Sunflowers: from soil to oil

By Anup Rao

Abstract

A sunflower is a collection of sets whose pairwise intersections are identical. In this article, we shall go sunflower-picking. We find sunflowers in several seemingly unrelated fields, before turning to discuss recent progress on the famous sunflower conjecture of Erdős and Rado, made by Alweiss, Lovett, Wu, and Zhang, as well as a related resolution of the threshold vs expectation threshold conjecture of Kahn and Kalai discovered by Park and Pham. We give short proofs for both of these results.

1. Sunflowers

Figure 1.

A sunflower with four petals

Graphic without alt text

The moral of Ramsey theory is that large systems can exhibit surprising structure. There are many examples of this kind, starting with the prototypical one: every graph on vertices either contains a clique⁠Footnote1 on vertices or an independent set⁠Footnote2 on vertices. Roth’s theorem Reference 15 proves that every subset of of density must contain an arithmetic progression.⁠Footnote3 The Hales–Jewett theorem Reference 9 and the Ajtai–Szemerédi corner theorem Reference 1 are other examples of this phenomenon.

1

Mutually adjacent vertices

2

Mutually nonadjacent vertices

3

Three numbers

A sunflower with petals is a collection of sets whose pairwise intersections are identical. The common intersection is called the core. In 1960, Erdős and Rado Reference 4 proved a Ramsey theoretic result concerning sunflowers: every large collection of sets must contain a sunflower. They gave a simple inductive argument showing that every collection of more than sets of size at most must contain a sunflower with petals.⁠Footnote4 There are examples with sets that have no sunflowers, and they conjectured that the correct bound is .

4

Often the sunflower lemma is stated under the assumption that each set is of size exactly rather than at most . Here we use the more general form because many applications rely on this form, and all of the ideas for proving the lemmas carry through.

The seeds were planted, and the search for sunflowers and sunflower lemmas began in earnest.

We begin this article by taking a tour through various fields where sunflowers are essential. We shall see examples relevant to finding arithmetic progressions in sumsets, understanding models of computation such as monotone boolean circuits and data structures, and we ask fundamental questions about the threshold of a monotone function. In each of these arenas, we skip details and zoom in to focus on the role played by sunflowers.

In 2019, Alweiss, Lovett, Wu, and Zhang Reference 2 made significant progress toward proving the sunflower conjecture. Subsequent refining by myself Reference 13, Frankston, Kahn, Narayanan, and Park Reference 7, and Bell, Chueluecha, and Warnke Reference 3 led to the result that every collection of sets of size at most must contain a sunflower with petals. A few months later, some of these ideas were used by Park and Pham Reference 11 to give a surprisingly simple and elegant resolution of the threshold vs expectation threshold conjecture of Kahn and Kalai Reference 10. In this article, we present a version of these arguments that give the easiest proofs yet. In fact, we give a single argument that simultaneously proves the sunflower bound and resolves the conjecture about thresholds.

2. Arithmetic progressions in sumsets

In 1992, Erdős and Sárközy Reference 5 used sunflowers to find arithmetic progressions in subset sums. Given a set , let denote the quantity . Then they proved:

Theorem 1 (Reference 5).

Given any set of size , there are subsets , …, , with , such that the sequence , …, is an arithmetic progression.

Much like the sunflower lemma, this is an example of finding structure in a large system. However, the structure we seek here is an arithmetic progression; what does this have to do with sunflowers? Erdős and Sárközy move between the two structures as follows. First, by counting the number of possible sums that can be obtained by subsets of and estimating a binomial coefficient, they show that some subsets of of size must attain the same sum. By the sunflower lemma, and the choice of parameters, this collection of sets is guaranteed to contain a sunflower. The proof is completed by Claim 2, whose proof we leave as an exercise (Figure 2):

Claim 2.

If , …, is a sunflower with core , , and , then

is an arithmetic progression.

3. Monotone circuit lower bounds

Sunflowers have had a huge impact in theoretical computer science. Perhaps the most well-known example is Razborov’s proof from 1985 Reference 14 that there are no small monotone circuits computing the clique function. Here, we give a cartoon description of this clever argument.

A boolean circuit computes with the help of gates implementing boolean logic. These logic gates can compute the OR, AND, or negation of their inputs. The inputs to the gates are either the outputs of other gates or input variables. The size of the circuit is the number of wires used, which is the same as the number of connections made between gates. A monotone circuit is a boolean circuit that does not have any gates computing negations. The circuit computes a function if there is a gate whose value is equal to the value of the function, for every choice of the input variables.

For a graph on vertices and a set of vertices, define

The function of interest for us is

which computes whether or not the graph contains a clique of size . Razborov’s argument leads to Theorem 3:

Theorem 3 (Reference 14).

For every and large enough, every monotone circuit computing must have size at least .

Razborov proves that this function requires exponentially large monotone circuits, if . Razborov’s result is one of the few examples where we are able to prove lower bounds on reasonable models of computation—it is a gem of theoretical computer science.

At a high level, sunflowers are used critically to show that any circuit computing can be used to obtain a smaller circuit with the same ability. Each such step involves a tiny error. We obtain a good approximation to the original circuit that is so simple that we can directly reason that it does not work. This proves that the original circuit does not work either.

Now, let us give a few more details. Let be a graph on vertices that contains a uniformly random clique of size and no other edges. Let be a uniformly random -partite graph. always contains a clique of size , while never contains a clique of size . A monotone circuit computing the clique function would have to output on and on . An input variable to the circuit is the indicator for the presence of an edge, which can be thought of as for some set of size .

Let us discuss how to approximate the circuit by a simpler circuit. First, we claim that can be safely replaced by . This is because by the choice of ,

and by the choice of ,

Thus, carrying out this approximation preserves the ability of the circuit to distinguish from , while reducing the size of the circuit.

Sunflowers play a key role in approximating OR gates, via Claim 4:

Claim 4.

If , …, form a sunflower with core and all sets are of size at most , then

and with high probability over the choice of ,

When the input is , the claim is trivial. When the input is , the approximation causes a problem if there is a clique on in , yet none of the petals constitute a clique. This is extremely unlikely to happen: given that the core is a clique, the events that the petals are also cliques are independent, and the choice of parameters ensures that each occurs with probability . So, one can argue that one of the petals will be a clique with probability .

Thus, if is large enough, any expression of the type

can be approximated by a smaller expression of the same type—use the sunflower lemma to find a sunflower among the sets and replace it by the core. Repeatedly applying these operations, one can show that any arbitrary small monotone circuit can be approximated by a circuit whose structure is so simple that it is trivial to verify that it cannot distinguish from .

4. Lower bounds for data structures

Data structures are a fundamental concept in computer science. They are used to efficiently maintain an object so that the object can be quickly modified and queried. Our next example is a lower bound on the running time of data structures for the problem of maintaining a set and computing its minimum. From my recent work with Ramamoorthy Reference 12, building on ideas from Reference 6Reference 8, our work shows the following:

Theorem 5 (Reference 12).

Any nonadaptive data structure of word size that allows us to add or delete elements from a subset of and compute the minimum element of the set must access locations for some operation.

The result is independent of the algorithm used to implement the data structure and the particular encoding of the data (namely ) used; the argument only relies on the sets of locations that the data structure reads and writes to. A valid data structure for our purposes is one that encodes the set as a vector . The data structure is associated with a family of subsets of the coordinates of the encoding and an algorithm for manipulating . For each , the algorithm is able change to either or by reading and writing to the coordinates of given by . The algorithm can compute the minimum of by reading the coordinates given by . Under just these assumptions, the argument proves that some set must be of size .

If all of the sets , , …, are of size , the choice of parameters implies that there is a sunflower among the sets , , …, . Suppose the sunflower corresponds to , …, , with and core . By construction, we must have . The key claim is the following:

Claim 6.

If , …, is a sunflower with core , then every subset of has an encoding as a vector in .

This claim combined with a straightforward counting argument implies that , proving that one of the sets must be large. To prove the claim, for any set , arrive at its encoding by deleting the elements of the set from the encoding of . After this process, every coordinate of for has the same value that it had after the elements of were inserted. The claimed encoding corresponds to the contents of the core at this point, which is a string in . can be recovered from the encoding by computing the minimum of , then deleting the minimum, then computing the minimum and deleting it, and repeating these operations over and over until the entire set has been recovered. The minimum can always be computed using the core, since . Because for , , one never needs to keep track of the contents of coordinates outside the core; the contents of the core are enough to simulate the entire process and determine .

5. Estimating the threshold of monotone functions

Suppose we sample a random graph by including each edge independently with probability . How can we estimate the probability that the graph contains a perfect matching?

This is a special case of a more general question. Let denote the set of subsets of , and let be a monotone function, meaning that implies that . Let be sampled by including each independently with probability . Because is monotone, is increasing in . The threshold of is the value of for which . There are a couple of generic ways to bound , and these bounds induce other kinds of thresholds that capture something about the structure of . These ideas were explored extensively by Kahn and Kalai Reference 10, Talagrand Reference 16, Frankston, Kahn, Narayanan, and Park Reference 7, and Park and Pham Reference 11.

Given a family of sets and a set , define the shadow . It is easy to see that every monotone function admits a minimal collection of sets such that for . Moreover, if is the minimal family for , then if and only if . So, by the union bound,

More generally, for every monotone function with , meaning that for all , we have the bound,

where here is the family of minimal sets of .

The expectation threshold of is the largest value of for which the right-hand side of Equation 5.2 is equal to for some monotone with . By Equation 5.2, the threshold is always at least the expectation threshold. When computes whether or not a graph has a perfect matching, the threshold is , while the expectation threshold is . Kahn and Kalai conjectured that this is the worst possible ratio: the threshold is always at most times larger than the expectation threshold.

In general, the above union bound can be quite far from tight. It is not tight when the events have intersections of significant measure. There is a more sophisticated way to get upper bounds on , as observed by Talagrand Reference 16—it can be thought of as a fractional variant of the union bound discussed above. Suppose there is a probability distribution on and satisfying

for all sets . Then we obtain the upper bound,

since for any fixed , the probability that is exactly .

The fractional-expectation threshold is the largest value of for which there is a satisfying the above condition with . The union bound of Equation 5.2 can also be proved using Equation 5.3, because if and is the set of minimal sets of , then we can sample so that

then because , we have that for any

proving Equation 5.2. So, the bound given by Equation 5.3 is certainly at least as good as the bound given by Equation 5.2. In particular, this implies that the threshold is at least as large as the fractional-expectation threshold, which in turn is at least the expectation threshold. But how far apart can these numbers be?

Talagrand conjectured that the fractional-expectation threshold is within a multiplicative factor of from the threshold and within an factor of the expectation threshold. Following recent progress on the sunflower lemma, Frankston, Kahn, Narayanan, and Park Reference 7 proved that the fractional-expectation-threshold is within of the threshold, thus resolving Talagrand’s first conjecture. Subsequently, Park and Pham proved that the expectation threshold is within a factor of the threshold, resolving Kahn and Kalai’s conjecture:

Theorem 7 (Reference 11).

For any monotone function , the threshold is at most times larger than the expectation threshold.

This allows us to compute the threshold for many graph properties, such as perfect matchings, Hamiltonian circuits, and bounded degree spanning trees. The ideas used to prove new sunflower lemmas play a key role in these proofs.

Talagrand made an important observation that suggests a definition that is ultimately used to prove the improved sunflower lemma. Suppose that is the smallest number for which there is a establishing Equation 5.3. Then by von Neumann’s minimax theorem, there is a distribution on such that for every choice of ,

Without loss of generality, we may assume that is supported on the minimal sets of , since we can always modify the distribution in this way and preserve the inequality. So, after making this change, we can rewrite Equation 5.4 as

This shows that has a very interesting property: it is spread, in the sense that it is unlikely to contain any fixed set : for .

The ideas used to prove the sunflower lemma are ultimately useful in proving the threshold vs expectation threshold conjecture, as well as the threshold vs fractional-expectation threshold conjecture. Let us briefly put on hold our study of these thresholds to discuss how the concept of being “spread” is useful in proving the new sunflower bound.

6. Sunflowers in spread families

At last we return to the sunflower question: how many sets of size are sufficient to ensure the presence of a sunflower with petals? Alweiss, Lovett, Wu, and Zhang discovered an elementary counting argument that is surprisingly powerful in helping answer this question.

Given a collection of sets, let be uniformly random. As in Section 5, we shall say that is -spread (for some parameter ) if for every set , . Now, suppose . If is not -spread, then there is a set such that the family has at least sets. In this case, we inductively find a sunflower in the family of sets of size at most obtained by deleting from the sets of . Adding back into this sunflower gives us a sunflower in our original family of sets. So, it only remains to find sunflowers in spread families.

We prove Claim 8 in Section 7. (All logarithms are computed base ).

Claim 8.

For , if is such that is -spread and is a uniformly random set of size , then .

Assuming the claim, let , …, be a random partition of the universe into sets, and set , so . Claim 8 implies that at least of these sets will contain a set of the family in expectation, and so there must be mutually disjoint sets—a sunflower with petals.

7. A clever counting argument

Finally, we arrive at the key technical theorem which will help us prove the new sunflower bound as well as resolve the threshold vs expectation threshold conjecture. Recall that we defined the shadow , and is -spread if . We prove:

Theorem 9.

Let be a family of sets of size at most . Then there is a distribution on pairs , where is a uniformly random set of size and is a family of sets, such that either or for every , and yet for any -spread that is independent of with , we have .

Let us first use the theorem to complete our proofs of the sunflower lemma and the threshold vs expectation threshold conjecture.

7.1. Sunflower lemma

To prove Claim 8, let be the given family, and let be a uniformly random set of , which is -spread with . By the theorem, implies that and so , proving Claim 8.

7.2. Threshold vs expectation threshold

Let be the family of minimal sets of the given monotone function and . Let be the threshold of , so . Standard concentration bounds imply that there must be a number with such that if is chosen to be a uniformly random set with , then . For ease of presentation, let us assume that .

Let denote the monotone function whose family of minimal sets is . By the theorem, either or , so

If is the distribution on sets where each element is included in independently with probability , then is -spread, so the theorem guarantees that . By Markov’s inequality,

But Equation 7.1 and Equation 7.2 imply that there is a fixed choice of such that and , proving the threshold vs expectation threshold conjecture.

7.3. Proving Theorem 9

Let , , …, be uniformly random disjoint sets of size . Here all logarithms are computed base . Our goal is to use , …, to define sets , …, . We shall then set and .

Let denote , and let denote . Define , …, iteratively as follows. For each and for , include in if and only if

(i)

, and

(ii)

is a minimal set of .

Intuitively, the above process attempts to cover all the sets of . In each step, we discard the elements of that have already been covered and proceed to cover more elements by including sets of size at least in . By the time , we will cover all remaining sets that are not included in . So, a set of is left uncovered in this process only if it is contained in .

We give an upper bound on the expected number of sets of size as follows. Fix , , .

(i)

There are at most choices for the set with . We have

(ii)

Given , let be the smallest set of that is contained in ; break ties by picking the lexicographically first set. It must be that , or else would have been included in . Furthermore, , or would be a strict subset of , and would not be included in . So, there can be at most choices for consistent with .

The above count shows that the expected number of sets of size in is at most . Thus, we can bound

This proves the theorem.

8. Conclusion

Sunflowers have had an enormous impact in a surprising number of different fields. They are certain to spring up in new places in the future. The counting method of Reference 2 has already found applications in places where there are no sunflowers. It is an exciting time to be playing with these concepts!

Acknowledgments

Thanks to Paul Beame and Shachar Lovett for useful comments.

About the author

Anup Rao is a professor of computer science at the University of Washington. He works on topics related to complexity theory and is the author of a textbook on communication complexity.

Figures

Figure 2.

Four petals induces an arithmetic progression of length .

Graphic without alt text

Mathematical Fragments

Claim 2.

If , …, is a sunflower with core , , and , then

is an arithmetic progression.

Theorem 3 (Reference 14).

For every and large enough, every monotone circuit computing must have size at least .

Claim 4.

If , …, form a sunflower with core and all sets are of size at most , then

and with high probability over the choice of ,

Equation (5.2)
Equation (5.3)
Equation (5.4)
Claim 8.

For , if is such that is -spread and is a uniformly random set of size , then .

Theorem 9.

Let be a family of sets of size at most . Then there is a distribution on pairs , where is a uniformly random set of size and is a family of sets, such that either or for every , and yet for any -spread that is independent of with , we have .

Equation (7.1)
Equation (7.2)

References

[1]
M. Ajtai and E. Szemerédi, Sets of lattice points that form no squares, Studia Sci. Math. Hungar. 9 (1974), 9–11 (1975). MR369299, Show rawAMSref\bib{AjtaiS74}{article}{ author={Ajtai, M.}, author={Szemer\'{e}di, E.}, title={Sets of lattice points that form no squares}, journal={Studia Sci. Math. Hungar.}, volume={9}, date={1974}, pages={9--11 (1975)}, issn={0081-6906}, review={\MR {369299}}, } Close amsref.
[2]
R. Alweiss, S. Lovett, K. Wu, and J. Zhang, Improved bounds for the sunflower lemma, STOC ’20—Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, ACM, New York, [2020] ©2020, pp. 624–630, DOI 10.1145/3357713.3384234. MR4141787, Show rawAMSref\bib{AlweissL0Z20}{article}{ author={Alweiss, Ryan}, author={Lovett, Shachar}, author={Wu, Kewen}, author={Zhang, Jiapeng}, title={Improved bounds for the sunflower lemma}, conference={ title={STOC '20---Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing}, }, book={ publisher={ACM, New York}, }, date={[2020] \copyright 2020}, pages={624--630}, review={\MR {4141787}}, doi={10.1145/3357713.3384234}, } Close amsref.
[3]
T. Bell, S. Chueluecha, and L. Warnke, Note on sunflowers, Discrete Math. 344 (2021), no. 7, Paper No. 112367, 3, DOI 10.1016/j.disc.2021.112367. MR4240687, Show rawAMSref\bib{BellCW21}{article}{ author={Bell, Tolson}, author={Chueluecha, Suchakree}, author={Warnke, Lutz}, title={Note on sunflowers}, journal={Discrete Math.}, volume={344}, date={2021}, number={7}, pages={Paper No. 112367, 3}, issn={0012-365X}, review={\MR {4240687}}, doi={10.1016/j.disc.2021.112367}, } Close amsref.
[4]
P. Erdős and R. Rado, Intersection theorems for systems of sets, J. London Math. Soc. 35 (1960), 85–90, DOI 10.1112/jlms/s1-35.1.85. MR111692, Show rawAMSref\bib{ErdosR60}{article}{ author={Erd\H {o}s, P.}, author={Rado, R.}, title={Intersection theorems for systems of sets}, journal={J. London Math. Soc.}, volume={35}, date={1960}, pages={85--90}, issn={0024-6107}, review={\MR {111692}}, doi={10.1112/jlms/s1-35.1.85}, } Close amsref.
[5]
P. Erdős and A. Sárközy, Arithmetic progressions in subset sums, Discrete Math. 102 (1992), no. 3, 249–264, DOI 10.1016/0012-365X(92)90119-Z. MR1169145, Show rawAMSref\bib{ErdosS92}{article}{ author={Erd\H {o}s, P.}, author={S\'{a}rk\"{o}zy, A.}, title={Arithmetic progressions in subset sums}, journal={Discrete Math.}, volume={102}, date={1992}, number={3}, pages={249--264}, issn={0012-365X}, review={\MR {1169145}}, doi={10.1016/0012-365X(92)90119-Z}, } Close amsref.
[6]
G. S. Frandsen, P. B. Miltersen, and S. Skyum, Dynamic word problems, J. ACM 44 (1997), no. 2, 257–271, DOI 10.1145/256303.256309. MR1470586, Show rawAMSref\bib{FrandsenMS97}{article}{ author={Frandsen, Gudmund Skovbjerg}, author={Miltersen, Peter Bro}, author={Skyum, Sven}, title={Dynamic word problems}, journal={J. ACM}, volume={44}, date={1997}, number={2}, pages={257--271}, issn={0004-5411}, review={\MR {1470586}}, doi={10.1145/256303.256309}, } Close amsref.
[7]
K. Frankston, J. Kahn, B. Narayanan, and J. Park, Thresholds versus fractional expectation-thresholds, Ann. of Math. (2) 194 (2021), no. 2, 475–495, DOI 10.4007/annals.2021.194.2.2. MR4298747, Show rawAMSref\bib{FrankstonKNP19}{article}{ author={Frankston, Keith}, author={Kahn, Jeff}, author={Narayanan, Bhargav}, author={Park, Jinyoung}, title={Thresholds versus fractional expectation-thresholds}, journal={Ann. of Math. (2)}, volume={194}, date={2021}, number={2}, pages={475--495}, issn={0003-486X}, review={\MR {4298747}}, doi={10.4007/annals.2021.194.2.2}, } Close amsref.
[8]
A. Gál and P. B. Miltersen, The cell probe complexity of succinct data structures, Theoret. Comput. Sci. 379 (2007), no. 3, 405–417, DOI 10.1016/j.tcs.2007.02.047. MR2329209, Show rawAMSref\bib{GalM07}{article}{ author={G\'{a}l, Anna}, author={Miltersen, Peter Bro}, title={The cell probe complexity of succinct data structures}, journal={Theoret. Comput. Sci.}, volume={379}, date={2007}, number={3}, pages={405--417}, issn={0304-3975}, review={\MR {2329209}}, doi={10.1016/j.tcs.2007.02.047}, } Close amsref.
[9]
A. W. Hales and R. I. Jewett, Regularity and positional games, Trans. Amer. Math. Soc. 106 (1963), 222–229, DOI 10.2307/1993764. MR143712, Show rawAMSref\bib{HalesJ63}{article}{ author={Hales, A. W.}, author={Jewett, R. I.}, title={Regularity and positional games}, journal={Trans. Amer. Math. Soc.}, volume={106}, date={1963}, pages={222--229}, issn={0002-9947}, review={\MR {143712}}, doi={10.2307/1993764}, } Close amsref.
[10]
J. Kahn and G. Kalai, Thresholds and expectation thresholds, Combin. Probab. Comput. 16 (2007), no. 3, 495–502, DOI 10.1017/S0963548307008474. MR2312440, Show rawAMSref\bib{KahnK07}{article}{ author={Kahn, Jeff}, author={Kalai, Gil}, title={Thresholds and expectation thresholds}, journal={Combin. Probab. Comput.}, volume={16}, date={2007}, number={3}, pages={495--502}, issn={0963-5483}, review={\MR {2312440}}, doi={10.1017/S0963548307008474}, } Close amsref.
[11]
Jinyoung Park and Huy Tuan Pham, A proof of the Kahn–Kalai conjecture, arXiv:2203.17207, 2022.
[12]
S. Natarajan Ramamoorthy and A. Rao, Lower bounds on non-adaptive data structures maintaining sets of numbers, from sunflowers, 33rd Computational Complexity Conference, LIPIcs. Leibniz Int. Proc. Inform., vol. 102, Schloss Dagstuhl. Leibniz-Zent. Inform., Wadern, 2018, pp. Art. No. 27, 16. MR3824478, Show rawAMSref\bib{RamamoorthyR18}{article}{ author={Natarajan Ramamoorthy, Sivaramakrishnan}, author={Rao, Anup}, title={Lower bounds on non-adaptive data structures maintaining sets of numbers, from sunflowers}, conference={ title={33rd Computational Complexity Conference}, }, book={ series={LIPIcs. Leibniz Int. Proc. Inform.}, volume={102}, publisher={Schloss Dagstuhl. Leibniz-Zent. Inform., Wadern}, }, date={2018}, pages={Art. No. 27, 16}, review={\MR {3824478}}, } Close amsref.
[13]
A. Rao, Coding for sunflowers, Discrete Anal., posted on 2020, Paper No. 2, 8, DOI 10.19086/da. MR4072543, Show rawAMSref\bib{Rao20}{article}{ author={Rao, Anup}, title={Coding for sunflowers}, journal={Discrete Anal.}, date={2020}, pages={Paper No. 2, 8}, review={\MR {4072543}}, doi={10.19086/da}, } Close amsref.
[14]
A. A. Razborov, Lower bounds on the monotone complexity of some Boolean functions (Russian), Dokl. Akad. Nauk SSSR 281 (1985), no. 4, 798–801. MR785629, Show rawAMSref\bib{Razborov85}{article}{ author={Razborov, A. A.}, title={Lower bounds on the monotone complexity of some Boolean functions}, language={Russian}, journal={Dokl. Akad. Nauk SSSR}, volume={281}, date={1985}, number={4}, pages={798--801}, issn={0002-3264}, review={\MR {785629}}, } Close amsref.
[15]
K. F. Roth, On certain sets of integers, J. London Math. Soc. 28 (1953), 104–109, DOI 10.1112/jlms/s1-28.1.104. MR51853, Show rawAMSref\bib{Roth53}{article}{ author={Roth, K. F.}, title={On certain sets of integers}, journal={J. London Math. Soc.}, volume={28}, date={1953}, pages={104--109}, issn={0024-6107}, review={\MR {51853}}, doi={10.1112/jlms/s1-28.1.104}, } Close amsref.
[16]
M. Talagrand, Are many small sets explicitly small?, STOC’10—Proceedings of the 2010 ACM International Symposium on Theory of Computing, ACM, New York, 2010, pp. 13–35. MR2743011, Show rawAMSref\bib{Talagrand10}{article}{ author={Talagrand, Michel}, title={Are many small sets explicitly small?}, conference={ title={STOC'10---Proceedings of the 2010 ACM International Symposium on Theory of Computing}, }, book={ publisher={ACM, New York}, }, date={2010}, pages={13--35}, review={\MR {2743011}}, } Close amsref.

Article Information

MSC 2020
Primary: 05-XX (Combinatorics)
Author Information
Anup Rao
University of Washington
anuprao@cs.washington.edu
Additional Notes

This exposition appears as a companion piece to a talk given at the Current Events Bulletin at the Joint Mathematical Meeting of the AMS in 2022.

Journal Information
Bulletin of the American Mathematical Society, Volume 60, Issue 1, ISSN 1088-9485, published by the American Mathematical Society, Providence, Rhode Island.
Publication History
This article was received on and published on .
Copyright Information
Copyright 2022 American Mathematical Society
Article References

Settings

Change font size
Resize article panel
Enable equation enrichment

Note. To explore an equation, focus it (e.g., by clicking on it) and use the arrow keys to navigate its structure. Screenreader users should be advised that enabling speech synthesis will lead to duplicate aural rendering.

For more information please visit the AMS MathViewer documentation.