Catalan functions and k-schur positivity

Size: px
Start display at page:

Download "Catalan functions and k-schur positivity"

Transcription

1 Catalan functions and k-schur positivity Jonah Blasiak Drexel University joint work with Jennifer Morse, Anna Pun, and Dan Summers April 2018

2 Strengthened Macdonald positivity conjecture Theorem (Haiman) The modified Macdonald polynomials are Schur positive: H µ (x; q, t) = λ K λµ (q, t)s λ (x) for K λµ (q, t) N[q, t]. Conjecture (Lapointe-Lascoux-Morse) The atom k-schur functions {A λ (x; t)} λ1 k form a basis for Λ k = span Q(q,t) {H µ (x; q, t)} µ1 k, and are Schur positive; expansion of H µ (x; q, t) Λ k in this basis has coefficients in N[q, t]. Conjecture (Lapointe-Lascoux-Morse) The k + 1-Schur expansion of a k-schur function has coefficients in N[t].

3 Strengthened Macdonald positivity conjecture Theorem (Haiman) The modified Macdonald polynomials are Schur positive: H µ (x; q, t) = λ K λµ (q, t)s λ (x) for K λµ (q, t) N[q, t]. Conjecture (Lapointe-Lascoux-Morse) The atom k-schur functions {A λ (x; t)} λ1 k form a basis for Λ k = span Q(q,t) {H µ (x; q, t)} µ1 k, and are Schur positive; expansion of H µ (x; q, t) Λ k in this basis has coefficients in N[q, t]. Conjecture (Lapointe-Lascoux-Morse) The k + 1-Schur expansion of a k-schur function has coefficients in N[t].

4 Strengthened Macdonald positivity conjecture Theorem (Haiman) The modified Macdonald polynomials are Schur positive: H µ (x; q, t) = λ K λµ (q, t)s λ (x) for K λµ (q, t) N[q, t]. Conjecture (Lapointe-Lascoux-Morse) The atom k-schur functions {A λ (x; t)} λ1 k form a basis for Λ k = span Q(q,t) {H µ (x; q, t)} µ1 k, and are Schur positive; expansion of H µ (x; q, t) Λ k in this basis has coefficients in N[q, t]. Conjecture (Lapointe-Lascoux-Morse) The k + 1-Schur expansion of a k-schur function has coefficients in N[t].

5 Strengthened Macdonald positivity conjecture Example. k = 2 H 1 4 = t 4( s + ts + t 2 s H 211 = t ( s + ts + t 2 s H 22 = ( s + ts + t 2 s ) + ( t 2 + t 3)( s + ts ) + ( 1 + qt 2 )( s + ts ) ( ) + (tq + q) s + ts }{{}}{{} positive sum of q, t-monomials t-positive sum of schur functions ) ( + s + ts ) ( + q s + ts + t 2 s + t 2 s +q 2 (s + ts + t 2 s ) ) )

6 Strengthened Macdonald positivity conjecture Example. k = 2 H 1 4 = t 4( s + ts + t 2 ) ( s + t 2 + t 3)( ) ( ) s + ts + s + ts + t 2 s H 211 = t ( s + ts + t 2 ) ( s qt 2 )( ) ( ) s + ts + q s + ts + t 2 s H 22 = ( s + ts + t 2 ) ( ) ) s + (tq + q) s + ts +q (s 2 + ts + t 2 s }{{}}{{} positive sum of q, t-monomials t-positive sum of schur functions }{{}}{{}}{{} s (2) s (2) s (2) basis for restricted span Λ k of Macdonald polynomials

7 Conjecturally equivalent definitions of k-schurs Schur basis symmetric positive branching [1998:Lapointe,Lascoux,Morse] Tableaux and katabolism [2003:Lapointe,Morse] Jing vertex operators [2006:Lam,Lapointe,Morse,Shimozono] Bruhat order on type-a affine Weyl group / strong tableaux [2010:Chen,Haiman] GL l (C)-equivariant Euler characteristics / Demazure operators [2012:Assaf,Billey] Quasisymmetric functions [2015:Dalal,Morse] Inverting affine Kostka matrix

8 Overview The k-schur functions appear in the study of Macdonald polynomials, the homology of the affine Grassmannian, graded representations of the symmetric group. Prior work on the branching rule: Geometric proof at t = 1 (Lam 2011). Formula for branching at t = 1 as equivalence classes on the k-shape poset (Lam-Lapointe-Morse-Shimozono 2013). Main results: Strong tableaux k-schur functions form a Schur positive basis for Λ k. (Branching rule) positive combinatorial formula for the k + 1-Schur expansion of k-schur functions. Strong tableaux k-schur functions agree with a Catalan function definition of Chen-Haiman.

9 Overview The k-schur functions appear in the study of Macdonald polynomials, the homology of the affine Grassmannian, graded representations of the symmetric group. Prior work on the branching rule: Geometric proof at t = 1 (Lam 2011). Formula for branching at t = 1 as equivalence classes on the k-shape poset (Lam-Lapointe-Morse-Shimozono 2013). Main results: Strong tableaux k-schur functions form a Schur positive basis for Λ k. (Branching rule) positive combinatorial formula for the k + 1-Schur expansion of k-schur functions. Strong tableaux k-schur functions agree with a Catalan function definition of Chen-Haiman.

10 Overview The k-schur functions appear in the study of Macdonald polynomials, the homology of the affine Grassmannian, graded representations of the symmetric group. Prior work on the branching rule: Geometric proof at t = 1 (Lam 2011). Formula for branching at t = 1 as equivalence classes on the k-shape poset (Lam-Lapointe-Morse-Shimozono 2013). Main results: Strong tableaux k-schur functions form a Schur positive basis for Λ k. (Branching rule) positive combinatorial formula for the k + 1-Schur expansion of k-schur functions. Strong tableaux k-schur functions agree with a Catalan function definition of Chen-Haiman.

11 Conjecturally equivalent definitions of k-schurs Schur basis symmetric positive branching [1998:Lapointe,Lascoux,Morse] Tableaux and katabolism [2003:Lapointe,Morse] Jing vertex operators [2006:Lam,Lapointe,Morse,Shimozono] Bruhat order on type-a affine Weyl group / strong tableaux [2010:Chen,Haiman] Catalan functions [2012:Assaf,Billey] Quasisymmetric functions [2015:Dalal,Morse] Inverting affine Kostka matrix [2018:B,Morse,Pun,Summers] Strong tableaux = Catalan functions

12 k-bounded partitions and k + 1-cores Def. A k-bounded partition is a partition with parts of size k. Def. A k + 1-core is a partition whose diagram has no box with hook length k + 1. Proposition. There is a bijection κ p(κ) from k + 1-cores to k-bounded partitions. Example. k = κ p(κ) Def. The k-skew diagram of a k + 1-core κ is the skew shape obtained by removing boxes of hook length > k.

13 k-bounded partitions and k + 1-cores Def. A k-bounded partition is a partition with parts of size k. Def. A k + 1-core is a partition whose diagram has no box with hook length k + 1. Proposition. There is a bijection κ p(κ) from k + 1-cores to k-bounded partitions. Example. k = κ p(κ) Def. The k-skew diagram of a k + 1-core κ is the skew shape obtained by removing boxes of hook length > k.

14 k-bounded partitions and k + 1-cores Def. A k-bounded partition is a partition with parts of size k. Def. A k + 1-core is a partition whose diagram has no box with hook length k + 1. Proposition. There is a bijection κ p(κ) from k + 1-cores to k-bounded partitions. Example. k = k-skew(κ) p(κ) Def. The k-skew diagram of a k + 1-core κ is the skew shape obtained by removing boxes of hook length > k.

15 Strong covers Def. An inclusion τ κ of k + 1-cores is a strong cover, denoted τ κ, if p(τ) + 1 = p(κ). Example. Strong cover with k = 4: corresponding k-skew diagrams: = = p(τ) = p(κ) =

16 Strong covers Def. An inclusion τ κ of k + 1-cores is a strong cover, denoted τ κ, if p(τ) + 1 = p(κ). Example. Strong cover with k = 4: corresponding k-skew diagrams: = = p(τ) = p(κ) =

17 Strong marked covers r Def. A strong marked cover τ == κ is a strong cover τ κ together with a positive integer r which is allowed to be the smallest row index of any connected component of the skew shape κ/τ. Example. The two possible markings of the previous strong cover: τ 6 == κ τ 3 == κ

18 Def. spin ( τ Spin r == κ ) = c (h 1) + N, where c = number of connected components of κ/τ, h = height (number of rows) of each component, N = number of components below the marked one. Example. τ 6 == κ τ 3 == κ spin = 4 spin = 5 spin = c (h 1) + N = 2 (3 1) + 0 = 4 spin = 2 (3 1) + 1 = 5

19 Vertical strong marked tableaux Def. A vertical strong marked tableau T of weight η = (η 1, η 2,... ) is a sequence κ (0) r == 1 κ (1) r == 2 r == m κ (m) such that r vi +1 < r vi +2 < < r vi +η i for all i, where v i := η η i 1. inside(t ) := p(κ (0) ) outside(t ) := p(κ (m) ) Example. For k = 4, a vertical strong marked tableau of weight (5): 5 5 κ (4) 5 == κ (5) 5

20 Vertical strong marked tableaux Def. A vertical strong marked tableau T of weight η = (η 1, η 2,... ) is a sequence κ (0) r == 1 κ (1) r == 2 r == m κ (m) such that r vi +1 < r vi +2 < < r vi +η i for all i, where v i := η η i 1. inside(t ) := p(κ (0) ) outside(t ) := p(κ (m) ) Example. For k = 4, a vertical strong marked tableau of weight (5): 4 4 κ (3) 4 == κ (4)

21 Vertical strong marked tableaux Def. A vertical strong marked tableau T of weight η = (η 1, η 2,... ) is a sequence κ (0) r == 1 κ (1) r == 2 r == m κ (m) such that r vi +1 < r vi +2 < < r vi +η i for all i, where v i := η η i 1. inside(t ) := p(κ (0) ) outside(t ) := p(κ (m) ) Example. For k = 4, a vertical strong marked tableau of weight (5): 3 3 κ (2) 3 == κ (3) 3

22 Vertical strong marked tableaux Def. A vertical strong marked tableau T of weight η = (η 1, η 2,... ) is a sequence κ (0) r == 1 κ (1) r == 2 r == m κ (m) such that r vi +1 < r vi +2 < < r vi +η i for all i, where v i := η η i 1. inside(t ) := p(κ (0) ) outside(t ) := p(κ (m) ) Example. For k = 4, a vertical strong marked tableau of weight (5): κ (1) 2 == κ (2)

23 Vertical strong marked tableaux Def. A vertical strong marked tableau T of weight η = (η 1, η 2,... ) is a sequence κ (0) r == 1 κ (1) r == 2 r == m κ (m) such that r vi +1 < r vi +2 < < r vi +η i for all i, where v i := η η i 1. inside(t ) := p(κ (0) ) outside(t ) := p(κ (m) ) Example. For k = 4, a vertical strong marked tableau of weight (5): 1 κ (0) 1 == κ (1)

24 Vertical strong marked tableaux Def. A vertical strong marked tableau T of weight η = (η 1, η 2,... ) is a sequence κ (0) r == 1 κ (1) r == 2 r == m κ (m) such that r vi +1 < r vi +2 < < r vi +η i for all i, where v i := η η i 1. inside(t ) := p(κ (0) ) outside(t ) := p(κ (m) ) Example. For k = 4, a vertical strong marked tableau of weight (5):

25 Spin k-schur functions We work in the ring of symmetric functions in infinitely many variables x = (x 1, x 2,... ). SMT k η(µ) = set of strong marked tableaux T of weight η with outside(t ) = µ. spin(t ) = sum of the spins of the strong marked covers comprising T. Def. For a k-bounded partition µ, let s µ (k) (x; t) = η Z 0, η = µ T SMT k η(µ) t spin(t ) x η. Their t = 1 specializations agree with another combinatorial definition using weak tableaux (Lam-Lapointe-Morse-Shimozono 2010), are Schubert classes in the homology of the affine Grassmannian Gr SLk+1 of SL k+1 (Lam 2008).

26 Spin k-schur functions We work in the ring of symmetric functions in infinitely many variables x = (x 1, x 2,... ). SMT k η(µ) = set of strong marked tableaux T of weight η with outside(t ) = µ. spin(t ) = sum of the spins of the strong marked covers comprising T. Def. For a k-bounded partition µ, let s µ (k) (x; t) = η Z 0, η = µ T SMT k η(µ) t spin(t ) x η. Their t = 1 specializations agree with another combinatorial definition using weak tableaux (Lam-Lapointe-Morse-Shimozono 2010), are Schubert classes in the homology of the affine Grassmannian Gr SLk+1 of SL k+1 (Lam 2008).

27 Properties of k-schur functions Theorem (B.-Morse-Pun-Summers) The k-schur functions {s (k) µ µ is k-bounded of length l} satisfy (vertical dual Pieri rule) (shift invariance) e d s(k) µ = s (k) µ = e l s(k+1) µ+1 l, T VSMT k (d) (µ) t spin(t ) s (k) inside(t ), (Schur function stability) if k µ, then s (k) µ = s µ. e d End(Λ) is defined by e d (g), h = g, e dh for all g, h Λ. VSMT k η(µ) = set of vertical strong marked tableaux T of weight η with outside(t ) = µ.

28 k-schur branching rule Theorem (B.-Morse-Pun-Summers) For µ a k-bounded partition of length l, the expansion of the k-schur function s (k) µ into k + 1-Schur functions is given by s (k) µ = T VSMT k+1 (l) (µ+1l ) t spin(t ) s (k+1) inside(t ). Proof. The shift invariance property followed by the vertical dual Pieri rule yields s (k) µ = e l s(k+1) µ+1 l = T VSMT k+1 (l) (µ+1l ) t spin(t ) s (k+1) inside(t ).

29 k-schur branching rule Theorem (B.-Morse-Pun-Summers) For µ a k-bounded partition of length l, the expansion of the k-schur function s (k) µ into k + 1-Schur functions is given by s (k) µ = T VSMT k+1 (l) (µ+1l ) t spin(t ) s (k+1) inside(t ). Proof. The shift invariance property followed by the vertical dual Pieri rule yields s (k) µ = e l s(k+1) µ+1 l = T VSMT k+1 (l) (µ+1l ) t spin(t ) s (k+1) inside(t ).

30 k-schur branching rule s (3) = t2 s (4) t 2 s (4) t 2 s (4) s (4) VSMT 4 (5) (33332)

31 k-schur branching rule s (3) = t2 s (4) t 2 s (4) t 2 s (4) s (4) VSMT 4 (5) (33332) T = spin(t ) = = 2 inside(t ) = 3222 outside(t ) = 33332

32 Root ideals Set of positive roots + := { (i, j) 1 i < j l }. Ψ + is an upper order ideal of positive roots. Example. Ψ = {(1, 3), (1, 4), (1, 5), (1, 6), (2, 5), (2, 6), (3, 6)} (1, 3) (1, 4) (1, 5) (1, 6) (2, 5) (2, 6) (3, 6)

33 Catalan functions Def. (Panyushev, Chen-Haiman) Ψ + is an upper order ideal of positive roots, γ Z l. The Catalan function indexed by Ψ and γ: Hγ Ψ (x; t) := (1 tr ij ) 1 s γ (x) (i, j) Ψ where the raising operator R ij acts by R ij (s γ (x)) = s γ+ɛi ɛ j (x). Example. Let µ = (µ 1,..., µ l ) be a partition. Empty root set: H µ (x; t) = s µ (x). Full root set: H + µ (x; t) = H µ (x; t), the modified Hall-Littlewood polynomial.

34 Catalan functions Def. (Panyushev, Chen-Haiman) Ψ + is an upper order ideal of positive roots, γ Z l. The Catalan function indexed by Ψ and γ: Hγ Ψ (x; t) := (1 tr ij ) 1 s γ (x) (i, j) Ψ where the raising operator R ij acts by R ij (s γ (x)) = s γ+ɛi ɛ j (x). Example. Let µ = (µ 1,..., µ l ) be a partition. Empty root set: H µ (x; t) = s µ (x). Full root set: H + µ (x; t) = H µ (x; t), the modified Hall-Littlewood polynomial.

35 k-schur Catalan functions Def. For µ a k-bounded partition of length l, define the root ideal and the Catalan function k (µ) = {(i, j) + k µ i + i < j}, s (k) µ (x; t) := H k (µ) µ = l l i=1 j=k+1 µ i +i ( 1 trij ) 1sµ (x). # nonroots in row i = k µ i

36 Example. k = 4, µ = Examples of Catalan functions 1, 3 1, 4 k (µ) = 2, 4 s (k) µ (x; t) = (i, j) k (µ) (1 tr ij ) 1 s µ (x)

37 Example. k = 4, µ = Examples of Catalan functions 1, 3 1, 4 k (µ) = 2, 4 s (k) µ (x; t) = (i, j) k (µ) (1 tr ij ) 1 s µ (x) = (1 tr 13 ) 1 (1 tr 24 ) 1 (1 tr 14 ) 1 s 3321 (x)

38 Example. k = 4, µ = Examples of Catalan functions 1, 3 1, 4 k (µ) = 2, 4 s (k) µ (x; t) = (i, j) k (µ) (1 tr ij ) 1 s µ (x) = (1 tr 13 ) 1 (1 tr 24 ) 1 (1 tr 14 ) 1 s 3321 (x) = s t(s s s 4320 ) + t 2 (s s s 5310 ) + t 3 (s s s 6300 ) + t 4 (s s )

39 Example. k = 4, µ = Examples of Catalan functions 1, 3 1, 4 k (µ) = 2, 4 s (k) µ (x; t) = (i, j) k (µ) (1 tr ij ) 1 s µ (x) = (1 tr 13 ) 1 (1 tr 24 ) 1 (1 tr 14 ) 1 s 3321 (x) = s t(s s s 4320 ) + t 2 (s s s 5310 ) + t 3 (s s s 6300 ) + t 4 (s s ) = s t(s s 4311 ) + t 2 (s s 5310 ) + t 3 s 5400.

40 Chen-Haiman conjecture Theorem (B.-Morse-Pun-Summers) For any k-bounded partition µ, the k-schur function s (k) µ (x; t) is the Catalan function s (k) µ (x; t).

41 k-schur into Schur Theorem (B.-Morse-Pun-Summers) Let µ be a k-bounded partition of length l and set m = max( µ k, 0). The Schur expansion the k-schur function s µ (k) is given by s (k) µ = T VSMT k+m (l m ) (µ+ml ) t spin(t ) s inside(t ). Proof. Applying the shift invariance property m times followed by the vertical dual Pieri rule, we obtain s (k) µ = (e l )m s (k+m) µ+m l = T VSMT k+m (l m ) (µ+ml ) t spin(t ) s inside(t ). The Schur function stability property ensures this is the Schur function decomposition.

42 k-schur into Schur Theorem (B.-Morse-Pun-Summers) Let µ be a k-bounded partition of length l and set m = max( µ k, 0). The Schur expansion the k-schur function s µ (k) is given by s (k) µ = T VSMT k+m (l m ) (µ+ml ) t spin(t ) s inside(t ). Proof. Applying the shift invariance property m times followed by the vertical dual Pieri rule, we obtain s (k) µ = (e l )m s (k+m) µ+m l = T VSMT k+m (l m ) (µ+ml ) t spin(t ) s inside(t ). The Schur function stability property ensures this is the Schur function decomposition.

43 Schur expansion of s (1) 111 = H t 3 s 3 t 2 s 21 t s 21 s 111 s (1) 111 = t3 s 3 + t 2 s 21 + ts 21 + s 111 The Schur expansion of the 1-Schur function s (1) 111 is obtained by summing t spin(t ) s inside(t ) over the set VSMT 3 (3,3)(3, 3, 3) of vertical strong marked tableaux T given above.

44 Schur function straightening Schur functions may be defined for any γ Z l. The Schur function s γ (x 1, x 2,..., x l ) = s γ (x) is straightened as follows: { sgn(γ + ρ)s sort(γ+ρ) ρ (x) if γ + ρ has distinct nonnegative parts, s γ (x) = 0 otherwise, sort(β) = weakly decreasing sequence obtained by sorting β, sgn(β) = sign of the shortest permutation taking β to sort(β). Example. l = 4, γ = γ + ρ = (3, 1, 2, 5) + (3, 2, 1, 0) = (6, 3, 3, 5) has a repeated part. Hence s 3125 (x) = 0.

45 Schur function straightening Schur functions may be defined for any γ Z l. The Schur function s γ (x 1, x 2,..., x l ) = s γ (x) is straightened as follows: { sgn(γ + ρ)s sort(γ+ρ) ρ (x) if γ + ρ has distinct nonnegative parts, s γ (x) = 0 otherwise, sort(β) = weakly decreasing sequence obtained by sorting β, sgn(β) = sign of the shortest permutation taking β to sort(β). Example. l = 4, γ = γ + ρ = (3, 1, 2, 5) + (3, 2, 1, 0) = (6, 3, 3, 5) has a repeated part. Hence s 3125 (x) = 0.

46 Schur function straightening Schur functions may be defined for any γ Z l. The Schur function s γ (x 1, x 2,..., x l ) = s γ (x) is straightened as follows: { sgn(γ + ρ)s sort(γ+ρ) ρ (x) if γ + ρ has distinct nonnegative parts, s γ (x) = 0 otherwise, sort(β) = weakly decreasing sequence obtained by sorting β, sgn(β) = sign of the shortest permutation taking β to sort(β). Example. l = 4, γ = γ + ρ = (4, 7, 1, 6) + (3, 2, 1, 0) = (7, 9, 2, 6) sort(γ + ρ) = (9, 7, 6, 2) sort(γ + ρ) ρ = (6, 5, 5, 2) Hence s 4716 (x) = s 6552 (x).

arxiv: v1 [math.co] 8 Nov 2017

arxiv: v1 [math.co] 8 Nov 2017 Proof of a conjecture of Morales Pak Panova on reverse plane partitions Peter L. Guo 1, C.D. Zhao 2 and Michael X.X. Zhong 3 arxiv:1711.03048v1 [math.co] 8 Nov 2017 1,2 Center for Combinatorics, LPMC-TJKLC

More information

LECTURE 3: FREE CENTRAL LIMIT THEOREM AND FREE CUMULANTS

LECTURE 3: FREE CENTRAL LIMIT THEOREM AND FREE CUMULANTS LECTURE 3: FREE CENTRAL LIMIT THEOREM AND FREE CUMULANTS Recall from Lecture 2 that if (A, φ) is a non-commutative probability space and A 1,..., A n are subalgebras of A which are free with respect to

More information

Quadrant marked mesh patterns in 123-avoiding permutations

Quadrant marked mesh patterns in 123-avoiding permutations Quadrant marked mesh patterns in 23-avoiding permutations Dun Qiu Department of Mathematics University of California, San Diego La Jolla, CA 92093-02. USA duqiu@math.ucsd.edu Jeffrey Remmel Department

More information

THE DEODHAR DECOMPOSITION OF THE GRASSMANNIAN AND THE REGULARITY OF KP SOLITONS

THE DEODHAR DECOMPOSITION OF THE GRASSMANNIAN AND THE REGULARITY OF KP SOLITONS THE DEODHAR DECOMPOSITION OF THE GRASSMANNIAN AND THE REGULARITY OF KP SOLITONS YUJI KODAMA AND LAUREN WILLIAMS Abstract. Given a point A in the real Grassmannian, it is well-known that one can construct

More information

A relation on 132-avoiding permutation patterns

A relation on 132-avoiding permutation patterns Discrete Mathematics and Theoretical Computer Science DMTCS vol. VOL, 205, 285 302 A relation on 32-avoiding permutation patterns Natalie Aisbett School of Mathematics and Statistics, University of Sydney,

More information

Outside nested decompositions and Schur function determinants. Emma Yu Jin

Outside nested decompositions and Schur function determinants. Emma Yu Jin Outside nested decompositions and Schur function determinants Emma Yu Jin Technische Universität Wien 77th SLC, Strobl September 12, 2016 1 2 (Semi)standard Young tableaux (Semi)standard Young tableaux

More information

arxiv: v1 [math.co] 31 Mar 2009

arxiv: v1 [math.co] 31 Mar 2009 A BIJECTION BETWEEN WELL-LABELLED POSITIVE PATHS AND MATCHINGS OLIVIER BERNARDI, BERTRAND DUPLANTIER, AND PHILIPPE NADEAU arxiv:0903.539v [math.co] 3 Mar 009 Abstract. A well-labelled positive path of

More information

maps 1 to 5. Similarly, we compute (1 2)(4 7 8)(2 1)( ) = (1 5 8)(2 4 7).

maps 1 to 5. Similarly, we compute (1 2)(4 7 8)(2 1)( ) = (1 5 8)(2 4 7). Math 430 Dr. Songhao Li Spring 2016 HOMEWORK 3 SOLUTIONS Due 2/15/16 Part II Section 9 Exercises 4. Find the orbits of σ : Z Z defined by σ(n) = n + 1. Solution: We show that the only orbit is Z. Let i,

More information

Notes on the symmetric group

Notes on the symmetric group Notes on the symmetric group 1 Computations in the symmetric group Recall that, given a set X, the set S X of all bijections from X to itself (or, more briefly, permutations of X) is group under function

More information

The rth moment of a real-valued random variable X with density f(x) is. x r f(x) dx

The rth moment of a real-valued random variable X with density f(x) is. x r f(x) dx 1 Cumulants 1.1 Definition The rth moment of a real-valued random variable X with density f(x) is µ r = E(X r ) = x r f(x) dx for integer r = 0, 1,.... The value is assumed to be finite. Provided that

More information

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Shlomo Hoory and Stefan Szeider Department of Computer Science, University of Toronto, shlomoh,szeider@cs.toronto.edu Abstract.

More information

Inversion Formulae on Permutations Avoiding 321

Inversion Formulae on Permutations Avoiding 321 Inversion Formulae on Permutations Avoiding 31 Pingge Chen College of Mathematics and Econometrics Hunan University Changsha, P. R. China. chenpingge@hnu.edu.cn Suijie Wang College of Mathematics and Econometrics

More information

Rises in forests of binary shrubs

Rises in forests of binary shrubs Discrete Mathematics and Theoretical Computer Science DMTCS vol. 9:, 07, #5 Rises in forests of binary shrubs Jeffrey Remmel Sainan Zheng arxiv:6.0908v4 [math.co] 8 Jul 07 Department of Mathematics, University

More information

The Sorting Index and Permutation Codes. Abstract

The Sorting Index and Permutation Codes. Abstract The Sorting Index and Permutation Codes William Y.C. Chen a, George Z. Gong b, Jeremy J.F. Guo b a Center for Applied Mathematics, Tianjin University, Tianjin 300072, P. R. China b Center for Combinatorics,

More information

GUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv: v1 [math.lo] 25 Mar 2019

GUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv: v1 [math.lo] 25 Mar 2019 GUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv:1903.10476v1 [math.lo] 25 Mar 2019 Abstract. In this article we prove three main theorems: (1) guessing models are internally unbounded, (2)

More information

On the h-vector of a Lattice Path Matroid

On the h-vector of a Lattice Path Matroid On the h-vector of a Lattice Path Matroid Jay Schweig Department of Mathematics University of Kansas Lawrence, KS 66044 jschweig@math.ku.edu Submitted: Sep 16, 2009; Accepted: Dec 18, 2009; Published:

More information

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Shlomo Hoory and Stefan Szeider Abstract (k, s)-sat is the propositional satisfiability problem restricted to instances where each

More information

The ruin probabilities of a multidimensional perturbed risk model

The ruin probabilities of a multidimensional perturbed risk model MATHEMATICAL COMMUNICATIONS 231 Math. Commun. 18(2013, 231 239 The ruin probabilities of a multidimensional perturbed risk model Tatjana Slijepčević-Manger 1, 1 Faculty of Civil Engineering, University

More information

Strong Subgraph k-connectivity of Digraphs

Strong Subgraph k-connectivity of Digraphs Strong Subgraph k-connectivity of Digraphs Yuefang Sun joint work with Gregory Gutin, Anders Yeo, Xiaoyan Zhang yuefangsun2013@163.com Department of Mathematics Shaoxing University, China July 2018, Zhuhai

More information

Palindromic Permutations and Generalized Smarandache Palindromic Permutations

Palindromic Permutations and Generalized Smarandache Palindromic Permutations arxiv:math/0607742v2 [mathgm] 8 Sep 2007 Palindromic Permutations and Generalized Smarandache Palindromic Permutations Tèmítópé Gbóláhàn Jaíyéọlá Department of Mathematics, Obafemi Awolowo University,

More information

Cumulants and triangles in Erdős-Rényi random graphs

Cumulants and triangles in Erdős-Rényi random graphs Cumulants and triangles in Erdős-Rényi random graphs Valentin Féray partially joint work with Pierre-Loïc Méliot (Orsay) and Ashkan Nighekbali (Zürich) Institut für Mathematik, Universität Zürich Probability

More information

Essays on Some Combinatorial Optimization Problems with Interval Data

Essays on Some Combinatorial Optimization Problems with Interval Data Essays on Some Combinatorial Optimization Problems with Interval Data a thesis submitted to the department of industrial engineering and the institute of engineering and sciences of bilkent university

More information

arxiv: v2 [math.lo] 13 Feb 2014

arxiv: v2 [math.lo] 13 Feb 2014 A LOWER BOUND FOR GENERALIZED DOMINATING NUMBERS arxiv:1401.7948v2 [math.lo] 13 Feb 2014 DAN HATHAWAY Abstract. We show that when κ and λ are infinite cardinals satisfying λ κ = λ, the cofinality of the

More information

Slides III - Complete Markets

Slides III - Complete Markets Slides III - Complete Markets Julio Garín University of Georgia Macroeconomic Theory II (Ph.D.) Spring 2017 Macroeconomic Theory II Slides III - Complete Markets Spring 2017 1 / 33 Outline 1. Risk, Uncertainty,

More information

Asymptotic Notation. Instructor: Laszlo Babai June 14, 2002

Asymptotic Notation. Instructor: Laszlo Babai June 14, 2002 Asymptotic Notation Instructor: Laszlo Babai June 14, 2002 1 Preliminaries Notation: exp(x) = e x. Throughout this course we shall use the following shorthand in quantifier notation. ( a) is read as for

More information

CATEGORICAL SKEW LATTICES

CATEGORICAL SKEW LATTICES CATEGORICAL SKEW LATTICES MICHAEL KINYON AND JONATHAN LEECH Abstract. Categorical skew lattices are a variety of skew lattices on which the natural partial order is especially well behaved. While most

More information

arxiv:physics/ v2 [math-ph] 13 Jan 1997

arxiv:physics/ v2 [math-ph] 13 Jan 1997 THE COMPLETE COHOMOLOGY OF E 8 LIE ALGEBRA arxiv:physics/9701004v2 [math-ph] 13 Jan 1997 H. R. Karadayi and M. Gungormez Dept.Physics, Fac. Science, Tech.Univ.Istanbul 80626, Maslak, Istanbul, Turkey Internet:

More information

Continuous images of closed sets in generalized Baire spaces ESI Workshop: Forcing and Large Cardinals

Continuous images of closed sets in generalized Baire spaces ESI Workshop: Forcing and Large Cardinals Continuous images of closed sets in generalized Baire spaces ESI Workshop: Forcing and Large Cardinals Philipp Moritz Lücke (joint work with Philipp Schlicht) Mathematisches Institut, Rheinische Friedrich-Wilhelms-Universität

More information

THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET

THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET MICHAEL PINSKER Abstract. We calculate the number of unary clones (submonoids of the full transformation monoid) containing the

More information

Extender based forcings, fresh sets and Aronszajn trees

Extender based forcings, fresh sets and Aronszajn trees Extender based forcings, fresh sets and Aronszajn trees Moti Gitik August 31, 2011 Abstract Extender based forcings are studied with respect of adding branches to Aronszajn trees. We construct a model

More information

Chapter 5 Finite Difference Methods. Math6911 W07, HM Zhu

Chapter 5 Finite Difference Methods. Math6911 W07, HM Zhu Chapter 5 Finite Difference Methods Math69 W07, HM Zhu References. Chapters 5 and 9, Brandimarte. Section 7.8, Hull 3. Chapter 7, Numerical analysis, Burden and Faires Outline Finite difference (FD) approximation

More information

Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem

Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem Joshua Cooper August 14, 006 Abstract We show that the problem of counting collinear points in a permutation (previously considered by the

More information

Course Information and Introduction

Course Information and Introduction August 20, 2015 Course Information 1 Instructor : Email : arash.rafiey@indstate.edu Office : Root Hall A-127 Office Hours : Tuesdays 12:00 pm to 1:00 pm in my office (A-127) 2 Course Webpage : http://cs.indstate.edu/

More information

Variations on a theme by Weetman

Variations on a theme by Weetman Variations on a theme by Weetman A.E. Brouwer Abstract We show for many strongly regular graphs, and for all Taylor graphs except the hexagon, that locally graphs have bounded diameter. 1 Locally graphs

More information

Gödel algebras free over finite distributive lattices

Gödel algebras free over finite distributive lattices TANCL, Oxford, August 4-9, 2007 1 Gödel algebras free over finite distributive lattices Stefano Aguzzoli Brunella Gerla Vincenzo Marra D.S.I. D.I.COM. D.I.C.O. University of Milano University of Insubria

More information

Philipp Moritz Lücke

Philipp Moritz Lücke Σ 1 -partition properties Philipp Moritz Lücke Mathematisches Institut Rheinische Friedrich-Wilhelms-Universität Bonn http://www.math.uni-bonn.de/people/pluecke/ Logic & Set Theory Seminar Bristol, 14.02.2017

More information

EXTENSIVE AND NORMAL FORM GAMES

EXTENSIVE AND NORMAL FORM GAMES EXTENSIVE AND NORMAL FORM GAMES Jörgen Weibull February 9, 2010 1 Extensive-form games Kuhn (1950,1953), Selten (1975), Kreps and Wilson (1982), Weibull (2004) Definition 1.1 A finite extensive-form game

More information

FORCING AND THE HALPERN-LÄUCHLI THEOREM. 1. Introduction This document is a continuation of [1]. It is intended to be part of a larger paper.

FORCING AND THE HALPERN-LÄUCHLI THEOREM. 1. Introduction This document is a continuation of [1]. It is intended to be part of a larger paper. FORCING AND THE HALPERN-LÄUCHLI THEOREM NATASHA DOBRINEN AND DAN HATHAWAY Abstract. We will show the various effects that forcing has on the Halpern-Läuchli Theorem. We will show that the the theorem at

More information

Interpolation of κ-compactness and PCF

Interpolation of κ-compactness and PCF Comment.Math.Univ.Carolin. 50,2(2009) 315 320 315 Interpolation of κ-compactness and PCF István Juhász, Zoltán Szentmiklóssy Abstract. We call a topological space κ-compact if every subset of size κ has

More information

Application of an Interval Backward Finite Difference Method for Solving the One-Dimensional Heat Conduction Problem

Application of an Interval Backward Finite Difference Method for Solving the One-Dimensional Heat Conduction Problem Application of an Interval Backward Finite Difference Method for Solving the One-Dimensional Heat Conduction Problem Malgorzata A. Jankowska 1, Andrzej Marciniak 2 and Tomasz Hoffmann 2 1 Poznan University

More information

Smoothed Analysis of Binary Search Trees

Smoothed Analysis of Binary Search Trees Smoothed Analysis of Binary Search Trees Bodo Manthey and Rüdiger Reischuk Universität zu Lübeck, Institut für Theoretische Informatik Ratzeburger Allee 160, 23538 Lübeck, Germany manthey/reischuk@tcs.uni-luebeck.de

More information

On the Pentagon Relations of Valued Quivers

On the Pentagon Relations of Valued Quivers International Journal of Algebra, Vol. 9, 2015, no. 8, 355-369 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ija.2015.5745 On the Pentagon Relations of Valued Quivers Yousuf A. Alkhezi Public

More information

Permutation Factorizations and Prime Parking Functions

Permutation Factorizations and Prime Parking Functions Permutation Factorizations and Prime Parking Functions Amarpreet Rattan Department of Combinatorics and Optimization University of Waterloo Waterloo, ON, Canada N2L 3G1 arattan@math.uwaterloo.ca June 10,

More information

Approximations of Stochastic Programs. Scenario Tree Reduction and Construction

Approximations of Stochastic Programs. Scenario Tree Reduction and Construction Approximations of Stochastic Programs. Scenario Tree Reduction and Construction W. Römisch Humboldt-University Berlin Institute of Mathematics 10099 Berlin, Germany www.mathematik.hu-berlin.de/~romisch

More information

On Packing Densities of Set Partitions

On Packing Densities of Set Partitions On Packing Densities of Set Partitions Adam M.Goyt 1 Department of Mathematics Minnesota State University Moorhead Moorhead, MN 56563, USA goytadam@mnstate.edu Lara K. Pudwell Department of Mathematics

More information

Sequences, Series, and Probability Part I

Sequences, Series, and Probability Part I Name Chapter 8 Sequences, Series, and Probability Part I Section 8.1 Sequences and Series Objective: In this lesson you learned how to use sequence, factorial, and summation notation to write the terms

More information

Chapter 8 Sequences, Series, and the Binomial Theorem

Chapter 8 Sequences, Series, and the Binomial Theorem Chapter 8 Sequences, Series, and the Binomial Theorem Section 1 Section 2 Section 3 Section 4 Sequences and Series Arithmetic Sequences and Partial Sums Geometric Sequences and Series The Binomial Theorem

More information

Orthogonality to the value group is the same as generic stability in C-minimal expansions of ACVF

Orthogonality to the value group is the same as generic stability in C-minimal expansions of ACVF Orthogonality to the value group is the same as generic stability in C-minimal expansions of ACVF Will Johnson February 18, 2014 1 Introduction Let T be some C-minimal expansion of ACVF. Let U be the monster

More information

On the Number of Permutations Avoiding a Given Pattern

On the Number of Permutations Avoiding a Given Pattern On the Number of Permutations Avoiding a Given Pattern Noga Alon Ehud Friedgut February 22, 2002 Abstract Let σ S k and τ S n be permutations. We say τ contains σ if there exist 1 x 1 < x 2

More information

WEIGHTED SUM OF THE EXTENSIONS OF THE REPRESENTATIONS OF QUADRATIC FORMS

WEIGHTED SUM OF THE EXTENSIONS OF THE REPRESENTATIONS OF QUADRATIC FORMS WEIGHTED SUM OF THE EXTENSIONS OF THE REPRESENTATIONS OF QUADRATIC FORMS BYEONG-KWEON OH Abstract Let L, N and M be positive definite integral Z-lattices In this paper, we show some relation between the

More information

The (λ, κ)-fn and the order theory of bases in boolean algebras

The (λ, κ)-fn and the order theory of bases in boolean algebras The (λ, κ)-fn and the order theory of bases in boolean algebras David Milovich Texas A&M International University david.milovich@tamiu.edu http://www.tamiu.edu/ dmilovich/ June 2, 2010 BLAST 1 / 22 The

More information

Bounds on coloring numbers

Bounds on coloring numbers Ben-Gurion University, Beer Sheva, and the Institute for Advanced Study, Princeton NJ January 15, 2011 Table of contents 1 Introduction 2 3 Infinite list-chromatic number Assuming cardinal arithmetic is

More information

An orderly algorithm to enumerate finite (semi)modular lattices

An orderly algorithm to enumerate finite (semi)modular lattices An orderly algorithm to enumerate finite (semi)modular lattices BLAST 23 Chapman University October 6, 23 Outline The original algorithm: Generating all finite lattices Generating modular and semimodular

More information

Chapter 3: Black-Scholes Equation and Its Numerical Evaluation

Chapter 3: Black-Scholes Equation and Its Numerical Evaluation Chapter 3: Black-Scholes Equation and Its Numerical Evaluation 3.1 Itô Integral 3.1.1 Convergence in the Mean and Stieltjes Integral Definition 3.1 (Convergence in the Mean) A sequence {X n } n ln of random

More information

Risk Measurement in Credit Portfolio Models

Risk Measurement in Credit Portfolio Models 9 th DGVFM Scientific Day 30 April 2010 1 Risk Measurement in Credit Portfolio Models 9 th DGVFM Scientific Day 30 April 2010 9 th DGVFM Scientific Day 30 April 2010 2 Quantitative Risk Management Profit

More information

Trinomial Tree. Set up a trinomial approximation to the geometric Brownian motion ds/s = r dt + σ dw. a

Trinomial Tree. Set up a trinomial approximation to the geometric Brownian motion ds/s = r dt + σ dw. a Trinomial Tree Set up a trinomial approximation to the geometric Brownian motion ds/s = r dt + σ dw. a The three stock prices at time t are S, Su, and Sd, where ud = 1. Impose the matching of mean and

More information

Interior-Point Algorithm for CLP II. yyye

Interior-Point Algorithm for CLP II.   yyye Conic Linear Optimization and Appl. Lecture Note #10 1 Interior-Point Algorithm for CLP II Yinyu Ye Department of Management Science and Engineering Stanford University Stanford, CA 94305, U.S.A. http://www.stanford.edu/

More information

arxiv:math/ v1 [math.lo] 9 Dec 2006

arxiv:math/ v1 [math.lo] 9 Dec 2006 arxiv:math/0612246v1 [math.lo] 9 Dec 2006 THE NONSTATIONARY IDEAL ON P κ (λ) FOR λ SINGULAR Pierre MATET and Saharon SHELAH Abstract Let κ be a regular uncountable cardinal and λ > κ a singular strong

More information

Conformal Invariance of the Exploration Path in 2D Critical Bond Percolation in the Square Lattice

Conformal Invariance of the Exploration Path in 2D Critical Bond Percolation in the Square Lattice Conformal Invariance of the Exploration Path in 2D Critical Bond Percolation in the Square Lattice Chinese University of Hong Kong, STAT December 12, 2012 (Joint work with Jonathan TSAI (HKU) and Wang

More information

Scenario reduction and scenario tree construction for power management problems

Scenario reduction and scenario tree construction for power management problems Scenario reduction and scenario tree construction for power management problems N. Gröwe-Kuska, H. Heitsch and W. Römisch Humboldt-University Berlin Institute of Mathematics Page 1 of 20 IEEE Bologna POWER

More information

Math 167: Mathematical Game Theory Instructor: Alpár R. Mészáros

Math 167: Mathematical Game Theory Instructor: Alpár R. Mészáros Math 167: Mathematical Game Theory Instructor: Alpár R. Mészáros Midterm #1, February 3, 2017 Name (use a pen): Student ID (use a pen): Signature (use a pen): Rules: Duration of the exam: 50 minutes. By

More information

The Semi-Weak Square Principle

The Semi-Weak Square Principle The Semi-Weak Square Principle Maxwell Levine Universität Wien Kurt Gödel Research Center for Mathematical Logic Währinger Straße 25 1090 Wien Austria maxwell.levine@univie.ac.at Abstract Cummings, Foreman,

More information

Chapter 7: Portfolio Theory

Chapter 7: Portfolio Theory Chapter 7: Portfolio Theory 1. Introduction 2. Portfolio Basics 3. The Feasible Set 4. Portfolio Selection Rules 5. The Efficient Frontier 6. Indifference Curves 7. The Two-Asset Portfolio 8. Unrestriceted

More information

arxiv: v2 [math.lo] 21 Mar 2016

arxiv: v2 [math.lo] 21 Mar 2016 WEAK DISTRIBUTIVITY IMPLYING DISTRIBUTIVITY arxiv:1410.1970v2 [math.lo] 21 Mar 2016 DAN HATHAWAY Abstract. Let B be a complete Boolean algebra. We show that if λ is an infinite cardinal and B is weakly

More information

Structural Induction

Structural Induction Structural Induction Jason Filippou CMSC250 @ UMCP 07-05-2016 Jason Filippou (CMSC250 @ UMCP) Structural Induction 07-05-2016 1 / 26 Outline 1 Recursively defined structures 2 Proofs Binary Trees Jason

More information

Lattice Paths and Their Generalizations

Lattice Paths and Their Generalizations and Their Generalizations SeungKyung Park Yonsei University August 9, 2012 Lattice paths Google search : lattice paths About 11,700,000 results (0.18 seconds) Lattice paths Google search : lattice paths

More information

On the two-variable Iwasawa theory. Tadashi Ochiai (Osaka University)

On the two-variable Iwasawa theory. Tadashi Ochiai (Osaka University) On the two-variable Iwasawa theory Tadashi Ochiai (Osaka University) 2004 Main Reference [1] A generalization of the Coleman map for Hida deformation, the American Journal of Mathematics, 2003. [2] Euler

More information

Measures of Contribution for Portfolio Risk

Measures of Contribution for Portfolio Risk X Workshop on Quantitative Finance Milan, January 29-30, 2009 Agenda Coherent Measures of Risk Spectral Measures of Risk Capital Allocation Euler Principle Application Risk Measurement Risk Attribution

More information

"Pricing Exotic Options using Strong Convergence Properties

Pricing Exotic Options using Strong Convergence Properties Fourth Oxford / Princeton Workshop on Financial Mathematics "Pricing Exotic Options using Strong Convergence Properties Klaus E. Schmitz Abe schmitz@maths.ox.ac.uk www.maths.ox.ac.uk/~schmitz Prof. Mike

More information

Sublinear Time Algorithms Oct 19, Lecture 1

Sublinear Time Algorithms Oct 19, Lecture 1 0368.416701 Sublinear Time Algorithms Oct 19, 2009 Lecturer: Ronitt Rubinfeld Lecture 1 Scribe: Daniel Shahaf 1 Sublinear-time algorithms: motivation Twenty years ago, there was practically no investigation

More information

COMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS

COMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS COMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS DAN HATHAWAY AND SCOTT SCHNEIDER Abstract. We discuss combinatorial conditions for the existence of various types of reductions between equivalence

More information

Applied Mathematics Letters

Applied Mathematics Letters Applied Mathematics Letters 23 (2010) 286 290 Contents lists available at ScienceDirect Applied Mathematics Letters journal homepage: wwwelseviercom/locate/aml The number of spanning trees of a graph Jianxi

More information

Lecture 4. Finite difference and finite element methods

Lecture 4. Finite difference and finite element methods Finite difference and finite element methods Lecture 4 Outline Black-Scholes equation From expectation to PDE Goal: compute the value of European option with payoff g which is the conditional expectation

More information

Factor Saving Innovation

Factor Saving Innovation Factor Saving Innovation Michele Boldrin and David K. Levine University of Minnesota and UCLA July 18, 2001 Abstract It has been argued that concave models exhibit less endogeneity of growth than models

More information

TWO-PERIODIC TERNARY RECURRENCES AND THEIR BINET-FORMULA 1. INTRODUCTION

TWO-PERIODIC TERNARY RECURRENCES AND THEIR BINET-FORMULA 1. INTRODUCTION TWO-PERIODIC TERNARY RECURRENCES AND THEIR BINET-FORMULA M. ALP, N. IRMAK and L. SZALAY Abstract. The properties of k-periodic binary recurrences have been discussed by several authors. In this paper,

More information

Part 3: Trust-region methods for unconstrained optimization. Nick Gould (RAL)

Part 3: Trust-region methods for unconstrained optimization. Nick Gould (RAL) Part 3: Trust-region methods for unconstrained optimization Nick Gould (RAL) minimize x IR n f(x) MSc course on nonlinear optimization UNCONSTRAINED MINIMIZATION minimize x IR n f(x) where the objective

More information

Solutions of Bimatrix Coalitional Games

Solutions of Bimatrix Coalitional Games Applied Mathematical Sciences, Vol. 8, 2014, no. 169, 8435-8441 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2014.410880 Solutions of Bimatrix Coalitional Games Xeniya Grigorieva St.Petersburg

More information

Relations in the tautological ring of the moduli space of curves

Relations in the tautological ring of the moduli space of curves Relations in the tautological ring of the moduli space of curves R. Pandharipande and A. Pixton January 2013 Abstract The virtual geometry of the moduli space of stable quotients is used to obtain Chow

More information

ExpTime Tableau Decision Procedures for Regular Grammar Logics with Converse

ExpTime Tableau Decision Procedures for Regular Grammar Logics with Converse ExpTime Tableau Decision Procedures for Regular Grammar Logics with Converse Linh Anh Nguyen 1 and Andrzej Sza las 1,2 1 Institute of Informatics, University of Warsaw Banacha 2, 02-097 Warsaw, Poland

More information

arxiv: v1 [math.co] 6 Oct 2009

arxiv: v1 [math.co] 6 Oct 2009 THE DESCENT STATISTIC OVER 123-AVOIDING PERMUTATIONS arxiv:0910.0963v1 [math.co] 6 Oct 2009 MARILENA BARNABEI, FLAVIO BONETTI, AND MATTEO SILIMBANI Abstract We exploit Krattenthaler s bijection between

More information

The illustrated zoo of order-preserving functions

The illustrated zoo of order-preserving functions The illustrated zoo of order-preserving functions David Wilding, February 2013 http://dpw.me/mathematics/ Posets (partially ordered sets) underlie much of mathematics, but we often don t give them a second

More information

Fair semigroups. Valdis Laan. University of Tartu, Estonia. (Joint research with László Márki) 1/19

Fair semigroups. Valdis Laan. University of Tartu, Estonia. (Joint research with László Márki) 1/19 Fair semigroups Valdis Laan University of Tartu, Estonia (Joint research with László Márki) 1/19 A semigroup S is called factorisable if ( s S)( x, y S) s = xy. 2/19 A semigroup S is called factorisable

More information

arxiv:math/ v1 [math.lo] 15 Jan 1991

arxiv:math/ v1 [math.lo] 15 Jan 1991 ON A CONJECTURE OF TARSKI ON PRODUCTS OF CARDINALS arxiv:math/9201247v1 [mathlo] 15 Jan 1991 Thomas Jech 1 and Saharon Shelah 2 Abstract 3 We look at an old conjecture of A Tarski on cardinal arithmetic

More information

IB SL EXAM REVIEW and PRACTICE

IB SL EXAM REVIEW and PRACTICE IB SL EXM REVIEW and PRCTICE Topic: Sequence and Series; Binomial Expansion Look through Chapter 2(Sequence and Series) and Chapter 7(Binomial Expansion). The self tutor on your CD-Rom may be helpful.

More information

Managing Default Contagion in Financial Networks

Managing Default Contagion in Financial Networks Managing Default Contagion in Financial Networks Nils Detering University of California, Santa Barbara with Thilo Meyer-Brandis, Konstantinos Panagiotou, Daniel Ritter (all LMU) CFMAR 10th Anniversary

More information

Pricing Default Events: Surprise, Exogeneity and Contagion

Pricing Default Events: Surprise, Exogeneity and Contagion 1/31 Pricing Default Events: Surprise, Exogeneity and Contagion C. GOURIEROUX, A. MONFORT, J.-P. RENNE BdF-ACPR-SoFiE conference, July 4, 2014 2/31 Introduction When investors are averse to a given risk,

More information

3.1 Measures of Central Tendency

3.1 Measures of Central Tendency 3.1 Measures of Central Tendency n Summation Notation x i or x Sum observation on the variable that appears to the right of the summation symbol. Example 1 Suppose the variable x i is used to represent

More information

Some Bounds for the Singular Values of Matrices

Some Bounds for the Singular Values of Matrices Applied Mathematical Sciences, Vol., 007, no. 49, 443-449 Some Bounds for the Singular Values of Matrices Ramazan Turkmen and Haci Civciv Department of Mathematics, Faculty of Art and Science Selcuk University,

More information

Mean Reversion in Asset Returns and Time Non-Separable Preferences

Mean Reversion in Asset Returns and Time Non-Separable Preferences Mean Reversion in Asset Returns and Time Non-Separable Preferences Petr Zemčík CERGE-EI April 2005 1 Mean Reversion Equity returns display negative serial correlation at horizons longer than one year.

More information

6.207/14.15: Networks Lecture 10: Introduction to Game Theory 2

6.207/14.15: Networks Lecture 10: Introduction to Game Theory 2 6.207/14.15: Networks Lecture 10: Introduction to Game Theory 2 Daron Acemoglu and Asu Ozdaglar MIT October 14, 2009 1 Introduction Outline Review Examples of Pure Strategy Nash Equilibria Mixed Strategies

More information

Generalising the weak compactness of ω

Generalising the weak compactness of ω Generalising the weak compactness of ω Andrew Brooke-Taylor Generalised Baire Spaces Masterclass Royal Netherlands Academy of Arts and Sciences 22 August 2018 Andrew Brooke-Taylor Generalising the weak

More information

Strong normalisation and the typed lambda calculus

Strong normalisation and the typed lambda calculus CHAPTER 9 Strong normalisation and the typed lambda calculus In the previous chapter we looked at some reduction rules for intuitionistic natural deduction proofs and we have seen that by applying these

More information

Heterogeneous Firm, Financial Market Integration and International Risk Sharing

Heterogeneous Firm, Financial Market Integration and International Risk Sharing Heterogeneous Firm, Financial Market Integration and International Risk Sharing Ming-Jen Chang, Shikuan Chen and Yen-Chen Wu National DongHwa University Thursday 22 nd November 2018 Department of Economics,

More information

Yao s Minimax Principle

Yao s Minimax Principle Complexity of algorithms The complexity of an algorithm is usually measured with respect to the size of the input, where size may for example refer to the length of a binary word describing the input,

More information

Invariant Variational Problems & Integrable Curve Flows. Peter J. Olver University of Minnesota olver

Invariant Variational Problems & Integrable Curve Flows. Peter J. Olver University of Minnesota   olver Invariant Variational Problems & Integrable Curve Flows Peter J. Olver University of Minnesota http://www.math.umn.edu/ olver Cocoyoc, November, 2005 1 Variational Problems x = (x 1,..., x p ) u = (u 1,...,

More information

MITCHELL S THEOREM REVISITED. Contents

MITCHELL S THEOREM REVISITED. Contents MITCHELL S THEOREM REVISITED THOMAS GILTON AND JOHN KRUEGER Abstract. Mitchell s theorem on the approachability ideal states that it is consistent relative to a greatly Mahlo cardinal that there is no

More information

The equivariant volumes of the permutahedron

The equivariant volumes of the permutahedron The equivariant volumes of the permutahedron Federico Ardila Anna Schindler Andrés R. Vindas-Meléndez Abstract We consider the action of the symmetric group S n on the permutahedron Π n. We prove that

More information

arxiv: v5 [quant-ph] 16 Oct 2008

arxiv: v5 [quant-ph] 16 Oct 2008 Violation of Equalities in Bipartite Qutrits Systems Hossein Movahhedian Department of Physics, Shahrood University of Technology, Seventh Tir Square, Shahrood, Iran We have recently shown that for the

More information

Secant Varieties, Symbolic Powers, Statistical Models

Secant Varieties, Symbolic Powers, Statistical Models Secant Varieties, Symbolic Powers, Statistical Models Seth Sullivant North Carolina State University November 19, 2012 Seth Sullivant (NCSU) Secant Varieties, etc. November 19, 2012 1 / 27 Joins and Secant

More information

Lecture 4: Divide and Conquer

Lecture 4: Divide and Conquer Lecture 4: Divide and Conquer Divide and Conquer Merge sort is an example of a divide-and-conquer algorithm Recall the three steps (at each level to solve a divideand-conquer problem recursively Divide

More information