getdoce1a0. 124KB Jun 04 2011 12:05:06 AM

Elect. Comm. in Probab. 12 (2007), 28–35

ELECTRONIC
COMMUNICATIONS
in PROBABILITY

A PROBABILISTIC PROOF OF A WEAK LIMIT LAW
FOR THE NUMBER OF CUTS NEEDED TO ISOLATE
THE ROOT OF A RANDOM RECURSIVE TREE
ALEX IKSANOV
National Taras Shevchenko University of Kiev, 60, Volodymyrska, 01033 Kiev, Ukraine
email: iksan@unicyb.kiev.ua
¨
MARTIN MOHLE
Mathematical Institute, University of T¨
ubingen, Auf der Morgenstelle 10, 72076 T¨
ubingen,
Germany
email: martin.moehle@uni-tuebingen.de
Submitted November 24, 2006, accepted in final form February 21, 2007
AMS 2000 Subject classification: Primary: 60F05, 60G50; Secondary: 05C05, 60E07

Keywords: coupling, random recursive tree, random walk, stable limit
Abstract
We present a short probabilistic proof of a weak convergence result for the number of cuts
needed to isolate the root of a random recursive tree. The proof is based on a coupling related
to a certain random walk.

1

Introduction and main result

Meir and Moon [9] introduced a procedure to isolate a root of a random recursive tree T with
n vertices, by the following successive deletions (cuts) of edges. One starts with choosing one
of the n− 1 edges at random and cuts this edge. This edge-removing procedure is iterated with
the subtree containing the root, and the procedure stops as soon as the root has been isolated.
For more information on (random) recursive trees and related edge-removal procedures we
refer to Janson [7, 8] and Panholzer [11].
For n ∈ N := {1, 2, . . .} let Xn denote the number of cuts needed to isolate the root of a
random recursive tree with n vertices. It is known [3] that the sequence (Xn )n∈N satisfies the
distributional recursion X1 = 0 and
d


Xn = 1 + Xn−Dn ,

n = 2, 3, . . . ,

where Dn is a random variable independent of X2 , . . . , Xn with distribution
P (Dn = k) =

n
,
(n − 1)k(k + 1)
28

k ∈ {1, . . . , n − 1}.

(1)

A limit law for the number of cuts needed to isolate the root of a random recursive tree

29


Note that (1) is equivalent to
P (Xn = j) =

n−1
n X P (Xn−k = j − 1)
,
n−1
k(k + 1)

j, n ∈ N, j < n.

(2)

k=1

Equation (2) can be viewed as a recursion on n ∈ N with initial values P (X1 = j) = δj0 ,
j ∈ N0 := {0, 1, 2, . . .}, or, alternatively, as a recursion on j ∈ N0 with initial values P (Xn =
0) = δn1 , n ∈ N, where δ denotes the Kronecker symbol.
As already pointed out in [2], there are important other interpretations for Xn . For example,

in the language of coalescent processes, Xn is the number of collision events that take place in
a Bolthausen-Sznitman n-coalescent [1] until there is just a single block. As a consequence, Xn
can be also interpreted as the absorption time of the Markov chain, which counts the number
of ancestors in a Bolthausen-Sznitman n-coalescent.
We are interested in the asymptotic behavior of Xn as n tends to infinity. The question of
finding a weak limit law for Xn was motivated by the work of Meir and Moon [9]. This problem
was unsolved for many years and, during that period, readdressed by several authors (see, for
example, Panholzer [11, p. 269]). A first proof of the following weak limit law for Xn appeared
in [3].
Theorem 1. As n tends to infinity,
(log n)2
Xn − log n − log log n
n
converges in distribution to a stable random variable X with characteristic function E(eitX ) =
exp(it log |t| − π2 |t|), t ∈ R.
Note that the same normalization as in Theorem 1 appears in [7] to derive an asymptotic
result for the number of cuts needed to isolate the root of a complete binary tree.
The proof of Theorem 1 in [3] works with analytic methods and is based on a singular analysis of generating functions. It is natural and, in our opinion, important to understand the
probabilistic structure behind Theorem 1. We therefore present a completely different, purely
probabilistic proof of Theorem 1. Our proof is considerably shorter than that given in [3] and

provides more insight in the probabilistic mechanisms behind the convergence. The key idea is
d
to replace Xn by a suitable random variable Mn with Mn = Xn . We construct Mn in such a
way that it is related (coupled) to the first passage time of a certain random walk and, hence,
easier to handle than Xn . We also mention that our coupling method is quite general and
might be useful to derive weak limit laws for other sequences (Xn )n∈N as well, but we do not
try to generalize our results here. We start with the coupling in Section 2, and prove Theorem
1 in Section 3.

2

A coupling

Let (ξi )i∈N be a sequence of independent copies of a random variable ξ with values in N. For
arbitrary but fixed n ∈ N, define a two-dimensional (coupled) process (Ri , Si )i∈N0 recursively
via (R0 , S0 ) := (0, 0) and, for i ∈ N,

(ξi , ξi ) if ξi < n − Ri−1 ,
(Ri , Si ) := (Ri−1 , Si−1 ) +
(0, ξi ) else.


30

Electronic Communications in Probability

The process (Ri , Si )i∈N0 depends on the parameter n. For convenience, we do not indicate
this dependence in our notation. The process (Si )i∈N0 is a zero-delayed random walk (Si =
ξ1 + · · · + ξi , i ∈ N0 ) and does not depend on n. The process (Ri )i∈N0 has non-decreasing
paths, starts in R0 = 0 and satisfies Ri < n for all i ∈ N0 . By induction on i it follows that
Ri ≤ Si , i ∈ N0 .
P
Let Mn := #{i ∈ N | Ri−1 6= Ri } = l≥0 1{Rl +ξl+1 n0 ,

P (Mn = j) =

n−1
1 X
pk P (Mn−k = j − 1),
1 − qn


j ∈ {1, . . . , n − 1},

k=1

where pk := P (ξ = k), qk := P (ξ ≥ k), k ∈ N, and n0 := sup{k ∈ N | qk = 1} ∈ N.

Proof. Obviously P (ξ ≥ n0 ) = 1. Hence, for fixed n ≤ n0 , the process (Ri )i is almost surely
constant equal to zero, and, therefore, M1 = · · · = Mn0 = 0 almost surely. Now fix n > n0
and let I := inf{i ∈ N| Ri > 0} denote the first jump time of the process (Ri )i . At this time,
the process (Ri )i will reach a state k ∈ {1, . . . , n − 1}. Thus, for j ∈ {1, . . . , n − 1},

P (Mn = j) =

X
X n−1

P (I = i, RI = k, Mn = j)

X n−1
X


P (ξ1 ≥ n, . . . , ξi−1 ≥ n, ξi = k, Mn = j).

i≥1 k=1

=

i≥1 k=1

(i,m)

b
We now use a renewal argument similar to those presented in [6]. For i, m ∈ N define R
0
0 and
b(i,m) := R
b (i,m) + ξi+k+1 1 b(i,m)
R
k+1
k

{R

k

ci,m := P∞ 1 b(i,m)
Then, M
l=0 {R

l

i+l+1 Nn − 1 | Ri−1 6= Ri }.

34

Electronic Communications in Probability

From time Nn − 1 on, the process (Ri )i cannot have more than (n − 1) − RNn −1 jumps,
because otherwise this process would reach a state larger than n − 1, which is impossible by
construction. Therefore,
Mn ≤ Nn − 1 + (n − 1) − RNn −1 = Nn − 1 + (n − 1) − SNn −1 ,

or,
0 ≤ Mn − Nn + 1 ≤ n − 1 − SNn −1 = Yn−1 ,
with Yn defined via (12). It remains to verify that Yn /bn → 0 in probability, where bn :=
n/(log n)2 . In order to see this fix ε > 0 and δ > 0. From
log ε + log n − 2 log log n
log(εbn )
=
→ 1,
log n
log n

n→∞

it follows that there exists a positive integer n0 = n0 (ε, δ) such that
log(εbn )
≥ 1−δ
log n

for all n > n0 .


Therefore, for n > n0 ,
P (Yn > εbn ) = P

 log Y

n

log n

>

 log Y

log(εbn ) 
n
≤ P
> 1 − δ → δ,
log n
log n

as log Yn / log n → Y in distribution by Lemma 2, with Y uniformly distributed on [0, 1]. But
δ > 0 can be chosen arbitrarily small, which shows that P (Yn > εbn ) → 0. The convergence
Yn /bn → 0 in probability is established.
Combining Proposition 1, 2, and 3 immediately yields that the convergence in Proposition 1
holds with Nn replaced by Mn or, alternatively, Xn . Thus we have found a probabilistic proof
of Theorem 1, which was the aim of this study.
Acknowledgement. The authors would like to thank Gerold Alsmeyer for helpful comments.
The work was done while A. Iksanov was visiting the Institute of Mathematical Statistics at the
University of M¨
unster in October and November 2006. He gratefully acknowledges financial
support and hospitality.

References
[1] Bolthausen, E. and Sznitman, A.-S. (1998). On Ruelle’s probability cascades and an
abstract cavity method. Comm. Math. Phys. 197, 247–276. MR1652734
[2] Drmota, M., Iksanov, A., M¨
ohle, M., and R¨
osler, U. (2007). Asymptotic results
about the total branch length of the Bolthausen-Sznitman coalescent. Stoch. Process.
Appl. 117, to appear
[3] Drmota, M., Iksanov, A., M¨
ohle, M., and R¨
osler, U. (2006). A limiting distribution for the number of cuts needed to isolate the root of a random recursive tree. Preprint,
submitted to Random Structures Algorithms

A limit law for the number of cuts needed to isolate the root of a random recursive tree

[4] Erickson, K.B. (1970). Strong renewal theorems with infinite mean. Trans. Amer. Math.
Soc. 151, 263–291. MR0268976
[5] Geluk, J.L. and De Haan, L. (2000). Stable probability distributions and their domains of attraction: a direct approach. Probab. Math. Statist. 20, 169–188. MR1785245
[6] Hinderer, K. and Walk, H. (1972). Anwendung von Erneuerungstheoremen und
Taubers¨
atzen f¨
ur eine Verallgemeinerung der Erneuerungsprozesse. Math. Z. 126, 95–
115. MR0300354
[7] Janson, S. (2004). Random records and cuttings in complete binary trees. In: Mathematics and Computer Science III, Birkh¨auser, Basel, pp. 241–253. MR2090513
[8] Janson, S. (2006). Random cutting and records in deterministic and random trees. Random Structures Algorithms 29, 139–179. MR2245498
[9] Meir, A. and Moon, J.W. (1974). Cutting down recursive trees. Math. Biosci. 21,
173–181. Math. Review number not available. Zbl 0288.05102
[10] M¨
ohle, M. (2005). Convergence results for compound Poisson distributions and applications to the standard Luria-Delbr¨
uck distribution. J. Appl. Probab. 42, 620–631.
MR2157509
[11] Panholzer, A. (2004). Destruction of recursive trees. In: Mathematics and Computer
Science III, Birkh¨
auser, Basel, pp. 267–280. MR2090518

35

Dokumen yang terkait

AN ALIS IS YU RID IS PUT USAN BE B AS DAL AM P E RKAR A TIND AK P IDA NA P E NY E RTA AN M E L AK U K A N P R AK T IK K E DO K T E RA N YA NG M E N G A K IB ATK AN M ATINYA P AS IE N ( PUT USA N N O MOR: 9 0/PID.B /2011/ PN.MD O)

0 82 16

ANALISIS FAKTOR YANGMEMPENGARUHI FERTILITAS PASANGAN USIA SUBUR DI DESA SEMBORO KECAMATAN SEMBORO KABUPATEN JEMBER TAHUN 2011

2 53 20

EFEKTIVITAS PENDIDIKAN KESEHATAN TENTANG PERTOLONGAN PERTAMA PADA KECELAKAAN (P3K) TERHADAP SIKAP MASYARAKAT DALAM PENANGANAN KORBAN KECELAKAAN LALU LINTAS (Studi Di Wilayah RT 05 RW 04 Kelurahan Sukun Kota Malang)

45 393 31

FAKTOR – FAKTOR YANG MEMPENGARUHI PENYERAPAN TENAGA KERJA INDUSTRI PENGOLAHAN BESAR DAN MENENGAH PADA TINGKAT KABUPATEN / KOTA DI JAWA TIMUR TAHUN 2006 - 2011

1 35 26

A DISCOURSE ANALYSIS ON “SPA: REGAIN BALANCE OF YOUR INNER AND OUTER BEAUTY” IN THE JAKARTA POST ON 4 MARCH 2011

9 161 13

Pengaruh kualitas aktiva produktif dan non performing financing terhadap return on asset perbankan syariah (Studi Pada 3 Bank Umum Syariah Tahun 2011 – 2014)

6 101 0

Pengaruh pemahaman fiqh muamalat mahasiswa terhadap keputusan membeli produk fashion palsu (study pada mahasiswa angkatan 2011 & 2012 prodi muamalat fakultas syariah dan hukum UIN Syarif Hidayatullah Jakarta)

0 22 0

Pendidikan Agama Islam Untuk Kelas 3 SD Kelas 3 Suyanto Suyoto 2011

4 108 178

ANALISIS NOTA KESEPAHAMAN ANTARA BANK INDONESIA, POLRI, DAN KEJAKSAAN REPUBLIK INDONESIA TAHUN 2011 SEBAGAI MEKANISME PERCEPATAN PENANGANAN TINDAK PIDANA PERBANKAN KHUSUSNYA BANK INDONESIA SEBAGAI PIHAK PELAPOR

1 17 40

KOORDINASI OTORITAS JASA KEUANGAN (OJK) DENGAN LEMBAGA PENJAMIN SIMPANAN (LPS) DAN BANK INDONESIA (BI) DALAM UPAYA PENANGANAN BANK BERMASALAH BERDASARKAN UNDANG-UNDANG RI NOMOR 21 TAHUN 2011 TENTANG OTORITAS JASA KEUANGAN

3 32 52