Next Article in Journal
The Agentic Perspective in Experimental Economics
Previous Article in Journal
Dividend Representations for Two Influence Assessments
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Asymptotic Thresholds for (a:b) Minimum-Degree Games

1
Laboratory of Engineering Science, Faculty of Science, Ibn Zohr University, Agadir 80000, Morocco
2
Department of Mathematics, Christian-Albrechts-Universität zu Kiel, 24118 Kiel, Germany
*
Authors to whom correspondence should be addressed.
Games 2025, 16(5), 47; https://doi.org/10.3390/g16050047
Submission received: 13 June 2025 / Revised: 25 July 2025 / Accepted: 8 August 2025 / Published: 8 September 2025
(This article belongs to the Section Algorithmic and Computational Game Theory)

Abstract

We investigate the ( a : b ) Maker–Breaker subgraph game played on the edge set of the complete graph K n , where n , a , b N , and Maker’s objective is to construct a member of a prescribed family of graphs H, while Breaker aims to prevent this. In our study, Breaker moves first, and H is taken to be either the family of connected spanning subgraphs or the family of spanning subgraphs with minimum-degree at least k = k ( n ) . For the ( a : b ) minimum-degree-k game, we determine the asymptotically optimal threshold bias across a wide range of values for a. For the ( a : b ) connectivity game, we resolve an open problem posed by Hefetz et al. (2012) by identifying the exact leading term in the asymptotic behavior of the threshold bias when a = c ln n .

1. Introduction

Positional game theory studies two-player games of perfect information, typically played on discrete structures, ranging from popular leisure games such as Tic-Tac-Toe and Hex to abstract games played on graphs and hypergraphs. Over the past 40 years, such games have been extensively studied (Beck, 2008; Glazik & Srivastav, 2022; Hancock, 2019; Hefetz et al., 2014; Krivelevich, 2011; Liebenau & Nenadov, 2022; Mikalacki & Stojaković, 2017).
In particular, games such as the connectivity and minimum-degree-k games can model adversarial scenarios in emergency infrastructure deployment. For instance, consider a situation where Maker represents a government agency tasked with establishing a communication network between critical locations (e.g., hospitals, shelters, or command centers) after a natural disaster. In the ( a : b ) setting, Maker secures a communication links per round, while Breaker permanently blocks b links due to natural obstacles, logistical failures, or conflicting operations. Once an edge is either claimed by Maker or blocked by Breaker, it cannot be used again. These games capture the strategic allocation of non-shareable resources under pressure and reveal threshold phenomena that determine the minimum advantage Maker must have to ensure global properties such as full connectivity or fault tolerance, even in the face of persistent disruption.
Let F be a family of subsets of a finite set X. In the biased ( a : b ) Maker–Breaker game played on the hypergraph ( X , F ) , two players, called Maker and Breaker, alternately claim a and b—previously unclaimed elements of X, respectively. The set X is called board, and the elements of F 2 X are the winning sets. Maker wins the game if they occupy a winning set; otherwise, Breaker wins.
The threshold bias for the ( a : b ) game is defined as follows: given a Maker–Breaker game ( X , F ) and a 1 , let b 0 ( a ) be the unique positive integer such that Maker has a winning strategy for all b < b 0 ( a ) , whereas Breaker has a winning strategy for all b b 0 ( a ) . Such an integer must exist, as Maker–Breaker games are known to be bias-monotone.
Determining the asymptotic threshold bias in Maker–Breaker subgraph games remains a significant challenge, especially for targets that contain cycles—a problem first raised in the foundational work of (Chvátal & Erdős, 1978). One such game is the triangle game, where the board is the edge set of the complete graph K n , and Maker’s goal is to occupy all three edges of a triangle. A notable advancement in this direction was recently made by (Glazik & Srivastav, 2022), who substantially reduced the gap between known upper and lower bounds in the triangle game.
In this paper, we study two variants of the Maker–Breaker game: the minimum-degree-k game and the connectivity game. Both are played on the complete graph K n with n vertices, where the board is the edge set of K n . The winning sets for Maker consist, respectively, of all spanning subgraphs with the minimum-degree at least k, and all connected spanning subgraphs.

1.1. Previous Work

The biased ( 1 : b ) connectivity game was introduced by (Chvátal & Erdős, 1978). Maker wins the connectivity game if he is able to occupy the edges of a spanning tree, thus winning. The authors proved that if b ( 1 + o ( 1 ) ) n ln n , then Breaker wins the game, and if b 1 4 o ( 1 ) n ln n , then Maker has a winning strategy to occupy a spanning tree. The problem of determining the exact leading constant for the threshold bias of the connectivity game was one of the famous open problems in Maker–Breaker games until it was resolved in a paper by (Gebauer & Szabó, 2009).
An earlier improvement came in a paper by (Beck, 1982), who showed that Maker wins the connectivity game for b ln 2 o ( 1 ) n ln n . Later, (Gebauer & Szabó, 2009) established the asymptotically optimal threshold bias for this game, showing that Maker has a winning strategy if b ( 1 o ( 1 ) ) n ln n .
They further demonstrated that Maker can occupy not only a spanning tree but even an induced subgraph with minimum-degree k = k ( n ) < ln ln n 3 in the ( 1 : b ) minimum-degree-k game, provided that
b ( ln n ln ln n ( 2 k + 3 ) ) n ln 2 n .
The techniques developed in their proofs have since been used in several works on Hamiltonicity, connectivity, and strong connectivity of graphs, digraphs, and randomly perturbed graphs (see, e.g., (Clemens et al., 2021; Frieze & Pegden, 2021; Hefetz et al., 2012; Krivelevich, 2011)).
Hefetz et al. (2012) considered the general ( a : b ) connectivity game, where both a and b may be greater than 1. For a = c ln n , where 0 < c 1 is a constant, they proved that the threshold bias lies between
( 1 o ( 1 ) ) c n c + 1 and min c n , ( 1 + o ( 1 ) ) 2 n 3 .
For c > 1 , they showed that the threshold bias lies between
( 1 o ( 1 ) ) c n c + 1 and ( 1 + o ( 1 ) ) 2 c n 2 c + 1 .
In both cases, the lower and upper bounds do not match in their leading terms.
In this paper, we resolve this problem by proving that Breaker has a winning strategy whenever
b ( 1 + o ( 1 ) ) c n c + 1
for any a = c ln n , where c > 0 .

1.2. Our Results

Unless stated otherwise, Breaker is assumed to move first in all ( a : b ) games considered in this paper.

1.2.1. The ( a : b ) Maker–Breaker Minimum-Degree-k Game

We show that in the ( a : b ) Maker–Breaker minimum-degree-k game, for
a = o n ln n and k = o ( ln n ) ,
Maker has a winning strategy if
b 1 o ( 1 ) a n a + ln n ,
thus involving the parameter a directly in the threshold bias. Moreover, for
a = Ω n ln n and k = o ( a ) ,
Maker wins whenever
b 1 o ( 1 ) n .
Both results extend the work of (Gebauer & Szabó, 2009) to a wide range of values for a.
A new analytical technique is introduced for the Maker strategy, where a vertex is considered dangerous if its degree in the Maker’s graph is less than k 1 . While (Gebauer & Szabó, 2009) define the average danger of a multiset of vertices for Maker and Breaker based solely on the number of distinct elements, our approach accounts for the fact that a vertex can become dangerous multiple times during the game. Consequently, we compute the average by considering both the distinct vertices and their repetitions. This refinement allows for a more accurate representation of the game’s dynamics with respect to Maker’s strategy.
Moreover, the technique of computing the average value of a multiset used by (Gebauer & Szabó, 2009) introduces complications when comparing the averages of two multisets. In this paper, we propose an alternative approach that allows us to derive a generalized form of Theorem 1.2 from (Gebauer & Szabó, 2009), without needing to distinguish whether the multisets are identical.
At this point, the question is whether there exists a strategy for Breaker such that he wins if b 1 + o ( 1 ) a n a + ln ( n ) in the case where a = o n ln n and k = o ( ln n ) , or if b 1 + o ( 1 ) n when a = Ω n ln n and k = o ( a ) . Establishing these bounds would determine the asymptotically optimal threshold bias. We are able to prove both of these statements.
Furthermore, for the ( a : b ) connectivity game, our result for k = 1 = o ( ln n ) in the case a ln ( n ) = o n ln n implies that Breaker wins if b 1 + o ( 1 ) a n a + ln ( n ) , improving upon the weaker bound b 1 + o ( 1 ) a n ln ( a n ) stated in (Hefetz et al., 2012).
Our proof relies on the BoxMaker game technique introduced by (Chvátal & Erdős, 1978), in which Breaker plays the role of BoxMaker. This technique was employed by (Gebauer & Szabó, 2009) to devise a winning strategy for Breaker in the minimum-degree ( 1 : b ) Maker–Breaker game. Later, Hefetz et al. (2012) adapted the same approach to demonstrate Breaker’s win in the ( a : b ) Connectivity Maker–Breaker game.
In our approach, we begin by constructing an instance of the BoxMaker game using a clique in the complete graph K n . The size of this clique plays a crucial role in determining the threshold bias: the larger the clique, the more difficult it becomes for Maker to prevent Breaker from isolating vertices.
In the earlier work of Hefetz et al. (2012), for a ln n , the clique size was set to
h = a n ( a + 1 ) ln ( a n ) .
In contrast, our analysis allows for a smaller clique size, namely,
h = n 2 ( a + ln n ) .

1.2.2. The ( a : b ) Maker–Breaker Connectivity Game

Hefetz et al. (2012) showed that if a = c ln n for some 0 < c 1 , then the threshold bias b 0 ( a ) satisfies
( 1 o ( 1 ) ) c n c + 1 < b 0 ( a ) < min c n , ( 1 + o ( 1 ) ) 2 n 3 ,
and if a = c ln n for some c > 1 , then
( 1 o ( 1 ) ) c n c + 1 < b 0 ( a ) < ( 1 + o ( 1 ) ) 2 c n 2 c + 1 .
They posed as an open problem the task of narrowing the gap between the lower and upper bounds on b 0 ( a ) .
Our result for the ( a : b ) minimum-degree-k game, with a = c ln n = o n ln n for some c > 0 , k = 1 = o ( ln n ) , and b 1 + o ( 1 ) a n a + ln ( n ) ( = 1 + o ( 1 ) c n c + 1 ) , immediately implies a win for Breaker in the connectivity game.
Remark 1.
When not necessary, we omit the ceiling and floor signs.

2. Minimum-Degree- k Game

Recall that Breaker moves first.

2.1. Winning Strategy for Maker

We introduce the notion of danger for each vertex, from the perspectives of both Maker and Breaker, and present a strategy designed to minimize the risk of losing the game for Maker.
Definition 1.
Let G M and G B denote the subgraphs of G formed by the edges claimed by Maker and Breaker, respectively. For each vertex v V , let d M ( v ) and d B ( v ) denote its degree in G M and G B , respectively.
  • A vertex v is said to be  dangerous if d M ( v ) k 1 .
  • The danger of v is defined by
    D ( v ) : = d B ( v ) 2 b a · d M ( v ) .
  • A vertex v V is called  saturated if all its incident edges have been claimed, i.e.,
    d M ( v ) + d B ( v ) = n 1 .
Maker’s Strategy. At each round i 1 , Maker makes a sequential moves. In the jth step of the ith round (for 1 j a ), he proceeds as follows:
  • Selects a vertex v i ( j ) V of maximum danger (i.e., one that maximizes D ( v ) over all v V );
  • Claims an arbitrary free edge incident to v i ( j ) .
This greedy strategy ensures that Maker continually reinforces the most vulnerable vertices, with the aim of eventually achieving degree at least k for every vertex in G M .
To analyze Maker’s minimum-degree strategy, we introduce the concept of average danger.
Consider the sth round of the game, for some integer s 2 , and let v s be a particular dangerous vertex at this stage. For each 1 i s , denote by M i and B i the ith move of Maker and Breaker, respectively.
According to Maker’s strategy, the vertices v 1 ( 1 ) , , v 1 ( a ) , v 2 ( 1 ) , , v 2 ( a ) , , v s 1 ( 1 ) , , v s 1 ( a ) were those of maximum danger immediately before the corresponding step j in Maker’s ith move.
For each 1 i s 1 , let
A s i : = v s i ( 1 ) , , v s i ( a ) , , v s 1 ( 1 ) , , v s 1 ( a ) , v s
denote the multiset of vertices among
v 1 ( 1 ) , , v 1 ( a ) , v 2 ( 1 ) , , v 2 ( a ) , , v s 1 ( 1 ) , , v s 1 ( a ) , v s
that are dangerous immediately before Maker’s ( s i ) th move. We define A s : = { v s } .
Note that the same vertex may appear multiple times in the above multiset, reflecting the fact that a given vertex can remain dangerous over several rounds.
Definition 2 (Average Danger).
We define the average danger of a multiset A s i as follows:
(i) 
D ¯ M ( A s i ) = w A s i D ( w ) a i + 1 is the average danger of the vertices in the multiset A s i from Maker’s perspective, immediately before Maker begins his moves in round s i .
(ii) 
D ¯ B ( A s i ) = w A s i D ( w ) a i + 1 is the average danger of the vertices in the multiset A s i from Breaker’s perspective, immediately before round s i .
Note that round s i begins with Breaker’s move. Therefore, the values of D ¯ M ( A s i ) and D ¯ B ( A s i ) generally differ.
In the following two lemmas, we establish lower and upper bounds on the average danger. Maker plays according to the strategy defined in Section 2.1. To illustrate the definitions, we focus on rounds s i and s i + 1 (Figure 1):
Proposition 1.
For every 1 i s 1 , the following inequalities hold:
D ¯ M A s i D ¯ B A s i and D ¯ M A s i D ¯ B A s i + 1 .
Proof. 
The first inequality is immediate since during Breaker’s moves the Maker degree of each vertex in A s i remains unchanged, implying that the danger
D ( w ) = d B ( w ) 2 b a d M ( w ) ,
for w A s i , can only increase.
For the second inequality, let
A s i = { v s i ( 1 ) , , v s i ( a ) , , v s 1 ( 1 ) , , v s 1 ( a ) , v s }
and fix an arbitrary vertex u A s i . Since u is dangerous just before Maker’s move, M s i , its danger value
D ( u ) = d B ( u ) 2 b a d M ( u )
can only decrease during Maker’s move M s i (because Maker’s actions increase d M ( u ) or leave it unchanged).
Moreover, by the strategy, Maker selects the vertices v s i ( 1 ) , , v s i ( a ) — those with the highest danger values among all vertices in A s i —one after the other in move M s i . Consequently, the minimum danger among these chosen vertices (evaluated immediately before M s i ) is at least as large as the danger of any vertex in A s i .
After Maker’s move M s i , the set of dangerous vertices is updated to A s i + 1 ; however, since Maker’s moves do not increase danger, the maximum danger among the vertices in A s i + 1 (measured immediately before Breaker’s move B s i + 1 ) is no greater than the minimum danger among { v s i ( 1 ) , , v s i ( a ) } from before M s i .
It follows that
D ¯ M ( A s i ) D ¯ B ( A s i + 1 ) ,
which is the desired inequality. □
Definition 3.
Let g : { 1 , , s } N be the function such that g ( i ) denotes the number of edges Breaker has claimed during the first i 1 rounds of the game, where both endpoints lie in the multiset A i .
Lemma 1.
Let 1 i s 1 , and let p be the number of edges { x , y } claimed by Breaker during his move in round s i , with both endpoints x , y A s i . Then:
p a · | A s i + 1 | + a 2 + g ( s i + 1 ) g ( s i ) .
Proof. 
Before his ( s i ) th move, Breaker has claimed exactly g ( s i ) edges with both endpoints in A s i . Thus, during round s i , he claims an additional p edges with both endpoints in A s i , so that by the end of the round, the total is g ( s i ) + p .
Recall that the multiset A s i consists of the a vertices selected in round s i together with the vertices in A s i + 1 ; that is,
A s i = { { v s i ( 1 ) , , v s i ( a ) } } A s i + 1 ,
where ⊎ denotes the multiset union.
There can be at most a 2 edges connecting pairs of vertices within { { v s i ( 1 ) , , v s i ( a ) } } . Moreover, each of the a vertices in this set can be incident with at most | A s i + 1 | vertices from A s i + 1 , contributing at most a · | A s i + 1 | additional edges.
Hence, the total number of edges with both endpoints in A s i after round s i is at most
g ( s i ) + p g ( s i + 1 ) + a · | A s i + 1 | + a 2 .
Rearranging the terms yields
p a · | A s i + 1 | + a 2 + g ( s i + 1 ) g ( s i ) ,
which is the desired inequality. □
Lemma 2.
For every integer i such that 1 i s 1 , the following inequalities hold:
(i) 
0 D ¯ M ( A s i ) D ¯ B ( A s i ) 2 b a i + 1 2 b a i .
(ii) 
D ¯ M ( A s i ) D ¯ B ( A s i ) b a 2 + a + a 2 + g ( s i + 1 ) g ( s i ) a i + a .
Proof. 
(i)
The first inequality follows immediately from Proposition 1. During round s i , Breaker claims b edges, causing the total Breaker-degree of vertices in A s i to increase by at most 2 b . Since D ¯ B ( A s i ) is a linear function of these danger values, this implies
D ¯ B ( A s i ) increases by at most 2 b a i + 1 during Breaker s move .
(ii)
Let q = b p , with p defined in Lemma 1. During Breaker’s move in round s i , the sum
u A s i d B ( u ) 2 b a d M ( u )
increases by at most 2 p + q = p + b . Consequently, D ¯ B A s i increases by at most b + p a i + 1 . Applying Lemma 1, we derive:
D ¯ M A s i D ¯ B A s i b + p a i + 1 b + a A s i + 1 + a 2 + g ( s i + 1 ) g ( s i ) a i + 1 b + a a ( i 1 ) + 1 + a 2 + g ( s i + 1 ) g ( s i ) a i b a 2 + a + a 2 + g ( s i + 1 ) g ( s i ) a i + a .
This completes the proof.
Corollary 1. 
For every integer i with 1 i s 1 , the following holds:
D ¯ B ( A s i ) D ¯ B ( A s i + 1 ) min 2 b a i , b a 2 + a + a 2 + g ( s i + 1 ) g ( s i ) a i + a .
Proof. 
By Proposition 1, we have
D ¯ B ( A s i + 1 ) D ¯ B ( A s i ) D ¯ M ( A s i ) D ¯ B ( A s i ) .
Applying Lemma 2 then establishes the stated inequality in Corollary 1, and the proof follows. □
Claim 1.
We recall the following well-known inequalities involving the harmonic numbers
H k = i = 1 k 1 i :
( a )
For all k N ,
ln ( k + 1 ) H k ln ( k ) + 1 .
( b )
For all integers i , j N with j i ,
H j H i ln ( j ) ln ( i ) .
Proof. 
We use the fact that the function f ( x ) = 1 x is positive and decreasing on [ 1 , ) .
(a)
Upper Bound
H k = 1 + i = 2 k 1 i 1 + i = 2 k i 1 i 1 x d x = 1 + 1 k 1 x d x = ln ( k ) + 1 .
Lower Bound
H k = i = 1 k 1 i i = 1 k i i + 1 1 x d x = 1 k + 1 1 x d x = ln ( k + 1 ) .
(b)
We have
H j H i = k = i + 1 j 1 k k = i + 1 j k 1 k 1 x d x = i j 1 x d x = ln ( j ) ln ( i ) .
Lemma 3.
The following inequality holds:
D ¯ B ( A s ) 2 b a ln ( s 1 ) + 1 .
Proof. 
Before round one starts, neither Breaker nor Maker has claimed any edge; hence
D ¯ B A 1 = 0 .
We proceed as follows:
0 = D ¯ B A 1 D ¯ B A 2 2 b a ( s 1 ) ( by Corollary 1 ) D ¯ B A s 2 b a ( s 1 ) 2 b a ( by Corollary 1 ) = D ¯ B A s 2 b a H s 1 D ¯ B A s 2 b a ln ( s 1 ) + 1 ,
where in the last inequality we used H s 1 ln ( s 1 ) + 1 . Rearranging yields
D ¯ B A s 2 b a ln ( s 1 ) + 1 ,
as claimed. □
Lemma 4.
Let r N . The following inequalities hold:
(i) 
If s > r , then
D ¯ B ( A s ) b a 2 ln ( s 1 ) ln ( r ) + 1 a 1 2 ln ( r ) + r a .
(ii) 
If s r , then
D ¯ B ( A s ) b a 1 + ln ( r ) a 1 2 ln ( r ) + r a .
Proof. 
(i)
We start by observing that D ¯ B ( A 1 ) = 0 , since no edges have been chosen before round one. Then:
0 = D ¯ B A 1 D ¯ B A 2 2 b a ( s 1 ) ( by Corollary 1 ) D ¯ B A s r 2 b a ( s 1 ) 2 b a ( r + 1 ) ( by Corollary 1 ) D ¯ B A s r + 1 2 b a ( s 1 ) 2 b a ( r + 1 ) b a 2 + a + a 2 + g ( s r + 1 ) g ( s r ) a r a ( by Corollary 1 ) D ¯ B A s 2 b a ( s 1 ) 2 b a ( r + 1 ) b a 2 + a + a 2 + g ( s r + 1 ) g ( s r ) a r b a 2 + a + a 2 + g ( s ) g ( s 1 ) a r a ( by Corollary 1 ) = D ¯ B A s 2 b a 1 s 1 + + 1 r + 1 b a 2 + a + a 2 a r + + b a 2 + a + a 2 a g ( s r + 1 ) g ( s r ) a r + + g ( s ) g ( s 1 ) a r a = D ¯ B A s 2 b a H s 1 H r b a H r a H r + H r + a 1 2 H r i = 1 r 1 1 a i ( i + 1 ) g ( s i ) + g ( s ) a g ( s r ) a r r a D ¯ B A s b a 2 H s 1 H r + H r + a 1 2 H r r a sin ce g ( s ) = 0 and g ( s i ) 0 D ¯ B A s b a 2 ln ( s 1 ) ln ( r ) + ln ( r ) + 1 + a 1 2 ln r r a ,
where in the last inequality we used H j ln ( j ) + 1 . Rearranging gives
D ¯ B A s b a 2 ln ( s 1 ) ln ( r ) + 1 ( a 1 ) 2 ln r + r a ,
as required.
(ii)
First, recall that D ¯ B A 1 = 0 . Then, using Corollary 1 repeatedly, we obtain:
0 = D ¯ B A 1 D ¯ B A 2 b a 2 + a + a 2 + g ( 2 ) g ( 1 ) a ( s 1 ) a D ¯ B A s b a 2 + a + a 2 + g ( 2 ) g ( 1 ) a ( s 1 ) b a 2 + a + a 2 + g ( 3 ) g ( 2 ) a ( s 2 ) b a 2 + a + a 2 + g ( s ) g ( s 1 ) a ( s 1 ) a = D ¯ B A s b a H s 1 + a H s 1 H s 1 a 1 2 H s 1 + i = 1 s 2 g ( s i ) a i ( i + 1 ) g ( s ) a + g ( 1 ) a ( s 1 ) ( s 1 ) a D ¯ B A s b a H s 1 + a 1 2 H s 1 ( s 1 ) a sin ce g ( s ) = 0 and g ( s i ) 0 > D ¯ B A s b a 1 + ln ( s ) + a 1 2 ln ( s ) s a D ¯ B A s b a 1 + ln ( r ) + a 1 2 ln ( r ) r a .
Since s r and the function x a 1 2 ln ( x ) x a is decreasing on [ 1 , + ) , we conclude that
D ¯ B A s < b a 1 + ln ( r ) a 1 2 ln r + r a .
This completes the proof.
Theorem 1.
Suppose Maker follows his strategy described in Section 2.1. Then, the following assertions hold:
(i) 
For every ε > 0 , there exists an integer n 0 ( ε ) such that, for all n n 0 ( ε ) , Maker can construct a spanning subgraph of K n with minimum-degree at least k = o ( ln ( n ) ) , provided that:
a = o n ln ( n ) and b ( 1 ε ) a n a + ln ( n ) .
(ii) 
For every ε > 0 , there exists an integer n 0 ( ε ) such that, for all n n 0 ( ε ) , Maker can construct a spanning subgraph of K n with minimum-degree at least k, given that:
a = Ω n ln ( n ) , k = o ( a ) , and b ( 1 ε ) n .
Proof. 
Assume for a moment that Maker loses the game, say in round s. Then, there exists a vertex v s with d M ( v s ) k 1 . Before round s, Breaker has claimed at least n 1 d M ( v s ) b n k b edges incident to v s , so we have d B ( v s ) n k b at that moment. Since A s = { v s } , it follows that D ¯ B ( A s ) = D ( v s ) . By definition of D ( v s ) , we obtain:
D ¯ B ( A s ) = D ( v s ) = d B ( v s ) 2 b a d M ( v s ) n k b 2 b ( k 1 ) a .
Maker’s strategy prescribes easing a dangerous vertices in every round. Before round s, he has claimed exactly a ( s 1 ) edges. We now show that a ( s 1 ) < k n .
Let A = { { v 1 ( 1 ) , , v 1 ( a ) , v 2 ( 1 ) , , v 2 ( a ) , , v s 1 ( 1 ) , , v s 1 ( a ) } } be the multiset of dangerous vertices up to round s 1 . Each vertex in A can be eased at most k times, because v s is still a dangerous vertex with degree less than k 1 in Maker’s graph. Therefore, all the a ( s 1 ) edges claimed by Maker until round s 1 are incident to vertices in A and each such vertex has Maker-degree at most k 1 . Since each vertex of K n can appear at most k times in the multiset A, we conclude that
a ( s 1 ) < n k .
(i)
Let r = n a 2 ln n and b = ( 1 ε ) a n a + ln n . By assumption, a = o n ln n and k = o ( ln n ) . We distinguish between two cases.
Case 1:  s > r .
By Lemma 4, we have:
n k b 2 b ( k 1 ) a D ( v s ) b a 2 ln ( s 1 ) ln r + 1 ( a 1 ) 2 ln r + r a .
Using s 1 < k n a and r = n a 2 ln n , we obtain:
n k b 2 b ( k 1 ) a < b a 2 ln n + 2 ln k 2 ln a + ln ln n ln n + 2 ln a + 1 ( a 1 ) 2 ln n a 2 ln n + n a ln n = b a ln n + 2 ln k + ln ln n + 1 ( a 1 ) 2 ln n a 2 ln n + n a ln n .
This leads to:
n k + ( a 1 ) 2 ln n a 2 ln n n a ln n < b a ln n + 2 ln k + ln ln n + a + 2 k 1 .
Thus,
b > a · n k + ( a 1 ) 2 ln n a 2 ln n n a ln n ln n + a + 2 k 1 + 2 ln k + ln ln n .
But since b = ( 1 ε ) a n a + ln n , we obtain:
( 1 ε ) · a n a + ln n > a n a + ln n · 1 k n + ( a 1 ) 2 n ln n a 2 ln n 1 a ln n 1 + 2 k 1 + 2 ln k + ln ln n a + ln n ,
which leads to a contradiction for sufficiently large n.
Case 2:  s r .
From Lemma 4, we have:
n k b 2 b ( k 1 ) a D ( v s ) b a ( 1 + ln r ) ( a 1 ) 2 ln r + r a .
Using r = n a 2 ln n , we obtain:
n k b 2 b ( k 1 ) a < b a ln n 2 ln a ln ln n + 1 ( a 1 ) 2 ln n a 2 ln n + n a ln n .
This yields the inequality:
n k + ( a 1 ) 2 ln n a 2 ln n n a ln n < b a ln n + a + 2 k 1 2 ln a ln ln n .
Isolating b gives:
b > a · n k + ( a 1 ) 2 ln n a 2 ln n n a ln n ln n + a + 2 k 1 2 ln a ln ln n .
Since b = ( 1 ε ) a n a + ln n , it follows that:
( 1 ε ) · a n a + ln n > a n a + ln n · 1 k n + ( a 1 ) 2 n ln n a 2 ln n 1 a ln n 1 + 2 k 1 2 ln a ln ln n a + ln n ,
which clearly leads to a contradiction for sufficiently large n.
(ii)
Set b = ( 1 ε ) n , and assume that
a = Ω n ln n and k = o ( a ) .
By Lemma 3, we have:
n k b 2 b ( k 1 ) a D ( v s ) 2 b a ln ( s 1 ) + 1 .
Using the estimate s 1 < k n a , it follows that:
n k b 2 b ( k 1 ) a < 2 b a ln k + ln n ln a + 1 .
This yields the inequality:
b > a ( n k ) 2 ln n + k + a 2 + ln k ln a .
Since b = ( 1 ε ) n , we derive:
( 1 ε ) n > n · a k n 2 ln n + k + a 2 + ln k ln a = n · 1 k a n 1 + 2 ln n + 2 k + 2 ln k 2 ln a a ,
which yields a contradiction when n is large enough.
Theorem 2.
Let 0 < δ < ε < 1 . Suppose that one of the following holds:
(i) 
a = o n ln n , k = o ( ln n ) , and b = ( 1 ε ) a n a + ln n ;
(ii) 
a = Ω n ln n , k = o ( a ) , and b = ( 1 ε ) n .
Then, following the strategy described in Theorem 1, Maker can, in at most k n a rounds, construct a graph of minimum-degree at least k such that the Breaker-degree of any vertex v with Maker-degree less than k is at most ( 1 δ ) n .
Proof. 
Maker follows the strategy described in Section 2.1. Suppose Breaker wins in round s, meaning that immediately after B s there is a vertex v s with d B ( v s ) > ( 1 δ ) n and d M ( v s ) k 1 . Then,
D ¯ B ( A s ) = D ( v s ) = d B ( v s ) 2 b a d M ( v s ) > ( 1 δ ) n b 2 b ( k 1 ) a .
Since this condition only affects Maker’s strategy, the conclusions of Lemmas 3 and 4 remain valid. Hence, we can proceed exactly as in the proof of Theorem 1, except that the definition of v s is adjusted to satisfy d B ( v s ) > ( 1 δ ) n .
(i)
Let r = n a 2 ln n and b = ( 1 ε ) a n a + ln ( n ) . By assumption,
a = o n ln n and k = o ln ( n ) .
We distinguish two cases.
Case 1: s > r . Arguing as in the proof of Theorem 1, Case 1 in part (i), we obtain
( 1 δ ) n b 2 b ( k 1 ) a D ( v s ) b a 2 ln s 1 ln ( r ) + 1 ( a 1 ) 2 ln ( r ) + r a .
Since s 1 < k n a and r = n a 2 ln n , it follows that
( 1 δ ) n b 2 b ( k 1 ) a < b a ln ( n ) + 2 ln ( k ) + ln ln ( n ) + 1 ( a 1 ) 2 ln n a 2 ln n + n a ln n .
Hence,
b > a ( 1 δ ) n + ( a 1 ) 2 ln n a 2 ln ( n ) n a ln ( n ) ln ( n ) + a + 2 k 1 + 2 ln ( k ) + ln ln ( n ) .
Since b = ( 1 ε ) a n a + ln ( n ) and ( 1 ε ) < ( 1 δ ) , the above inequality cannot hold for sufficiently large n.
Case 2:
s r . As before, we get
( 1 δ ) n b 2 b ( k 1 ) a b a ln ( n ) 2 ln ( a ) ln ln ( n ) + 1 ( a 1 ) 2 ln n a 2 ln ( n ) + n a ln ( n ) ,
and isolating b implies
b > a ( 1 δ ) n + ( a 1 ) 2 ln n a 2 ln ( n ) n a ln ( n ) ln ( n ) + a + 2 k 1 2 ln ( a ) ln ln ( n ) .
For sufficiently large n, this yields a contradiction with
b = ( 1 ε ) a n a + ln ( n ) and ( 1 ε ) < ( 1 δ ) .
(ii)
Set b = ( 1 ε ) n , and assume that
a = Ω n ln n and k = o ( a ) .
In the same way as in the proof of Theorem 1 (ii), we have:
( 1 δ ) n b 2 b ( k 1 ) a D ( v s ) 2 b a ln ( s 1 ) + 1 .
Since s 1 < k n a , it follows that:
( 1 δ ) n b 2 b ( k 1 ) a < 2 b a ln k + ln n ln a + 1 .
This yields the inequality:
b > a ( 1 δ ) n 2 ln n + k + a 2 + ln k ln a .
For large n, this contradicts the assumption b = ( 1 ε ) n , since ( 1 ε ) < ( 1 δ ) .

2.2. A Winning Strategy for Breaker

In this section, we present a strategy that enables Breaker to win the minimum-degree-k game.
For previous results on this topic, we refer the reader to the works of Hefetz et al. (2012), and of (Chvátal & Erdős, 1978), which have already been discussed in the introduction.
The ( a : b ) Box Game
The ( a : b ) Box game is played on k pairwise disjoint sets A 1 , , A k of possibly different sizes, with total size i = 1 k | A i | = t . These sets are often referred to as boxes, and their elements as balls.
Two players, called BoxMaker and BoxBreaker, alternately claim a and b elements, respectively. BoxMaker wins if he manages to claim all the balls in at least one box, while BoxBreaker aims to prevent this.
This setting can also be described as a game played on a hypergraph H = ( V , E ) , where V = i = 1 k A i and E = { A 1 , , A k } . Let t : = | V | .
The family { A 1 , , A k } consists of pairwise disjoint sets whose total size is t. The board of the Box game is said to form a canonical hypergraph of type ( k , t ) if the size difference between any two boxes satisfies | | A i | | A j | | 1 for all 1 i , j k . We denote this game by B ( k , t , a , b ) .
The Box Game was introduced in 1978 by (Chvátal & Erdős, 1978) for the special case of one-sided bias, that is, arbitrary a but b = 1 .
For the general ( a : b ) Box Game, (Hamidoune & Las Vergnas, 1987) provided necessary and sufficient conditions under which BoxMaker can win when BoxBreaker starts the game. Later, in 2012, Hefetz et al. (2012) established a sufficient condition for BoxMaker’s win in the case where BoxMaker moves first.
A typical winning strategy for BoxMaker is as follows: whenever Breaker claims a ball in a specific box, that box is considered lost for Maker. In the remaining boxes, Maker selects balls in such a way as to maintain a balancing condition, namely | | A i | | A j | | 1 for all boxes i , j . Maker continues in this manner until he reaches a box that contains fewer than a unclaimed balls.
We will use a sufficient condition for BoxMaker’s win in the game B ( k , t , a , b ) as proved by Hefetz et al. (2012).
Given positive integers a and b, define the function f as follows:
f ( k ; a , b ) : = ( k 1 ) ( a + 1 ) , if 1 k b , k a , if b < k 2 b , k ( f ( k b ; a , b ) + a b ) k b , otherwise .
Lemma 5
(Lemma 6 in (Hefetz et al., 2012)). Let a , b and k be positive integers satisfying k > b and a b 1 0 . Then,
f ( k ; a , b ) k a 1 + k ( a b 1 ) b j = 2 k / b 1 1 j .
Lemma 6
(Lemma 7 in (Hefetz et al., 2012)). If t f ( k ; a , b ) + a , then BoxMaker has a winning strategy for B ( k , t , a , b ) .
Here is our strategy for Breaker:
Let
b = ( 1 + ε ) a n a + ln n , a = o ( n ) , and h : = n 2 ( a + ln n ) .
Breaker wins if and only if he manages to ensure that
d B ( v ) n k
for some vertex v K n .
He proceeds in two phases:
Step 1: Breaker builds a clique C of size at least h such that no vertex in C is incident to any edge claimed by Maker. That is, Maker does not touch any vertex of C during this step.
Step 2: Breaker selects a vertex v C , and claims n k h + 1 free edges incident to v that are not in the clique C. As a result, the degree of v in Maker’s graph is strictly less than k, and therefore Maker cannot win.
Let | C | denote the number of vertices in the clique C.
Breaker’s Strategy
First Step: Clique Construction
Set C 1 : = .
For each i = 2 , , h , Breaker constructs a clique C i , as large as possible, satisfying the following conditions:
(a) 
C i is a clique in Breaker’s graph such that d M ( v ) = 0 for every vertex v C i just before Breaker’s ith turn. That is, no edge claimed by Maker is incident to any vertex in C i .
(b) 
| C i | | C i 1 | + 1 .
After constructing C i , Maker claims a edges.
The construction process terminates once a clique C of size at least h has been built.
Second Step: Playing the Box Game
Let C be the clique constructed in the first step, so that | V ( C ) | h and d M ( v ) = 0 for all v V ( C ) . Immediately after the construction of C, Maker may touch at most a vertices in C. Let A V ( C ) be the set of such vertices.
(c) 
Let V * C \ A be a subset of size h a .
(d) 
For each vertex v V * , let E v denote the set of edges incident to v that are neither claimed by Maker nor part of the clique C.
(e) 
Define the hypergraph H = ( V , E ) , where V : = v V * E v and E : = { E v : v V * } . This hypergraph models an instance of the BoxMaker–Breaker game, where the nodes are edges of K n .
(f) 
Breaker plays as BoxMaker in the auxiliary box game B ( h a , ( h a ) ( n k h + 1 ) , b , a ) , and makes the first move.
Lemma 7.
If Breaker, playing as BoxMaker, wins the box game
B h a , ( h a ) ( n k h + 1 ) , b , a ,
then he also wins the minimum-degree-k game.
Proof. 
Let v be the vertex whose box E v is fully claimed by Breaker in the auxiliary box game. By definition of E v , at least n k h + 1 free edges incident to v and lying outside the clique C are now owned by Breaker.
Inside the clique C of size h Breaker already controls all h 1 edges incident to v. Hence the total number of Breaker edges incident to v is
( n k h + 1 ) + ( h 1 ) = n k .
Consequently, Maker can be incident to at most ( n 1 ) ( n k ) = k 1 edges at v. Thus, the degree of v in Maker’s graph is strictly less than k, and Breaker wins the minimum-degree-k game. □
We now show that, by following the strategy described above, Breaker can win the minimum-degree-k game.
The proof will also verify that each step of the strategy, from (a) to (f), can be correctly and effectively implemented. This includes the construction of increasingly large cliques disjoint from Maker’s graph, the maintenance of the degree condition during the game, and the successful reduction of the problem to an instance of the Box game where Breaker, acting as BoxMaker, is guaranteed to win.
Theorem 3.
For every ε > 0 , there exists n 0 ( ε ) N such that for all n n 0 ( ε ) , Breaker wins the ( a : b ) minimum-degree-k game whenever
k = o ( n ) , a = o ( n ) , and b ( 1 + ε ) a n a + ln n .
Proof. 
The first step consists of at most h moves, where
h = n 2 ( a + ln n ) ,
and begins with C 1 : = . Suppose Breaker has already constructed cliques C 1 , , C i , with i { 1 , , h } . After Breaker’s i-th move, Maker has claimed at most a edges incident with vertices in C i .
Claim 2.
There exist at least  a + 1  vertices  u 1 , , u a + 1  that belong neither to the clique  C i  nor to Maker’s graph.
Proof of Claim 2.
At this stage of the game, the clique constructed by Breaker ( C i ) contains at most h 1 vertices. Additionally, Maker’s graph involves at most 2 a ( h 1 ) vertices (since in each of the previous h 1 rounds, Maker claims at most a edges, each of which is incident to two vertices). Hence, the total number of vertices occupied (those belonging to C i and those claimed by Maker) is at most
| C i | + 2 a ( h 1 ) ( h 1 ) + 2 a ( h 1 ) = ( 2 a + 1 ) ( h 1 ) .
Since h 1 < n 2 ( a + ln n ) and a = o ( n ) , for sufficiently large n, we have
( 2 a + 1 ) ( h 1 ) + a + 1 < ( 2 a + 1 ) n 2 ( a + ln n ) + a + 1 < n .
Thus, at least a + 1 vertices u 1 , , u a + 1 remain available, belonging neither to the clique C i nor to Maker’s graph, and Claim 1 is proven. □
Breaker uses Claim 1 iteratively to enlarge the cliques C i until he obtains a clique C with | C | h . At that point he switches to the auxiliary box game B h a , ( h a ) ( n k h + 1 ) , b , a described in steps (c)(f). By Lemma 7, a win for Breaker in this box game implies a win in the minimum-degree-k game.
To justify that Breaker can always extend the current clique, note first that a = o ( n ) implies a 2 + a + a ln n + ln n = o ( n ) . Hence
a ( a + 1 ) 2 = o a n a + ln n .
Moreover,
( a + 1 ) ( h 1 ) ( a + 1 ) n 2 ( a + ln n ) a n a + ln n .
With b = ( 1 + ε ) a n a + ln n , we therefore have, for sufficiently large n,
b > a + 1 2 + ( a + 1 ) ( h 1 ) .
Consequently, in Breaker’s ( i + 1 ) -st turn he can
1. claim all a + 1 2 edges of the clique on the fresh vertices u 1 , , u a + 1 ;
2. claim at most ( a + 1 ) | C i | additional edges between { u 1 , , u a + 1 } and C i .
Let X be the set of nodes of C i and let C i be the clique constructed on X { u 1 , , u a + 1 } .
Breaker may claim the remaining b a + 1 2 ( a + 1 ) | C i | edges arbitrarily. Maker, in contrast, can claim at most a edges incident to vertices in C i during his i-th turn. Consequently, there is at least one vertex, say w, with Maker-degree 0. Vertex w can then be used to construct a new clique C i + 1 satisfying | C i | + 1 | C i + 1 | and maintaining d M ( v ) = 0 for all vertices v C i + 1 .
In the second step, Breaker begins with a clique of size at least h, with d M ( v ) = 0 for all v V ( C ) . Maker can select edges incident to at most a vertices from C. Let A V ( C ) be a subset of vertices with cardinality a, containing exactly these selected vertices. Breaker’s goal is then to claim at least n k h + 1 edges incident to a particular vertex v 0 V ( C ) \ A .
As a result,
d B ( v 0 ) n k , d M ( v 0 ) = ( n 1 ) d B ( v 0 ) k 1 ,
so Maker cannot achieve minimum-degree k. Breaker thus wins the minimum-degree-k game.
We define the set V * = C \ A , and clearly, | V * | = h a . For each vertex v V * , the number of edges incident to v not claimed by Maker and not included in C is n h . Let E v denote a subset of these edges with cardinality n k h + 1 for each vertex v V * . We construct the BoxMaker–Breaker hypergraph as H = ( V , E ) with vertex set V = v V * E v and edge set E = { E v v V * } . Breaker begins playing first as BoxMaker in the auxiliary Box Game B ( h a , ( h a ) ( n k h + 1 ) , b , a ) .
By Lemma 7, if BoxMaker has a winning strategy for B ( h a , ( h a ) ( n k h + 1 ) , b , a ) , then Breaker wins the ( a : b ) minimum-degree-k game on K n .
To establish that BoxMaker indeed has a winning strategy for B ( h a , ( h a ) ( n k h + 1 ) , b , a ) , it suffices, according to Lemma 6, to demonstrate:
( h a ) ( n k h + 1 ) f ( h a ; b , a ) + b .
Given a = o ( n ) , we note that h a > a and b a 1 0 for sufficiently large n. Applying Lemma 5, we have:
f ( h a ; b , a ) ( h a ) b 1 + ( h a ) ( b a 1 ) a i = 2 ( h a ) / a 1 1 i .
Recall that the harmonic numbers H j = i = 1 j 1 i satisfy the following inequality (Chen, 2010).
ln ( j ) + γ < H j .
Therefore, we obtain:
f ( h a ; b , a ) ( h a ) b 1 + ( h a ) ( b a 1 ) a ln h a a 1 .
Hence, it remains to verify that:
( h a ) ( n k h + 1 ) ( h a ) b 1 + ( h a ) ( b a 1 ) a ln h a a 1 + b .
Dividing by h a , then multiplying by a, gives:
a ( n k h + 1 ) a b a h a + ( b a 1 ) ln h a a 1 + a b h a ,
leading finally to the condition:
b a n k h + ln h a a + ln h a a 1 + a h a a + ln h a a 1 + a h a .
Since this lower bound on b is asymptotically equivalent to a n a + ln ( n ) , and given that b = ( 1 + ε ) a n a + ln ( n ) , the above inequality indeed holds for sufficiently large n. □
We note a straightforward bound on b that guarantees Breaker’s win.
Remark 2.
If b n k , then Breaker can win the ( a : b ) minimum-degree-k game by claiming n k edges incident to a vertex v on his first turn, preventing Maker from reaching degree k at v.
We now determine the asymptotic optimal generalized threshold bias for this game, a direct consequence of Theorem 1, Theorem 3, and Remark 2:
Theorem 4.
(i) 
If a = o n ln ( n ) and k = o ( ln ( n ) ) , the asymptotic optimal threshold bias is a n a + ln ( n ) .
(ii) 
If a = Ω n ln ( n ) and k = o ( a ) , the asymptotic optimal threshold bias is n.
Applying Theorem 4 with k = 1 immediately yields the following result for the connectivity game:
Theorem 5.
(i) 
If a = o n ln ( n ) , the asymptotic optimal generalized threshold bias for the connectivity game is a n a + ln ( n ) .
(ii) 
If a = Ω n ln ( n ) , the asymptotic optimal generalized threshold bias for the connectivity game is n.
As mentioned in the introduction, this resolves the open problem posed by Hefetz et al. (2012).

3. Conclusions and Open Problems

In this paper, we investigate the ( a : b ) Maker–Breaker minimum-degree-k game and establish new upper and lower bounds on the threshold bias, thereby extending the foundational results of (Gebauer & Szabó, 2009). A key objective of our work is to identify and analyze cases where the threshold bias can be determined precisely in the asymptotic sense. Notably, we resolve an open problem posed by Hefetz et al. (2012) concerning the connectivity game, by determining its exact asymptotic threshold bias.
However, many cases remain in which the threshold bias is not yet fully characterized. For example, based on the proof of Theorem 1 and the result of Theorem 3, when u n k v n , v n = o ( n ) , u n = Ω ( ln n ) , and a = o n / ln n , the threshold bias b 0 ( a ) satisfies
( 1 o ( 1 ) ) · a n a + ln n + 2 k b 0 ( a ) ( 1 + o ( 1 ) ) · a n a + ln n .
This leaves a gap between the lower and upper bounds that still requires refinement. We believe that narrowing this gap would be of significant interest and would warrant further investigation.

Author Contributions

Conceptualization, M.E.O.; Methodology, A.F.; Formal analysis, A.F. and M.E.O.; Supervision, A.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received financial support by DFG-OA-Fonds der CAU.

Data Availability Statement

No new data were created or analyzed in this study.

Conflicts of Interest

The authors declare no conflict of interest.

Nomenclature

Summary of main notations used in the paper:
SymbolDescription
K n Complete graph on n vertices
a , b Bias parameters in the ( a : b ) Maker–Breaker game
b 0 ( a ) Threshold bias function for fixed Maker power a
u n = o ( v n ) ε > 0 , n 0 N , n n 0 : | u n | ε | v n |
u n = Ω ( v n ) c > 0 , n 0 N , n n 0 : c | v n | | u n |
x Smallest integer that is greater than or equal to x.

References

  1. Beck, J. (1982). Remarks on positional games. Acta Mathematica Academiae Scientiarum Hungarica, 40(1–2), 65–71. [Google Scholar] [CrossRef]
  2. Beck, J. (2008). Combinatorial games: Tic-Tac-Toe theory (Vol. 114). Cambridge University Press. [Google Scholar]
  3. Chen, C.-P. (2010). Inequalities for the Euler–Mascheroni constant. Applied Mathematics Letters, 23(2), 161–164. [Google Scholar] [CrossRef]
  4. Chvátal, V., & Erdős, P. (1978). Biased positional games. In Annals of discrete mathematics (Vol. 2, pp. 221–229). Elsevier. [Google Scholar]
  5. Clemens, D., Hamann, F., Mogge, Y., & Parczyk, O. (2021). Maker-Breaker games on randomly perturbed graphs. SIAM Journal on Discrete Mathematics, 35(4), 2723–2748. [Google Scholar] [CrossRef]
  6. Frieze, A., & Pegden, W. (2021). Maker-Breaker on digraphs. Journal of Graph Theory, 98(4), 653–661. [Google Scholar] [CrossRef]
  7. Gebauer, H., & Szabó, T. (2009). Asymptotic random graph intuition for the biased connectivity game. Random Structures & Algorithms, 35(4), 431–443. [Google Scholar] [CrossRef]
  8. Glazik, C., & Srivastav, A. (2022). A new bound for the Maker–Breaker triangle game. European Journal of Combinatorics, 104, 103536. [Google Scholar] [CrossRef]
  9. Hamidoune, Y. O., & Las Vergnas, M. (1987). A solution to the box game. Discrete Mathematics, 65(2), 157–171. [Google Scholar] [CrossRef]
  10. Hancock, R. (2019). The Maker–Breaker Rado game on a random set of integers. SIAM Journal on Discrete Mathematics, 33(1), 68–94. [Google Scholar] [CrossRef]
  11. Hefetz, D., Krivelevich, M., Stojaković, M., & Szabó, T. (2014). Positional games. Springer. [Google Scholar]
  12. Hefetz, D., Mikalacki, M., & Stojaković, M. (2012). Doubly biased Maker-Breaker connectivity game. Electronic Journal of Combinatorics, 19(1), P61. [Google Scholar] [CrossRef] [PubMed]
  13. Krivelevich, M. (2011). The critical bias for the Hamiltonicity game is (1 + o(1))n/ ln n. Journal of the American Mathematical Society, 24(1), 125–131. [Google Scholar] [CrossRef]
  14. Liebenau, A., & Nenadov, R. (2022). The threshold bias of the clique-factor game. Journal of Combinatorial Theory, Series B, 152, 221–247. [Google Scholar] [CrossRef]
  15. Mikalacki, M., & Stojaković, M. (2017). Winning fast in biased Maker-Breaker games. Electronic Notes in Discrete Mathematics, 61, 863–868. [Google Scholar] [CrossRef]
Figure 1. Schematic representation of the evolution of the average danger during two consecutive rounds.
Figure 1. Schematic representation of the evolution of the average danger during two consecutive rounds.
Games 16 00047 g001
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Fouadi, A.; El Ouali, M.; Srivastav, A. Asymptotic Thresholds for (a:b) Minimum-Degree Games. Games 2025, 16, 47. https://doi.org/10.3390/g16050047

AMA Style

Fouadi A, El Ouali M, Srivastav A. Asymptotic Thresholds for (a:b) Minimum-Degree Games. Games. 2025; 16(5):47. https://doi.org/10.3390/g16050047

Chicago/Turabian Style

Fouadi, Adnane, Mourad El Ouali, and Anand Srivastav. 2025. "Asymptotic Thresholds for (a:b) Minimum-Degree Games" Games 16, no. 5: 47. https://doi.org/10.3390/g16050047

APA Style

Fouadi, A., El Ouali, M., & Srivastav, A. (2025). Asymptotic Thresholds for (a:b) Minimum-Degree Games. Games, 16(5), 47. https://doi.org/10.3390/g16050047

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop