgements
The work of RvdH was supported in part by Netherlands Organisation for Sci-
entific Research (NWO). I am grateful to Gordon Slade for introducing me to
the field of percolation, which has proved to be an extremely beautiful and rich
world indeed! It has always been a delight to attack percolation problems with
Gordon, and I have enjoyed this dearly. I warmly thank Gerard Hooghiemstra
for jointly taking the first steps (and then many more) in the field of random
graphs. Let’s take plenty more steps together!
REFERENCES
Aiello, W., Bonato, A, Cooper, C., Janssen, J., and Pralat, P. (Preprint (2007)).
A spatial web graph model with local influence regions. To appear in Internet
Mathematics.
Aiello, W., Chung, F., and Lu, L. (2002). Random evolution in massive graphs.
In Handbook of massive data sets, Volume 4 of Massive Comput., pp. 97–122.
Kluwer Acad. Publ., Dordrecht.
Aizenman, M. (1997). On the number of incipient spanning clusters. Nucl.
Phys. B , 485, 551–582.
Aizenman, M. and Barsky, D.J. (1987). Sharpness of the phase transition in
percolation models. Commun. Math. Phys., 108, 489–526.
Aizenman, M., Kesten, H., and Newman, C.M. (1987). Uniqueness of the infi-
nite cluster and continuity of connectivity functions for short and long range
percolation. Commun. Math. Phys., 111, 505–531.
Aizenman, M. and Newman, C.M. (1984). Tree graph inequalities and critical
behavior in percolation models. J. Stat. Phys., 36, 107–143.
Albert, R. and Barabási, A.-L. (2002). Statistical mechanics of complex net-
works. Rev. Modern Phys., 74(1), 47–97.
Alon, N. and Spencer, J. (2000). The probabilistic method (Second edn). Wiley-
Interscience Series in Discrete Mathematics and Optimization. John Wiley &
Sons, New York.
Athreya, K. and Ney, P. (1972). Branching processes. Springer-Verlag, New
York. Die Grundlehren der mathematischen Wissenschaften, Band 196.
Austin, T. L., Fagen, R. E., Penney, W. F., and Riordan, J. (1959). The number
of components in random linear graphs. Ann. Math. Statist, 30, 747–754.
Baccelli, F. and Blaszczyszyn, B. (2001). On a coverage process ranging from
the Boolean model to the Poisson-Voronoi tessellation with applications to
wireless communications. Adv. in Appl. Probab., 33(2), 293–323.
Barabási, A.-L. (2002). Linked: The New Science of Networks. Perseus Pub-
lishing, Cambridge, Massachusetts.
Barabási, A.-L. and Albert, R. (1999). Emergence of scaling in random net-
works. Science, 286(5439), 509–512.
Barbour, A. D. and Reinert, G. (2001). Small worlds. Random Structures
Algorithms, 19(1), 54–74.
Barbour, A. D. and Reinert, Gesine (2004). Correction: “Small worlds” [Ran-
dom Structures Algorithms 19 (2001), no. 1, 54–74; mr1848027]. Random
Structures Algorithms, 25(1), 115.
Barbour, A. D. and Reinert, G. (2006). Discrete small world networks. Electron.
J. Probab., 11, no. 47, 1234–1283 (electronic).
Barsky, D.J. and Aizenman, M. (1991). Percolation critical exponents under
66 References
Bollobás, B., Borgs, C., Chayes, J., and Riordan, O. (2003). Directed scale-free
graphs. In Proceedings of the Fourteenth Annual ACM-SIAM Symposium on
Discrete Algorithms (Baltimore, MD, 2003), New York, pp. 132–139. ACM.
Bollobás, B., Janson, S., and Riordan, O. (2007). The phase transition in
inhomogeneous random graphs. Random Structures Algorithms, 31(1), 3–122.
Bollobás, B. and Riordan, O. (2003a). Mathematical results on scale-free ran-
dom graphs. In Handbook of graphs and networks, pp. 1–34. Wiley-VCH,
Weinheim.
Bollobás, B. and Riordan, O. (2003b). Robustness and vulnerability of scale-free
random graphs. Internet Math., 1(1), 1–35.
Bollobás, B. and Riordan, O. (2004a). Coupling scale-free and classical random
graphs. Internet Math., 1(2), 215–225.
Bollobás, B. and Riordan, O. (2004b). The diameter of a scale-free random
graph. Combinatorica, 24(1), 5–34.
Bollobás, B. and Riordan, O. (2006a). The critical probability for random
Voronoi percolation in the plane is 1/2. Probab. Theory Related Fields, 136(3),
417–468.
Bollobás, B. and Riordan, O. (2006b). Percolation. Cambridge University Press,
New York.
Bollobás, B. and Riordan, O. (2006c). A short proof of the Harris-Kesten
theorem. Bull. London Math. Soc., 38(3), 470–484.
Bollobás, B. and Riordan, O. (2008). Percolation on random Johnson-Mehl
tessellations and related models. Probab. Theory Related Fields, 140(3-4),
319–343.
Bollobás, B., Riordan, O., Spencer, J., and Tusnády, G. (2001). The degree
sequence of a scale-free random graph process. Random Structures Algo-
rithms, 18(3), 279–290.
Borgs, C., Chayes, J., Hofstad, R. van der, Slade, G., and Spencer, J. (2005a).
Random subgraphs of finite graphs. I. The scaling window under the triangle
condition. Random Structures Algorithms, 27(2), 137–184.
Borgs, C., Chayes, J., Hofstad, R. van der, Slade, G., and Spencer, J. (2005b).
Random subgraphs of finite graphs. II. The lace expansion and the triangle
condition. Ann. Probab., 33(5), 1886–1944.
Borgs, C., Chayes, J. T., Kesten, H., and Spencer, J. (1999). Uniform bounded-
ness of critical crossing probabilities implies hyperscaling. Random Structures
Algorithms, 15(3-4), 368–413. Statistical physics methods in discrete proba-
bility, combinatorics, and theoretical computer science (Princeton, NJ, 1997).
Britton, T., Deijfen, M., and Martin-Löf, A. (2006). Generating simple random
graphs with prescribed degree distribution. J. Stat. Phys., 124(6), 1377–1397.
Broadbent, S. R. and Hammersley, J. M. (1957). Percolation processes. I. Crys-
tals and mazes. Proc. Cambridge Philos. Soc., 53, 629–641.
Burton, R. M. and Keane, M. (1989). Density and uniqueness in percolation.
Comm. Math. Phys., 121(3), 501–505.
Camia, F. (Preprint (2008)). Scaling limits of two-dimensional percolation: an
68 References
overview.
Cardy, John L. (1992). Critical percolation in finite geometries. J. Phys.
A, 25(4), L201–L206.
Chayes, J. T. and Chayes, L. (1987). On the upper critical dimension of
Bernoulli percolation. Comm. Math. Phys., 113(1), 27–48.
Chayes, J. T., Chayes, L., Grimmett, G. R., Kesten, H., and Schonmann, R. H.
(1989). The correlation length for the high-density phase of Bernoulli perco-
lation. Ann. Probab., 17(4), 1277–1302.
Chung, F. and Lu, L. (2002a). The average distances in random graphs with
given expected degrees. Proc. Natl. Acad. Sci. USA, 99(25), 15879–15882
(electronic).
Chung, F. and Lu, L. (2002b). Connected components in random graphs with
given expected degree sequences. Ann. Comb., 6(2), 125–145.
Chung, F. and Lu, L. (2003). The average distance in a random graph with
given expected degrees. Internet Math., 1(1), 91–113.
Chung, F. and Lu, L. (2006a). Complex graphs and networks, Volume 107 of
CBMS Regional Conference Series in Mathematics. Published for the Confer-
ence Board of the Mathematical Sciences, Washington, DC.
Chung, F. and Lu, L. (2006b). The volume of the giant component of a random
graph with given expected degrees. SIAM J. Discrete Math., 20, 395–411.
Chung, F., Lu, L., and Vu, V. (2004). The spectra of random graphs with given
expected degrees. Internet Math., 1(3), 257–275.
Cooper, C. and Frieze, A. (2003). A general model of web graphs. Random
Structures Algorithms, 22(3), 311–335.
Davies, P. L. (1978). The simple branching process: a note on convergence when
the mean is infinite. J. Appl. Probab., 15(3), 466–480.
Dawson, D.A. (1993). Measure-valued Markov processes. In Ecole d’Eté de
Probabilités de Saint-Flour 1991. Lecture Notes in Mathematics #1541, Berlin.
Springer.
Deijfen, M., Esker, H. van den, Hofstad, R. van der, and Hooghiemstra, G.
(Preprint (2007)). A preferential attachment model with random initial de-
grees.
Dodziuk, J. (1984). Difference equations, isoperimetric inequality and tran-
sience of certain random walks. Trans. Amer. Math. Soc., 284(2), 787–794.
Dorogovtsev, S.N. and Mendes, J.F.F. (2002). Evolution of networks. Advances
in Physics, 51, 1079–1187.
Dousse, O., Franceschetti, M., Macris, N., Meester, R., and Thiran, P. (2006).
Percolation in the signal to interference ratio graph. J. Appl. Probab., 43(2),
552–562.
Durrett, R. (1980). On the growth of one-dimensional contact processes. Ann.
Probab., 8(5), 890–907.
Durrett, R. (2007). Random graph dynamics. Cambridge Series in Statistical
and Probabilistic Mathematics. Cambridge University Press, Cambridge.
Dynkin, E. B. (1994). An introduction to branching measure-valued processes,
References 69
University Press.
Nguyen, B. G. (1987). Gap exponents for percolation processes with triangle
condition. J. Statist. Phys., 49(1-2), 235–243.
Nguyen, B.G. and Yang, W-S. (1993). Triangle condition for oriented percola-
tion in high dimensions. Ann. Probab., 21, 1809–1844.
Nguyen, B.G. and Yang, W-S. (1995). Gaussian limit for critical oriented per-
colation in high dimensions. J. Stat. Phys., 78, 841–876.
Nienhuis, B. (1984). Critical behavior of two-dimensional spin models and
charge asymmetry in the Coulomb gas. J. Statist. Phys., 34(5-6), 731–761.
Norros, I. and Reittu, H. (2006). On a conditionally Poissonian graph process.
Adv. in Appl. Probab., 38(1), 59–75.
Oliveira, R. and Spencer, J. (2005). Connectivity transitions in networks with
super-linear preferential attachment. Internet Math., 2(2), 121–163.
Penrose, M.D. (2003). Random geometric graphs, Volume 5 of Oxford Studies
in Probability. Oxford University Press, Oxford.
Perkins, E. (2002). Dawson-Watanabe superprocesses and measure-valued dif-
fusions. In Lectures on probability theory and statistics (Saint-Flour, 1999),
Volume 1781 of Lecture Notes in Math., pp. 125–324. Springer, Berlin.
Reimer, D. (2000). Proof of the van den Berg-Kesten conjecture. Combin.
Probab. Comput., 9(1), 27–32.
Rudas, A., Tóth, B., and Valkó, B. (2007). Random trees and general branching
processes. Random Structures Algorithms, 31(2), 186–202.
Russo, L. (1978). A note on percolation. Z. Wahrscheinlichkeitstheorie und
Verw. Gebiete, 43(1), 39–48.
Russo, L. (1981). On the critical percolation probabilities. Z. Wahrsch. Verw.
Gebiete, 56(2), 229–237.
Sakai, A. (2002). Hyperscaling inequalities for the contact process and oriented
percolation. J. Statist. Phys., 106(1-2), 201–211.
Schonmann, R. H. (2001). Multiplicity of phase transitions and mean-field
criticality on highly non-amenable graphs. Comm. Math. Phys., 219, 271–
322.
Schonmann, R. H. (1999). Stability of infinite clusters in supercritical percola-
tion. Probab. Theory Related Fields, 113(2), 287–300.
Schonmann, R. H. (2002). Mean-field criticality for percolation on planar non-
amenable graphs. Comm. Math. Phys., 225(3), 453–463.
Schramm, O. (2000). Scaling limits of loop-erased random walks and uniform
spanning trees. Israel J. Math., 118, 221–288.
Seymour, P. D. and Welsh, D. J. A. (1978). Percolation probabilities on the
square lattice. Ann. Discrete Math., 3, 227–245. Advances in graph theory
(Cambridge Combinatorial Conf., Trinity College, Cambridge, 1977).
Slade, G. (2006). The lace expansion and its applications, Volume 1879 of
Lecture Notes in Mathematics. Springer-Verlag, Berlin. Lectures from the
34th Summer School on Probability Theory held in Saint-Flour, July 6–24,
2004, Edited and with a foreword by Jean Picard.
74 References