Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Public Access

A Lower Bound on Cycle-Finding in Sparse Digraphs

Published: 10 October 2022 Publication History
  • Get Citation Alerts
  • Abstract

    We consider the problem of finding a cycle in a sparse directed graph G that is promised to be far from acyclic, meaning that the smallest feedback arc set, i.e., a subset of edges whose deletion results in an acyclic graph, in G is large. We prove an information-theoretic lower bound, showing that for N-vertex graphs with constant outdegree, any algorithm for this problem must make Ω̄(N5/9) queries to an adjacency list representation of G. In the language of property testing, our result is an Ω̄(N5/9) lower bound on the query complexity of one-sided algorithms for testing whether sparse digraphs with constant outdegree are far from acyclic. This is the first improvement on the Ω (√ N) lower bound, implicit in the work of Bender and Ron, which follows from a simple birthday paradox argument.

    1 Introduction

    In the current massive data era there is great interest in the abilities and limitations of sublinear time algorithms for various computational problems. In particular, in recent years a number of researchers have studied sublinear time algorithms for fundamental graph problems such as approximating the size of the minimum vertex cover [19, 24, 25, 26, 28, 31], the number of connected components [6], maximum matching [25, 31], and the minimum spanning tree weight [6, 7, 10]; counting edges [3, 13, 17], stars [1, 18], triangles [11], k-cliques [12], and arbitrary subgraphs [2]; finding forbidden minors [22, 23]; and checking k-colorability [29], bipartiteness [16], planarity [5], and more. The sublinear time regime imposes natural constraints on algorithms. For instance, a simple “needle in a haystack” lower bound argument shows that it is impossible to distinguish acyclic graphs from graphs with one or more cycles in time sublinear in the number of edges. As a result, sublinear graph algorithms typically provide either approximate guarantees on their output1 or are designed for property testing-style problems in which the input graph G is promised to satisfy some condition that allows a sublinear algorithm to succeed.2 Our results are of the second type: We prove a lower bound on the running time of algorithms for finding cycles in sparse digraphs that are promised to be not too close to acyclic.
    To motivate our inquiry, we observe that many of the most fascinating and enigmatic objects of modern scientific research, such as brains, neural networks, social networks, and the Internet, are naturally modeled as massive, sparse, directed graphs. Thus it is a compelling goal to understand the capabilities of sublinear time algorithms on such graphs. Despite this fact, although there is substantial literature on property testing in general undirected graphs (see Chapters 8, 9, and 10 of [15]), we are aware of fewer works on sublinear time algorithms or property testing on sparse directed graphs [9, 20, 21, 27]. The most directly relevant previous work that we are aware of is the early paper of Bender and Ron [4] on testing acyclicity in directed graphs, which we discuss in detail below.

    1.1 The Query Model and Promise Problem That We Consider

    Throughout this work, we consider digraphs on N vertices named \( [N]:=\lbrace 1,\ldots ,N\rbrace \) in which the outdegree of each vertex is bounded from above by a small absolute constant d. It suffices to take \( d \ge 80 \) for our main result to hold. Graphs are represented using the adjacency list model, in which a query consists of a vertex \( u \in [N] \) and an index \( i \in [d] \) . In response, the algorithm receives the \( i^{\text{th}} \) outneighbor of u or an empty string if u has fewer than i outneighbors. The query complexity of an algorithm is the maximum number of queries that it makes on any N-vertex graph.
    The algorithmic problem we consider is that of outputting a directed cycle given an input graph G. The promise that G contains at least one cycle is insufficient to allow sublinear time algorithms: for instance, if G consists of a single constant-length cycle and all other vertices are isolated, or if G consists of a single cycle of length N, \( \Omega (N) \) queries are required. Recall that a feedback arc set of a directed graph G is a subset of edges \( S \subseteq E \) where every directed cycle in G contains at least one edge in S, or equivalently, where deleting all the edges in S makes G acyclic. In both of the aforementioned examples, there are feedback arc sets of size 1. Hence, in the spirit of property testing, we consider the promise problem in which the input graph G is promised to be \( \varepsilon \) -far from acyclic, i.e., where the smallest feedback arc set of G has size at least \( \varepsilon d N \) .
    As we discuss later in item (1) of Section 9, the promise that G is \( \varepsilon \) -far from acyclic ensures that G must contain very short cycles (polylogarithmic in N) [14], so this promise eliminates the concern that merely outputting a directed cycle necessitates \( \Omega (N) \) runtime. However, it is far from clear how many queries may be required to find a cycle in sparse directed graphs that are \( \varepsilon \) -far from acyclic. This question was implicitly considered by Bender and Ron: in [4] they gave an \( \Omega (N^{1/3}) \) -query lower bound on property testing algorithms for testing whether a bounded-degree digraph is acyclic versus \( \varepsilon \) -far from acyclic with two-sided error in the adjacency list model. Implicit in the proof of their \( \Omega (N^{1/3}) \) lower bound is an \( \Omega (N^{1/2}) \) lower bound for one-sided testers, or equivalently, for algorithms that find a directed cycle in far-from-acyclic bounded-degree digraphs. We give a proof sketch of this lower bound in Section 3.1; as we explain there, their \( \Omega (N^{1/2}) \) lower bound is based on a simple birthday paradox argument but such an argument cannot succeed in obtaining an \( \omega (N^{1/2}) \) lower bound. We note that Bender and Ron [4] state as an explicit goal for future work the problem of improving their lower bound, and that acyclicity testing in bounded-degree digraphs is listed as “Open Problem #41” on the website sublinear.info.3
    The analogous testing problem for undirected graphs has known optimal algorithms for both one-sided and two-sided error. Unlike in the case of directed graphs, where the rich family of directed acyclic graphs can vary greatly in the number of edges, the only acyclic undirected graphs are forests. As a result, the size of the minimum “feedback edge set” in an undirected graph is a function of just the edge and vertex counts of the components. The two-sided algorithm of Goldreich and Ron [16] is centered around estimating these edge densities and has query complexity independent of the number of vertices. Meanwhile, the one-sided algorithm of Czumaj et al. [8] finds a cycle with high probability using \( \widetilde{O}(N^{1/2}) \) queries, matching the lower bound of [16] up to logarithmic factors.

    1.2 Our Result: An Ω̄(N5/9)-query Lower Bound

    Our main result is a proof that any randomized algorithm under the adjacency list query model must make \( \widetilde{\Omega }(N^{5/9}) \) queries to find a cycle in a sparse N-vertex digraph that is \( \varepsilon \) -far from acyclic. The lower bound holds even if \( \varepsilon \) is a fixed constant. In more detail, our main result is the following:
    Theorem 1 (Main Theorem).
    Let \( d,\varepsilon \) be fixed constants with \( d \ge 80 \) and \( \varepsilon \le 1/60 \) , and let G be an arbitrary digraph, promised to be \( \varepsilon \) -far from acyclic and with outdegree bounded above by d. Any algorithm that, given query access to the adjacency list representation of G, outputs a directed cycle in G with constant probability must make \( \widetilde{\Omega }(N^{5/9}) \) queries.
    We give a detailed discussion of our techniques in Section 3; as explained there, the arguments underlying our lower bound are significantly more involved, both conceptually and technically, than the \( \Omega (N^{1/2}) \) lower bound of [4] for the same problem.

    2 Preliminaries

    A directed graph (or digraph) \( G = (V, E) \) consists of a set V of vertices and a set E of directed edges. Each edge directed from u to v is represented by the pair \( (u,v) \) . The outdegree (resp. indegree) of a vertex u is the number of edges \( (u,v) \) (resp. \( (v,u) \) ) between u and an outneighbor (resp. inneighbor) \( v \in V \) . We say a digraph has outdegree bounded by d if every vertex has outdegree at most d. A digraph is \( \varepsilon \) -far from acyclic if the minimum feedback arc set has size \( \varepsilon d N \) (that is, at least \( \varepsilon d N \) edges must be removed to make G acyclic). An out-tree is an acyclic digraph in which there exists a unique directed path from a root vertex to every other vertex. A vertex in an out-tree with no outgoing edge is called a leaf; otherwise it is called an internal vertex. An out-tree is said to have degree d if every internal vertex has outdegree exactly d.
    Given a positive integer n, we write \( [n] \) to denote \( \lbrace 1,\ldots ,n\rbrace \) . For fixed d and \( \varepsilon \) , we consider the problem of finding a cycle in a digraph \( G=([N],E) \) , with outdegree bounded by d, that is \( \varepsilon \) -far from acyclic. Algorithms may query the adjacency list representation of G as follows. We assume the algorithm knows N. A query consists of a vertex \( u \in [N] \) and an index \( i \in [d] \) . In response, the algorithm receives the \( i^{\text{th}} \) outneighbor of u or an empty string if u has fewer than i neighbors. For convenience, we simplify the adjacency list query model to the \( {vertex \ query} \) model, in which the algorithm simply queries a vertex u and receives an ordered list containing all outneighbors of u. Clearly, algorithms on digraphs with maximum outdegree at most d under the vertex-query model can be implemented in the adjacency list model by increasing the number of queries by a factor of d, and thus asymptotic lower bounds in the vertex-query model also hold in the adjacency list model.
    Throughout the paper, random variables are indicated by a bold font such as \( {\boldsymbol {G}} \) and distributions are indicated by blackboard bold such as \( \mathbb {G} \) .

    3 Our Techniques

    As is standard in property testing, we employ Yao’s principle [30] to prove our lower bound. By this principle, to prove Theorem 1 it suffices to define a probability distribution over N-vertex digraphs with outdegree bounded by d and argue that
    (1)
    A random \( {\boldsymbol {G}} \) drawn from this distribution is \( \varepsilon \) -far from acyclic with probability \( 1-o_N(1) \) .
    (2)
    Any deterministic algorithm \( \mathcal {A} \) that makes
    \( \begin{equation*} {\overline{Q}}:=\frac{N^{5/9}}{\log N} \end{equation*} \)
    queries to \( {\boldsymbol {G}} \) finds a cycle with probability \( o_N(1) \) .
    In this section we first present a simple distribution from [4] and sketch the \( \Omega (N^{1/2}) \) lower bound for this distribution that is implicit in the arguments of [4]. We then outline the difficulty inherent in proving an asymptotically better lower bound, informally describe the distribution \( \mathbb {BR} \) that we use for Theorem 1, and outline our proof of the theorem.

    3.1 A Simple Ω (N1/2) Lower Bound Due to Bender and Ron

    The distribution over sparse digraphs we now describe corresponds to the distribution \( \mathscr{G}_2 \) defined in Section 4 of [4]; we denote this distribution by \( \mathbb {BR}_{\mathrm{simple}} := \mathbb {BR}_{\mathrm{simple}}(N, d). \) A graph \( {\boldsymbol {G}} \) drawn from \( \mathbb {BR}_{\mathrm{simple}} \) is generated by randomly partitioning the N vertices \( \lbrace 1,\dots ,N\rbrace \) into two equal-size subsets \( \boldsymbol {S}_1 \) and \( \boldsymbol {S}_2 \) and taking d random directed perfect matchings from \( \boldsymbol {S}_1 \) to \( \boldsymbol {S}_2 \) and d random directed perfect matchings from \( \boldsymbol {S}_2 \) to \( \boldsymbol {S}_1 \) as the edges of \( {\boldsymbol {G}}. \)
    A straightforward probabilistic analysis (see Lemma 5 of [4]) shows that for any constant \( d \ge 128 \) , a random graph \( {\boldsymbol {G}} \sim \mathbb {BR}_{\mathrm{simple}} \) is \( \varepsilon \) -far from acyclic for \( \varepsilon =1/16 \) . To complete the lower bound, it remains to argue that any deterministic algorithm \( \mathcal {A} \) that makes \( o(N^{1/2}) \) queries finds a directed cycle in \( {\boldsymbol {G}} \sim \mathbb {BR}_{\mathrm{simple}} \) with probability \( o_N(1) \) . This follows from the following stronger property: with probability \( 1-o_N(1) \) over the choice of \( {\boldsymbol {G}} \sim \mathbb {BR}_{\mathrm{simple}} \) , no deterministic algorithm that makes \( o(N^{1/2}) \) queries receives in response to a query a vertex it has previously observed, either as input to or output from a query.4 This property follows from a standard birthday paradox type argument, i.e., the fact that a sequence of \( o(N^{1/2}) \) uniform samples from an N-element set samples the same element twice with probability \( o_N(1) \) .

    3.2 A Challenge in Going Beyond N1/2 Many Queries

    Another birthday paradox type argument demonstrates that a random walk in \( {\boldsymbol {G}} \sim \mathbb {BR}_{\mathrm{simple}} \) will collide with itself in \( O(N^{1/2}) \) steps with high probability, thus yielding a cycle. Hence, a different construction must be considered to obtain an \( \omega (N^{1/2}) \) lower bound.
    The essence of the simple \( \Omega (N^{1/2}) \) lower bound is that with high probability, the algorithm receives no “useful” information about the underlying graph: each of \( o(N^{1/2}) \) many queries yields an answer that is uniform over all previously unseen vertices. Unfortunately, this property does not hold for algorithms that make \( \omega (N^{1/2}) \) queries. For example, an algorithm that repeatedly queries \( (u,i) \) pairs drawn uniformly at random from \( [N]\times [d] \) would observe i.i.d. draws from some distribution over \( [N] \) . Because \( \omega (N^{1/2}) \) i.i.d. draws from any distribution supported on at most N elements will result in \( \omega _N(1) \) collisions with high probability, any argument establishing an \( \omega (N^{1/2}) \) lower bound must contend with the nontrivial information that algorithms receive about the unknown underlying graph through collisions. Indeed, the central difficulty in proving an \( \omega (N^{1/2}) \) lower bound is showing that no algorithm can gain enough information from induced collisions to find a cycle.

    3.3 Our Construction and a Sketch of Our Main Ideas

    We now give an informal description of the distribution \( \mathbb {BR}:= \mathbb {BR}(N,d) \) that we analyze (a detailed description is given in Section 4). This distribution is a modified version of a construction proposed by Bender and Ron in [4].
    Each graph in the support of \( \mathbb {BR} \) has 3N vertices, and each vertex has outdegree either d or 0. A graph \( {\boldsymbol {G}} \) drawn from \( \mathbb {BR} \) is obtained as follows: N vertices are randomly selected and designated as blue vertices, and the remaining 2N vertices are designated as red vertices. Red vertices are randomly partitioned into L many layers \( R_1,\dots ,R_L \) , each containing \( W=2N/L \) vertices.5 Each blue vertex is assigned d outneighbors by choosing each one uniformly at random from the blue vertices and the first half of the layers of the red vertices. Each red vertex in layer \( R_i \) ( \( i \lt L \) ) is assigned d outneighbors by choosing each one uniformly from the W vertices in \( R_{i+1}. \) For a visual example, refer to Figure 1. A straightforward probabilistic argument (given in Section 4.2) shows that with probability \( 1-o_N(1) \) a random \( {\boldsymbol {G}} \sim \mathbb {BR} \) is \( \varepsilon \) -far from acyclic, so the main challenge is to show that it is hard to find a directed cycle in a graph drawn from this distribution.
    Fig. 1.
    Fig. 1. Cartoon of a random graph \( {\boldsymbol {G}} \sim \mathbb {BR} \) .
    We give some intuition behind the construction of graphs in \( \mathbb {BR} \) . Note that every cycle in \( {\boldsymbol {G}} \) consists entirely of blue vertices. Thus, a cycle-finding algorithm may want to “avoid wandering into the red region.” This, however, is difficult to do because the local neighborhood of a typical vertex “looks the same” whether it is blue or red (note that an algorithm under the adjacency list model of course never receives explicit information about whether any particular vertex is blue or red). For example, the simple random walk approach sketched at the beginning of the previous subsection will not work for \( {\boldsymbol {G}} \sim \mathbb {BR} \) : even if the random walk starts at a blue vertex, after \( O(1) \) steps on average it will reach a red vertex and will have no chance of completing a cycle. Given that an algorithm needs \( \Omega (N^{1/2}) \) queries to find a cycle even if it is given the set of blue vertices (since the blue part of \( {\boldsymbol {G}}\sim \mathbb {BR} \) is very similar to graphs drawn from \( \mathbb {BR}_{\mathrm{simple}} \) described in Section 3.1), it is natural to hope for an \( \omega (N^{1/2}) \) lower bound using the distribution \( \mathbb {BR} \) .
    There are two challenges in obtaining an \( \omega (N^{1/2}) \) lower bound using \( \mathbb {BR} \) . First, as discussed in the previous subsection (which applies not only to \( \mathbb {BR} \) but to any distribution), an \( \omega (N^{1/2}) \) -query algorithm may experience many collisions and hence potentially obtain a significant amount of information about \( {\boldsymbol {G}} \) . The second challenge is specific to \( \mathbb {BR} \) . Despite the intuition, “wandering into the red region” may actually provide useful information about \( {\boldsymbol {G}} \) when done strategically (see Section 8 for two attacks on \( \mathbb {BR} \) based on exploring the red region; they together imply that one cannot hope to obtain a lower bound better than \( N^{13/18} \) using \( \mathbb {BR} \) ). Given that many algorithmic strategies are possible, how can one argue that every algorithm that does not make too many queries is unlikely to find a cycle?
    To explain the intuition that underlies our lower bound, we first note that for a query on vertex u to reveal a cycle, it must be the case that u is blue and there is a directed path from one of its outneighbors to u in the current “knowledge graph” of the algorithm (where the knowledge graph consists of all edges that have been found so far and v is an ancestor of u if it has a directed path to u). As a result, we focus on the maximum number of ancestors among all blue vertices in the current knowledge graph because the probability that an algorithm discovers a cycle when it queries a vertex is proportional to its number of ancestors in the knowledge graph. Our proof, at a high level, shows that this crucial quantity cannot grow too fast.
    A key notion behind our analysis is the division of a sequence of queries made by an algorithm into distinct epochs. Roughly speaking, an epoch ends either when a collision occurs (i.e., one of the outneighbors of the vertex queried is a vertex that the algorithm has seen before, either as a query vertex or as an outneighbor of a query vertex), or when “too many” queries have been made since the end of the previous epoch. We introduce the notion of epochs in Section 5 and bound the number of epochs that occur in the execution of any algorithm that makes at most \( {\overline{Q}} \) queries (Lemma 2). We also bound the number of blue surprise epochs: these are epochs that end because the vertex u queried is blue and has a blue outneighbor v that the algorithm has seen before (Lemma 3). We pay special attention to such epochs because with the discovery of \( (u,v) \) , all ancestors of u become ancestors of v and the number of ancestors of v may grow rapidly.
    Next, in Section 6 we show that during an epoch of any algorithm, regardless of outcomes of previous epochs, the vertices queried are unlikely to contain a path of blue vertices of length more than \( 4 \log N \) . We do so by analyzing the information that an algorithm has about the connected components of the knowledge graph at any point in its execution, and arguing that the distribution of colors of unqueried children of the knowledge graph is close to a “naive distribution” against which no algorithm can succeed in constructing a long blue path with high probability. We use this argument to prove Lemma 4, which is at the heart of our lower bound argument. In particular, Lemma 4 implies that during an epoch that is not a blue surprise epoch (or during a blue surprise epoch but ignoring the blue-blue collision edge found at the end of the epoch), the maximum number of ancestors of blue vertices in the knowledge graph can increase by no more than \( 4\log N \) .
    Finally, in Section 7, we combine Lemmas 2, 3, and 4 to bound the maximum number of ancestors of blue vertices in its knowledge graph during the execution of any \( {\overline{Q}} \) -query algorithm on \( {\boldsymbol {G}}\sim \mathbb {BR} \) . This is used to show that every such algorithm finds a cycle in \( {\boldsymbol {G}}\sim \mathbb {BR} \) with probability \( o_N(1) \) .
    To simplify the presentation, we introduce in Section 5.1 an augmented query model, called the color revelation model, in which more information is provided to the algorithm than in the standard model. Specifically, at the end of each epoch the query algorithm is provided with the color of every vertex it has previously seen. All our results discussed above are proved under this model and our lower bound trivially carries over to the standard model since any algorithm under the latter can be simulated under the color revelation model by simply ignoring the additional information.

    4 The Bender-Ron Graphs

    In this section we formally describe the distribution \( \mathbb {BR}:= \mathbb {BR}(N,d) \) and prove, in Section 4.2, that \( {\boldsymbol {G}}\sim \mathbb {BR} \) is \( 1/60 \) -far from acyclic with probability \( 1-o_N(1) \) when \( d\ge 80 \) . Theorem 1 follows from the next theorem which we prove across Sections 5 through 7:
    Theorem 1.
    Let d be a constant with \( d\ge 80 \) . Let \( \mathcal {A} \) be any \( {\overline{Q}} \) -query deterministic algorithm that operates on graphs in the support of \( \mathbb {BR} \) under the vertex-query model, where \( {\overline{Q}}:= N^{5/9} / \log N \) . Then the probability of \( \mathcal {A} \) finding a cycle in \( {\boldsymbol {G}}\sim \mathbb {BR} \) is \( o_N(1) \) .

    4.1 The Distribution

    Let \( L := (2N)^{2/9} \) and \( W := 2N/L = (2N)^{7/9} \) be two parameters indicating the number of red layers and the width of each red layer, respectively.6 We refer to a map from a subset of \( [3N] \) to \( L+1 \) colors \( \lbrace \text{blue},\text{red}_1,\ldots ,\text{red}_L\rbrace \) as a coloring.
    A digraph \( {\boldsymbol {G}}\sim \mathbb {BR} \) over the vertex set \( [3N] \) is generated by the following randomized procedure:
    (1)
    Let \( \mathbb {U} \) be the uniform distribution over all colorings \( C:[3N]\rightarrow \lbrace \text{blue},\text{red}_1,\ldots ,\text{red}_L\rbrace \) such that N vertices are colored \( \text{blue} \) and W vertices are colored \( \text{red}_i \) for each \( i\in [L] \) . The procedure starts by drawing a coloring \( \boldsymbol {C}\sim \mathbb {U} \) . Naturally we refer to vertices in \( \mathbf {B} \) as blue vertices and vertices in \( \mathbf {R}_1\cup \cdots \cup \mathbf {R}_L \) as red vertices according to \( \boldsymbol {C} \) . We view \( \mathbf {R}_1,\ldots ,\mathbf {R}_L \) as L layers of red vertices and refer to vertices in \( \mathbf {R}_i \) as red vertices in the \( i^{\text{th}} \) layer (see Figure 1).
    (2)
    For each blue vertex \( u\in \mathbf {B} \) , create its adjacency list by drawing a sequence of d vertices without replacement from the following set of \( (N-1)+LW/2=2N-1 \) vertices:
    \( \begin{equation*} \Big (\mathbf {B}\setminus \lbrace u\rbrace \Big) \cup \bigcup _{i=1}^{L/2} \mathbf {R}_i. \end{equation*} \)
    Thus, a blue vertex has d distinct outneighbors from \( \mathbf {B} \) and the top \( L/2 \) layers of red vertices.
    (3)
    For each red vertex in \( \mathbf {R}_i \) , \( 1 \le i \lt L \) , create its adjacency list by drawing a sequence of d vertices without replacement from \( \mathbf {R}_{i+1} \) . Thus, each red vertex (other than those in the bottom layer \( \mathbf {R}_L \) ) has d distinct outneighbors in the next layer. Finally, set the adjacency list of each vertex in \( \mathbf {R}_L \) to be empty. This finishes the construction of \( {\boldsymbol {G}} \) . Note that every vertex in \( {\boldsymbol {G}} \) has out-degree either d or 0 so \( {\boldsymbol {G}} \) is a bounded-outdegree-d digraph as promised.
    We refer to graphs in the support of \( \mathbb {BR} \) as Bender-Ron graphs, since these graphs are inspired by a construction that was proposed (but not analyzed) in [4]. Figure 1 illustrates To facilitate our proof of Theorem 2 later, in addition we introduce \( \mathbb {BR}^* \) to denote the distribution of \( (\boldsymbol {C},{\boldsymbol {G}}) \) generated by the procedure above (so the marginal distribution of \( {\boldsymbol {G}} \) in \( \mathbb {BR}^* \) is the same as \( \mathbb {BR} \) ).
    We record the following property that is trivial from the construction:
    Property 1.
    Let \( (C,G) \) be a pair in the support of \( \mathbb {BR}^* \) and let \( (u,v) \) be an edge in G. Then either (1) \( C(u)=C(v)=\text{blue} \) (a \( \text{blue}\rightarrow \text{blue} \) edge), (2) \( C(u)=\text{blue} \) and \( C(v)=\text{red}_i \) for some \( i\le L/2 \) (a \( \text{blue}\rightarrow \text{red} \) edge), or (3) \( C(u)=\text{red}_i \) and \( C(v)=\text{red}_{i+1} \) for some \( i\lt L \) (a \( \text{red}\rightarrow \text{red} \) edge).
    Moreover, if a vertex u has no outneighbor, then we must have \( C(u)=\text{red}_L \) .

    4.2 Almost All Bender-Ron Graphs Are Far From Acyclic

    It is clear from the construction that no red vertex can participate in a cycle, but intuitively the \( \text{blue}\rightarrow \text{blue} \) edges will result in many cycles in the blue part of the graph. To make this intuition precise, we utilize some standard facts about feedback arc sets. The following claim is folklore and we include its proof for completeness:
    Claim 1.
    An N-vertex digraph \( G=(V,E) \) is \( \varepsilon \) -far from acyclic if and only if for every (bijective) vertex ordering \( \pi : V \rightarrow \lbrace 1,\ldots\,,N\rbrace \) , the number of “backedges” (i.e. directed edges \( (u,v) \) such that \( \pi (u) \gt \pi (v) \) ) is at least \( \varepsilon dN \) .
    Proof.
    We prove the contrapositive in both directions: ( \( \Rightarrow \) ) Let \( \pi \) be an ordering for which the number of backedges is less than \( \varepsilon dN \) . Deleting all those backedges leaves an acyclic graph, showing that the graph is \( \varepsilon \) -close to acyclic. ( \( \Leftarrow \) ) If G is \( \varepsilon \) -close to acyclic, there is a feedback arc set with fewer than \( \varepsilon dN \) edges. After deleting those edges, we can find a topological sort of the resulting acyclic graph. The ordering resulting from the topological sort has exactly the feedback arc set as its backedges.□
    A partition \( (V_1, V_2) \) of a vertex set V is said to be balanced if \( |V_1| = |V_2| \) . We will use the following consequence to bound the distance to acyclicity of the blue subgraph of \( {\boldsymbol {G}} \) :
    Claim 2.
    Let \( G=(V,E) \) be an N-vertex digraph. Suppose that for all balanced partitions \( (V_1,V_2) \) of V, the number of directed edges from \( V_1 \) to \( V_2 \) is at least \( \varepsilon d N \) . Then G is \( \varepsilon \) -far from acyclic.
    Proof.
    Every ordering of vertices \( \pi \) induces a balanced partition \( (V_1,V_2) \) by taking \( V_2 \) as the first \( N/2 \) vertices in \( \pi \) and \( V_1 \) as the last \( N/2 \) vertices in \( \pi \) . Then all edges from \( V_1 \) to \( V_2 \) are backedges with respect to \( \pi \) . The result follows from Claim 1.□
    Lemma 1 (𝔹ℝ-graphs Are Far From Acyclic)
    Let \( d \ge 80 \) be a constant. Then a random digraph \( {\boldsymbol {G}}\sim \mathbb {BR} \) is \( 1/60 \) -far from acyclic with probability \( 1-o_N(1) \) .
    Proof.
    It suffices to show that, after fixing some coloring C, a random graph \( {\boldsymbol {G}} \) drawn using steps (2) and (3) described above is far from acyclic with high probability. To this end, we assume without loss of generality that the blue vertices in C are \( [N] \) . We focus on the subgraph of \( {\boldsymbol {G}} \) induced by the blue vertices \( [N] \) , which we refer to as the blue subgraph.
    Fix a balanced partition \( (V_1,V_2) \) of the blue vertices \( [N] \) . We show below that the number of edges from \( V_1 \) to \( V_2 \) in \( {\boldsymbol {G}} \) is at least \( dN/20 \) with probability \( 1-\exp ({- N}) \) . It follows from a union bound over all balanced partitions that with probability \( 1-o_N(1) \) , the number of edges one needs to delete to make \( {\boldsymbol {G}} \) acyclic is at least \( dN/20 \) .
    To bound the number of edges in \( {\boldsymbol {G}} \) from \( V_1 \) to \( V_2 \) , we go through vertices in \( V_1 \) one by one and for each vertex \( u\in V_1 \) , draw a sequence of d outneighbors without replacement from a set of \( 2N-1 \) vertices which contains \( V_2 \) . For each of these \( dN/2 \) many rounds and for any outcomes in previous rounds, the probability of gaining a directed edge from \( V_1 \) to \( V_2 \) is at least
    \( \begin{equation*} \frac{(N/2)-(d-1)}{2N-1-(d-1)} \ge \frac{1}{5} \end{equation*} \)
    when N is sufficiently large, so the expected number of edges is at least \( (dN/2)\cdot (1/5)=dN/10 \) . It follows from a Chernoff bound (and a standard coupling argument) that the probability of having fewer than \( dN/20 \) edges is at most
    \( \begin{equation*} \exp ({-(dN/10)(1/2)^2(1/2)}) = \exp ({-dN/80}) \le \exp (-N), \end{equation*} \)
    when \( d\ge 80 \) . With a union bound over the at most \( 2^N \) many balanced partitions, we conclude that \( {\boldsymbol {G}} \) has at least \( dN/20 \) edges from \( V_1 \) to \( V_2 \) in all balanced partitions \( (V_1,V_2) \) of \( [N] \) with probability at least \( 1-\exp (-N)\cdot 2^N=1-o_N(1) \) . Thus the blue subgraph is \( (1/20) \) -far from acyclic with probability \( 1-o_N(1) \) . Because the total number of vertices is 3N, after lifting back to the original graph we have that \( {\boldsymbol {G}} \) is \( (1/60) \) -far from acyclic with probability \( 1-o_N(1) \) .□

    5 Epochs and Color Revelation

    The goal of the rest of the paper is to prove Theorem 2. Recall that under the vertex-query model, each time an algorithm queries a vertex \( u\in [3N] \) it receives as its answer an ordered list \( a=(v_1,\ldots ,v_\ell) \) containing the outneighbors of u. We assume without loss of generality that the algorithm never queries the same vertex twice. For graphs in the support of \( \mathbb {BR} \) we know that the answer to each query is either an ordered list \( (v_1,\ldots ,v_d) \) of d distinct vertices different from u or the empty list. This leads to the following definition of query histories.
    Definition 1 (Query Histories).
    A query history H is an ordered tuple \( ((u_1,a_1),\ldots ,(u_q,a_q)) \) for some \( q\ge 0 \) such that \( u_1,\ldots ,u_q \) are distinct vertices in \( [3N] \) and each \( a_i \) is either a list of d distinct vertices different from \( u_i \) or the empty list. We refer to q as the length of H, and H as the empty history when \( q=0 \) .
    Each query history \( H=((u_1,a_1),\ldots ,(u_q,a_q)) \) uniquely determines a knowledge graph, denoted \( \mathsf {KG}(H) \) , which summarizes the information about the underlying graph contained in H: The vertex set of \( \mathsf {KG}(H) \) , denoted \( \mathsf {VKG}(H) \) , consists of all vertices that appear in H (i.e., every \( u_i \) and every vertex v in \( a_i \) for some \( i\in [q] \) ); \( \mathsf {KG}(H) \) contains a directed edge \( (u,v) \) if \( u=u_i \) and v appears in \( a_i \) for some \( i\in [q] \) . Note that each vertex in \( \mathsf {KG}(H) \) has outdegree either d or 0, and every vertex with outdegree d is queried in H. On the other hand, a vertex u with outdegree 0 has two cases: Either u is queried in H and the answer a is empty, in which case we refer to u as a sink in \( \mathsf {KG}(H) \) , or u is discovered as an outneighbor of some vertex queried in H but itself is never queried in H.
    To prove Theorem 2, we introduce the notion of epochs and a new query model called the color revelation model in Section 5.1. In addition to receiving the adjacency list of the vertex queried, an algorithm under the color revelation model receives additional information about colors of vertices in the current knowledge graph at the end of each epoch. In the rest of the paper we show that, under the color revelation model, any \( {\overline{Q}} \) -query deterministic algorithm finds a cycle in \( {\boldsymbol {G}}\sim \mathbb {BR} \) with probability \( o_N(1) \) (see the exact statement in Theorem 4). Theorem 2 follows from Theorem 4 trivially because the color revelation model is no harder than the vertex-query model: any algorithm under the vertex-query model can be simulated under the color revelation model by simply ignoring the additional information.

    5.1 The Color Revelation Model

    Let \( H=((u_1,a_1),\ldots ,(u_q,a_q)) \) be a query history for some \( q\ge 0 \) ; we write \( H_i \) to denote its i-prefix \( ((u_1,a_1),\ldots ,(u_i,a_i)) \) . We say the \( k^{th} \) query \( (u_k,a_k) \) is a surprise in H if \( a_k \) contains a vertex that appears in \( \mathsf {VKG}(H_{k-1}) \) . Otherwise, we refer to \( (u_k,a_k) \) as surprise-free.
    We now describe the color revelation model, which provides additional power to the query algorithm by revealing the colors of vertices in previous epochs for free. Although this augmentation makes the task of cycle-finding easier, it also makes it easier to prove lower bounds. Formally, the oracle now contains a pair \( (C,G) \) in the support of \( \mathbb {BR}^* \) , instead of just a Bender-Ron graph G as in the vertex-query model. The oracle uses C to reveal to the algorithm colors of certain vertices. (In general, a coloring C is not uniquely determined by a Bender-Ron graph G.)
    Under the color revelation model, an algorithm \( \mathcal {A} \) maintains a triple \( (H,\mathcal {E},P) \) , where
    (1)
    H is the current query history, updated after each query as in the vertex-query model;
    (2)
    \( \mathcal {E}=(E_1,\ldots ,E_\ell) \) for some \( \ell \ge 1 \) is a decomposition of H into epochs, where each epoch \( E_i \) is by itself a query history and \( H=E_1\circ \cdots \circ E_\ell \) ; and
    (3)
    Letting \( H^{\prime }=E_1\circ \cdots \circ E_{\ell -1} \) , P is a coloring map from \( \mathsf {VKG}(H^{\prime }) \) to \( \lbrace \text{blue}, \text{red}_1,\ldots ,\text{red}_L\rbrace \) .
    Initially, H and \( E_1 \) are empty and \( \mathcal {E}= (E_1) \) . We refer to the final epoch \( E_\ell \) as the current epoch. For clarity, we use symbols P and S to denote partial colorings over subsets of \( [3N] \) and use C to denote a full coloring over the set \( [3N] \) .
    Let \( (H,\mathcal {E}, P) \) denote the current triple maintained by an algorithm \( \mathcal {A} \) . Under the color revelation model, the next round proceeds as follows:
    (1)
    As in the vertex-query model, \( \mathcal {A} \) queries a vertex u, receives an ordered list a containing the outneighbors of u in G, and concatenates \( (u,a) \) to H and \( E_\ell \) .
    (2)
    The current epoch ends if \( (u,a) \) is a surprise in H or \( |E_\ell | = L/2 \) . In this case:
    (1)
    \( \mathcal {A} \) learns colors of vertices in the current epoch: P is extended so that \( P(u)=C(u) \) for every \( u\in \mathsf {VKG}(H) \) .
    (2)
    A new epoch begins: An empty epoch \( E_{\ell +1} \) is appended to \( \mathcal {E} \) .
    Note that \( \mathcal {E} \) can be reconstructed from H by reading H serially and recording the end of an epoch if a surprise occurs or the length of the epoch reaches \( L/2 \) . Thus \( \mathcal {A} \) needs only to maintain the pair \( (H,P) \) instead of the triple \( (H,\mathcal {E},P) \) . We refer to \( \mathcal {E} \) as the epoch decomposition of H.
    Next we introduce the notion of valid knowledge pairs.
    Definition 2 (Valid Knowledge Pairs).
    A pair \( (H,P) \) is called a valid knowledge pair if
    \( H=((u_1,a_1),\ldots ,(u_q,a_q)) \) is a query history for some \( q\ge 0 \) and P is a coloring map over \( \mathsf {VKG}(H^{\prime }) \) , where \( \mathcal {E}=(E_1,\ldots ,E_\ell) \) is the epoch decomposition of H and \( H^{\prime }=E_1\circ \cdots \circ E_{\ell -1} \) ;
    There exists a pair \( (C,G) \) in the support of \( \mathbb {BR}^* \) such that C is an extension of P and G is consistent with H, i.e., \( a_i \) is the adjacency list of \( u_i \) in G for every \( i\in [q] \) .
    Given a valid knowledge pair \( (H,P) \) we use \( \mathbb {BR}^*(H,P) \) to denote the distribution of \( (\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^* \) conditioning on \( \boldsymbol {C} \) being an extension of P and \( {\boldsymbol {G}} \) being consistent with H.
    Note that the pair \( (H,P) \) maintained by an algorithm under the color revelation model is always valid by definition. From now on we consider a deterministic query algorithm \( \mathcal {A} \) under the color revelation model as a map from valid knowledge pairs to vertices so that \( u=A(H,P) \) is the next vertex that is queried. Theorem 2 follows directly from the following statement in the color revelation model:
    Theorem 3.
    Let d be a constant with \( d\ge 80 \) , and let \( \mathcal {A} \) be a \( {\overline{Q}} \) -query deterministic algorithm that works on pairs in the support of \( \mathbb {BR}^* \) under the color revelation model, where \( {\overline{Q}}=N^{5/9}/\log N \) . Then the probability of \( \mathcal {A} \) finding a cycle in \( (\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^* \) is \( o_N(1) \) .

    5.2 Epoch Bounds

    Let \( (H,P) \) be a valid knowledge pair and let \( \mathcal {E}=(E_1,\ldots ,E_\ell) \) be the epoch decomposition of the query history H. We refer to an epoch \( E_i \) , \( i\lt \ell \) , as a surprise epoch if its last query is a surprise in H; otherwise \( E_i \) has length \( L/2 \) and ends by timeout. A surprise epoch \( E_i \) is a blue surprise epoch if the last vertex queried in \( E_i \) is blue in P.
    We begin our proof of Theorem 4 by proving upper bounds on the number of epochs and blue surprise epochs that occur during the execution of a Q-query algorithm under the color revelation model.
    Lemma 2 (Epoch Bound).
    There exists a constant \( c_1 \) such that for any algorithm that makes Q queries, we have
    \( \begin{equation} \mathop {{\bf Pr}}_{(\boldsymbol {C},{\boldsymbol {G}}) \sim \mathbb {BR}^*}\left[\hspace{1.42271pt}\text{more than $c_1\left(\frac{Q^2}{W} + \frac{Q}{L}\right)$ epochs occur}\hspace{2.27626pt} \right] \le \exp \left(-\Omega \left(\frac{Q^2}{W}\right)\right). \end{equation} \)
    (1)
    Proof.
    Let \( \mathcal {A} \) be an algorithm that makes Q queries. Since each epoch is either a surprise epoch or ends by timeout, the number of epochs which take place when running \( \mathcal {A} \) on a pair \( (C,G) \) in the support of \( \mathbb {BR}^* \) is bounded from above by the number of surprise queries plus \( 2Q/L \) . It suffices to show that the probability of \( \mathcal {A} \) observing more than \( c_1(Q^2/W) \) many surprises when running on \( (\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^* \) is at most \( \exp (-\Omega (Q^2/W)) \) .
    For this purpose we fix a valid knowledge pair \( (H,P) \) and let \( u=\mathcal {A}(H,P) \) be the vertex that \( \mathcal {A} \) queries next. Below we upper bound the probability of u being a surprise by \( O(Q/W) \) when \( \mathcal {A} \) runs on \( (\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^*(H,P) \) . Since u has not been queried before, a key observation is that, if we fix any coloring C in the support of \( \mathbb {BR}^*(H,P) \) and condition the randomly drawn colored graph \( (\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^*(H,P) \) on \( \boldsymbol {C}=C \) , the adjacency list of u will be distributed as follows: if \( C(u)=\text{blue} \) , then each of its d outneighbors is drawn without replacement from vertices of color \( \text{blue} \) in C (other than u itself) and vertices of color \( \text{red}_i \) , \( i\le L/2 \) ; if \( C(u)=\text{red}_i \) for some \( i\lt L \) , then each of its d outneighbors is drawn without replacement from vertices of color \( \text{red}_{i+1} \) in C; if \( C(u)=\text{red}_{L} \) , then its adjacency list is empty.
    As a result, if \( C(u)=\text{blue} \) , the probability of u being a surprise query is at most
    \( \begin{equation*} d\cdot \frac{Q(d+1)}{2N-1}\le \frac{ d^2 Q}{N}, \end{equation*} \)
    using a union bound over its d outneighbors, the fact that \( \mathsf {VKG}(H) \) has size at most \( q(d+1)\le Q(d+1) \) , and our conditioning of \( (\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^*(H,P) \) on \( \boldsymbol {C}=C \) . Similarly, the probability of u being a surprise when \( C(u)=\text{red}_i \) , for some \( i\lt L \) , can be bounded from above by \( 2d^2Q/W \) . Since u is always surprise-free if \( C(u)=\text{red}_L \) , we have that the probability of u being a surprise when \( \mathcal {A} \) runs on \( (\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^*(H,P) \) is at most \( 2d^2Q/W \) .
    Now for each \( q \in [Q] \) , let \( \boldsymbol {X}_q \) be a Bernoulli random variable which is 1 if the \( q^{th} \) query made by \( \mathcal {A} \) on \( (\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^* \) is a surprise. Then what we have shown above implies that the probability of \( \boldsymbol {X}_q=1 \) is \( O(Q/W) \) even conditioning on any outcomes of \( \boldsymbol {X}_1,\ldots ,\boldsymbol {X}_{q-1} \) . It follows from the Chernoff bound (together with a standard coupling argument) that
    \( \begin{equation*} \Pr \left[\sum _{q\in [Q]}\boldsymbol {X}_q\ge \frac{4d^2Q^2}{W}\right]\le \exp \left(-\Omega \left(\frac{Q^2}{W}\right)\right). \end{equation*} \)
    This finishes the proof of the lemma.□
    Recall that an epoch ends as a blue surprise epoch if the last query u is both a surprise and a blue vertex. If we let \( \boldsymbol {X}_q \) denote the random variable that is 1 if the \( q^{th} \) query of \( \mathcal {A} \) turns out to be the last query of a blue surprise epoch, when running on \( (\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^* \) , then the argument used in the proof of Lemma 2 implies that the probability of \( \boldsymbol {X}_q=1 \) is at most \( O(Q/N) \) conditioning on any outcomes of \( \boldsymbol {X}_1,\ldots ,\boldsymbol {X}_{q-1} \) . This gives us the following upper bound:
    Lemma 3 (Blue Surprise Epochs Bound).
    There exists a constant \( c_2 \) such that for any algorithm that makes Q queries,
    \( \begin{equation} \mathop {{\bf Pr}}_{(\boldsymbol {C},{\boldsymbol {G}}) \sim \mathbb {BR}^*} \left[\hspace{1.42271pt}\text{more than $\frac{c_2Q^2}{N}$ blue surprise epochs occur\hspace{2.27626pt}}\right]\le \exp \left(-\Omega \left(\frac{Q^2}{N}\right)\right). \end{equation} \)
    (2)

    6 Bounding the Probability of Long Blue Paths

    In this section we prove a key lemma central to the proof of Theorem 4: that in any given epoch, the probability that a \( {\overline{Q}} \) -query algorithm discovers a “long” path of previously unseen blue vertices is low. As a result, with high probability, the subgraph induced by the blue nodes revealed at the end of each epoch is a forest in which every tree has small depth.
    Lemma 4 (Long Blue Paths Are Unlikely).
    Let \( (H,P) \) be a valid knowledge pair in which the length q of H is bounded by \( {\overline{Q}} \) . Let \( E_\ell \) be the current epoch of H and let \( (\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^*(H,P) \) . The probability that \( \mathsf {KG}(E_\ell) \) contains a path of length at least \( 4\log N \) consisting of blue vertices only under \( \boldsymbol {C} \) is \( o(N^{-2}) \) .7
    We begin with some notation and a sketch of the proof. Let \( (H,P) \) be a valid knowledge pair, let \( \mathcal {E}=(E_1,\ldots ,E_\ell) \) be the epoch decomposition of H, and let \( H^{\prime }=E_1\circ \cdots \circ E_{\ell -1} \) . By definition, the current epoch \( E_\ell \) satisfies \( |E_\ell |\lt L/2 \) and every query in \( E_\ell \) is surprise-free in H. As a result, the graph \( \mathsf {KG}(E_\ell) \) is a vertex-disjoint union of degree-d out-trees.8 This leads to the following observation:
    Property 2.
    Let T be an out-tree in \( \mathsf {KG}(E_\ell) \) . Then:
    (1)
    Every vertex of T, other than the root, lies outside \( \mathsf {VKG}(H^{\prime }) \) . (The root may or may not lie in \( \mathsf {VKG}(H^{\prime }) \) .)
    (2)
    Every internal vertex and every sink (in the original graph) in T is queried in \( E_\ell \) .
    Let \( \mathbb {S}= \mathbb {S}(H,P) \) be the distribution of partial colorings over \( \mathsf {VKG}(H) \) induced by \( \boldsymbol {C} \) drawn as in \( (\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^*(H,P) \) .
    Definition 3.
    We say that \( S \sim \mathbb {S} \) is a good partial coloring over \( \mathsf {VKG}(H) \) with respect to P if (1) S is an extension of P, (2) For each directed edge \( (u,v) \) in \( \mathsf {KG}(H) \) , either \( S(u)=S(v)=\text{blue}, \) or \( S(u)=\text{blue} \) and \( S(v)=\text{red}_i \) for some \( i\in [L/2] \) , or \( S(u)=\text{red}_i \) and \( S(v)=\text{red}_{i+1} \) for some \( i\lt L \) , and (3) \( S(u)=\text{red}_L \) for every sink vertex in H.
    We observe that every partial coloring S in the support of \( \mathbb {S} \) must be a good partial coloring over \( \mathsf {VKG}(H) \) (see Property 1).
    Lemma 4 states that \( \mathsf {KG}(E_\ell) \) is unlikely to have a long blue path under \( \boldsymbol {S}\sim \mathbb {S} \) . To prove this assertion, we introduce a naive distribution \( \mathbb {S}^{\prime } \) in Section 6.1 that is much easier to work with and at the same time serves as a good approximation of the distribution \( \mathbb {S} \) . We then show that \( \mathsf {KG}(E_\ell) \) is unlikely to have a long blue path under \( \boldsymbol {S}^{\prime }\sim \mathbb {S}^{\prime } \) , from which Lemma 4 follows.
    The intuition behind the naive distribution \( \mathbb {S}^{\prime } \) is that we color each tree T in \( \mathsf {KG}(E_\ell) \) independently, ignoring all information in the knowledge pair \( (H,P) \) other than the tree T itself. Roughly speaking, we generate a coloring for T as follows. If the root of T lies outside of \( \mathsf {VKG}(H^{\prime }) \) , we color it red with probability 2/3 and blue with probability 1/3 as if it were drawn uniformly at random from \( [3N] \) . If the root of T lies inside \( \mathsf {VKG}(H^{\prime }) \) , its color is known. We then propagate down the tree in breadth-first order. If the parent of a vertex v was colored \( \text{blue} \) , v is colored \( \text{blue} \) with probability \( 1/2 \) and \( \text{red}_i \) with probability \( 1/L \) for each \( i\in [L/2] \) ; if the parent of v was colored \( \text{red}_i \) then v is colored \( \text{red}_{i+1} \) . \( \mathbb {S}^{\prime } \) does not capture \( \mathbb {S} \) perfectly, but we show in Section 6.2 that they are pointwise very close to each other.

    6.1 The Naive Distribution

    Before introducing the naive distribution \( \mathbb {S}^{\prime } \) , we start by classifying trees of \( \mathsf {KG}(E_\ell) \) into four types and note that we can already deduce colors of certain vertices in any good coloring S over \( \mathsf {VKG}(H) \) . Let T be an out-tree of \( \mathsf {KG}(E_\ell) \) with height \( \mathsf {h}(T) \) and root vertex r:
    T is a type-1 out-tree if \( r \in \mathsf {VKG}(H^{\prime }) \) (so the color of r has already been revealed in P) and \( P(r)=\text{red}_i \) for some \( i\in [L] \) . It follows from Property 1 that every valid coloring S has \( S(v)=\text{red}_{i+\ell } \) for each vertex v of depth \( \ell \) in the tree. (Note that we must have \( i+\mathsf {h}(T)\le L \) ; otherwise the pair \( (H,P) \) cannot be a valid knowledge pair.)
    T is a type-2 out-tree if \( r \in \mathsf {VKG}(H^{\prime }) \) and \( P(r)=\text{blue} \) . Then none of its leaves can be a sink; otherwise \( (H,P) \) implies that there is a path from a \( \text{blue} \) vertex to a \( \text{red}_L \) vertex of length at most \( \mathsf {h}(T)\le |E_\ell |\lt L/2 \) , contradicting with the validity of \( (H,P) \) .
    T is a type-3 out-tree if r is not in \( \mathsf {VKG}(H^{\prime }) \) but T contains at least one sink leaf \( v^* \) . Given that \( \mathsf {h}(T)\lt L/2 \) , it follows from Property 1 that every good coloring S satisfies \( S(r)=\text{red}_{L-k} \) , where k is the depth of \( v^* \) in T, and \( S(v)=\text{red}_{L-k+\ell } \) for every vertex v of depth \( \ell \) in the tree.
    T is a type-4 out-tree if r is not in \( \mathsf {VKG}(H^{\prime }) \) and none of its leaves is a sink.
    Figure 2 illustrates the four types of out-trees. Let U denote the set of vertices that are always colored \( \text{red} \) or always colored \( \text{blue} \) in a good partial coloring for \( \mathsf {VKG}(H) \) ; that is, every vertex in \( \mathsf {VKG}(H^{\prime }) \) as well as vertices in type-1 and type-3 trees in \( \mathsf {KG}(E_\ell) \) . Let \( P^{\prime } \) denote the unique partial coloring over U that agrees with every good partial coloring S over \( \mathsf {VKG}(H) \) .
    Fig. 2.
    Fig. 2. Possible out-tree types during a given epoch. Bichromatic circles denote vertices whose types cannot be determined from \( (H,P) \) alone.
    We are ready to define the naive distribution \( \mathbb {S}^{\prime } \) of partial colorings over \( \mathsf {VKG}(H) \) . A coloring \( \boldsymbol {S}^{\prime }\sim \mathbb {S}^{\prime } \) is drawn using the following procedure:
    (1)
    First, color each vertex \( u\in U \) as \( P^{\prime }(u) \) .9
    (2)
    For each type-4 tree T, color its root vertex blue with probability \( N/(3N-\mathsf {h}(T)W) \) and \( \text{red}_i \) with probability \( W/(3N-\mathsf {h}(T)W) \) for each \( i\le L-\mathsf {h}(T) \) .10
    (3)
    Go through each type-2 and type-4 tree one by one and consider uncolored vertices in breadth-first order starting from the roots. For each vertex v, if its parent is colored \( \text{blue} \) , color v \( \text{blue} \) with probability \( 1/2 \) and with \( \text{red}_i \) for each \( i\in [L/2] \) with probability \( 1/L \) . If the parent of v is colored \( \text{red}_i \) , color v \( \text{red}_{i+1} \) .11
    The following property follows directly from the procedure for \( \mathbb {S}^{\prime } \) above:
    Property 3.
    Every partial coloring in the support of \( \mathbb {S}^{\prime } \) is a good partial coloring over \( \mathsf {VKG}(H) \) .
    Both distributions \( \mathbb {S} \) and \( \mathbb {S}^{\prime } \) are supported on good partial colorings over \( \mathsf {VKG}(H) \) . The next lemma shows that \( \mathbb {S}^{\prime } \) is a good approximation of \( \mathbb {S} \) :
    Lemma 5.
    For every good partial coloring S over \( \mathsf {VKG}(H) \) , we have
    \( \begin{align*} 0.9 \cdot \Pr _{\boldsymbol {S}^{\prime }\sim \mathbb {S}^{\prime }} [\boldsymbol {S}^{\prime }=S]\le \Pr _{\boldsymbol {S}\sim \mathbb {S}} [\boldsymbol {S}=S]\le 1.1 \cdot \Pr _{\boldsymbol {S}^{\prime }\sim \mathbb {S}^{\prime }} [\boldsymbol {S}^{\prime }=S]. \end{align*} \)
    Before proving Lemma 5 in Section 6.2, we use it to give a quick proof of Lemma 4.
    Proof of Lemma 4 using Lemma 5
    Given a good coloring S over \( \mathsf {VKG}(H) \) we use \( \operatorname{LBP}(S) \) to denote the event that \( \mathsf {KG}(E_\ell) \) contains a blue path of length at least \( 4\log N \) under S. It follows from Lemma 5 that
    \( \begin{equation} \Pr _{\boldsymbol {S}\sim \mathbb {S}} \big [\operatorname{LBP}(\boldsymbol {S})\big ]\le 1.1\cdot \Pr _{\boldsymbol {S}^{\prime }\sim \mathbb {S}^{\prime }} \big [\operatorname{LBP}(\boldsymbol {S}^{\prime })\big ]. \end{equation} \)
    (3)
    On the other hand, if \( \operatorname{LBP}(S) \) holds then there must be a vertex v in some tree whose depth is at least \( 4\log N \) , and the path from the root to v is all blue. We note that because v is colored blue, it must belong to a type-2 or type-4 tree. For each such vertex v, let \( \operatorname{LBP}(S,v) \) denote the event that the path from the root to v is blue under S. Then the probability of \( \operatorname{LBP}(\boldsymbol {S}^{\prime },v) \) when \( \boldsymbol {S}^{\prime }\sim \mathbb {S}^{\prime } \) is \( (1/2)^{\ell }\le 1/N^4 \) if v is in a type-2 tree and has depth \( \ell \) , and is
    \( \begin{equation*} \frac{N}{3N-\mathsf {h}(T)W}\cdot (1/2)^\ell \le 1/N^4 \end{equation*} \)
    if v is in a type-4 tree T. As a result, the probability of \( \operatorname{LBP}(\boldsymbol {S}^{\prime }) \) when \( \boldsymbol {S}^{\prime }\sim \mathbb {S}^{\prime } \) is \( O(1/N^3) \) by a union bound since the total number of such vertices v is at most 3N. The lemma follows from (3).□

    6.2 The Naive Distribution is a Good Approximation: Proof of Lemma 5

    To simplify the presentation, in this section we use the notation “ \( a \pm b \) ” to denote a quantity that is between \( a-b \) and \( a+b \) . Let S be a good partial coloring over \( \mathsf {VKG}(H) \) . We write \( \mathcal {T}_2 \) to denote the set of type-2 trees in \( \mathsf {KG}(E_\ell) \) and \( \mathcal {T}_4 \) to denote the set of type-4 trees in \( \mathsf {KG}(E_\ell) \) , and we write \( \mathcal {T} \) to denote \( \mathcal {T}_2\cup \mathcal {T}_4 \) . Given S, we write \( \mathcal {T}_{4,b}(S) \) to denote the set of type-4 trees with a blue root and \( \mathcal {T}_{4,r}(S) \) to denote the set of type-4 trees with a red root in S. We also use \( \#_{br}(S),\#_{bb}(S) \) and \( \#_{rr}(S) \) to denote the total number of \( \text{blue}\rightarrow \text{red} \) , \( \text{blue}\rightarrow \text{blue} \) and \( \text{red}\rightarrow \text{red} \) edges in all trees in \( \mathcal {T} \) .
    We start with the easier task of obtaining a closed-form expression for \( \Pr _{\boldsymbol {S}^{\prime }\sim \mathbb {S}^{\prime }}[\boldsymbol {S}^{\prime }=S] \) . This quantity can be written as a product: each root of a type-4 tree contributes a factor which depends on its color in S (recall the second step of the procedure for drawing from \( \mathbb {S}^{\prime } \) ), and each edge of a tree in \( \mathcal {T} \) contributes a factor which is \( 1/2 \) if it is a \( \text{blue}\rightarrow \text{blue} \) edge in S, \( 1/L \) if it is a \( \text{blue}\rightarrow \text{red} \) edge, and 1 if it is a \( \text{red}\rightarrow \text{red} \) edge. As a result, we have
    \( \begin{align*} \Pr _{\boldsymbol {S}^{\prime }\sim \mathbb {S}^{\prime }}[\boldsymbol {S}^{\prime }=S] &= \left(\prod _{T\in \mathcal {T}_{4,b}(S)}\frac{N}{3N-\mathsf {h}(T)W} \right)\hspace{1.70709pt} \left(\prod _{T\in \mathcal {T}_{4,r}(S)}\frac{W}{3N-\mathsf {h}(T)W}\right)\hspace{1.70709pt}\left(\frac{1}{L}\right)^{ \#_{br}(S)} \left(\frac{1}{2}\right)^{ \#_{bb}(S)}\\ {[}0.3ex] &= \left(\prod _{T\in \mathcal {T}_4}\frac{W}{3N-\mathsf {h}(T)W}\right) \hspace{1.70709pt}\left(\frac{L}{2}\right)^{|\mathcal {T}_{4,b}(S)|} \left(\frac{1}{L}\right)^{ \#_{br}(S)} \left(\frac{1}{2}\right)^{ \#_{bb}(S)}\\ {[}0.5ex] &= \tau _1\cdot \left(\frac{L}{2}\right)^{|\mathcal {T}_{4,b}(S)|}\left(\frac{1}{L}\right)^{\#_{br}(S)}\left(\frac{1}{2}\right)^{\#_{bb}(S)}, \end{align*} \)
    where the second equality uses \( WL/2=N \) and the fact that \( {\mathcal {T}}_4 \) is the disjoint union of \( {\mathcal {T}}_{4,b}(S) \) and \( {\mathcal {T}}_{4,r}(S) \) . The quantity \( \tau _1\gt 0 \) is a value that does not depend on S.
    Next, we analyze the probability distribution \( \mathbb {S} \) in detail. For each good partial coloring S over \( \mathsf {VKG}(H) \) , we write \( \mathsf {w}(S) \) as a shorthand for the probability over \( (\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^* \) that \( \boldsymbol {C} \) is an extension of S and \( {\boldsymbol {G}} \) is consistent with H. Given the definition of \( \mathbb {S} \) and \( \mathsf {w}(\cdot) \) , we have
    \( \begin{align} \Pr _{\boldsymbol {S}\sim \mathbb {S}}[\boldsymbol {S}=S] = \frac{\mathsf {w}(S)}{\textstyle \sum _{\text{good}\ S^{\prime }} \mathsf {w}(S^{\prime })}, \end{align} \)
    (4)
    where the sum is over all good partial colorings \( S^{\prime } \) over \( \mathsf {VKG}(H) \) .
    Looking ahead, our plan is to show that there is a value \( \tau \gt 0 \) (independent of \( \boldsymbol {S} \) ) such that
    \( \begin{equation*} 0.99\cdot \tau \cdot \Pr _{\boldsymbol {S}^{\prime }\sim \mathbb {S}^{\prime }}[\boldsymbol {S}^{\prime }=S]\le \mathsf {w}(S)\le 1.01\cdot \tau \cdot \Pr _{\boldsymbol {S}^{\prime }\sim \mathbb {S}^{\prime }}[\boldsymbol {S}^{\prime }=S] \end{equation*} \)
    or more succinctly,
    \( \begin{equation} \mathsf {w}(S) = (1\pm 0.01)\cdot \tau \cdot \Pr _{\boldsymbol {S}^{\prime }\sim \mathbb {S}^{\prime }}[\boldsymbol {S}^{\prime }=S]. \end{equation} \)
    (5)
    With the above expression, it follows from
    \( \begin{equation*} \sum _{\text{good}\ S^{\prime }} \hspace{1.70709pt}\Pr _{\boldsymbol {S}^{\prime }\sim \mathbb {S}^{\prime }}[\boldsymbol {S}^{\prime }=S^{\prime }]=1 \end{equation*} \)
    (since \( \mathbb {S}^{\prime } \) is supported on good colorings) that
    \( \begin{align} 0.99\tau \le \sum _{\text{good}\ S^{\prime }}\mathsf {w}(S^{\prime })\le 1.01\tau . \end{align} \)
    (6)
    Combining (4), (5), and (6), we have
    \( \begin{equation*} \Pr _{\boldsymbol {S}\sim \mathbb {S}}[\boldsymbol {S}=S]\le \frac{1.01\tau }{0.99\tau }\cdot \Pr _{\boldsymbol {S}^{\prime }\sim \mathbb {S}^{\prime }} [\boldsymbol {S}^{\prime }=S]\lt 1.1\Pr _{\boldsymbol {S}^{\prime }\sim \mathbb {S}^{\prime }}[\boldsymbol {S}^{\prime }=S], \end{equation*} \)
    and the analogous lower bound in Lemma 5 can be proved similarly. Thus, it suffices to prove (5). We start with some notation. We use \( \mathbb {U} \) to denote the uniform distribution over all full colorings. Given a full coloring C, we use \( \mathbb {BR}(C) \) to denote the distribution of Bender-Ron graphs generated using C as the full coloring in the procedure for \( \mathbb {BR} \) .
    Now we consider the \( (\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^* \) in the definition of \( \mathsf {w}(S) \) by first drawing a full coloring \( \boldsymbol {C}\sim \mathbb {U} \) . If \( \boldsymbol {C} \) is not an extension of S then we already fail to satisfy the condition in the definition of \( \mathsf {w}(S) \) . Let \( \operatorname{ext}(\boldsymbol {C}, S) \) denote the event that \( \boldsymbol {C} \) is an extension of S. If \( \operatorname{ext}(\boldsymbol {C}, S) \) then we draw \( {\boldsymbol {G}}\sim \mathbb {BR}(\boldsymbol {C}) \) to see if \( {\boldsymbol {G}} \) is consistent with H.
    A useful observation is that every C that extends S shares the same probability of \( {\boldsymbol {G}}\sim \mathbb {BR}(C) \) being consistent with H. Let \( \#_b(U) \) (respectively \( \#_r(U) \) ) be the number of blue (respectively red) vertices in U under S that are queried in H; note that these two numbers are independent of S since every good coloring must be an extension of \( P^{\prime } \) on U. We let \( Y := \mathsf {VKG}(H) \setminus U \) denote the set of vertices which may be colored either \( \text{red} \) or \( \text{blue} \) in a good coloring; that is, all vertices in type-2 and type-4 trees except for the roots of type-2 trees. Let \( \#_b(Y,S) \) (respectively \( \#_r(Y,S) \) ) denote the number of blue (respectively red) vertices in Y under S that are queried in H. Then, for every C that is an extension of S, the probability of \( {\boldsymbol {G}}\sim \mathbb {BR}(C) \) being consistent with H is
    \( \begin{align} & \left(\prod _{i=1}^d \frac{1}{2N-i} \right)^{\#_b(U)+\#_b(Y,S)} \left(\prod _{i=0}^{d-1} \frac{1}{W-i} \right)^{\#_r(U)+\#_r(Y,S)} =\tau _2\cdot \left(\prod _{i=1}^d \frac{1}{2N-i} \right)^{ \#_b(Y,S)} \left(\prod _{i=0}^{d-1} \frac{1}{W-i} \right)^{ \#_r(Y,S)} \end{align} \)
    (7)
    for some positive value \( \tau _2 \) independent of S. Note that our choices of \( L,W \) and \( {\overline{Q}} \) satisfy
    \( \begin{equation} L{\overline{Q}}=o(W). \end{equation} \)
    (8)
    Using (8) (we only need \( L=o(W) \) here) and the fact that \( \#_b(Y,S),\#_r(Y,S)\le L/2 \) , (7) becomes
    \( \begin{align*} \big (1\pm o_N(1)\big)\cdot \tau _2\cdot \left(\frac{1}{2N}\right)^{d\cdot \#_b(Y,S)} \left(\frac{1}{W}\right)^{d \cdot \#_r(Y,S)} = \big (1\pm o_N(1)\big)\cdot \tau _3\cdot \left(\frac{1}{L}\right)^{d\cdot \#_b(Y,S)} , \end{align*} \)
    for some positive value \( \tau _3 \) that is independent of S since \( \#_b(Y,S)+\#_r(Y,S) \) is a constant independent of S.
    Note that \( d\cdot \#_b(Y,S)= \#_{bb}(S)+\#_{br}(S)-d |\mathcal {T}_2| \) . This is just because each blue vertex queried in Y introduces d edges that are either \( \text{blue}\rightarrow \text{blue} \) or \( \text{blue}\rightarrow \text{red} \) in \( \mathcal {T} \) ; we need to subtract \( d |\mathcal {T}_2| \) because roots of type-2 trees are not included in Y. Since \( |\mathcal {T}_2| \) is a value independent of S, (7) can be simplified to
    \( \begin{align*} \big (1\pm o_N(1)\big)\cdot \tau _4\cdot \left(\frac{1}{L}\right)^{\#_{bb}(S)+\#_{br}(S)}, \end{align*} \)
    for some value \( \tau _4\gt 0 \) that is independent of S, and thus
    \( \begin{align*} \mathsf {w}(S) = \big (1\pm o_N(1)\big)\cdot \Pr _{\boldsymbol {C}\sim \mathbb {U}}\big [\operatorname{ext}(\boldsymbol {C}, S)\hspace{1.42271pt}\big ] \cdot \tau _4 \cdot \left(\frac{1}{L}\right)^{\#_{bb}(S)+\#_{br}(S)}. \end{align*} \)
    Next, we evaluate the probability that \( \boldsymbol {C}\sim \mathbb {U} \) is an extension of S over \( \mathsf {VKG}(H)=U\cup Y \) . For this purpose we consider the following experiment:
    (1)
    Pick an arbitrary ordering \( u_1,\ldots ,u_{|U|} \) of U and an arbitrary ordering \( y_1,\ldots ,y_{|Y|} \) of Y.
    (2)
    Start with N \( \text{blue} \) pebbles and W \( \text{red}_i \) pebbles for each \( i\in [L] \) . Go through vertices \( u_1,\ldots ,u_{|U|} \) one by one and assign each one a remaining (as yet unassigned) pebble uniformly at random. Then go through vertices \( y_1,\ldots ,y_{|Y|} \) one by one and assign each one a remaining pebble uniformly at random.
    (3)
    For each \( u_i \) , we use \( \boldsymbol {A}_i \) to denote the Bernoulli random variable that is 1 if \( u_i \) is assigned a pebble of color \( S(u_i) \) , and define \( \mathbf {B}_i \) similarly for each \( y_i \) .
    Then the probability \( \Pr _{\boldsymbol {C}\sim \mathbb {U}}\lbrack \operatorname{ext}(\boldsymbol {C}, S)\rbrack \) that we are interested in is
    \( \begin{align*} \Pr \big [\boldsymbol {A}_1= \cdots =\boldsymbol {A}_{|U|} = \mathbf {B}_1 = \cdots =\mathbf {B}_{|Y|}=1\big ] &=\Pr \big [\boldsymbol {A}_1=\cdots =\boldsymbol {A}_{|U|}=1\big ]\\ &\times \ \prod _{i\in [|Y|]} \Pr \big [\mathbf {B}_i=1\hspace{1.70709pt}|\hspace{1.70709pt}\boldsymbol {A}_1=\cdots =\mathbf {B}_{i-1}=1\big ]\\ &=\ \tau _5\cdot \prod _{i\in [|Y|]} \Pr \big [\mathbf {B}_i=1\hspace{1.70709pt}|\hspace{1.70709pt}\boldsymbol {A}_1=\cdots =\mathbf {B}_{i-1}=1\big ], \end{align*} \)
    for some positive value \( \tau _5 \) that is independent of S. For each \( y_i \) with \( S(y_i)=\text{blue} \) , we have
    \( \begin{align*} \frac{N-{\overline{Q}}(d+1)}{3N} \le \Pr \big [\mathbf {B}_i=1\hspace{1.70709pt}|\hspace{1.70709pt}\boldsymbol {A}_1=\cdots =\mathbf {B}_{i-1}=1\big ]\le \frac{N}{3N-{\overline{Q}}(d+1)}. \end{align*} \)
    This is because regardless of outcomes for vertices before \( y_i \) , the number of blue pebbles left in the round of \( y_i \) lies between \( N-{\overline{Q}}\cdot (d+1) \) and N (since \( \mathsf {VKG}(H) \) has no more than \( {\overline{Q}}\cdot (d+1) \) vertices) and the total number of pebbles left is between \( 3N-{\overline{Q}}\cdot (d+1) \) and 3N.
    Similarly for each \( y_i \) with \( S(y_i)=\text{red}_j \) for some \( j\in [L] \) , we have
    \( \begin{align*} \frac{W-{\overline{Q}}(d+1)}{3N} \le \Pr \big [\mathbf {B}_i=1\hspace{1.70709pt}|\hspace{1.70709pt}\boldsymbol {A}_1=\cdots =\mathbf {B}_{i-1}=1\big ] \le \frac{W}{3N-{\overline{Q}}(d+1)}. \end{align*} \)
    Let \( \#^*_b(Y,S) \) (or \( \#^*_r(Y,S) \) ) denote the number of blue (or red) vertices in Y under S (unlike \( \#_b(Y,S) \) and \( \#_r(Y,S) \) , these vertices may have not been queried). It follows from (8) and \( |Y|=O(L) \) that
    \( \begin{align*} \Pr _{\boldsymbol {C}\sim \mathbb {U}}\big [\operatorname{ext}(\boldsymbol {C}, S)\hspace{1.42271pt}\big ] =\big (1\pm o_N(1)\big) \cdot \tau _5\cdot \left(\frac{1}{3}\right)^{\#^*_b(Y,S)} \cdot \left(\frac{W}{3N}\right)^{\#^*_r(Y,S)} =\big (1\pm o_N(1)\big) \cdot \tau _6\cdot \left(\frac{2}{L}\right)^{\#^*_r(Y,S)}, \end{align*} \)
    for some value \( \tau _6\gt 0 \) that is independent of S since \( \#_b^*(Y,S)+\#_r^*(Y,S)=|Y| \) is a value independent of S. Finally, we have
    \( \begin{align*} \frac{\mathsf {w}(S)}{\Pr _{\boldsymbol {S}^{\prime }\sim \mathbb {S}^{\prime }}[\boldsymbol {S}^{\prime }=S]}=\big (1\pm o_N(1)\big) \cdot \tau _7 \cdot \left(\frac{2}{L}\right)^{ \#_r^*(Y,S)+\#_{bb}(S)+|\mathcal {T}_{4,b}(S)|} \end{align*} \)
    for some value \( \tau _7\gt 0 \) that is independent of S. Note that for any good coloring S, the exponent \( \#_r^*(Y,S)+\#_{bb}(S)+|\mathcal {T}_{4,b}(S)| \) in the expression above is also equal to \( |Y| \) , which is once again a value that does not depend on S. This finishes the proof of (5) and Lemma 5.

    7 A Lower Bound On Cycle Finding

    This section combines the results of Lemmas 2, 3 and 4 to establish Theorem 4, which is restated below:
    Theorem 3
    Let d be a constant with \( d\ge 80 \) , and let \( \mathcal {A} \) be a \( {\overline{Q}} \) -query deterministic algorithm that works on pairs in the support of \( \mathbb {BR}^* \) under the color revelation model, where \( {\overline{Q}}=N^{5/9}/\log N \) . Then the probability of \( \mathcal {A} \) finding a cycle in \( (\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^* \) is \( o_N(1) \) .
    Proof.
    Let \( \mathcal {A} \) be a \( {\overline{Q}} \) -query algorithm. We start by introducing the definition of typical pairs in the support of \( \mathbb {BR}^* \) with respect to \( \mathcal {A} \) , and then show that \( (\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^* \) is typical with probability \( 1-o_N(1) \) .
    Definition 4.
    We say a pair \( (C,G) \) in the support of \( \mathbb {BR}^* \) is typical with respect to an algorithm \( \mathcal {A} \) if the following conditions hold:
    (i)
    The number of epochs during the execution of \( \mathcal {A} \) on \( (C,G) \) is \( O({\overline{Q}}^2/W + {\overline{Q}}/L) \) .
    (ii)
    The number of blue surprise epochs during the execution of \( \mathcal {A} \) on \( (C,G) \) is \( \smash{O({\overline{Q}}^2/N)} \) .
    (iii)
    For each \( q\in [{\overline{Q}}] \) , let \( \smash{(H^{(q)},P^{(q)})} \) denote the knowledge pair of running \( \mathcal {A} \) on \( (C,G) \) after q queries and let \( \smash{E^{(q)}} \) denote the current epoch (in the epoch decomposition of \( \smash{H^{(q)}} \) ). Then there is no blue path longer than \( \smash{4\log N} \) in \( \smash{\mathsf {KG}(E^{(q)})} \) under the coloring C.
    We combine Lemmas 2, 3 and 4 to show that \( (\boldsymbol {C},{\boldsymbol {G}}) \) \( \sim \mathbb {BR}^* \) is typical with respect to \( \mathcal {A} \) with probability \( 1-o_N(1) \) . We focus on the third condition (iii) since the probability of \( (\boldsymbol {C},{\boldsymbol {G}}) \) satisfying the first two conditions is \( 1-o_N(1) \) by Lemmas 2 and 3. For (iii) we have
    \( \begin{align*} \Pr _{(\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^*}\big [\hspace{1.42271pt}\text{$(\boldsymbol {C},{\boldsymbol {G}})$ violates (iii)}\hspace{1.42271pt}\big ] \le \sum _{q=1}^{{\overline{Q}}} \Pr _{(\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^*}\big [\hspace{1.42271pt}\text{$(\boldsymbol {C},{\boldsymbol {G}})$ violates (iii) after $q$ queries}\hspace{1.42271pt}\big ]. \end{align*} \)
    On the other hand, letting \( \mathcal {A}_q(\boldsymbol {C},{\boldsymbol {G}}) \) denote the knowledge pair \( \mathcal {A} \) observes after q queries on \( (\boldsymbol {C}, {\boldsymbol {G}}) \) , the \( q^\text{th} \) probability in the sum can be written as
    \( \begin{align*} \sum _{\text{valid}\ (H,P)} \Pr _{(\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^*}\big [\hspace{1.42271pt}\text{$\mathcal {A}_q(\boldsymbol {C},{\boldsymbol {G}}) = (H,P)$} \hspace{1.42271pt}\big ]\cdot \Pr _{(\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^*(H,P)}\big [\hspace{1.42271pt}\text{$(\boldsymbol {C},{\boldsymbol {G}})$ violates (iii) after $q$ queries}\hspace{1.42271pt}\big ], \end{align*} \)
    where the sum is over all valid knowledge pairs \( (H,P) \) of length q. It follows from Lemma 4 that the second term in the summand in the above expression is \( o(N^{-2}) \) for every valid knowledge pair \( (H,P) \) . Since \( {\overline{Q}}\le N \) , the probability of \( (\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^* \) violating (iii) is \( o(N^{-1}) \) and thus \( (\boldsymbol {C},{\boldsymbol {G}}) \) is typical with probability \( 1-o_N(1) \) .
    Given a query history H and a vertex u, we write \( \mathsf {anc}(H,u) \) to denote the set of ancestors of u in \( \mathsf {KG}(H) \) , i.e., the set of vertices (other than u itself) that have a directed path to u. (If \( u\notin \mathsf {VKG}(H) \) then \( \mathsf {anc}(H,u) \) is trivially empty.) The claim below shows that if \( (C,G) \) is typical then at any time during the execution of \( \mathcal {A} \) on \( (C,G) \) , every blue vertex has a small set of ancestors in \( \mathsf {KG}(H) \) .
    Claim 3.
    Let \( (C,G) \) be a typical pair with respect to \( \mathcal {A} \) . Then for each \( q\in [{\overline{Q}}] \) , letting H be the query history of \( \mathcal {A} \) after making q queries on \( (C,G) \) , we have
    \( \begin{equation} \big |\hspace{0.85355pt}\mathsf {anc}(H,u)\hspace{0.85355pt}\big |\le O\left(\log N\cdot \left(\frac{{{\overline{Q}}}^2}{W}+\frac{{\overline{Q}}}{L}\right)\cdot \frac{{{\overline{Q}}}^2}{N}\right), \end{equation} \)
    (9)
    for every vertex u with \( C(u)=\text{blue} \) .
    Proof.
    Recall that at the end of each blue surprise epoch, \( \mathcal {A} \) may find an edge \( (u,v) \) such that the vertex u being queried is blue and v is a vertex encountered before. We refer to such an edge as a surprise edge if v also turns out to be blue.
    Now we consider running \( \mathcal {A} \) on a typical pair \( (C,G) \) . Let \( (H^{(i)},P^{(i)}) \) denote the knowledge pair maintained by \( \mathcal {A} \) after i queries, let \( E^{(i)} \) be the current epoch, and let \( H^{(i)}=H^{\prime (i)}\circ E^{(i)} \) . We focus on the evolution of the blue subgraph (the subgraph induced by its blue vertices) of \( \mathsf {KG}(H^{\prime (i)}) \) over time. Let \( \mathsf {BKG}(H^{\prime (i)}) \) denote the blue subgraph of \( \mathsf {KG}(H^{\prime (i)}) \) .
    First we note that \( \mathsf {KG}(H^{\prime (i)}) \) (and thus, \( \mathsf {BKG}(H^{\prime (i)}) \) ) is only updated at the end of each epoch. If an epoch ends at the \( i^{\text{th}} \) query, a number of out-trees are added to \( \mathsf {KG}(H^{\prime (i-1)}) \) . Each such tree (other than its root) is vertex-disjoint from \( \mathsf {KG}(H^{\prime (i-1)}) \) . In addition, if the epoch is a blue surprise epoch, no more than d many surprise edges are added to \( \mathsf {KG}(H^{\prime (i)}) \) . Now focusing on \( \mathsf {BKG}(H^{\prime (i)}) \) vs \( \mathsf {BKG}(H^{\prime (i-1)}) \) , we have that at the end of each epoch, each out-tree added to \( \mathsf {BKG}(H^{\prime (i-1)}) \) satisfies the extra condition of having depth at most \( 4\log N \) . If it is the end of a blue surprise epoch, at most d surprise edges are added to \( \mathsf {BKG}(H^{\prime (i)}). \)
    As a result, letting \( H=H^{\prime }\circ E \) be the query history of \( \mathcal {A} \) after making q queries on a typical pair \( (C,G) \) , we have that \( \mathsf {BKG}(H^{\prime }) \) is the union of (1) a forest in which each out-tree has depth at most
    \( \begin{equation} O\left(\log N\cdot \left(\frac{{{\overline{Q}}}^2}{W}+\frac{{\overline{Q}}}{L}\right)\right) \end{equation} \)
    (10)
    and (2) a set of at most
    \( \begin{equation} O\left(\frac{{{\overline{Q}}}^2}{N}\right) \end{equation} \)
    (11)
    many surprise edges, where (10) and (11) follow from parts (i) and (ii) in Definition 4, respectively (since \( (C,G) \) is typical).
    Let u be a vertex in \( \mathsf {BKG}(H^{\prime }) \) . To bound the number of its ancestors, we consider an in-tree T rooted at u such that every ancestor of u appears in T (with a directed path to u). If we remove surprise edges from T, it is left with a vertex-disjoint union of directed paths; this is because, after removing surprise edges, \( \mathsf {BKG}(H^{\prime }) \) is a forest of out-trees (so no vertex has indegree larger than 1). Since each path has length bounded by (10) and the number of surprise edges is bounded by (11), the number of vertices in T, i.e., the number of ancestors of u, is bounded by (9).
    Now in Claim 3, u can be a vertex in \( \mathsf {VKG}(E) \) . Note that \( \mathsf {KG}(E) \) must be a forest of out-trees and because \( (C,G) \) is typical, the blue subgraph of each such out-tree has depth at most \( 4\log N \) . As a result, considering vertices in \( \mathsf {VKG}(E) \) may add a term of \( 4\log N \) to our bound for the number of ancestors, which is still captured by (9). This finishes the proof of the claim.□
    Now we show that \( \mathcal {A} \) finds a cycle in \( (\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^* \) with probability \( o_N(1) \) . Given that \( (\boldsymbol {C},{\boldsymbol {G}}) \) is typical with probability at least \( 1-o_N(1) \) , we have
    \( \begin{align} \Pr _{(\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^*}\big [\hspace{1.42271pt}\text{$\mathcal {A}$ finds a cycle}\hspace{1.42271pt}\big ] & \le o_N(1) + \Pr _{(\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^*}\big [\hspace{1.42271pt}\text{$(\boldsymbol {C},{\boldsymbol {G}})$ is typical and $\mathcal {A}$ finds a cycle}\hspace{1.42271pt}\big ] \\ {[}0.2ex] & \le o_N(1) +\sum _{q\in {[{\overline{Q}}}]}\hspace{1.70709pt}\Pr _{(\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^*}\big [\hspace{1.42271pt}\text{$(\boldsymbol {C},{\boldsymbol {G}})$ is typical and $\mathcal {A}$ finds a cycle in the $q^{\text{th}}$ round}\hspace{1.42271pt}\big ].\nonumber \nonumber \end{align} \)
    (12)
    As a result, it suffices to bound each probability in the sum by \( o(1/N) \) .
    Fix any \( q\in [{\overline{Q}}] \) . Given a pair \( (H,C) \) , where \( H=H^{\prime }\circ E \) is a query history of length \( q-1 \) and C is a full coloring, we write \( P(H,C) \) to denote the restriction of C on \( \mathsf {VKG}(H^{\prime }) \) . Then we have
    \( \begin{align} &\Pr _{(\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^*}\big [\hspace{1.42271pt}\text{$(\boldsymbol {C},{\boldsymbol {G}})$ is typical and $\mathcal {A}$ finds a cycle in the $q^{\text{th}}$ round}\hspace{1.42271pt}\big ] \end{align} \)
    (13)
    is at most
    \( \begin{align} \sum _{(H,C)}\hspace{1.42271pt} \Pr _{(\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^*}\big [\text{$\boldsymbol {C}=C$, $\mathcal {A}$ on $(\boldsymbol {C},{\boldsymbol {G}})$ sees $(H,P(H,C))$}\big ] \cdot \Pr _{(\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^*(H,C)}\big [\hspace{1.42271pt}\text{$\mathcal {A}$ finds a cycle in the $q^{\text{th}}$ round}\hspace{1.42271pt}\big ] \end{align} \)
    (14)
    where the sum is over all \( (H,C) \) such that every blue vertex (under C) in \( \mathsf {VKG}(H) \) has its number of ancestors bounded by (9). This follows from Claim 3 since \( (\boldsymbol {C},{\boldsymbol {G}}) \) is typical in (13).
    Fix such a pair \( (H,C) \) and let \( u=\mathcal {A}(H,P(H,C)) \) be the next vertex that is queried by \( \mathcal {A} \) . If \( u\notin \mathsf {VKG}(H) \) or \( u\in \mathsf {VKG}(H) \) is not blue under C, the probability in (14) is 0. If \( u\in \mathsf {VKG}(H) \) is blue, we note that under \( (\boldsymbol {C},{\boldsymbol {G}})\sim \mathbb {BR}^*(H,C) \) , outneighbors of u are picked randomly from \( 2N-1 \) vertices without replacement. Consequently, the probability that one of them is an ancestor of u can be bounded by
    \( \begin{equation*} O\left(\log N \cdot \left(\frac{{\overline{Q}}^4}{WN^2} + \frac{{\overline{Q}}^3}{LN^2}\right)\right). \end{equation*} \)
    As a result, this is an upper bound for (14) as well as (13) and thus, the sum in (12) is at most
    \( \begin{align} {\overline{Q}}\cdot O\left(\log N\cdot \left(\frac{{\overline{Q}}^4}{WN^2} + \frac{{\overline{Q}}^3}{LN^2}\right)\right) = O\left(\log N \cdot \left(\frac{{\overline{Q}}^5}{WN^2} + \frac{{\overline{Q}}^4}{LN^2}\right)\right) =o_N(1) \end{align} \)
    (15)
    with our choices of \( L,W \) and \( {\overline{Q}} \) . This finishes the proof of the lemma.
    Looking back regarding our choices of \( L:=(2N)^{2/9} \) and \( W := 2N/L = (2N)^{7/9} \) , we need L, W, and \( {\overline{Q}} \) to satisfy the two inequalities (8) (that \( L{\overline{Q}}=o(W) \) ) and (15). Our choices of L and W are optimized to maximize the query complexity \( {\overline{Q}} \) under these conditions.

    8 Finding Cycles in Bender-Ron-graphs using O(N13/18) Queries

    Given the lower bound established above for cycle-finding in Bender-Ron graphs, one natural question concerns the limitations of this approach: what is the true query complexity of cycle-finding in graphs drawn from this distribution? This section sketches two algorithmic approaches that find cycles with high probability in random graphs \( {\boldsymbol {G}} \sim \mathbb {BR} \) for many values of the length parameter L. In particular, setting \( L=\Theta (N^{2/9}) \) as in our lower bound construction yields an algorithm for cycle finding in \( \mathbb {BR} \) graphs with query complexity roughly \( N^{13/18} \) .
    Algorithm 1. We begin with the following simple observation: With high probability over a random Bender-Ron graph \( {\boldsymbol {G}} \sim \mathbb {BR} \) , for each vertex \( v \in [3N] \) it is possible to correctly determine the color (and layer, if the color is red) of v in \( O(L) \) queries. This is a straightforward consequence of the following two facts. First, if v is a red vertex in layer \( R_i \) , then every directed path from v reaches a sink after exactly \( L-i \) edges. Second, for almost every graph \( {\boldsymbol {G}} \) in the support of \( \mathbb {BR} \) , a sequence of random walks made from any blue vertex in \( {\boldsymbol {G}} \) will differ significantly in the distance they travel before they find a sink. Thus, an algorithm can determine the color and layer of v with high probability by making several random walks of length \( O(L) \) .
    We can leverage this observation to find a cycle with high probability in \( O(L\sqrt {N}) \) queries as follows. The algorithm works by first identifying a blue vertex in \( O(L) \) queries by randomly sampling and confirming its color using the procedure described above. Each child of a blue vertex \( {\boldsymbol {G}} \sim \mathbb {BR} \) is blue with probability 1/2, so we can grow a blue path from our seed vertex at a cost of roughly \( O(L) \) queries to confirm the color of each additional vertex.12 We construct a blue path of length \( C \sqrt {N} \) , at which point each successive blue vertex added to the path creates a cycle with probability at least \( C/(2 \sqrt {N}) \) . By a birthday paradox argument, the next \( C \sqrt {N} \) blue vertices added to the path yield a cycle with high probability for large C. Setting \( L = (2N)^{2/9} \) as in our lower bound proof, the query complexity of the resulting algorithm is \( O(N^{13/18}) \) .
    Algorithm 2. Algorithm 1 provides a good upper bound on the query complexity of cycle-finding in Bender-Ron graphs when L is relatively small. In this section we sketch a more sophisticated strategy that gives a query-efficient algorithm when L is large. The key observation here is that for almost every graph \( {\boldsymbol {G}} \sim \mathbb {BR}, \) given any red vertex v in layer \( R_i \) , by making \( P := \widetilde{O}(W) \) queries it is possible to query almost every vertex in layer \( R_{i+t} \) , where \( t=\log _d P. \) This is accomplished by performing a breadth-first search of depth t starting from vertex v. We think of this as the query algorithm “building a wall” at layer \( R_{i+t} \) .
    Algorithm 2 has two stages. In the first stage, it builds a series of walls, effectively mapping out the structure of G. In the second stage, it exploits its knowledge about the structure of G to efficiently build a long blue path using a method similar to Algorithm 1.
    In more detail, the first stage starts by first identifying M red vertices by sampling vertices at random and using random walks to confirm their color, a process which takes \( O(LM) \) queries. In the rest of the first stage the algorithm then performs the wall-building procedure at each of these vertices, a process which takes roughly \( \widetilde{O}(MW) \) queries.13 At this point, the query algorithm has built \( \Theta (M) \) walls, which with high probability are typically spaced at intervals roughly \( O(L/M) \) apart throughout the layers \( R_1,\dots ,R_L \) . At this point, the number of queries that the first stage takes is about
    \( \begin{equation*} \widetilde{O}(M(W+L)) = \widetilde{O}(M(N/L+L)). \end{equation*} \)
    In the second stage, Algorithm 2 is the same as Algorithm 1, except that Algorithm 2 can identify vertex colors by reaching a wall instead of a sink vertex. Consider a random walk from a vertex v. If v is in layer \( R_i \) , then most random walks from v will collide with the next wall in a particular, fixed number of queries \( a_i \) , which will typically be \( O(L/M) \) . If v is a blue vertex, then most random walks from v will still collide with a wall in \( O(L/M) \) queries, but with high probability the length of these walks will vary significantly. As a result, using the same method as Algorithm 1, Algorithm 2 can identify vertex colors in \( O(L/M) \) queries and find a cycle of length \( O(\sqrt {N}) \) in \( O(L\sqrt {N}/M) \) queries. Thus, the query complexity of Algorithm 2 is
    \( \begin{equation*} \widetilde{O}\big (M(N/L+L) + L\sqrt {N}/M\big). \end{equation*} \)
    If \( L \gg N^{1/4} \) , then taking
    \( \begin{equation*} M={\frac{N^{1/4}L}{\sqrt {N + L^2}}} \gg 1, \end{equation*} \)
    we get that the query complexity of this second approach is roughly
    \( \begin{equation*} \widetilde{O}\left(N^{1/4} \sqrt {N + L^2}\right), \end{equation*} \)
    which is \( o(N) \) for \( N^{1/4} \ll L \le o(N^{3/4}). \)

    9 Directions for Future Work: Towards Upper Bounds

    Given our \( \widetilde{\Omega }(N^{5/9}) \) lower bound, it is natural to ask the true query complexity of cycle finding in sparse digraphs that are \( \varepsilon \) -far from acyclic. We conjecture that there is an \( o(N) \) -query algorithm for this problem, and we pose the problem of finding such an algorithm as a tantalizing goal for future work. We conclude with a few comments towards this goal:
    (1)
    Let \( \ell = \ell (m,\varepsilon) \) be the smallest value such that every m-edge digraph G with the smallest feedback arc set of size at least \( \varepsilon m \) must have a cycle of length at most \( \ell . \) Fox [14] has proved that \( \ell (m,\varepsilon) \le {\widetilde{O}(\log m)}/{\varepsilon } \) . It follows that every bounded-outdegree-d N-vertex digraph that is constant-far from acyclic must contain a cycle of length \( \widetilde{O}(\log N) \) . This structural result may be viewed as a highly efficient nondeterministic algorithm (with query complexity \( \widetilde{O}(\log N) \) ) for the cycle-finding problem that we consider.
    (2)
    It is possible that a simple algorithm based on breadth first search may have sublinear query complexity for cycle-finding in far-from-acyclic bounded-degree digraphs. In more detail, we do not know a counterexample to the following conjecture: “Let \( 0 \lt \varepsilon \lt 1 \) be a (small) constant. Let \( \mathcal {A}^{\prime } \) be an algorithm which works as follows: for \( C=C(\varepsilon) \) (a large constant) many repetitions, \( \mathcal {A}^{\prime } \) picks a random vertex v in G and performs a breadth first search out from v until \( CN/\log N \) vertices have been explored. When run on any N-vertex graph G that is \( \varepsilon \) -far from acyclic, one of the \( C(\varepsilon) \) BFSes performed by algorithm \( \mathcal {A}^{\prime } \) finds a cycle with constant probability.” (We note that by considering the case in which G is a union of d many randomly chosen bipartite matchings, it can be shown that \( N/\log N \) cannot be replaced by any function of N that is \( o(N/\log N) \) .)

    Acknowledgments

    We thank Jacob Fox for telling us about [14], and several anonymous reviewers for helpful comments on an earlier draft.

    Footnotes

    1
    For instance, the algorithms of [2, 6, 11, 26].
    2
    For instance, the algorithms of [5, 16, 22, 29].
    4
    We assume without loss of generality that the algorithm never repeats a previous query.
    5
    Both L and W are \( N^{\Theta (1)} \) ; the exact values will be given later and are not important for our intuitive discussion here.
    6
    Note that by our choices of L and W, \( N+LW = 3N \) . This particular setting of L and W is chosen to optimize our lower bound, as will become clear in the course of our analysis. We assume without loss of generality that N is such that both \( L/2 \) and W are integers.
    7
    The constant factors in the lemma statement are arbitrary but will be convenient later in the analysis.
    8
    Note that an isolated vertex is also counted as a degree-d out-tree.
    9
    Our random coloring \( \boldsymbol {S}^{\prime } \) is always an extension of \( P^{\prime } \) . Furthermore, the vertices of type-1 and type-3 trees are all colored red, and the roots of type-2 trees are colored blue.
    10
    The intuition behind the denominator is that because there is a path of length \( \mathsf {h}(T) \) that starts at r, its color cannot be \( \text{red}_{L-\mathsf {h}(T)+1},\ldots ,\text{red}_L \) .
    11
    Observe that we never go beyond \( \text{red}_L \) because the height of each tree is at most \( L/2 \) .
    12
    With high probability, the number of red vertices we identify is proportional to the length of the path. If a blue node has no blue children, an event which occurs with probability \( 1/2^d \) , we backtrack to the previous node.
    13
    If the algorithm finds a sink while attempting to run a breadth-first search of depth t, this wall fails and the procedure continues.

    References

    [1]
    Maryam Aliakbarpour, Amartya Shankha Biswas, Themis Gouleakis, John Peebles, Ronitt Rubinfeld, and Anak Yodpinyanee. 2018. Sublinear-time algorithms for counting star subgraphs via edge sampling. Algorithmica 80, 2 (2018), 668–697.
    [2]
    Sepehr Assadi, Michael Kapralov, and Sanjeev Khanna. 2019. A simple sublinear-time algorithm for counting arbitrary subgraphs via edge sampling. In 10th Innovations in Theoretical Computer Science Conference (ITCS). 6:1–6:20.
    [3]
    Paul Beame, Sariel Har-Peled, Sivaramakrishnan Natarajan Ramamoorthy, Cyrus Rashtchian, and Makrand Sinha. 2018. Edge estimation with independent set oracles. In Proceedings of the 2018 ACM Conference on Innovations in Theoretical Computer Science.
    [4]
    Michael A. Bender and Dana Ron. 2002. Testing properties of directed graphs: Acyclicity and connectivity. Random Struct. Algorithms 20, 2 (2002), 184–205.
    [5]
    Itai Benjamini, Oded Schramm, and Asaf Shapira. 2008. Every minor-closed property of sparse graphs is testable. In Proceedings of the 40th Annual ACM Symposium on Theory of Computing (STOC). 393–402.
    [6]
    Bernard Chazelle, Ronitt Rubinfeld, and Luca Trevisan. 2005. Approximating the minimum spanning tree weight in sublinear time. SIAM J. Comput. 34, 6 (2005), 1370–1379.
    [7]
    Artur Czumaj, Funda Ergün, Lance Fortnow, Avner Magen, Ilan Newman, Ronitt Rubinfeld, and Christian Sohler. 2005. Approximating the weight of the euclidean minimum spanning tree in sublinear time. SIAM J. Comput. 35, 1 (2005), 91–109.
    [8]
    Artur Czumaj, Oded Goldreich, Dana Ron, C. Seshadhri, Asaf Shapira, and Christian Sohler. 2014. Finding cycles and trees in sublinear time. Random Structures & Algorithms 45, 2 (2014), 139–184.
    [9]
    Artur Czumaj, Pan Peng, and Christian Sohler. 2016. Relating two property testing models for bounded degree directed graphs. In Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing (STOC). 1033–1045.
    [10]
    Artur Czumaj and Christian Sohler. 2009. Estimating the weight of metric minimum spanning trees in sublinear time. SIAM J. Comput. 39, 3 (2009), 904–922.
    [11]
    Talya Eden, Amit Levi, Dana Ron, and C. Seshadhri. 2017. Approximately counting triangles in sublinear time. SIAM J. Comput. 46, 5 (2017), 1603–1646.
    [12]
    Talya Eden, Dana Ron, and C. Seshadhri. 2018. On approximating the number of k-cliques in sublinear time. In Proceedings of the 50th ACM Symposium on the Theory of Computing. 722–734.
    [13]
    Uriel Feige. 2006. On sums of independent random variables with unbounded variance and estimating the average degree in a graph. SIAM J. Comput. 35, 4 (2006), 964–984.
    [14]
    Jacob Fox. 2018. Personal communication.
    [15]
    Oded Goldreich. 2017. Introduction to Property Testing. Cambridge University Press, New York.
    [16]
    Oded Goldreich and Dana Ron. 2002. Property testing in bounded degree graphs. Algorithmica 32, 2 (2002), 302–343.
    [17]
    Oded Goldreich and Dana Ron. 2008. Approximating average parameters of graphs. Random Structures & Algorithms 32, 4 (2008), 473–493.
    [18]
    Mira Gonen, Dana Ron, and Yuval Shavitt. 2011. Counting stars and other small subgraphs in sublinear-time. SIAM J. Comput. 25, 3 (2011), 1365–1411.
    [19]
    Avinatan Hassidim, Jonathan A. Kelner, Huy N. Nguyen, and Krzysztof Onak. 2009. Local graph partitions for approximation and testing. In Proc. 50th IEEE Symposium on Foundations of Computer Science (FOCS). IEEE, 22–31.
    [20]
    Frank Hellweg and Christian Sohler. 2012. Property testing in sparse directed graphs: Strong connectivity and subgraph-freeness. In Algorithms - ESA 2012-20th Annual European Symposium. 599–610.
    [21]
    Frank Hellweg and Christian Sohler. 2013. Property-testing in sparse directed graphs: 3-star-freeness and connectivity. CoRR abs/1312.0497.
    [22]
    Akash Kumar, C. Seshadhri, and Andrew Stolman. 2018. Finding forbidden minors in sublinear time: A \( n^{1/2+o(1)} \) -query one-sided tester for minor closed properties on bounded degree graphs. In 59th IEEE Annual Symposium on Foundations of Computer Science (FOCS). 509–520.
    [23]
    Akash Kumar, C. Seshadhri, and Andrew Stolman. 2019. Random walks and forbidden minors II: A poly \( (d\epsilon ^{-1}) \) -query tester for minor-closed properties of bounded degree graphs. In Proceedings of the 51st ACM Symposium on the Theory of Computing.
    [24]
    Sharon Marko and Dana Ron. 2009. Approximating the distance to properties in bounded-degree and general sparse graphs. ACM Transactions on Algorithms 5, 2 (2009), 22.
    [25]
    Huy N. Nguyen and Krzysztof Onak. 2008. Constant-time approximation algorithms via local improvements. In Proc. 49th IEEE Symposium on Foundations of Computer Science (FOCS). IEEE, 327–336.
    [26]
    Krzysztof Onak, Dana Ron, Michal Rosen, and Ronitt Rubinfeld. 2012. A near-optimal sublinear-time algorithm for approximating the minimum vertex cover size. In Proceedings of the 23rd annual ACM-SIAM Symposium on Discrete Algorithms (SODA). 1123–1131.
    [27]
    Yaron Orenstein and Dana Ron. 2011. Testing Eulerianity and connectivity in directed sparse graphs. Theoretical Computer Science 412 (2011), 6390–6408.
    [28]
    Michal Parnas and Dana Ron. 2007. Approximating the minimum vertex cover in sublinear time and a connection to distributed algorithms. Theoretical Computer Science 381, 1–3 (2007), 183–196.
    [29]
    V. Rödl and R. A. Duke. 1985. On graphs with small subgraphs of large chromatic number. Graphs and Combinatorics 1, 1 (1985), 91–96.
    [30]
    A. Yao. 1977. Probabilistic computations: Towards a unified measure of complexity. In Proc. Seventeenth Annual Symposium on Foundations of Computer Science (STOC). 222–227.
    [31]
    Yuichi Yoshida, Masaki Yamamoto, and Hiro Ito. 2009. An improved constant-time approximation algorithm for maximum matchings. In Proc. 41st Annual ACM Symposium on Theory of Computing (STOC). ACM, 225–234.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Algorithms
    ACM Transactions on Algorithms  Volume 18, Issue 4
    October 2022
    305 pages
    ISSN:1549-6325
    EISSN:1549-6333
    DOI:10.1145/3561946
    • Editor:
    • Edith Cohen
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 10 October 2022
    Online AM: 08 February 2022
    Accepted: 13 August 2020
    Revised: 31 July 2020
    Received: 26 January 2020
    Published in TALG Volume 18, Issue 4

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Property testing
    2. directed acyclic graphs
    3. randomized algorithms
    4. graph algorithms

    Qualifiers

    • Research-article
    • Refereed

    Funding Sources

    • NSF
    • Simons Collaboration on Algorithms and Geometry

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 349
      Total Downloads
    • Downloads (Last 12 months)171
    • Downloads (Last 6 weeks)26

    Other Metrics

    Citations

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media