A relation on 132-avoiding permutation patterns

Size: px
Start display at page:

Download "A relation on 132-avoiding permutation patterns"

Transcription

1 Discrete Mathematics and Theoretical Computer Science DMTCS vol. VOL, 205, A relation on 32-avoiding permutation patterns Natalie Aisbett School of Mathematics and Statistics, University of Sydney, Australia received 9 th June 203, revised 4 th Jan. 204, 6 th Feb. 204, 24 th Mar. 205, 5 th May 205, accepted 2 th Nov A permutation σ contains the permutation τ if there is a subsequence of σ order isomorphic to τ. A permutation σ is τ-avoiding if it does not contain the permutation τ. For any n, the popularity of a permutation τ, denoted A n(τ), is the number of copies of τ contained in the set of all 32-avoiding permutations of length n. Rudolph conjectures that for permutations τ and µ of the same length, for all n we have A n(τ) A n(µ) if and only if the spine structure of τ is less than or equal to the spine structure of µ in refinement order. We prove one direction of Rudolph s conjecture by showing that if the spine structure of τ is less than or equal to the spine structure of µ, then for all n, A n(τ) A n(µ). Furthermore, we show that A n(τ) < A n(µ) when n is greater than the length of τ and µ. We disprove the opposite direction by giving a counterexample, and hence disprove the conjecture. Keywords: permutations, permutation pattern, popularity Introduction A permutation σ contains the permutation τ if there is a subsequence of σ order isomorphic to τ. In this case we say that τ is a pattern of σ. A permutation σ is τ-avoiding if it does not contain the permutation τ. The popularity of a permutation τ in length n 32-avoiding permutations (defined more rigorously in Section 2), denoted A n (τ), is the number of copies of τ contained in the set of all 32-avoiding permutations of length n. The question of pattern popularity within permutations that avoid some pattern was first asked by Joshua Cooper on his webpage [4]. Here he raised the question: what is the expected number of copies of a pattern in a randomly chosen pattern avoiding permutation? This problem was first tackled by Bóna in [], where he proved that for all permutation patterns τ of length k and for any n k we have A n (2... k) A n (τ) A n (k(k )... ). He then extended this result in [2] to show that for all n 3 A n (23) = A n (23) = A n (32). In [5], Homberger studied Cooper s question for patterns of length 3 in 23-avoiding permutations. Every 32-avoiding permutation τ has an associated binary tree T (τ) (defined in Section 4) which in turn has an associated partition called its spine structure. In [6], Rudolph extended the results of Bóna to show that: c 205 Discrete Mathematics and Theoretical Computer Science (DMTCS), Nancy, France

2 286 Natalie Aisbett Theorem. ([6, Theorem 6]). For any 32-avoiding permutations τ and µ of length k, if T (τ) and T (µ) have the same spine structure, then for all n k we have A n (τ) = A n (µ). Chua and Sankar have since shown in [3] that if A n (τ) = A n (µ) for all n, then T (τ) and T (µ) have the same spine structure. In [6], Rudolph conjectured the following: Conjecture.2 ([6, Conjecture 2]). Given patterns τ and µ, for all n we have A n (τ) A n (µ) if and only if the spine structure of T (τ) is less than or equal to the spine structure of T (µ) in refinement order. In Theorem 4.6 we prove one direction of Conjecture.2, by showing that if the spine structure of T (τ) is less than or equal to the spine structure of T (µ) in refinement order, then A n (τ) A n (µ). It should be mentioned that Theorem 4.6 has previously been proven by Rudolph (unpublished). In Proposition 4.8, we strengthen this result by showing that if τ and µ have length less than n and the spine structure of T (τ) is less than the spine structure of T (µ) in refinement order, then A n (τ) < A n (µ). Then, in Corollary 5.2, we disprove Conjecture.2 by showing that there exist permutations τ and µ such that for all n we have A n (τ) A n (µ), whereas T (τ) and T (µ) are incomparable in refinement order. We now give an outline of how the paper leads into the proof of the main theorem, Theorem 4.6. Chapter 2 introduces the main definitions that are used in the paper. Chapter 3 introduces a move that can be performed on a 32-avoiding permutation τ, which gives another 32-avoiding permutation µ of the same length as τ. Theorem 3.5 is used to show that A n (µ) A n (τ), and is the main theorem in Chapter 3. In Chapter 4, we describe a well-known bijection between binary trees and 32-avoiding permutations. In this paper, this bijection sends the permutation τ to the tree T (τ). We describe this bijection in order to define the spine structure of 32-avoiding permutations, which is a property of their corresponding binary trees. Note that two distinct 32-avoiding permutations may have the same spine structure. Then, in Proposition 4.4, we show that if φ is obtained from σ by the popularity increasing move, then the spine structure of φ is greater than the spine structure of σ in refinement order. We then show (see Proposition 4.5 and the proof of Theorem 4.6) that if the spine structure of a 32-avoiding permutation φ is greater than the spine structure of another 32-avoiding permutation σ, then there is a permutation τ with the same spine structure as σ, and a permutation µ with the same spine structure as φ, such that µ is obtained from τ by the popularity increasing move. Since popularity is equal for permutations with the same spine structure (Theorem.), this proves the main theorem of this paper, Theorem 4.6. Acknowledgements I would like to thank my PhD supervisor Anthony Henderson for helpful conversations. 2 Definitions Let [n] denote the set of integers {, 2,..., n}. Let σ = σ... σ n denote a permutation of [n] written in one-line notation. The permutation σ contains the pattern τ = τ... τ k if there exist i < i 2 < < i k n such that for any s, t k we have σ is < σ it when τ s < τ t. A permutation pattern τ = τ... τ k is of length k. A 32-avoiding permutation is a permutation that does not contain the pattern 32. We denote the set of all permutations of [n] that are 32-avoiding by S n (32).

3 A relation on 32-avoiding permutation patterns 287 Suppose that τ = τ... τ k is a permutation of length k for some integer k n, and suppose that σ S n (32). Let f(σ, τ) denote the number of copies of τ contained in σ. For example, f(5342, 32) = 7 since the subsequences 532, 53, 542, 54, 52, 32 and 42 give rise to the pattern 32. The popularity of a pattern τ S k (32) in length n 32-avoiding permutations, denoted A n (τ), is given by A n (τ) := σ S n(32) f(σ, τ). Permutations τ and µ each of length k are equipopular if for all n, A n (τ) = A n (µ). Note that if a 32-avoiding permutation contains a pattern, then that pattern must also be a 32-avoiding permutation. There is 0! = permutation of the empty set, which is of length 0. It certainly avoids 32, and hence belongs to S 0 (32), so that S 0 (32) =. When τ is the length 0 permutation we take by convention A n (τ) = S n (32). Suppose σ... σ n S n (32) and that σ s... σ sk (where s < < s k ) gives rise to a permutation pattern τ. Then we say that {σ s,..., σ sk } are the elements in this occurrence of τ, and for all i [k] we say that σ si occurs as τ i. 3 A popularity increasing move In this section we describe a move on 32-avoiding permutations. We show that for all n, this move can be applied to any permutation in S n (32) other than n(n )..., and that it results in another 32-avoiding permutation. We then show, in Theorem 3.5, that this move produces a new permutation whose popularity is greater than or equal to that of the original permutation. Observe that if σ = σ... σ n is a 32-avoiding permutation, and if σ j = n, then for all i < j and for all k > j we have σ i > σ k. In other words, all entries to the left of n are greater than all entries to the right of n. Suppose that σ = σ... σ n S n (32), and that there are a pair of indices i, j with i < j, such that: σ i < σ j, for all integers α such that α < i we have σ α > σ j, for all integers β such that i < β < j we have σ β < σ i. Then we may form a new permutation φ = φ... φ n, where φ... φ i = σ... σ i, φ i = σ j, φ i+... φ j = σ i... σ j, and φ j+... φ n = σ j+... σ n. In other words, φ is obtained from σ by removing σ j and inserting it before σ i. Since σ is 32-avoiding, all elements in {σ j+,..., σ n } are either less than σ i or greater than σ j, hence we must have σ j = σ i +. We can therefore denote φ unambiguously by σ σj.

4 288 Natalie Aisbett Example 3.. Let σ = S 9 (32). Then σ 7 is defined, and is equal to The permutation σ is shown below on the left, and σ 7 is shown below on the right Note that if σ S n (32) and σ σj is defined for some j, then σ can be broken into five parts (dependent on j) as follows: The set of numbers {σ,..., σ i }, which we denote by L for left. Every number in L is greater than σ j. σ i. The set of numbers {σ i+,..., σ j }, which we denote by M for middle (this set is empty if j = i + ). Every number in M is less than σ i. σ j. The set of numbers {σ j+,..., σ n }, which we denote by R for right. Each number in this set is either less than all numbers in the set M σ i, or is greater than σ j. Example 3.2. Let σ = S 9 (32) (see Example 3.), and let σ j = 7. Then L = {8}, M = {5, 3, 4}, and R = {, 2, 9}. Proposition 3.3. Suppose σ S n (32) and that for some j, φ = σ σj is defined. Then φ S n (32). Proof: Suppose for a contradiction that φ S n (32). Then σ j must occur as an element in a 32 pattern in φ. If σ j occurs as, then the elements that occur as 3 and 2 must be contained in R. This is the desired contradiction that σ would not be 32-avoiding, since the same triple of integers form a 32 pattern in σ. If σ j occurs as 3 or 2 we also have a contradiction since σ... σ i are all greater than σ j. Proposition 3.4. For any n 2 and any σ S n (32) {n(n )... }, there exists an index j such that σ σj is defined. Proof: Since σ is not the permutation n(n )..., there is a minimal j such that σ j > σ j. Then permutation σ σj is defined since σ... σ j is decreasing. Suppose τ S k (32) and n is an integer greater than or equal to k. Let O n (τ) denote the set of occurrences of τ in permutations σ S n (32) such that n is an element in the occurrence, and let O n(τ)

5 A relation on 32-avoiding permutation patterns 289 be the set of occurrences of the pattern τ in permutations σ S n (32) such that n is not an element in the occurrence. Then A n (τ) = O n (τ) + O n(τ). We denote an occurrence of τ in some σ = σ... σ n by a pair (σ, σ s... σ sk ) in which {σ s,..., σ sk } are the elements in the occurrence of τ. Given permutations τ of length k and µ of length l, we define permutations τ µ and τ µ each of length k + l as follows { τ i, if i k, (τ µ) i = µ i + k, if k + i k + l, (τ µ) i = { τ i + l, if i k, µ i, if k + i k + l. Theorem 3.5. Suppose that µ, τ S k (32) and that for some j, µ = τ τj. Then for all n k we have A n (µ) A n (τ). Proof: We proceed by induction. By definition, if µ = τ τj for some j, then µ and τ have length greater than or equal to 2. Hence, to prove the base case, we need to prove that if µ = τ τj for some j, where µ is of length 2, then A 2 (µ) A 2 (τ). This is true since A 2 (τ) = A 2 (µ) =. Now assume by induction that A n (µ) A n (τ) holds for every pair µ and τ of length k with µ = τ τj for some j, where k k and n < n, or k < k and n n. Now suppose that µ = τ τj for some µ, τ and j, where µ S k (32). We will show that A n (µ) A n (τ). Note that the sets L, M and R that we will mentioned in this proof are subsets of {τ,..., τ k }. We will consider occurrences of the pattern τ contained in permutations σ S n (32). We will consider the following two cases separately. a) The set of occurrences of τ contained in O n(τ). b) The set of occurrences of τ contained in O n (τ). In this case n may occur as τ j if and only if L is empty, and the elements in R are all less than the elements in M {τ i }. To show that A n (µ) A n (τ) we first show, in part a), by induction that O n(τ) O n(µ), and we then show, in part b), that O n (τ) O n (µ). First we consider case a), i.e., occurrences of τ in O n(τ). Suppose that for some ξ i, there exists at least one occurrence of τ in some permutation σ S n (32), so that when σ is written in one-line notation: n is to the left of the element that occurs as τ ξ, and if ξ, then the element that occurs as τ ξ is to the left of n.

6 290 Natalie Aisbett Given any such occurrence in which σ α+ = n, the pattern which is order isomorphic to the word τ... τ ξ occurs within the permutation which is order isomorphic to the word σ... σ α S α (32), and the pattern τ ξ... τ k occurs within the permutation σ α+2... σ n S n α (32). Also, given an occurrence of the pattern which is order isomorphic to the word τ... τ ξ within a permutation θ in S α (32), and an occurrence of τ ξ... τ k within a permutation φ in S n α (32), we may concatenate these occurrences to form an occurrence of τ in the permutation σ = (θ ) φ. Hence, the number of such occurrences of τ in permutations σ O n(τ) in which σ α+ = n is given by A α (τ... τ ξ )A n α (τ ξ... τ k ). Summing this over all possible values of α gives the total number of such occurrences (with respect to this value of ξ) of τ O n(τ): n+ξ k 2 α=ξ A α (τ... τ ξ )A n α (τ ξ... τ k ). In the case that ξ =, so that τ... τ ξ is the empty word, recall that the term A α (τ... τ ξ ) equals S α (32), and that S 0 (32) =. We will now consider, for this value of ξ, occurrences of µ is permutation in O n(µ) in which n lies between µ ξ and µ ξ (or to the left of µ if ξ = ). By a similar argument, the number of such occurrences of µ in all possible σ S n (32) is the sum n+ξ k 2 α=ξ A α (µ... µ ξ )A n α (µ ξ... µ k ). Now, µ... µ ξ = τ... τ ξ, so that A α (µ... µ ξ ) = A α (τ... τ ξ ) for all α in the summation. By induction, we have that A n α (τ ξ... τ k ) A n α (µ ξ... µ k ) for all α in the summation, since µ ξ... µ k = τ ξ... τ τj k. Therefore n+ξ k 2 α=ξ n+ξ k 2 α=ξ A α (τ... τ ξ )A n α (τ ξ... τ k ) A α (µ... µ ξ )A n α (µ ξ... µ k ) holds for all ξ i such that n may lie between τ ξ and τ ξ. Note that it is not possible for n to lie between τ ξ and τ ξ if ξ {i +,..., j}. Suppose that for some ξ j, there exists at least one occurrence of τ in some permutation σ S n (32), so that when σ is written in one-line notation: n is to the right of the element that occurs as τ ξ, and

7 A relation on 32-avoiding permutation patterns 29 if ξ k, then the element that occurs as τ ξ is to the right of n. For this value of ξ, we can again consider occurrences of µ is O n(µ) in which n lies between µ ξ and µ ξ. Note that if ξ = j, then µ ξ = τ j. By a similar argument to that given when ξ i, we can deduce that the number of such occurrences of the pattern τ is less than or equal to the number of such occurrences of the pattern µ. Since we have considered all possible occurrences of τ in O n(τ), we have shown that O n(τ) O n(µ). We now consider case b), i.e., occurrences of τ in O n (τ). Recall that O n (τ) is the set of occurrences of τ in permutations in S n (32) in which n is an element of the occurrence. For this part, we will show that O n (τ) O n (µ) in two cases. The first case is when τ j is not equal to k, and we prove this case by induction. The second case is when τ j = k, so that for all elements in O n (τ) we must have n occur as τ j. In this case we define a map from O n (τ) to O n (µ) and show that this map in an injection. Suppose that τ j k, so that n may occur as an element in L or R only. Suppose that for some ξ i, there exists an occurrence of τ in which n occurs as τ ξ. Then there exists an occurrence of µ in O n (µ) in which n occurs as µ ξ. The number of such occurrences of the pattern τ in all possible σ S n (32) is n+ξ k α=ξ A α (τ... τ ξ )A n α (τ ξ+... τ k ), and the number of such occurrences of the pattern µ in all possible σ S n (32) is n+ξ k α=ξ A α (µ... µ ξ )A n α (µ ξ+... µ k ). Since τ... τ ξ = µ... µ ξ we have that A α (τ... τ ξ ) = A α (µ... µ ξ ) for all α in the summation. By the inductive hypothesis A n α (τ ξ+... τ k ) A n α (µ ξ+... µ k ) for all α in the summation since µ ξ+... µ k = τ ξ+... τ τj k. Hence n+ξ k α=ξ n+ξ k α=ξ A α (τ... τ ξ )A n α (τ ξ+... τ k ) A α (µ... µ ξ )A n α (µ ξ+... µ k ). Suppose that for some ξ j +, that there is at least one occurrence of τ in O n (τ) in which n occurs as τ ξ. Then there exists at least one occurrence of µ in O n (µ) in which n occurs as µ ξ. By the same argument as in the case where ξ i, we have that the number of such occurrences of the pattern τ is less than or equal to the number of such occurrences of the pattern µ.

8 292 Natalie Aisbett We now consider elements of O n (τ) in which n occurs as τ j. Note that this case is possible if and only if τ i = τ (i.e., L is empty), and all elements of R are less than elements in M τ i. For such τ we will define a map ψ : O n (τ) O n (µ). We will argue that this map in injective, and therefore, the number of such occurrences of the pattern τ is less than or equal to the number of such occurrences of the pattern µ. Fix an element (σ, σ s... σ sk ) O n (τ) such that σ sj = n. Consider the earliest index α [s j ] such that: the occurrence of the elements in M {τ i } in σ are in the set {σ,..., σ α }, and each element in {σ,..., σ α } is greater than all the elements in the set {σ α+,..., σ n } {σ sj }. Note that there must exist such an index α since s j satisfies the above two conditions. Note also that since σ S n (32), the elements σ α+,..., σ sj (we take this set to be empty if σ α = σ sj ) are an interval in the set of integers [n]. Let u be the permutation pattern σ... σ α, let v be the permutation pattern σ α+... σ sj, and let w be the permutation pattern σ sj+... σ n. We let where ψ((σ, σ s... σ sk )) = ( σ, σ t... σ tk ), σ = ((v ) u) w, with the occurrence σ t,..., σ tk of µ in σ is given by n, followed by the entries in the patterns u and w in σ that give the occurrence of the elements in u and w in σ (see Example 3.6). τ,..., τ j, τ j+,..., τ n Now σ is clearly in S n (32). To show that ψ in injective, we show that for any occurrence of µ in the image of this map, we can recover the occurrence of τ that mapped to it uniquely. Suppose ψ((σ, σ s... σ sk )) = ( σ, σ t... σ tk ), and consider the earliest index β [n] such that: the occurrence of the elements in M {τ i } in σ are in the set { σ,..., σ β }, the occurrence of the elements in R in σ are in the set { σ β+, σ β+2,..., σ n }, each element in { σ,..., σ β } is greater than all the elements in the set { σ β+,..., σ n }. Note that there must exist such an index β since there was an index α that satisfied these conditions in σ. Suppose that σ l = n. Then the permutation pattern σ,..., σ l is denoted by v. We denote the permutation pattern σ l+,..., σ β by u, and we denote the permutation pattern σ β+... σ n by w. Then σ = ((v ) u) w,

9 A relation on 32-avoiding permutation patterns 293 and the occurrence of τ that maps to ( σ, σ t... σ tk ) must be given by σ = ((u v) ) w, where n occurs as τ j, and the entries in u and w that corresponded to the occurrence of µ 2... µ n in σ give the occurrence of τ... τ j τ j+... τ n in σ (see Example 3.6). This is exactly (σ, σ s... σ sk ). Example 3.6. We give an example of the map ψ given in the proof of Theorem 3.5. Let k = 6 and let n = 3. Let τ be the permutation 53462, and let µ = τ 6 = Let ((, 2, 8, 7, 9, 6, 0, 5, 4, 3, 2,, 3), (2, 7, 9, 3, 2, 3)) be an occurrence of τ in σ = (, 2, 8, 7, 9, 6, 0, 5, 4, 3, 2,, 3). The occurrence (σ, τ) is shown below in Figure (a), where we have included a dot above elements in the occurrence of τ. The index s j is equal to 0, and σ 0 = 3 occurs as τ j = 6. The pattern u is given by (, 2, 8, 7, 9, 6, 0), the pattern v is given by (5, 4), and the pattern w is given by (2,, 3). Then the occurrence of µ in the permutation σ is given by ((2,, 3, 9, 0, 6, 5, 7, 4, 8, 2,, 3), (3, 0, 5, 7, 2, 3)), and is shown in Figure (b) below u v w (a) v u w (b) Fig. : 4 Proof of the main theorem In this section, we prove the main theorem, Theorem 4.6. Before proving Theorem 4.6, we describe the binary tree T (σ) associated to a 32-avoiding permutation σ, and we then describe the difference in the structure of T (τ) and T (µ) where µ = τ τj for some j. The set of all 32-avoiding permutations of length n is in bijection with the set of all binary trees with n vertices, denoted T n. This is a well-known result, and it is described in detail in [6]. We will briefly

10 294 Natalie Aisbett describe this bijection. For any tree T T n, we label the vertices as follows. We visit each of the vertices of the tree in pre-order (root, left subtree, right subtree), labelling the ith vertex visited by n+ i. Given T with such a labelling, we recover its corresponding permutation σ = σ... σ n S n (32) by visiting the vertices in in-order (left subtree, root, right subtree), letting the ith vertex visited be the value of σ i. Following the notation of [6], for any σ S n (32) we denote its associated binary tree by T (σ). We will also assume that the trees come with the pre-order labeling described. Rudolph defines the spines of a binary tree T to be connected components of T when all edges connecting left children to their parents are deleted. She also defines the spine structure of T to be the sequence a,..., a s, where the a i are the number of vertices in each of the spines in T listed in descending order. We also denote the spine structure of a tree T by S(T ), and call the numbers a i the parts of S(T ). To make discussions easier, we also define the spine structure of a 32-avoiding permutation τ to be the spine structure of the binary tree T (τ). Define the relation R called the refinement order on the set of all spine structures whose parts sum to n as follows. If a,..., a s and b,..., b t are two spine structures such that s i= a i = t i= b i = n, then a,..., a s R b,..., b t (or equivalently b,..., b t R a,..., a s ) if a,..., a s can be obtained from b,..., b t by merging subsets of its parts. For example 5, 4, 3 R 3, 3, 2, 2,, since it can be obtained by merging the subset of parts {3,2} and the subset of parts {2,, }. Suppose G is a graph with vertex set S. An induced subgraph H of G is a graph with vertex set a subset of S, such that two vertices are adjacent in H if and only if they are adjacent in G. A subtree H of a binary tree graph G is an induced subgraph that is itself a binary tree graph, in which the root of H is the closest vertex of H to the root of G. The following two propositions describe the child/parent relation between vertices in T (σ) for a permutation σ. They are used to understand the proof of Proposition 4.3, which describes how T (σ σj ) is obtained from T (σ) when σ σj is defined. Proposition 4.. Suppose σ = σ... σ n S n (32). For any index α [n] such that σ α [n ], let σ β be the least integer such that: σ β > σ α, if β < α, then σ β+,..., σ α (this set is empty if β = α ) are all less than σ α, if β > α, then σ α+,..., σ β (this set is empty if β = α + ) are all less than σ α. Then σ β is the parent vertex of σ α in T (σ). Proof: Suppose that σ m = n. Since σ S n (32) the words σ... σ m and σ m+... σ n are both 32-avoiding. Now T (σ) has root n, and the left child of n is the root of the subtree T (σ... σ m ), and the right child of n is the root of the subtree T (σ m+... σ n ). We assume by way of induction, that the proposition is true for all 32-avoiding permutations of length less than n. The proposition is clearly true for permutations of length. By the inductive hypothesis, the proposition holds for T (σ... σ m ) and T (σ m+... σ n ). Then, since the root of T (σ... σ m ) is the largest integer in the set {σ,..., σ m }, and the root of T (σ m+... σ n ) is the largest integer in the set {σ m+,..., σ n }, the condition of the proposition holds for all vertices in T (σ), so that the proposition holds for all n. We may also rephrase this result as a condition for being a child, rather than a parent:

11 A relation on 32-avoiding permutation patterns 295 Proposition 4.2. Suppose σ = σ... σ n S n (32). For any index α [n] such that σ α >, let β be an index such that σ β < σ α, and either: β < α, and σ β is the greatest integer such that {σ β+,..., σ α } (this set is empty if β = α ) are all less than σ β, β > α, and σ β is the greatest integer such that {σ α+,..., σ β } (this set is empty if β = α + ) are all less than σ β. Then σ β is a child vertex of σ α in T (σ). Suppose σ is a permutation in S n (32) such that σ σj is defined for some j. Using Propositions 4. and 4.2, we can deduce the following about the construction of T (σ): The vertex σ i is the left child of σ j. The vertex σ i has no left child. The subtree of T consisting of the right child of σ i and its descendants is the tree T (σ i+... σ j ). Suppose there is a largest integer m such that all elements in the set {σ j+,..., σ m } are all less than σ j. Then the right child of σ j is the root of the tree T (σ j+... σ m ). If j = n or σ j+ > σ j, so that there is no such integer m, then σ j has no right child (that is, the tree T (σ j+... σ m ) is empty). n σ j σ i T (σ i+...σ j ) T (σ j+...σ m ) Fig. 2: The tree T (σ) for some σ S n(32) such that σ σ j is defined for some j. The vertex σ j may be the left or right child of its parent vertex. The following proposition describes how we may alter T (σ) to obtain T (φ) where φ = σ σj for some j. Figures 3, 4 and 5 give an example of this process. Proposition 4.3. Suppose that φ = σ σj is defined for some j. Suppose that m is the largest integer such that σ j+,..., σ m are all less than σ j. Then T (φ) is obtained from T (σ) by the following steps:

12 296 Natalie Aisbett () Remove the subtrees T (σ i+... σ j ) and T (σ j+... σ m ) from T (σ). (2) Remove the vertex σ i from the remaining tree and reattach it as the right child of σ j. (3) Reattach the tree T (σ i+... σ j ) so that its root is the right child of σ i. (4) Reattach the tree T (σ j+... σ m ) so that its root is the right child of the vertex σ j (note that σ j is the smallest integer in the spine of the tree T (σ i+... σ j ) that contains its root). Proof: The reader should refer to Propositions 4. and 4.2 throughout every step of this proof. Consider all numbers in the set {σ, σ 2,..., σ n } ({σ i, σ i+,..., σ j } {σ j+,..., σ m }). A vertex is a left (respectively right) child of another vertex w in this set in T (σ), if and only if it is a left (respectively right) child of w in T (φ). This confirms that step () is correct, i.e., that the subtree on the vertices {σ, σ 2,..., σ n } ({σ i, σ i+,..., σ j } {σ j+,..., σ m }) is identical in T (σ) and T (φ). It is clear that σ i is the right child of σ j in T (φ). This confirms that step (2) is correct. A vertex v in the set {σ i,..., σ j } is the left (respectively right) child of another vertex w in this set in T (σ), if and only if it is the left (respectively right) child of w in T (φ). This confirms that step (3) is correct. A vertex v in the set {σ j+... σ m } is a left (respectively right) child of another vertex w in this set in T (σ), if and only if it is a left (respectively right) vertex of w in T (φ). Also, the root of T (σ j+... σ m ) is the right child of σ j in T (φ). This confirms step Fig. 3: An example of T (σ) for σ = (5, 4, 6, 0, 7, 8, 9, 6,, 4, 3, 5, 2, 2,, 3) in which σ i = 0 and σ j =. We remove the subtrees T (σ i+... σ j ) = T (7896) and T (σ j+... σ m) = T (4352).

13 A relation on 32-avoiding permutation patterns Fig. 4: Reattaching the vertex σ i = 0 so that it is the right child of σ j = Fig. 5: Left: reattaching the tree T (σ i+... σ j ). Right: reattaching the tree T (σ j+... σ m). Proposition 4.4. Suppose that for some j, φ = σ σj, and suppose that S(T (σ)) = a,..., a s. Then S(T (φ)) is obtained from the spine structure a,..., a s by merging two parts. That is, there exist indices l, m, such that the parts in S(T (φ)) are {a,..., a s } {a l, a m } {a l + a m }. Proof: By Proposition 4.3, the spine structure of T (φ) is obtained from the spine structure of T (σ) by merging the spine of T (σ) that contains σ i and the spine of T (σ) that contains σ j. The following definition appears in [6]. A left-justified binary tree is is a binary tree in which every vertex that is a right child of its parent does not have a left child. Proposition 4.5. Suppose that T, T 2 T n and the spine structure of T 2 is obtained from the spine structure of T by merging two parts. Then there exists σ S n (32) such that φ = σ σj is defined for some j, and such that T (σ) has the same spine structure as T, and T (φ) has the same spine structure as T 2. Proof: Suppose that a,..., a s is the spine structure of T, and that a l and a m are merged to give the

14 298 Natalie Aisbett spine structure of T 2. We will construct a new tree T T n that is left-justified, with the same spine structure as T. If we label the vertices of any left-justified tree with s parts in pre-order, then the vertices n s+, n s+2,..., n, n are a path of vertices in this tree, in which each vertex in this sequence is the left child of the following vertex. Let T be such a tree, so that the spine containing vertex n s+ has a l vertices, and the spine containing vertex n s + 2 has a m vertices. The order of the remaining spines in T is irrelevant. Then T is equal to T (σ) for some σ S n (32) such that φ = σ n s+2 is defined, and the tree T (φ) has the same spine structure as T 2. Theorem 4.6. Suppose τ and µ are elements of S k (32). If the spine structure of T (τ) is less than or equal to the spine structure of T (µ) in refinement order, then for all n, A n (τ) A n (µ). Proof: We may assume that the spine structure of T (µ) is obtained from the spine structure of T (τ) by merging two parts, since if this implies A n (τ) A n (µ), then the theorem also holds if S(T (µ)) is obtained from S(T (τ)) by merging any subsets of parts. By Proposition 4.5, there exists τ and j such that τ τj is defined, and such that S(T (τ)) = S(T ( τ)) and S(T (µ)) = S(T ( τ τj )). By Theorem., A n (τ) = A n ( τ) and A n (µ) = A n ( τ τj ). By Theorem 3.5, A n ( τ) A n ( τ τj ), so that A n (τ) A n (µ). We will now strengthen the result of Theorem 4.6 by showing, in Theorem 4.8, that if µ = τ τj for µ S k (32), and n > k, then A n (µ) > A n (τ). The following proposition on spine structures is used to prove Theorem 4.8. Proposition 4.7. Suppose that τ S k (32) and that for some j, µ = τ τj is defined. Then there exists a permutation τ S k (32) such that µ = τ k is defined, S(T (τ)) = S(T ( τ))) and S(T (µ)) = S(T ( µ)). Proof: Suppose the spine of T (τ) that contains τ j contains l vertices, and that the spine of T (τ) that contains τ i = τ j contains m vertices. Create a binary tree T with the same spine structure as T (τ) as follows. First, form a left-justified binary tree T with two spines, one of length m and the other of length l, so that the root of the length l spine is the root of T. Form a left-justified binary tree T 2 whose spines consist of the spines of T that do not contain τ i or τ j. Form T by adjoining T and T 2 so that the root of T 2 is the left child of the leaf contained in the same spine as τ i of T. See Figure 6 for an example. Theorem 4.8. Suppose τ S k (32) and that for some j, µ = τ τj is defined. Then for any integer n > k we have A n (µ) > A n (τ). Proof: By Proposition 4.7, we may assume that τ j = k. Then it is possible that n occurs as τ j. In order to understand this proof we need to recall the proof of Theorem 3.5. We will show that the injective map from O n (τ) to O n (µ), defined in the proof of Theorem 3.5, is not onto. This is proves the theorem. Suppose n > k. Then there exists some σ in S n (32) which contains the pattern µ, such that n occurs as µ = k, σ n = n, and σ n is not an element in the occurrence of µ. We require that σ = n in this case. If such an occurrence of µ is mapped to by an occurrence of τ, then the occurrence of τ is obtained by shifting n so that entries occurring as elements in M {τ i } (note τ i = µ 2 ) are to its left, and entries occurring as elements in R are to its right. However such a permutation would not be in S n (32) because σ s n(n ) forms a 32 pattern, where σ s occurs as µ 2. Hence, in this case, A n (µ) > A n (τ).

15 A relation on 32-avoiding permutation patterns Fig. 6: Let τ = S 9(32), and let µ = τ 6. Then T ( ) has the same spine structure as T (τ), and T ( ) has the same spine structure as T (µ). The tree shown on the left is T (τ) and the tree shown on the right is T ( ) 5 A counterexample to Conjecture.2 In this section, we provide a counterexample to Conjecture.2, by showing that for all n 4 we have A n (324) A n (342). This provides a contradiction since S(T (324)) = 2, 2 and S(T (342)) = 3, are incomparable in refinement order. Proposition 5.. For all n 4 we have A n (324) A n (342). Furthermore, we have equality if and only if n = 4. Proof: We assume by induction that for all k {4, 5,..., n } we have A k (324) A k (342). This is true for k = 4 since A 4 (324) = A 4 (342) =. We will now consider possible occurrences of 324 and 342 in permutations in S n (32) for some n 4. For all n 4 the following expression holds: n n 2 A n (324) =2 A i (324) S n i (32) + A i (324)A n i () i=4 A i (32)A n i (). n 2 + i=2 The sum of the first two terms is the number of occurrences of 324 in which n is not an element in the occurrence. The first term is the number of occurrences in which the element n lies entirely to the right or entirely to the left of elements in the occurrence of 324, and the second term is the sum of occurrences in which the element n lies between the entry that occurs as 4 and the entry that occurs as. The final term is the number of occurrences in which n occurs as 4. Also, for all n 4: i=3

16 300 Natalie Aisbett n n 2 A n (342) =2 A i (342) S n i (32) + A i (342)A n i () i=4 n 3 + i=2 n 3 A i (34)A n i (2) + i= i=3 A i (3)A n i (2). The sum of the first three terms in the summation is the number of occurrences of 342 in which n is not an element in the occurrence. The first term is the number of occurrences in which the entry n is entirely to the right or entirely to the left of all elements in the occurrence of 342. The second term is the number of occurrences of 342 in which the entry n lies to the right of the entry that occurs as 2 and to the left of the entry that occurs as. The third term is the number of occurrences in which the entry n lies between the entry that occurs as 4 and the entry that occurs as 2. The fourth term is the number of occurrences in which n occurs as 4. By induction, we have that n n A i (324) S n i (32) A i (342) S n i (32). i=4 By Bona s result in [2], we have that Also, i=4 n 2 n 2 A i (324)A n i () = A i (342)A n i (). i=3 i=3 n 2 n 3 A i (32)A n i () = A i (3)A n i (2). i=2 Since n 3 i=2 A i(34)a n i (2) > 0 this implies that A n (324) < A n (342). Corollary 5.2. There exist permutations τ and µ of the same length k, such that for all n k we have A n (τ) A n (µ), and the spine structure of T (τ) is incomparable to the spine structure of T (µ) in refinement order. The counterexample given in Proposition 5. leads naturally to Question 5.3, on the popularity of 32-avoiding permutations. For all n, define the partial order L, called the lexicographic order, on the set of partitions of n, as follows. For any partitions a,..., a s and b,..., b t, where the parts are listed in descending order, we have a,..., a s L b,..., b t if there exists j [s] such that a = b, a 2 = b 2,..., a j = b j and a j > b j. Note that if a,..., a s R b,..., b t then it follows that a,..., a s L b,..., b t. Question 5.3. Let τ and µ be permutations in S k (32). Is it true that if S(T (τ)) L S(T (µ)), then for all n k we have A n (τ) A n (µ)? If this is true, do we have equality only when n = k? Proposition 5. demonstrates that the first statement in Question 5.3 is true in the case that k = 4. i=

17 A relation on 32-avoiding permutation patterns 30 References [] Miklós Bóna, The Absence of a Pattern and the Occurrences of Another, Discrete Mathematics and Theoretical Computer Science, Vol. 4, 200, no. 2. [2] Miklós Bóna, Surprising symmetries in Objects Counted by Catalan Numbers, Electronic Journal of Combinatorics, Vol. 9, 202, no., p. 62. [3] Lynn Chua, Krishanu Roy Sankar, Equipopularity classes of 32-avoiding permutations, The Electronic Journal of Combinatorics, Vol. 2, 204, no.. [4] Joshua Cooper, Combinatorial problems I like, cooper/ combprob.html, accessed 203. [5] Cheyne Homberger, Expected Patterns in Permutation Classes, Electronic Journal of Combinatorics, Vol. 9, no.3. [6] Kate Rudolph, Pattern Popularity in 32-avoiding Permutations, The Electronic Journal of Combinatorics, Vol. 20, 203, no., p. 8.

18 302 Natalie Aisbett

arxiv: v1 [math.co] 31 Mar 2009

arxiv: v1 [math.co] 31 Mar 2009 A BIJECTION BETWEEN WELL-LABELLED POSITIVE PATHS AND MATCHINGS OLIVIER BERNARDI, BERTRAND DUPLANTIER, AND PHILIPPE NADEAU arxiv:0903.539v [math.co] 3 Mar 009 Abstract. A well-labelled positive path of

More information

Notes on the symmetric group

Notes on the symmetric group Notes on the symmetric group 1 Computations in the symmetric group Recall that, given a set X, the set S X of all bijections from X to itself (or, more briefly, permutations of X) is group under function

More information

Permutation Factorizations and Prime Parking Functions

Permutation Factorizations and Prime Parking Functions Permutation Factorizations and Prime Parking Functions Amarpreet Rattan Department of Combinatorics and Optimization University of Waterloo Waterloo, ON, Canada N2L 3G1 arattan@math.uwaterloo.ca June 10,

More information

1 Solutions to Tute09

1 Solutions to Tute09 s to Tute0 Questions 4. - 4. are straight forward. Q. 4.4 Show that in a binary tree of N nodes, there are N + NULL pointers. Every node has outgoing pointers. Therefore there are N pointers. Each node,

More information

Structural Induction

Structural Induction Structural Induction Jason Filippou CMSC250 @ UMCP 07-05-2016 Jason Filippou (CMSC250 @ UMCP) Structural Induction 07-05-2016 1 / 26 Outline 1 Recursively defined structures 2 Proofs Binary Trees Jason

More information

COMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS

COMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS COMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS DAN HATHAWAY AND SCOTT SCHNEIDER Abstract. We discuss combinatorial conditions for the existence of various types of reductions between equivalence

More information

Quadrant marked mesh patterns in 123-avoiding permutations

Quadrant marked mesh patterns in 123-avoiding permutations Quadrant marked mesh patterns in 23-avoiding permutations Dun Qiu Department of Mathematics University of California, San Diego La Jolla, CA 92093-02. USA duqiu@math.ucsd.edu Jeffrey Remmel Department

More information

On the Number of Permutations Avoiding a Given Pattern

On the Number of Permutations Avoiding a Given Pattern On the Number of Permutations Avoiding a Given Pattern Noga Alon Ehud Friedgut February 22, 2002 Abstract Let σ S k and τ S n be permutations. We say τ contains σ if there exist 1 x 1 < x 2

More information

CSE 21 Winter 2016 Homework 6 Due: Wednesday, May 11, 2016 at 11:59pm. Instructions

CSE 21 Winter 2016 Homework 6 Due: Wednesday, May 11, 2016 at 11:59pm. Instructions CSE 1 Winter 016 Homework 6 Due: Wednesday, May 11, 016 at 11:59pm Instructions Homework should be done in groups of one to three people. You are free to change group members at any time throughout the

More information

Laurence Boxer and Ismet KARACA

Laurence Boxer and Ismet KARACA SOME PROPERTIES OF DIGITAL COVERING SPACES Laurence Boxer and Ismet KARACA Abstract. In this paper we study digital versions of some properties of covering spaces from algebraic topology. We correct and

More information

CATEGORICAL SKEW LATTICES

CATEGORICAL SKEW LATTICES CATEGORICAL SKEW LATTICES MICHAEL KINYON AND JONATHAN LEECH Abstract. Categorical skew lattices are a variety of skew lattices on which the natural partial order is especially well behaved. While most

More information

Lecture l(x) 1. (1) x X

Lecture l(x) 1. (1) x X Lecture 14 Agenda for the lecture Kraft s inequality Shannon codes The relation H(X) L u (X) = L p (X) H(X) + 1 14.1 Kraft s inequality While the definition of prefix-free codes is intuitively clear, we

More information

On the h-vector of a Lattice Path Matroid

On the h-vector of a Lattice Path Matroid On the h-vector of a Lattice Path Matroid Jay Schweig Department of Mathematics University of Kansas Lawrence, KS 66044 jschweig@math.ku.edu Submitted: Sep 16, 2009; Accepted: Dec 18, 2009; Published:

More information

ECE 586GT: Problem Set 1: Problems and Solutions Analysis of static games

ECE 586GT: Problem Set 1: Problems and Solutions Analysis of static games University of Illinois Fall 2018 ECE 586GT: Problem Set 1: Problems and Solutions Analysis of static games Due: Tuesday, Sept. 11, at beginning of class Reading: Course notes, Sections 1.1-1.4 1. [A random

More information

TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC

TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC THOMAS BOLANDER AND TORBEN BRAÜNER Abstract. Hybrid logics are a principled generalization of both modal logics and description logics. It is well-known

More information

On the Optimality of a Family of Binary Trees Techical Report TR

On the Optimality of a Family of Binary Trees Techical Report TR On the Optimality of a Family of Binary Trees Techical Report TR-011101-1 Dana Vrajitoru and William Knight Indiana University South Bend Department of Computer and Information Sciences Abstract In this

More information

On Packing Densities of Set Partitions

On Packing Densities of Set Partitions On Packing Densities of Set Partitions Adam M.Goyt 1 Department of Mathematics Minnesota State University Moorhead Moorhead, MN 56563, USA goytadam@mnstate.edu Lara K. Pudwell Department of Mathematics

More information

2 all subsequent nodes. 252 all subsequent nodes. 401 all subsequent nodes. 398 all subsequent nodes. 330 all subsequent nodes

2 all subsequent nodes. 252 all subsequent nodes. 401 all subsequent nodes. 398 all subsequent nodes. 330 all subsequent nodes ¼ À ÈÌ Ê ½¾ ÈÊÇ Ä ÅË ½µ ½¾º¾¹½ ¾µ ½¾º¾¹ µ ½¾º¾¹ µ ½¾º¾¹ µ ½¾º ¹ µ ½¾º ¹ µ ½¾º ¹¾ µ ½¾º ¹ µ ½¾¹¾ ½¼µ ½¾¹ ½ (1) CLR 12.2-1 Based on the structure of the binary tree, and the procedure of Tree-Search, any

More information

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Shlomo Hoory and Stefan Szeider Department of Computer Science, University of Toronto, shlomoh,szeider@cs.toronto.edu Abstract.

More information

Brouwer, A.E.; Koolen, J.H.

Brouwer, A.E.; Koolen, J.H. Brouwer, A.E.; Koolen, J.H. Published in: European Journal of Combinatorics DOI: 10.1016/j.ejc.008.07.006 Published: 01/01/009 Document Version Publisher s PDF, also known as Version of Record (includes

More information

SET 1C Binary Trees. 2. (i) Define the height of a binary tree or subtree and also define a height balanced (AVL) tree. (2)

SET 1C Binary Trees. 2. (i) Define the height of a binary tree or subtree and also define a height balanced (AVL) tree. (2) SET 1C Binary Trees 1. Construct a binary tree whose preorder traversal is K L N M P R Q S T and inorder traversal is N L K P R M S Q T 2. (i) Define the height of a binary tree or subtree and also define

More information

Laurence Boxer and Ismet KARACA

Laurence Boxer and Ismet KARACA THE CLASSIFICATION OF DIGITAL COVERING SPACES Laurence Boxer and Ismet KARACA Abstract. In this paper we classify digital covering spaces using the conjugacy class corresponding to a digital covering space.

More information

Supporting Information

Supporting Information Supporting Information Novikoff et al. 0.073/pnas.0986309 SI Text The Recap Method. In The Recap Method in the paper, we described a schedule in terms of a depth-first traversal of a full binary tree,

More information

Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem

Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem Joshua Cooper August 14, 006 Abstract We show that the problem of counting collinear points in a permutation (previously considered by the

More information

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Shlomo Hoory and Stefan Szeider Abstract (k, s)-sat is the propositional satisfiability problem restricted to instances where each

More information

An effective perfect-set theorem

An effective perfect-set theorem An effective perfect-set theorem David Belanger, joint with Keng Meng (Selwyn) Ng CTFM 2016 at Waseda University, Tokyo Institute for Mathematical Sciences National University of Singapore The perfect

More information

Optimal Satisficing Tree Searches

Optimal Satisficing Tree Searches Optimal Satisficing Tree Searches Dan Geiger and Jeffrey A. Barnett Northrop Research and Technology Center One Research Park Palos Verdes, CA 90274 Abstract We provide an algorithm that finds optimal

More information

Global Joint Distribution Factorizes into Local Marginal Distributions on Tree-Structured Graphs

Global Joint Distribution Factorizes into Local Marginal Distributions on Tree-Structured Graphs Teaching Note October 26, 2007 Global Joint Distribution Factorizes into Local Marginal Distributions on Tree-Structured Graphs Xinhua Zhang Xinhua.Zhang@anu.edu.au Research School of Information Sciences

More information

Homework #4. CMSC351 - Spring 2013 PRINT Name : Due: Thu Apr 16 th at the start of class

Homework #4. CMSC351 - Spring 2013 PRINT Name : Due: Thu Apr 16 th at the start of class Homework #4 CMSC351 - Spring 2013 PRINT Name : Due: Thu Apr 16 th at the start of class o Grades depend on neatness and clarity. o Write your answers with enough detail about your approach and concepts

More information

Yao s Minimax Principle

Yao s Minimax Principle Complexity of algorithms The complexity of an algorithm is usually measured with respect to the size of the input, where size may for example refer to the length of a binary word describing the input,

More information

Course Information and Introduction

Course Information and Introduction August 20, 2015 Course Information 1 Instructor : Email : arash.rafiey@indstate.edu Office : Root Hall A-127 Office Hours : Tuesdays 12:00 pm to 1:00 pm in my office (A-127) 2 Course Webpage : http://cs.indstate.edu/

More information

arxiv: v1 [math.co] 6 Oct 2009

arxiv: v1 [math.co] 6 Oct 2009 THE DESCENT STATISTIC OVER 123-AVOIDING PERMUTATIONS arxiv:0910.0963v1 [math.co] 6 Oct 2009 MARILENA BARNABEI, FLAVIO BONETTI, AND MATTEO SILIMBANI Abstract We exploit Krattenthaler s bijection between

More information

The Binomial Theorem and Consequences

The Binomial Theorem and Consequences The Binomial Theorem and Consequences Juris Steprāns York University November 17, 2011 Fermat s Theorem Pierre de Fermat claimed the following theorem in 1640, but the first published proof (by Leonhard

More information

LECTURE 3: FREE CENTRAL LIMIT THEOREM AND FREE CUMULANTS

LECTURE 3: FREE CENTRAL LIMIT THEOREM AND FREE CUMULANTS LECTURE 3: FREE CENTRAL LIMIT THEOREM AND FREE CUMULANTS Recall from Lecture 2 that if (A, φ) is a non-commutative probability space and A 1,..., A n are subalgebras of A which are free with respect to

More information

Inversion Formulae on Permutations Avoiding 321

Inversion Formulae on Permutations Avoiding 321 Inversion Formulae on Permutations Avoiding 31 Pingge Chen College of Mathematics and Econometrics Hunan University Changsha, P. R. China. chenpingge@hnu.edu.cn Suijie Wang College of Mathematics and Econometrics

More information

Sublinear Time Algorithms Oct 19, Lecture 1

Sublinear Time Algorithms Oct 19, Lecture 1 0368.416701 Sublinear Time Algorithms Oct 19, 2009 Lecturer: Ronitt Rubinfeld Lecture 1 Scribe: Daniel Shahaf 1 Sublinear-time algorithms: motivation Twenty years ago, there was practically no investigation

More information

LECTURE 2: MULTIPERIOD MODELS AND TREES

LECTURE 2: MULTIPERIOD MODELS AND TREES LECTURE 2: MULTIPERIOD MODELS AND TREES 1. Introduction One-period models, which were the subject of Lecture 1, are of limited usefulness in the pricing and hedging of derivative securities. In real-world

More information

Best response cycles in perfect information games

Best response cycles in perfect information games P. Jean-Jacques Herings, Arkadi Predtetchinski Best response cycles in perfect information games RM/15/017 Best response cycles in perfect information games P. Jean Jacques Herings and Arkadi Predtetchinski

More information

Continuous images of closed sets in generalized Baire spaces ESI Workshop: Forcing and Large Cardinals

Continuous images of closed sets in generalized Baire spaces ESI Workshop: Forcing and Large Cardinals Continuous images of closed sets in generalized Baire spaces ESI Workshop: Forcing and Large Cardinals Philipp Moritz Lücke (joint work with Philipp Schlicht) Mathematisches Institut, Rheinische Friedrich-Wilhelms-Universität

More information

Palindromic Permutations and Generalized Smarandache Palindromic Permutations

Palindromic Permutations and Generalized Smarandache Palindromic Permutations arxiv:math/0607742v2 [mathgm] 8 Sep 2007 Palindromic Permutations and Generalized Smarandache Palindromic Permutations Tèmítópé Gbóláhàn Jaíyéọlá Department of Mathematics, Obafemi Awolowo University,

More information

Game Theory: Normal Form Games

Game Theory: Normal Form Games Game Theory: Normal Form Games Michael Levet June 23, 2016 1 Introduction Game Theory is a mathematical field that studies how rational agents make decisions in both competitive and cooperative situations.

More information

Cumulants and triangles in Erdős-Rényi random graphs

Cumulants and triangles in Erdős-Rényi random graphs Cumulants and triangles in Erdős-Rényi random graphs Valentin Féray partially joint work with Pierre-Loïc Méliot (Orsay) and Ashkan Nighekbali (Zürich) Institut für Mathematik, Universität Zürich Probability

More information

The Sorting Index and Permutation Codes. Abstract

The Sorting Index and Permutation Codes. Abstract The Sorting Index and Permutation Codes William Y.C. Chen a, George Z. Gong b, Jeremy J.F. Guo b a Center for Applied Mathematics, Tianjin University, Tianjin 300072, P. R. China b Center for Combinatorics,

More information

The Turing Definability of the Relation of Computably Enumerable In. S. Barry Cooper

The Turing Definability of the Relation of Computably Enumerable In. S. Barry Cooper The Turing Definability of the Relation of Computably Enumerable In S. Barry Cooper Computability Theory Seminar University of Leeds Winter, 1999 2000 1. The big picture Turing definability/invariance

More information

Generating all nite modular lattices of a given size

Generating all nite modular lattices of a given size Generating all nite modular lattices of a given size Peter Jipsen and Nathan Lawless Dedicated to Brian Davey on the occasion of his 65th birthday Abstract. Modular lattices, introduced by R. Dedekind,

More information

Realizability of n-vertex Graphs with Prescribed Vertex Connectivity, Edge Connectivity, Minimum Degree, and Maximum Degree

Realizability of n-vertex Graphs with Prescribed Vertex Connectivity, Edge Connectivity, Minimum Degree, and Maximum Degree Realizability of n-vertex Graphs with Prescribed Vertex Connectivity, Edge Connectivity, Minimum Degree, and Maximum Degree Lewis Sears IV Washington and Lee University 1 Introduction The study of graph

More information

Algebra homework 8 Homomorphisms, isomorphisms

Algebra homework 8 Homomorphisms, isomorphisms MATH-UA.343.005 T.A. Louis Guigo Algebra homework 8 Homomorphisms, isomorphisms For every n 1 we denote by S n the n-th symmetric group. Exercise 1. Consider the following permutations: ( ) ( 1 2 3 4 5

More information

Smoothed Analysis of Binary Search Trees

Smoothed Analysis of Binary Search Trees Smoothed Analysis of Binary Search Trees Bodo Manthey and Rüdiger Reischuk Universität zu Lübeck, Institut für Theoretische Informatik Ratzeburger Allee 160, 23538 Lübeck, Germany manthey/reischuk@tcs.uni-luebeck.de

More information

Introduction to Greedy Algorithms: Huffman Codes

Introduction to Greedy Algorithms: Huffman Codes Introduction to Greedy Algorithms: Huffman Codes Yufei Tao ITEE University of Queensland In computer science, one interesting method to design algorithms is to go greedy, namely, keep doing the thing that

More information

Lecture 2: The Simple Story of 2-SAT

Lecture 2: The Simple Story of 2-SAT 0510-7410: Topics in Algorithms - Random Satisfiability March 04, 2014 Lecture 2: The Simple Story of 2-SAT Lecturer: Benny Applebaum Scribe(s): Mor Baruch 1 Lecture Outline In this talk we will show that

More information

Applied Mathematics Letters

Applied Mathematics Letters Applied Mathematics Letters 23 (2010) 286 290 Contents lists available at ScienceDirect Applied Mathematics Letters journal homepage: wwwelseviercom/locate/aml The number of spanning trees of a graph Jianxi

More information

DESCENDANTS IN HEAP ORDERED TREES OR A TRIUMPH OF COMPUTER ALGEBRA

DESCENDANTS IN HEAP ORDERED TREES OR A TRIUMPH OF COMPUTER ALGEBRA DESCENDANTS IN HEAP ORDERED TREES OR A TRIUMPH OF COMPUTER ALGEBRA Helmut Prodinger Institut für Algebra und Diskrete Mathematik Technical University of Vienna Wiedner Hauptstrasse 8 0 A-00 Vienna, Austria

More information

Interpolation of κ-compactness and PCF

Interpolation of κ-compactness and PCF Comment.Math.Univ.Carolin. 50,2(2009) 315 320 315 Interpolation of κ-compactness and PCF István Juhász, Zoltán Szentmiklóssy Abstract. We call a topological space κ-compact if every subset of size κ has

More information

Strong Subgraph k-connectivity of Digraphs

Strong Subgraph k-connectivity of Digraphs Strong Subgraph k-connectivity of Digraphs Yuefang Sun joint work with Gregory Gutin, Anders Yeo, Xiaoyan Zhang yuefangsun2013@163.com Department of Mathematics Shaoxing University, China July 2018, Zhuhai

More information

On the Optimality of a Family of Binary Trees

On the Optimality of a Family of Binary Trees On the Optimality of a Family of Binary Trees Dana Vrajitoru Computer and Information Sciences Department Indiana University South Bend South Bend, IN 46645 Email: danav@cs.iusb.edu William Knight Computer

More information

On Packing Densities of Set Partitions

On Packing Densities of Set Partitions On Packing Densities of Set Partitions arxiv:1301.1303v1 [math.co] 7 Jan 2013 Adam M.Goyt 1 Department of Mathematics Minnesota State University Moorhead Moorhead, MN 56563, USA goytadam@mnstate.edu Lara

More information

GUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv: v1 [math.lo] 25 Mar 2019

GUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv: v1 [math.lo] 25 Mar 2019 GUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv:1903.10476v1 [math.lo] 25 Mar 2019 Abstract. In this article we prove three main theorems: (1) guessing models are internally unbounded, (2)

More information

ON THE MAXIMUM AND MINIMUM SIZES OF A GRAPH

ON THE MAXIMUM AND MINIMUM SIZES OF A GRAPH Discussiones Mathematicae Graph Theory 37 (2017) 623 632 doi:10.7151/dmgt.1941 ON THE MAXIMUM AND MINIMUM SIZES OF A GRAPH WITH GIVEN k-connectivity Yuefang Sun Department of Mathematics Shaoxing University

More information

Discrete Mathematics for CS Spring 2008 David Wagner Final Exam

Discrete Mathematics for CS Spring 2008 David Wagner Final Exam CS 70 Discrete Mathematics for CS Spring 2008 David Wagner Final Exam PRINT your name:, (last) SIGN your name: (first) PRINT your Unix account login: Your section time (e.g., Tue 3pm): Name of the person

More information

THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET

THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET MICHAEL PINSKER Abstract. We calculate the number of unary clones (submonoids of the full transformation monoid) containing the

More information

Classifying Descents According to Parity

Classifying Descents According to Parity Classifying Descents According to Parity arxiv:math/0508570v1 [math.co] 29 Aug 2005 Sergey Kitaev Reyjaví University Ofanleiti 2 IS-103 Reyjaví, Iceland sergey@ru.is Jeffrey Remmel Department of Mathematics

More information

Strong normalisation and the typed lambda calculus

Strong normalisation and the typed lambda calculus CHAPTER 9 Strong normalisation and the typed lambda calculus In the previous chapter we looked at some reduction rules for intuitionistic natural deduction proofs and we have seen that by applying these

More information

Strongly compact Magidor forcing.

Strongly compact Magidor forcing. Strongly compact Magidor forcing. Moti Gitik June 25, 2014 Abstract We present a strongly compact version of the Supercompact Magidor forcing ([3]). A variation of it is used to show that the following

More information

On the number of one-factorizations of the complete graph on 12 points

On the number of one-factorizations of the complete graph on 12 points On the number of one-factorizations of the complete graph on 12 points D. K. Garnick J. H. Dinitz Department of Computer Science Department of Mathematics Bowdoin College University of Vermont Brunswick

More information

Notes on Natural Logic

Notes on Natural Logic Notes on Natural Logic Notes for PHIL370 Eric Pacuit November 16, 2012 1 Preliminaries: Trees A tree is a structure T = (T, E), where T is a nonempty set whose elements are called nodes and E is a relation

More information

NEW PERMUTATION CODING AND EQUIDISTRIBUTION OF SET-VALUED STATISTICS. Dominique Foata and Guo-Niu Han

NEW PERMUTATION CODING AND EQUIDISTRIBUTION OF SET-VALUED STATISTICS. Dominique Foata and Guo-Niu Han April 9, 2009 NEW PERMUTATION CODING AND EQUIDISTRIBUTION OF SET-VALUED STATISTICS Dominique Foata and Guo-Niu Han ABSTRACT. A new coding for permutations is explicitly constructed and its association

More information

A Combinatorial Proof for the Circular Chromatic Number of Kneser Graphs

A Combinatorial Proof for the Circular Chromatic Number of Kneser Graphs A Combinatorial Proof for the Circular Chromatic Number of Kneser Graphs Daphne Der-Fen Liu Department of Mathematics California State University, Los Angeles, USA Email: dliu@calstatela.edu Xuding Zhu

More information

Rises in forests of binary shrubs

Rises in forests of binary shrubs Discrete Mathematics and Theoretical Computer Science DMTCS vol. 9:, 07, #5 Rises in forests of binary shrubs Jeffrey Remmel Sainan Zheng arxiv:6.0908v4 [math.co] 8 Jul 07 Department of Mathematics, University

More information

4: SINGLE-PERIOD MARKET MODELS

4: SINGLE-PERIOD MARKET MODELS 4: SINGLE-PERIOD MARKET MODELS Marek Rutkowski School of Mathematics and Statistics University of Sydney Semester 2, 2016 M. Rutkowski (USydney) Slides 4: Single-Period Market Models 1 / 87 General Single-Period

More information

Arborescent Architecture for Decentralized Supervisory Control of Discrete Event Systems

Arborescent Architecture for Decentralized Supervisory Control of Discrete Event Systems Arborescent Architecture for Decentralized Supervisory Control of Discrete Event Systems Ahmed Khoumsi and Hicham Chakib Dept. Electrical & Computer Engineering, University of Sherbrooke, Canada Email:

More information

Variations on a theme by Weetman

Variations on a theme by Weetman Variations on a theme by Weetman A.E. Brouwer Abstract We show for many strongly regular graphs, and for all Taylor graphs except the hexagon, that locally graphs have bounded diameter. 1 Locally graphs

More information

Pareto-Optimal Assignments by Hierarchical Exchange

Pareto-Optimal Assignments by Hierarchical Exchange Preprints of the Max Planck Institute for Research on Collective Goods Bonn 2011/11 Pareto-Optimal Assignments by Hierarchical Exchange Sophie Bade MAX PLANCK SOCIETY Preprints of the Max Planck Institute

More information

NOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE INTRODUCTION 1. FIBONACCI TREES

NOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE INTRODUCTION 1. FIBONACCI TREES 0#0# NOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE Shizuoka University, Hamamatsu, 432, Japan (Submitted February 1982) INTRODUCTION Continuing a previous paper [3], some new observations

More information

Structure connectivity and substructure connectivity of twisted hypercubes

Structure connectivity and substructure connectivity of twisted hypercubes arxiv:1803.08408v1 [math.co] Mar 018 Structure connectivity and substructure connectivity of twisted hypercubes Dong Li, Xiaolan Hu, Huiqing Liu Abstract Let G be a graph and T a certain connected subgraph

More information

Algorithmic Game Theory and Applications. Lecture 11: Games of Perfect Information

Algorithmic Game Theory and Applications. Lecture 11: Games of Perfect Information Algorithmic Game Theory and Applications Lecture 11: Games of Perfect Information Kousha Etessami finite games of perfect information Recall, a perfect information (PI) game has only 1 node per information

More information

Web Appendix: Proofs and extensions.

Web Appendix: Proofs and extensions. B eb Appendix: Proofs and extensions. B.1 Proofs of results about block correlated markets. This subsection provides proofs for Propositions A1, A2, A3 and A4, and the proof of Lemma A1. Proof of Proposition

More information

PARTITIONS OF 2 ω AND COMPLETELY ULTRAMETRIZABLE SPACES

PARTITIONS OF 2 ω AND COMPLETELY ULTRAMETRIZABLE SPACES PARTITIONS OF 2 ω AND COMPLETELY ULTRAMETRIZABLE SPACES WILLIAM R. BRIAN AND ARNOLD W. MILLER Abstract. We prove that, for every n, the topological space ω ω n (where ω n has the discrete topology) can

More information

Lecture 22. Survey Sampling: an Overview

Lecture 22. Survey Sampling: an Overview Math 408 - Mathematical Statistics Lecture 22. Survey Sampling: an Overview March 25, 2013 Konstantin Zuev (USC) Math 408, Lecture 22 March 25, 2013 1 / 16 Survey Sampling: What and Why In surveys sampling

More information

On the Pentagon Relations of Valued Quivers

On the Pentagon Relations of Valued Quivers International Journal of Algebra, Vol. 9, 2015, no. 8, 355-369 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ija.2015.5745 On the Pentagon Relations of Valued Quivers Yousuf A. Alkhezi Public

More information

Essays on Some Combinatorial Optimization Problems with Interval Data

Essays on Some Combinatorial Optimization Problems with Interval Data Essays on Some Combinatorial Optimization Problems with Interval Data a thesis submitted to the department of industrial engineering and the institute of engineering and sciences of bilkent university

More information

PERFECT TREE FORCINGS FOR SINGULAR CARDINALS

PERFECT TREE FORCINGS FOR SINGULAR CARDINALS PERFECT TREE FORCINGS FOR SINGULAR CARDINALS NATASHA DOBRINEN, DAN HATHAWAY, AND KAREL PRIKRY Abstract. We investigate forcing properties of perfect tree forcings defined by Prikry to answer a question

More information

Hierarchical Exchange Rules and the Core in. Indivisible Objects Allocation

Hierarchical Exchange Rules and the Core in. Indivisible Objects Allocation Hierarchical Exchange Rules and the Core in Indivisible Objects Allocation Qianfeng Tang and Yongchao Zhang January 8, 2016 Abstract We study the allocation of indivisible objects under the general endowment

More information

Fractional Graphs. Figure 1

Fractional Graphs. Figure 1 Fractional Graphs Richard H. Hammack Department of Mathematics and Applied Mathematics Virginia Commonwealth University Richmond, VA 23284-2014, USA rhammack@vcu.edu Abstract. Edge-colorings are used to

More information

MATH 5510 Mathematical Models of Financial Derivatives. Topic 1 Risk neutral pricing principles under single-period securities models

MATH 5510 Mathematical Models of Financial Derivatives. Topic 1 Risk neutral pricing principles under single-period securities models MATH 5510 Mathematical Models of Financial Derivatives Topic 1 Risk neutral pricing principles under single-period securities models 1.1 Law of one price and Arrow securities 1.2 No-arbitrage theory and

More information

Development Separation in Lambda-Calculus

Development Separation in Lambda-Calculus Development Separation in Lambda-Calculus Hongwei Xi Boston University Work partly funded by NSF grant CCR-0229480 Development Separation in Lambda-Calculus p.1/26 Motivation for the Research To facilitate

More information

Non replication of options

Non replication of options Non replication of options Christos Kountzakis, Ioannis A Polyrakis and Foivos Xanthos June 30, 2008 Abstract In this paper we study the scarcity of replication of options in the two period model of financial

More information

A Property Equivalent to n-permutability for Infinite Groups

A Property Equivalent to n-permutability for Infinite Groups Journal of Algebra 221, 570 578 (1999) Article ID jabr.1999.7996, available online at http://www.idealibrary.com on A Property Equivalent to n-permutability for Infinite Groups Alireza Abdollahi* and Aliakbar

More information

3.2 No-arbitrage theory and risk neutral probability measure

3.2 No-arbitrage theory and risk neutral probability measure Mathematical Models in Economics and Finance Topic 3 Fundamental theorem of asset pricing 3.1 Law of one price and Arrow securities 3.2 No-arbitrage theory and risk neutral probability measure 3.3 Valuation

More information

MAT 4250: Lecture 1 Eric Chung

MAT 4250: Lecture 1 Eric Chung 1 MAT 4250: Lecture 1 Eric Chung 2Chapter 1: Impartial Combinatorial Games 3 Combinatorial games Combinatorial games are two-person games with perfect information and no chance moves, and with a win-or-lose

More information

arxiv: v1 [math.lo] 24 Feb 2014

arxiv: v1 [math.lo] 24 Feb 2014 Residuated Basic Logic II. Interpolation, Decidability and Embedding Minghui Ma 1 and Zhe Lin 2 arxiv:1404.7401v1 [math.lo] 24 Feb 2014 1 Institute for Logic and Intelligence, Southwest University, Beibei

More information

A construction of short sequences containing all permutations of a set as subsequences Radomirovi, Saša

A construction of short sequences containing all permutations of a set as subsequences Radomirovi, Saša University of Dundee A construction of short sequences containing all permutations of a set as subsequences Radomirovi, Saša Published in: Electronic Journal of Combinatorics Publication date: 2012 Document

More information

maps 1 to 5. Similarly, we compute (1 2)(4 7 8)(2 1)( ) = (1 5 8)(2 4 7).

maps 1 to 5. Similarly, we compute (1 2)(4 7 8)(2 1)( ) = (1 5 8)(2 4 7). Math 430 Dr. Songhao Li Spring 2016 HOMEWORK 3 SOLUTIONS Due 2/15/16 Part II Section 9 Exercises 4. Find the orbits of σ : Z Z defined by σ(n) = n + 1. Solution: We show that the only orbit is Z. Let i,

More information

Sy D. Friedman. August 28, 2001

Sy D. Friedman. August 28, 2001 0 # and Inner Models Sy D. Friedman August 28, 2001 In this paper we examine the cardinal structure of inner models that satisfy GCH but do not contain 0 #. We show, assuming that 0 # exists, that such

More information

Lie Algebras and Representation Theory Homework 7

Lie Algebras and Representation Theory Homework 7 Lie Algebras and Representation Theory Homework 7 Debbie Matthews 2015-05-19 Problem 10.5 If σ W can be written as a product of t simple reflections, prove that t has the same parity as l(σ). Let = {α

More information

The Probabilistic Method - Probabilistic Techniques. Lecture 7: Martingales

The Probabilistic Method - Probabilistic Techniques. Lecture 7: Martingales The Probabilistic Method - Probabilistic Techniques Lecture 7: Martingales Sotiris Nikoletseas Associate Professor Computer Engineering and Informatics Department 2015-2016 Sotiris Nikoletseas, Associate

More information

Sequential allocation of indivisible goods

Sequential allocation of indivisible goods 1 / 27 Sequential allocation of indivisible goods Thomas Kalinowski Institut für Mathematik, Universität Rostock Newcastle Tuesday, January 22, 2013 joint work with... 2 / 27 Nina Narodytska Toby Walsh

More information

Generating all modular lattices of a given size

Generating all modular lattices of a given size Generating all modular lattices of a given size ADAM 2013 Nathan Lawless Chapman University June 6-8, 2013 Outline Introduction to Lattice Theory: Modular Lattices The Objective: Generating and Counting

More information

MSU CSE Spring 2011 Exam 2-ANSWERS

MSU CSE Spring 2011 Exam 2-ANSWERS MSU CSE 260-001 Spring 2011 Exam 2-NSWERS Name: This is a closed book exam, with 9 problems on 5 pages totaling 100 points. Integer ivision/ Modulo rithmetic 1. We can add two numbers in base 2 by using

More information

Two-lit trees for lit-only sigma-game

Two-lit trees for lit-only sigma-game Two-lit trees for lit-only sigma-game Hau-wen Huang July 24, 2018 arxiv:1010.5846v3 [math.co] 14 Aug 2012 Abstract A configuration of the lit-only σ-game on a finite graph Γ is an assignment of one of

More information

The suffix binary search tree and suffix AVL tree

The suffix binary search tree and suffix AVL tree Journal of Discrete Algorithms 1 (2003) 387 408 www.elsevier.com/locate/jda The suffix binary search tree and suffix AVL tree Robert W. Irving, Lorna Love Department of Computing Science, University of

More information