4.1 The Theory Behind the Flag Algebra Approach
Suppose we have a (possibly empty) family
\({\mathcal {X}}\) of
forbidden graphs. Let
\({\mathcal {G}}_n = {\mathcal {G}}_n({\mathcal {X}})\) denote set of all graphs up to isomorphism of some given order
n not containing any graph in
\({\mathcal {X}}\) as an induced subgraph and write
\({\mathcal {G}}= {\mathcal {G}}({\mathcal {X}}) = \bigcup _{n \in {\mathbb {N}}} {\mathcal {G}}_n ({\mathcal {X}})\). For two graphs
G and
H we let
\(d_H(G)\) denote the
induced subgraph density of
H in
G, that is the probability that |
V(
H)| vertices chosen uniformly at random in
G induce a copy of
H. Consider a graph parameter
\(\lambda : {\mathcal {G}}\rightarrow {\mathbb {R}}\) for which there exists some
\(n_0 \in {\mathbb {N}}\) such that
\(\lambda \) satisfies the averaging equality
$$\begin{aligned} \lambda (G) = \sum _{H \in {\mathcal {G}}_n} d_H(G) \, \lambda (H) \end{aligned}$$
(6)
for any
\(n \ge n_0\) and
\(G \in {\mathcal {G}}\) of order at least
n. We note that the results in this paper are limited to families of forbidden graphs
\({\mathcal {X}}= \emptyset \) and
\({\mathcal {X}}= \{K_t\}\) as well as the graph parameter
\(\lambda (G) = d_{K_s}({\overline{G}}) + d_{K_t}(G)\), which clearly satisfies Eq. (
6) with
\(n_0 = \max \{s,t\}\).
For any infinite subset
\({\mathcal {H}}\subseteq {\mathcal {G}}\), we write
$$\begin{aligned} \lambda (n, {\mathcal {H}}) = \min _{G \in {\mathcal {H}}\cap {\mathcal {G}}_n} \lambda (G) \quad \text {and} \quad \lambda ({\mathcal {H}}) = \liminf _{n \rightarrow \infty } \lambda (n, {\mathcal {H}}) \end{aligned}$$
where for notational convenience
\(\lambda (n, {\mathcal {H}}) = \infty \) when
\({\mathcal {H}}\cap {\mathcal {G}}_n = \emptyset \). We are of course primarily interested in studying
\(\lambda ({\mathcal {G}})\), though we keep the notation general, as we will need it when establishing stability. Note that a trivial lower bound that follows from Eq. (
6) is
\(\lambda ({\mathcal {G}}) \ge \lambda (m, {\mathcal {G}})\) for any arbitrary
\(m \ge n_0\).
The goal of the flag algebra approach is to establish the existence of coefficents
\(a_H \in {\mathbb {R}}\) for some fixed
\(m \in {\mathbb {N}}\) satisfying the inequality
$$\begin{aligned} \sum _{H \in {\mathcal {G}}_m} d_H(G) \, a_H + o(1) \ge 0 \end{aligned}$$
(7)
for any
G of order at least
m, as this implies the, hopefully improved, lower bound of
$$\begin{aligned} \lambda ({\mathcal {G}}) \ge \min _{H \in {\mathcal {G}}_m} \{ \lambda (H) - a_H \}. \end{aligned}$$
(8)
In order to establish the type of coefficients commonly achieved through the solution of an SDP, we will need some additional notation. Note that the term
strong (graph) homomorphism between two (potentially looped) graphs
\(G_1\) and
\(G_2\) refers to any map
\(\psi : V(G_1) \rightarrow V(G_2)\) satisfying
\(\{v_1, v_2\} \in E(G_1)\) if and only if
\(\{\psi (v_1), \psi (v_2)\} \in E(G_2)\).
We will denote the set of all \(\tau \)-flags of order \(l \ge v\) by \({\mathcal {F}}_{\tau }^{l}\). Let \(F, F' \in {\mathcal {F}}_{\tau }^{l}\) be two \(\tau \)-flags of same order and \(H \in {\mathcal {G}}\) an arbitrary graph of order at least \(2l - v\). Let \(\theta :[v] \hookrightarrow V(H)\) be an arbitrary injective map implying a partial labelling of H (but not necessarily turning \((H, \theta )\) into a \(\tau \)-flag) and write \(d^{\theta }_F(H)\) for the probability that \(l-v\) vertices selected uniformly at random in \(V(H) \setminus \theta ([v])\) together with the vertices labelled by \(\theta \) induce a flag isomorphic to F. Obviously this value is 0 whenever \((H, \theta )\) is not a \(\tau \)-flag. We will write \(d_F(H) = {\mathbb {E}}_{\theta } \, d^{\theta }_F(H)\) for the flag density, where we are taking the uniform distribution over all possible injective maps \(\theta \). We will likewise write \(d^{\theta }_{F, F'}(H)\) for the probability that a subset \(S_1\) of \(V(H) \setminus \theta ([v])\) of size \(l-v\) chosen uniformly at random together with the vertices labelled through \(\theta \) is isomorphic to F and that another subset \(S_2\) of \(V(H) \setminus \big ( \theta ([v]) \cup S_1 \big )\) of size \(l-v\) chosen uniformly at random together with the vertices labelled through \(\theta \) is isomorphic to \(F'\). We will write \(d_{F,F'}(H) = {\mathbb {E}}_{\theta } \, d^{\theta }_{F, F'}(H)\) for the flag pair density.
We note that Eq. (
6) holds for the flag pair density when
\(m \ge 2l-v\), that is
$$\begin{aligned} d_{F, F'}(G) = \sum _{H \in {\mathcal {G}}_m} d_H(G) \, d_{F, F'}(H) \end{aligned}$$
(9)
for arbitrary
\(G \in {\mathcal {G}}\). We also note that
\(d_F^{\theta }(G) \, d_{F'}^{\theta }(G) = d_{F, F'}^{\theta }(G) + O(1/n)\) and hence
$$\begin{aligned} {\mathbb {E}}_{\theta } d_F^{\theta }(G) \, d_{F'}^{\theta }(G) = d_{F, F'}(G) + O(1/n). \end{aligned}$$
(10)
Using this notation, we can now state the heart of the SDP-based flag algebra approach.
This proposition motivates the following SDP formulation: given two symmetric matrices
A and
B of equal size, we will use the inner product
\(\langle A,B \rangle = \text {tr}(A^T B)\). Write
\(D^{(i)}(H)\) for the symmetric matrix of size
\(|{\mathcal {F}}_{\tau _i}^{l_i}| \times |{\mathcal {F}}_{\tau _i}^{l_i}|\) for
\(1 \le i \le r\) whose entries are given by
\(d_{F,F'}(H)\) when using flags
\(F \in {\mathcal {F}}_{\tau _i}^{l_i}\) as indices. Write
\(D_H\) for the symmetric block diagonal matrix with the integer 1 as its first and
\(D^{(i)}(H)\) as the following blocks for
\(1 \le i \le r\). Finally, let
C denote the matrix of equal size to
\(D_H\) with all-zero entries except for the first, which is 1. We are now interested in solving
$$\begin{aligned} \max _{X \succeq 0}&\quad \langle C, X \rangle \\ \text {subject to}&\quad \langle D_H, X \rangle \le \lambda (H) \quad \text {for all } H \in {\mathcal {G}}_m. \nonumber \end{aligned}$$
Finding a positive semi-definite matrices
X that solves this SDP is equivalent to finding
\({\mathcal {Q}}^{(i)}\) that maximize the right hand side of Eq. (
11). Of course, most actual solvers will take advantage of the block-diagonal structure that we may assume for
X given the problem formulation, rather than optimizing over the whole space of positive semi-definite matrices.
4.2 Establishing Stability and Exactness
After finding matching upper and lower bounds, it is natural to ask whether the construction is unique and stability holds, i.e., if anything that comes close to the optimal value must be close to the extremal construction. Statements like this can usually be derived by extracting additional information from a flag algebra based proof and appealing to the Induced Removal Lemma of Alon et al. [
1]. Pikhurko et al. [
65] formalized this process, establishing sufficient criteria for various stability forms. We will present this succinctly while highlighting two improvements: introducing and strengthening the notion of
reconstructors to derive stability from smaller Flag-Algebra-based proofs, and formalizing an argument for establishing the optimal weighting of a blow-up. Let us start by establishing some additional notions relating to Theorem
4.2.
A graph that is not sharp asymptotically does not appear as a subgraph in any extremal sequence, see for example Lemma 4.1 in [
66] for a proof of this statement.
Sharp graphs therefore usually give a good indication of which graphs can occur as subgraphs in an extremal sequence and have in the past been used to find novel constructions.
If a certificate
\((m, (\tau _i), ({\mathcal {Q}}^{(i)}) )\) is sufficiently large in relation to our believed extremal construction
C, say
\(m \ge |V(C)| + 1\), and stability is believed to hold, then establishing it is often a reasonably straight-forward matter of verifying that the only sharp graphs are those that occur with positive density in the blow-up sequence of
C and then invoking the Induced Removal Lemma. This is often far beyond the realm of being computationally feasible, so we need a way to establish the structure of a construction
C using only graphs of order
m, where
m is preferably as small as possible. This was already done implicitly in [
66] and the same ideas can also be found in [
65], where some sufficient requirements are part of the general criteria stated there. We find it helpful though to state the exact requirements separately from the statements used to establish the stability result, as this is the place were the most can be achieved using ad-hoc arguments invoking the structure of
C. This motivates the following definition.
Let us introduce some additional notions. For a given graph C, we say that a graph T uniquely embeds into C if there exists a strong homomorphism \(\psi : V(T) \rightarrow V(C)\) and \(\psi \) is unique up to automorphism, that is for any additional strong homomorphism \(\psi ': V(T) \rightarrow V(C)\) there must exist \(\varphi _T \in \text {Aut}(T)\) and \(\varphi _C \in \text {Aut}(C)\) such that \(\varphi _C \circ \psi ' \circ \varphi _T \equiv \psi \). For a set of vertices \(X \subseteq V(C)\), we write \(N_{C,X}(v) = N_C(v) \cap X\) for the neighborhood of any \(v \in V(C)\) in X. We let \(\sim _X\) denote the equivalence relationship induced in V(C) by \(N_{C,X}\) and \([v]_X\) the equivalence class containing \(v \in V(C)\). We say X defines unique neighborhoods in C if \([v]_X = \{v\}\) for all \(v \in V(C)\).
It is easy to see that a graph
C is an
\(\ell \)-reconstructor of itself if
\(|V(C)| \le \ell -1\). More commonly though, the following lemma is used, which is also implicit in Theorem 4.1 in [
65].
A more technical but stronger condition was previously already implicitly formulated in [
66] to establish stability of the Clebsch graph for
\(g_{6,3}\) using a certificate with
\(m = 7\). Here we further strengthen it in the form of the following lemma.
Proof
Let some arbitrary graph
G satisfying the assumptions of Definition
4.5 be given. Fix a copy of
C[
X] in
G that is guaranteed to exist by assumption (i) of Definition
4.5, that is fix
\(Y \subseteq V(G)\) such that
\(G[Y] \cong C[X]\) and let
\(\psi : Y \hookrightarrow X\) be the corresponding graph isomorphism. The goal is to construct a strong homomorphism
\(\varphi : V(G) \rightarrow V(C)\) satisfying
\(\varphi \vert _Y \equiv \psi \) given the requirements of the lemma and the assumptions of a reconstructor.
Let us first assume that
\(|X| = |X'| \le \ell - 1\), that is in particular
\(X = X'\). By assumption (ii) of Definition
4.5, there exists a strong homomorphism
\(\varphi _v: Y \cup \{v\} \rightarrow V(C)\) for any vertex
\(v \in V(G)\) since
\(|Y \cup \{v\}| \le \ell \). As
C[
X] uniquely embeds into
C by (1a), there exist
\(\xi _v \in \text {Aut}(G[Y])\) and
\(\chi _v \in \text {Aut}(C)\) such that
\(\chi _v \circ \varphi _v \vert _{Y} \circ \xi _v \equiv \psi \). Let us therefore w.l.o.g. assume that
\(\varphi _v \vert _Y \equiv \psi \). Since
X defines unique neighborhoods in
C, it follows that
\(\varphi _v (v) \in V(C)\) is uniquely defined for every
\(v \in V(G)\) and its adjacencies in
X match those of
v in
Y, that is
\(\psi (N_{G,Y}(v)) = N_{C,X}(\varphi _v (v))\). Let
\(\varphi : V(G) \rightarrow V(C)\) therefore be given by
\(\varphi (v) = \varphi _v (v)\) for every
\(v \in V(G)\).
Now if
\(|X| = \ell \) and
\(|X'| \le \ell -2\), that is in particular
\(X' \subsetneq X\), then write
\(Y' = \psi ^{-1}(X') \subset Y\). Let
\(x \in X {\setminus } X'\) be arbitrary but fixed and write
\(y = \psi ^{-1}(x) \in Y {\setminus } Y'\). By assumption (ii) of Definition
4.5, there exists a strong homomorphism
\(\varphi _{v}: Y' \cup \{y, v\} \rightarrow V(C)\) for any vertex
\(v \in V(G)\) since
\(|Y' \cup \{y, v\}| \le \ell \) by (1b). As
\(C[X' \cup \{x\}]\) uniquely embeds into
C by (1b), we can again w.l.o.g. assume that
\(\varphi _{v}\vert _{Y' \cup \{y\}} \equiv \psi \vert _{Y' \cup \{y\}}\).
Since \(X'\) defines unique neighborhoods in C by (2), it likewise follows that \(\varphi _{v} (v)\) is uniquely defined for every \(v \in V(G)\) and its adjacencies in \(X' \cup \{x\}\) match those of v in \(Y' \cup \{y\}\) under \(\psi \). Since this is actually independent of our choice of x, we in fact also have that the adjacencies of \(\varphi _{v} (v)\) in X match those of v in Y, that is \(\psi (N_{G,Y}(v)) = N_{C,X}(\varphi _v (v))\) for any \(v \in V(G)\). Let \(\varphi : V(G) \rightarrow V(C)\) therefore again be given by \(\varphi (v) = \varphi _{v} (v)\) for every \(v \in G\).
Let us now establish that in either case
\(\varphi \) is in fact a strong homomorphism from
G to
C. For arbitrary
\(w_1, w_2 \in V(G)\), let
\(X'' \subset X\) be as given by (3) for
\(v_1 = \varphi (w_1) \in V(C)\) and
\(v_2 = \varphi (w_2) \in V(C)\) and write
\(Y'' = \varphi ^{-1}(X'') = \psi ^{-1}(X'') \subset Y\). The induced subgraph
\(G[Y'' \cup \{w_1, w_2\}]\) has at most
\(\ell \) vertices, so by assumption (ii) of Definition
4.5 there exists a strong homomorphism
\(\varphi ': Y'' \cup \{w_1, w_2\} \rightarrow V(C)\). Since
\(G[Y'' \cup \{w_i\}] \cong C[X'' \cup \{v_i\}]\) for
any \(i \in \{1,2\}\) by construction of
\(\varphi \) and since
\(C[X'' \cup \{v_i\}]\) uniquely embeds into
C for
some \(i \in \{1,2\}\) by (3), we can w.l.o.g. assume that
\(\varphi ' \vert _{Y''} \equiv \psi \vert _{Y''} \equiv \varphi \vert _{Y''}\). We distinguish the cases
\(v_1 = v_2\) and
\(v_1 \ne v_2\). In the former,
\([v_1]_{X''} = \{v_1\}\) by (3a). Since
\(\varphi '\) is a strong homomorphism, we have
\(\varphi ' (w_i) \in [v_1]_{X''}\) for
\(i \in \{1,2\}\) and it follows that
\(\varphi ' (w_2) = v_2 = v_1 = \varphi ' (w_1)\). Since
\(\varphi '\) is a strong homomorphism and
C simple,
\(w_1\) and
\(w_2\) are therefore not adjacent in
G if
\(v_1 = v_2\). Now if
\(v_1 \ne v_2\), then
\([v_1]_{X''} \ne [v_2]_{X''}\) and the bipartite subgraph induced by
\([v_1]_{X''}\) and
\([v_2]_{X''}\) in
C is complete if
\(v_1\) and
\(v_2\) are adjacent in
C and empty if they are not by (3b). Since
\(\varphi '\) is a strong homomorphism, we have
\(\varphi ' (w_1) \in [v_1]_{X''}\) and
\(\varphi ' (w_2) \in [v_2]_{X''}\) and therefore
\(\varphi '(w_1)\) and
\(\varphi '(w_2)\) are adjacent in
C if and only if
\(v_1\) and
\(v_2\) are. Since
\(\varphi '\) is a strong homomorphism,
\(v_1\) and
\(v_2\) are therefore adjacent in
C if and only if
\(w_1\) and
\(w_2\) are adjacent in
G, establishing that
\(\varphi : V(G) \rightarrow V(C)\) is a strong homomorphism.
\(\square \)
Having established how to find reconstructors, let us now formally introduce the relevant notion of stability and how to establish it using a reconstructor. Let
$$\begin{aligned} {\mathcal {B}}(C) = \{C[m_1, \ldots , m_n]: m_1, \ldots , m_n \in {\mathbb {N}}_0 \} \subset {\mathcal {G}}\end{aligned}$$
denote the set of all blow-ups of
C and assume that we have established that
\(\lambda ({\mathcal {G}}) = \lambda ({\mathcal {B}}(C))\).
Perfect stability strengthens the standard notion of stability, where one requires that for every \(\varepsilon > 0\) there exists \(\delta > 0\) such that \(\lambda (G) \le \lambda ({\mathcal {G}}) + \delta \) and \(n \ge 1/\delta \) implies that one has to change at most \(\varepsilon n^2\) edges to obtain a graph in \({\mathcal {B}}(C)\). Clearly perfect stability also implies that any \(G \in {\mathcal {G}}_n\) with \(n \ge n_0\) satisfying \(\lambda (G) = \lambda (n, {\mathcal {G}})\) is a blow-up of C.
Theorem
4.9 in combination with Lemma
4.7 allows us to establish our stability results. However, this only implies that extremal constructions must be
some blow-up of a given graph
C of order
n. One can go further though and establish that
a particular weighting of the blow-up must be optimal. For both of our applications, that weighting will be the balanced one. For any vector of weights
\(\textbf{w}\in {\mathbb {S}}_n\), where
\({\mathbb {S}}_n\) is the
n-dimensional probability simplex, we define
$$\begin{aligned} {\mathcal {B}}_{\textbf{w}}(C) = \{C[m_1, \ldots , m_n]: | m_i - w_i \, ( m_1 + \ldots + m_n) | \le 1 \text { for all } 1 \le i \le n\} \subset {\mathcal {B}}(C) \end{aligned}$$
as the set of all blow-ups of
C where the parts are weighted according to
\(\textbf{w}\) where
\(w_i\) denotes the
i-th entry of
\(\textbf{w}\).
While theoretically the problem of establishing
\(\mathop {\mathrm {arg\,min}}\limits _{\textbf{w}\in {\mathbb {S}}_n} \lambda ({\mathcal {B}}_{\textbf{w}}(C))\) could be stated as a polynomial minimization problem over
\(n-1\) variables, the usual approach relies on studying if any of the matrices
\({\mathcal {Q}}^i\) have unique zero eigenvectors and then invoking the subsequent proposition to relate them to graph densities, assuming the associated types
\(\tau _i\) are present in
C and fulfill certain properties. We will need the following result, c.f. Lemma 3.4 in [
65]. Before stating it, assume some
\(1 \le i \le r\) and
\(\psi : [v_i] \hookrightarrow V(C)\) us given, where
\(v_i\) is the order of
\(\tau _i\), such that
\((C, \psi )\) is a
\(\tau _i\)-flag and
\(w_j \ne 0\) for all
\(j \in \psi ([v_i])\). Let
\(\delta ^{\psi }_{F}(C, \textbf{w})\) now denote the probability that
\(l_i - v_i\) vertices chosen not-necessarily-injectively and at random according to
\(\textbf{w}\) in
\(V(C) \setminus \psi ([v_i])\) together with the vertices labelled by
\(\psi \) induce a flag isomorphic to
F. Note that this generalizes the previous definition of
\(d^{\psi }_{F}(C)\), where the vertices were selected uniformly at random.
Using this, one can formulate some sufficient criteria to establish the uniqueness of a given optimal weighting. The following is a generalization of Lemma 6.2 in [
65] that is based on ideas previously used in [
66].
4.3 Practical Aspects of Using the Flag Algebra Approach
flagmatic
, developed by Emil Vaughan and hosted on
, calculates graph densities and passes SDP formulations to solvers like
CSDP
[
9] and
SDPA
[
93]. In order to obtain rigorous mathematical proofs, the floating point-based solutions from the SDPs need to be rounded to (fractional) values while ensuring the matrices remain positive semi-definite.
flagmatic
handles this rounding process and produces verifiable certificates for the proofs, allowing anyone with access to the software to verify the results independently. The certificates for our lower bounds can be found at
. We do not supply certificates of stability and symmetry from [
65], as they are incompatible with our ad-hoc arguments in Lemma
4.7 and Theorem
4.9. Below we describe some specifics regarding the bounds for each problem.
Bounds and stability for \(c_{s,t}\). For the lower bounds of \(c_{3,4}\) and \(c_{3,5}\), we used \(m = 6\) and were able to reduce the number of types to 4 for each problem. The certificates for these proofs are contained in the files c_34.json
and c_35.json
.
In order to derive stability for
\(c_{3,4}\), we also obtained a certificate for
\(m = 7\) and verified that all sharp graphs are those with a strong homomorphism into the Schläfli graph. The certificate for this proof is contained in the file
c_34_7.json
. Perfect stability now follows from Theorem
4.9 using the uniquely embeddable subgraph
T of
\(C_{S}\) consisting of two triangles joined by an edge. The fact that
T is a 7-reconstructor of the Schläfli graph follows by computationally verifying the requirements of Lemma
4.7. The certificate for the proof that
\(\lambda ({\mathcal {G}}(\{T\}) > \lambda ({\mathcal {G}})\) is contained in the file
c_34_reconstructor.json
. The fact that the balanced blow-up of the Schläfli graph is the unique optimal weighting follows by applying Theorem
4.11. Here let the Schläfli graph be as ordered in the
graph6
representation stated in Sect.
3.3 with vertices labelled
\(1, \ldots , 27\) and use
\(X_1 = \{1, 2, 4, 6, 7\}\),
\(X_2 = \{1, 2, 12, 13, 14\}\) and
\(X_3 = \{1, 2, 4, 6, 12\}\). The certificate for the proof that
\(\lambda ({\mathcal {G}}(C_S[X_1])) > \lambda ({\mathcal {G}})\) is contained in the file
c_34_symmetry.json
.
Regarding the non-differentiability of
\(c_{3,4}(x)\) at
\(x = 41\cdot 3^{-6}\), we considered a differently weighted version of Eq. (
1). For
\(w_s, w_t \ge 0\) satisfying
\(w_s + w_t = 2\), let
$$\begin{aligned} c^{(w_s,w_t)}_{s,t} = \lim _{n \rightarrow \infty } \min \left\{ w_s \, \frac{k_s({\overline{G}})}{{n \atopwithdelims ()s}} + w_t \, \frac{k_t(G)}{{n \atopwithdelims ()t}}: |G| = n \right\} \end{aligned}$$
(14)
and note that clearly
\(c_{s,t} = c^{(1,1)}_{s,t}\). We used flagmatic to establish a lower bound for
\(c^{(1-\epsilon ,1+\epsilon )}_{3,4}\) that matches the upper bound given by the Schläfli graph when
\(\epsilon = 10^{-4}\), implying the non-differentiability of
\(c_{3,4}(x)\) at that point. The certificate for this proof is contained in the file
c_34_epsilon.json
and uses
\(m=6\) as well as the same types as the proof of
\(c_{3,4}\).
For the lower bounds of \(c_5\) and \(c_{4,5}\), we used \(m = 8\) and the values obtained after rounding are reasonably close to those indicated by the SDP solver. The certificates for these proofs are contained in the files c_5.json
and c_45.json
.
Bounds and stability for \(g_{s,t}\). For
\(g_{4,5}\), we used
\(m = 7\) and also used the full 38 types to establish this bound as the rounding failed when attempting to reduce the number of types involved. In general, this problem seemed more demanding and for example required the double precision solver. The certificate for the proof is contained in the file
g_45.json
. We can also easily derive perfect stability from this certificate by verifying that all sharp graphs are those with a strong homomorphism into
\(C_{R(3,5)}\) and noting that the graph
T of order 5 obtained by joining two triangles at a vertex is a 7-reconstructor of
\(C_{R(3,5)}\) by Lemma
4.6. The certificate for the proof that
\(\lambda ({\mathcal {G}}(\{K_5, K_4^+\}) > \lambda ({\mathcal {G}}(\{K_5\})\) is contained in the file
g_45_reconstructor.json
. The fact that the balanced blow-up of
\(C_{R(3,5)}\) is the unique optimal weighting also easily follows by applying Theorem
4.11 with
T as
\(C[X_1]\) and
\(k=1\) after verifying that the associated matrix
\({\mathcal {Q}}\) indeed has co-rank 1.
All of the reported lower bounds for \(g_{s,t}\) when \((s,t) \ne (4,5)\) were obtained using \(m = 8\). The certificates for these proofs are contained in the files g_st.json
.