arxiv: v2 [math.co] 3 Feb 2018

Size: px
Start display at page:

Download "arxiv: v2 [math.co] 3 Feb 2018"

Transcription

1 SIGNED COUNTINGS OF TYPES B AND D PERMUTATIONS AND t,-euler NUMBERS arxiv: v2 [math.co] 3 Feb 208 SEN-PENG EU, TUNG-SHAN FU, HSIANG-CHUN HSU, AND HSIN-CHIEH LIAO Abstract. It is a classical result that the parity-balance of the number of weak excedances of all permutations (derangements, respectively) of length n is the Euler number E n, alternating in sign, if n is odd (even, respectively). Josuat-Vergès obtained a -analog of the results respecting the number of crossings of a permutation. One of the goals in this paper is to extend the results to the permutations (derangements, respectively) of types B and D, on the basis of the joint distribution in statistics excedances, crossings and the number of negative entries obtained by Corteel, Josuat-Vergès and Kim. Springer numbers are analogous Euler numbers that count the alternating permutations of type B, called snakes. Josuat-Vergès derived bivariate polynomials Q n(t,) and R n(t,) as generalized Euler numbers via successive -derivatives and multiplications by t on polynomials in t. The other goal in this paper is to give a combinatorial interpretation of Q n(t,) and R n(t,) as the enumerators of the snakes with restrictions.. Introduction Let S n be the set of permutations of [n] := {,2,...,n}. The classical Euler numbers E n, defined by x n E n n! = tanx+secx, count the number of alternating permutations in S n, i.e., σ S n such that σ > σ 2 < σ 3 >...σ n. The numbers E 2n are called the secant numbers and the numbers E 2n+ are called the tangent numbers. Withthesignofapermutationdependingontheparityofthenumberofweakexcedances, it is known[0, 8] that the signed counting of all permutations(derangements, respectively) of [n] is the Euler number E n if n is odd (even, respectively). There are also -analogs of the results, refined by various statistics [9, 4, 20]. One of the goals in this paper is to give their types B and D extensions. Surprisingly, the signs are controlled by one half of the number of flag weak excedances (Theorems.3 and.4). As alternating permutations form the largest descent class in the symmetric group S n, Springer [22] determined the cardinality K(W) of the largest descent class of any finite Coxeter group W in the classification. Arnol d [] introduced families of restricted signed permutations, called snakes, with uantities K(W) for each group W. In particular, the number S n = K(B n ) associated with the group B n of signed permutations is called the nth 200 Mathematics Subject Classification. Primary 05A05, 05A5; Secondary 05A9. Key words and phrases. Euler number, Springer number, signed permutations, derangements, continued fractions, weighted bicolored Motzkin paths.

2 2 SEN-PENG EU, TUNG-SHAN FU, HSIANG-CHUN HSU, AND HSIN-CHIEH LIAO Springer number. Springer [22] obtained the exponential generating function for {S n }, x n S n n! = cosx sinx. Josuat-Vergès derived bivariate polynomials Q n (t,) and R n (t,) as generalized Euler numbers via successive -derivatives and multiplications by t on polynomials in t. The other goal in this paper is to give a combinatorial interpretation of Q n (t,) and R n (t,) as the enumerators of variants of the snakes... Backgrounds. For a permutation σ = σ σ 2 σ n S n, an excedance (weak excedance, respectively) is an integer i [n] such that σ i > i (σ i i, respectively). Let exc(σ) and wex(σ) denote the number of excedances and the number of weak excedances of σ, respectively. It is a classical result of Euler that { 0 if n is even, ( ) exc(σ) = ( ) n () 2 E n if n is odd. σ S n This is the evaluation at x = of the γ-expansion of the Eulerian polynomials, obtained by Foata and Schützenberger [0], σ S n x exc(σ) = (n )/2 i=0 γ n,i x i (+x) n 2i, (2) where γ n,i is the number of σ S n with i descents and no double descents. Let S n be the set of derangements in S n (i.e., consisting of σ S n without fixed points). Another result is that { n ( ) exc(σ) ( ) 2E = n if n is even, (3) 0 if n is odd. σ S n This is the evaluation at x = of the γ-expansion of the derangement polynomials σ S n x exc(σ) = n/2 i=0 ξ n,i x i (+x) n 2i, (4) where ξ n,i is the number of σ S n with i decreasing runs and none of size one. This result along with -analogs were obtained independently by several authors; see e.g. [4, 6, 9, 2]. Roselle [8] obtained an analogous result of E.(3), using a different statistic with euidistribution, with the exponential generating function 2ex for the right-hand side. e 2x + There are some -analogs of the Euler numbers E n. One of the -analogs is introduced by Han, Randrianarivony and Zeng [3], defined in the form of continued fraction expansion. We use the notation α α 2 β β 2 = α /(β α 2 /(β 2...)) for continued fractions. The -secant numbers E 2n () and the -tangent numbers E 2n+ () are defined by E 2n ()x n = [] 2 x [2] 2 x [3] 2 x, (5) E 2n+ ()x n = [] [2] x [2] [3] x [3] [4] x, (6) where [j] := j for all positive integers j.

3 SIGNED COUNTINGS OF TYPES B AND D PERMUTATIONS 3 A crossing of σ S n is a pair (i,j) with i,j such that i < j σ i < σ j or σ i < σ j < i < j, denoted by cro(σ) the number of crossings of σ. The notions of crossing and alignment of a permutation were introduced by Williams [23] in connection to totally positive Grassmann cells. Corteel [5] gave an enumerative relation between crossing and alignment. Refined by the statistic cro(σ), Josuat-Vergès [4] derived -analogs of the results in Es.() and (3), { 0 if n is even, ( ) wex(σ) cro(σ) = ( ) n+ (7) 2 E n () if n is odd; σ S n ( { wex(σ) ( )n ) cro(σ) 2 = E n () if n is even, (8) 0 if n is odd. σ S n There are two other distinct -analogs of Es.() and (3) that have been discovered by Foata and Han [9] and by Shin and Zeng [20], respectively. One of the purposes of this paper is to extend the results in Es.(7) and (8) on signed permutations and even-signed permutations..2. Main results. Josuat-Vergès introduced bivariate polynomials Q n (t,) and R n (t,) for generalizations of the -secant numbers and -tangent numbers, respectively [5]. Let D be the -analog of the differential operator acting on polynomials f(t) by (Df)(t) := f(t) f(t). (9) ( )t Let U be the operator acting on f(t) by multiplication by t. Notice that the -derivative D(t n ) = [n] t n and the communication relation DU UD = hold. The polynomials Q n (t,) and R n (t,) are defined algebraically by Q n (t,) := (D +UDU) n, R n (t,) := (D +DUU) n. (0) Several of the initial polynomials are listed below: Q 0 (t,) = Q (t,) = t Q 2 (t,) = +(+)t 2 Q 3 (t,) = ( )t+( )t 3, R 0 (t,) = R (t,) = (+)t R 2 (t,) = (+)+( )t 2 R 3 (t,) = ( )t+( )t 3. Josuat-Vergès proved Q n (,) = S n and R n (,) = 2 n E n+, and obtained the generating functions for the seuences {Q n (t,)} and {R n (t,)} in the form of J-fractions (or Jacobi continued fractions) [5].

4 4 SEN-PENG EU, TUNG-SHAN FU, HSIANG-CHUN HSU, AND HSIN-CHIEH LIAO Definition.. For any two seuences {µ h } h 0 and {λ h } h, let F(µ h,λ h ) denote the continued fraction λ x 2 λ 2 x 2 λ 3 x 2 F(µ h,λ h ) = () µ 0 x µ x µ 2 x µ 3 x Theorem.2. (Josuat-Vergès) We have Q n (t,)x n = F(µ Q h,λq h ), where { µ Q h = t h ([h] +[h+] ) λ Q h = (+t 2 2h )[h] 2, R n (t,)x n = F(µ R h,λr h ), (2) { µ R h = t h (+)[h+] λ R h = (+t 2 2h )[h] [h+]. Notice that Q 2n (0,) = E 2n () and R 2n+ (0,) = E 2n+ (), the -secant and -tangent numbers defined in Es.(5) and (6). Asigned permutation of[n]isabijectionσ oftheset[±n] := { n, n+,...,,,2,...,n} onto itself such that σ( i) = σ(i) for all i [±n]. It will be denoted as σ = σ σ 2 σ n = (σ,σ 2,...,σ n ), where σ i = σ(i), called the window notation of σ. Let B n be the set of signed permutations of [n]. Let D n B n be the subset consisting of the signed permutations with even number of negative entries in their window notations. Members of D n are called the even-signed permutations of [n]. For a σ = σ σ 2 σ n B n, a crossing of σ is a pair (i,j) with i,j such that i < j σ i < σ j or i < j σ i < σ j or i > j > σ i > σ j. The notion of crossing of signed permutations was first considered in [7]. Let cro B (σ) be the number of crossings of σ. For example, the crossings of σ = (3, 4, 2,5,) B 5 consist of the pairs (i,j) {(3,),(2,4)} ({(3,2),(5,2),(5,3)} respectively), which satisfy the second (third, respectively) condition. Hence cro B (σ) = 5. Let neg(σ) be the number of negative entries in σ and let fwex(σ) = 2wex(σ) +neg(σ), where wex(σ) = #{i [n] : σ i i}. In particular, σ i is a fixed point of σ if σ i = i. Let B n (D n, respectively) denote the subset of B n (D n, respectively) consisting of the signed permutations of [n] without fixed points. Our first main result is the type B and type D analogs of the results in Es.(7) and (8), with the sign of σ B n depending on the parity of one half of the statistic fwex(σ). Theorem.3. For n, we have (i) ] ( ) fwex(σ) 2 t neg(σ) crob(σ) = [( ) n+ 2 +( ) n 2 t R n (t,). σ B n { (ii) ( ) fwex(σ) 2 t neg(σ) crob(σ) ( ) n 2tR n (t,) if n is even, = ( ) n+ 2 R σ D n (t,) if n is odd. n Theorem.4. For n, we have (i) ( σ B n ) fwex(σ) 2 t neg(σ) cro B(σ) = ( ) n 2 Q n (t,).

5 SIGNED COUNTINGS OF TYPES B AND D PERMUTATIONS 5 (ii) σ D n ( ) fwex(σ) 2 t neg(σ) crob(σ) = { ( )n 2 Q n (t,) if n is even, 0 if n is odd. When t = and =, we obtain types B and D extensions of the results in Es.() and (3). Corollary.5. For n, we have (i) { n ( ) fwex(σ) 2 ( ) 22 = n E n if n is even, 0 if n is odd. σ B n (ii) ( ) fwex(σ) 2 = ( ) n+ 2 2 n E n. σ D n Corollary.6. For n, we have (i) ( ) fwex(σ) 2 = ( ) n 2 S n. (ii) σ B n σ D n { n ( ) fwex(σ) 2 ( ) 2S = n if n is even, 0 if n is odd. Remarks.7. Corteel et al. [6, Proposition 3.3] proved that thenumberof type Bdescents des B (σ) = #{i : σ i > σ i+,0 i < n} is euidistributed with fwex(σ)/2 for σ B n. The result in (i) of Corollary.5 coincides with the evaluation at x = of the γ-nonnegativity result in [7, Theorem 3.5]. See [2, Theorem.2] for a γ-nonnegativity result for the derangements σ B n, making use of the statistic fexc(σ) = 2exc(σ)+neg(σ). Since fwex(σ) agrees with fexc(σ) when σ is a derangement, Athanasiadis result implies (i) of Corollary.6 when setting r = 2 and x =. There is also a type D γ-nonnegativity result in [7, Theorem 3.9], which uses a varied descent number statistic of signed permutations. See [3] for a recent survey of γ-positivity results appearing in various combinatorial or geometric contexts..3. The generalized t,-euler numbers. A signed permutation σ = σ σ 2 σ n B n is a snake of size n if σ > σ 2 < σ 3 > σ n. Let S n B n be the set of snakes of size n. Let Sn 0 S n be the subset consisting of the snakes σ with σ > 0, and let Sn 00 S0 n be the subset consisting of the snakes σ with σ > 0 and ( ) n σ n < 0. The sets S n and Sn 0 were introduced by Arnol d [] and the set Sn 00 was introduced by Josuat-Vergès [5]. For a snake σ = σ σ 2 σ n B n, let cs(σ) denote the number of changes of sign through the entries σ,σ 2,...,σ n, i.e., cs(σ) := #{i : σ i σ i+ < 0,0 i n} with the following convention for the entries σ 0 and σ n+ : σ 0 = (n+) and σ n+ = ( ) n (n+) if σ S n ; σ 0 = 0 and σ n+ = ( ) n (n+) if σ Sn 0; σ 0 = 0 and σ n+ = 0 if σ Sn 00. Making use of a recursive method, Josuat-Vergès [5, Theorem 3.4] gave a combinatorial interpretation of Q n (t,) and R n (t,), with the distribution of cs(σ) for the variate t, i.e., Q n (t,) = t cs(σ), R n (t,) = t cs(σ). σ S 0 n σ S 00 n+

6 6 SEN-PENG EU, TUNG-SHAN FU, HSIANG-CHUN HSU, AND HSIN-CHIEH LIAO Our second main result is a combinatorial interpretation of Q n (t,) and R n (t,). In terms of three-term patterns of permutations, we come up with the statistics pat Q (σ) and pat R (σ) of snakes (defined in E.(2) and E.(22) in Section 5) for the variate. Theorem.8. We have (i) Q n (t,) = t cs(σ) 2-3( σ )+pat Q (σ). σ S 0 n (ii) R n (t,) = σ S 00 n+ t cs(σ) 2-3( σ )+pat R (σ) n. The rest of the paper is organized as follows. In Section 2, we relate the polynomials Q n (t,) and R n (t,) to weighted bicolored Motzkin paths via the continued fraction expansions of their generating functions. We also review the connection between signed permutations and Motzkin paths established by Corteel et al. [6]. In Section 3, we prove Theorem.3, using the method of sign-reversing involution on the weighted paths. In Section 4, we consider the signed permutations without fixed points and prove Theorem.4. In Section 5, we give a combinatorial interpretation of the polynomials Q n (t,) and R n (t,) as the enumerators of the snakes in Sn 0 and S00 n+, respectively. 2. Continued fractions and weighted Motzkin paths A Motzkin path of length n is a lattice path from the origin to the point (n,0) staying weakly above the x-axis, using the up step (,), down step (, ), and level step (,0). Let U, D and L denote an up step, a down step and a level step, accordingly. We consider a Motzkin path µ = z z 2 z n with a weight function ρ on the steps. The weight of µ, denoted by ρ(µ), is defined to be the product of the weight ρ(z j ) of each step z j for j =,2,...,n. The height of a step z j is the y-coordinate of the starting point of z j. Making use of Flajolet s formula [8, Proposition 7A], the generating function for the weight count of the Motzkin paths can be expressed as a continued fraction. Theorem 2.. (Flajolet) For h 0, let a h, b h and c h be polynomials such that each monomial has coefficient. Let M n be the set of weighted Motzkin paths of length n such that the weight of an up step (down step or level step, respectively) at height h is one of the monomials appearing in a h (b h or c h, respectively). Then the generating function for ρ(m n ) = µ M n ρ(µ) has the expansion ρ(m n )x n = a 0 b x 2 a b 2 x 2 (3) c 0 x c x c 2 x 2.. Bicolored Motzkin paths. A bicolored Motzkin path (also known as 2-Motzkin path) is a Motzkin path with two kinds of level steps, say straight and wavy, denoted by L and W, respectively. For a nonnegative integer h, let z (h) denote a step z at height h in a bicolored Motzkin path for z {U,L,W,D}.

7 SIGNED COUNTINGS OF TYPES B AND D PERMUTATIONS 7 By Theorem.2, the initial part of the expansion of the generating functions for R n (t,) and Q n (t,) are shown below. R n (t,)x n = (+t 2 2 )[] [2] x 2 (+t 2 4 )[2] [3] x 2 t(+)[] x t(+)[2] x t 2 (+)[3] x, Q n (t,)x n (+t 2 )[] 2 x 2 (+t 2 3 )[2] 2 x 2 = t[] x t([] +[2] )x t 2 ([2] +[3] )x. By Theorem 2., the following observations provide feasible weighting schemes that realize the polynomials R n (t,) and Q n (t,) in terms of the bicolored Motzkin paths. Those paths will be used to encode the snakes in Sn+ 00 and S0 n (Theorem 5. and Theorem 5.8) Proposition 2.2. Let T n be the set of weighted bicolored Motzkin paths of length n with a weight function ρ such that for h 0, ρ(u (h) ) {,,..., h } {t 2 2h+2,t 2 2h+3,...,t 2 3h+2 }, ρ(l (h) ) {t h+,t h+2,...,t 2h+ }, ρ(w (h) ) {t h,t h+,...,t 2h }, ρ(d (h+) ) {,,..., h+ }. Then we have n )x ρ(t n = R n (t,)x n. Proposition 2.3. Let Tn be the set of weighted bicolored Motzkin paths of length n containing no wavy level steps on the x-axis, with a weight function ρ such that for h 0, ρ(u (h) ) {,,..., h } {t 2 2h+,t 2 2h+2,...,t 2 3h+ }, ρ(l (h) ) {t h,t h+,...,t 2h }, ρ(w (h) ) {t h,t h+,...,t 2h } for h, ρ(d (h+) ) {,,..., h }. Then we have ρ(t n)x n = Q n (t,)x n Linking signed permutations to bicolored Motzkin paths. Corteel et al. [6] considered a refined enumerator for the signed permutations in B n, with respect to the statistics fwex, neg and cro, and define a seuence of polynomials B n (y,t,) for n 0 by B n (y,t,) = σ B n y fwex(σ) t neg(σ) crob(σ). (4) For example, we have B 0 (y,t,) =, B (y,t,) = y 2 +yt, B 2 (y,t,) = y 4 +(2t+t)y 3 +(t 2 +t 2 +)y 2 +ty. Extended from Foata Zeilberger bijection [], Corteel et al. established a bijection between the set B n of signed permutations and the following set of weighted bicolored Motzkin paths [6, Subsection 7.] and obtained a continued fraction expansion of the generating function for the enumerators B n (y,t,) [6, Theorem 6.].

8 8 SEN-PENG EU, TUNG-SHAN FU, HSIANG-CHUN HSU, AND HSIN-CHIEH LIAO Definition 2.4. Let M n be the set of weighted bicolored Motzkin paths of length n containing no wavy level steps on the x-axis, with a weight function ρ such that for h 0, ρ(u (h) ) {y 2,y 2,...,y 2 h } {yt h,yt h+,...,yt 2h }, ρ(l (h) ) {y 2,y 2,...,y 2 h } {yt h,yt h+,...,yt 2h }, ρ(w (h) ) {,,..., h } {yt h,yt h+,...,yt 2h } for h, ρ(d (h+) ) {,,..., h } {yt h+,yt h+2,...,yt 2h+ }. Remarks 2.5. Rather than the original weight function given in [6], we have interchanged the possible weights of the up steps and the down steps, in the sense of traversing the paths backward. This unifies the possible weights for the initial step (either U (0) or L (0) ), for the purpose of restructuring the weighted bicolored Motzkin paths (Proposition 3.2). Theorem 2.6. (Corteel, Josuat-Vergès, Kim) There is a bijection Γ between B n and M n such that σ B n y fwex(σ) t neg(σ) crob(σ) = ρ(m n ). (5) Moreover, let µ h = y 2 [h + ] + [h] + yt h ([h] + [h + ] ) for h 0 and λ h = [h] 2 (y2 + yt h )(+yt h ) for h, then we have B n (y,t,)x n = F(µ h,λ h ), (6) where F(µ h,λ h ) is the expansion of the J-fraction given in Definition.. 3. Proof of Theorem.3 Inthissection wepresentacombinatorial proofoftheorem.3, makinguseofthemethod of sign-reversing involution on paths. First, we restructure the weighted bicolored Motzkin paths in M n. Definition 3.. Let H n be the set of weighted bicolored Motzkin paths of length n with a weight function ρ such that for h 0, ρ(u (h) ) {y 2,y 2,...,y 2 h+ } {yt h+,yt h+2,...,yt 2h+2 }, ρ(l (h) ) {,,..., h } {yt h+,yt h+2,...,yt 2h+ }, ρ(w (h) ) {y 2,y 2,...,y 2 h } {yt h,yt h+,...,yt 2h }, ρ(d (h+) ) {,,..., h } {yt h+,yt h+2,...,yt 2h+ }. Proposition 3.2. There is a two-to-one bijection Φ between M n and H n such that ρ(m n ) = (y 2 +yt)ρ(h n ). Proof. Given a path µ = p p 2 p n M n, we create a weight-preserving path z z 2 z 2n of length 2n from µ as the intermediate stage, where z 2i z 2i is determined from p i by UU if p i = U, UD if p z 2i z 2i = i = L, DU if p i = W, DD if p i = D, withweightρ(z 2i ) = ρ(p i )andρ(z 2i ) = for i n. Notethatρ(z ) = ρ(p ) {y 2,yt} since p = U (0) or L (0). Then we construct the corresponding path Φ(µ) = p p 2 p n

9 SIGNED COUNTINGS OF TYPES B AND D PERMUTATIONS 9 from z 2 z 2n (with z and z 2n excluded), where p j is determined by z 2jz 2j+ with weight ρ(p j ) = ρ(z 2j)ρ(z 2j+ ) according to the following cases U if z 2j z 2j+ = UU, p j = L if z 2j z 2j+ = UD, W if z 2j z 2j+ = DU, D if z 2j z 2j+ = DD, for j n. Notice that ρ(µ) = ρ(p )ρ(φ(µ)) since ρ(p j ) = ρ(p j+) for j n. Hence ρ(µ) = y 2 ρ(φ(µ)) or ytρ(φ(µ)). Moreover, the possible weights of p j can be determined from the steps of µ since U (h) if p j+ = U (h+) or L (h+), p L j = (h) if p j+ = W (h+) or D (h+), W (h) if p j+ = U (h) or L (h), D (h+) if p j+ = D (h+) or W (h+), for some h 0. That Φ(µ) H n follows from the weight function of the paths in M n. It is straightforward to obtain the map Φ by the reverse procedure. Example 3.3. Let µ = p p 2...p 8 M 8 be the path shown on the left-hand side in the upperrowoffigure,wherew j = ρ(p j )for j 8. ThecorrespondingbicoloredMotzkin path Φ(µ) = p p 2 p 7 H 7 is shown on the right-hand side, where the intermediate stage z z 2 z 6 is shown in the lower row of Figure. w 4 PSfrag replacements w 2 w 3 w 7 w 3 w 4 w w 5 w Φ 8 w 2 w 5 w 6 w 6 w 7 w 8 w w 2 w 3 w 4 w 5 w 6 w 7 w 8 Figure. A restructured weighted bicolored Motzkin paths. By a matching pair (U (h),d (h+) ) we mean an up step U (h) and a down step D (h+) that face each other, in the sense that the horizontal line segment from the midpoint of U (h) to the midpoint of D (h+) stays under the path. Let ρ(u (h),d (h+) ) denote the ordered pair (ρ(u (h) ),ρ(d (h+) )) of weights. We shall establish an involution Ψ : H n H n that changes the weight of a path by the factor y 2, with the following set of restricted paths as the fixed points. Definition 3.4. Let F n H n be the subset consisting of the weighted paths satisfying the following conditions. For h 0,

10 0 SEN-PENG EU, TUNG-SHAN FU, HSIANG-CHUN HSU, AND HSIN-CHIEH LIAO ρ(u (h),d (h+) ) = (y 2 a, b ) or (yt h++a,yt h++b ) for some a {0,,...,h + } and b {0,,...,h}, for any matching pair (U (h),d (h+) ), ρ(l (h) ) {yt h+,yt h+2,...,yt 2h+ }, ρ(w (h) ) {yt h,yt h+,...,yt 2h }. Notice that for any matching pair (U (h),d (h+) ) with weight (a,b), it is euivalent to the reassignment ρ(u (h),d (h+) ) = (a,b ) such that a b = ab regarding the total weight of a path. Comparing the weight functions of the paths in F n and in the set T n given in Proposition 2.2, we have the following result. Lemma 3.5. We have ρ(f n ) = y n R n (t,). Proof. For any path µ F n, notice that the weight of µ contains the factor y n since every matching pair of up step and down step contributes the parameter y 2, while every level step (either straight or wavy) contributes the parameter y. By Theorem 2., we observe that ρ(f n ) and y n ρ(t n ) have same generating function. By Proposition 2.2, the assertion follows. The sign-reversing map Ψ : H n H n is constructed as follows. Algorithm A. Given a path µ H n, the corresponding path Ψ (µ) is constructed by the following procedure. (A) If µ contains no straight level steps L (h) with weight a or wavy level steps W (h) with weight y 2 a for any a {0,,...,h} then go to (A2). Otherwise, among such level steps find the first step z, say z = L (h) (W (h), respectively) with weight ρ(z) = a (y 2 a, respectively), then the corresponding path Ψ (µ) is obtained by replacing z by W (h) (L (h), respectively) with weight y 2 a ( a, respectively). (A2) Ifµcontainsnomatchingpairs(U (h),d (h+) )withρ(u (h),d (h+) ) = (y 2 a,yt h++b ) or (yt h++a, b ) for any a {0,,...,h+} or b {0,,...h} then go to (A3). Otherwise, among such pairs find the first pair with weight, say (y 2 a,yt h++b ) ((yt h++a, b ), respectively), then the corresponding path Ψ (µ) is obtained by replacing the weight of the pair by (yt h++a, b ) ((y 2 a,yt h++b ), respectively). (A3) Then we have µ F n. Let Ψ (µ) = µ. Regarding the possibilities of the weighted steps of the paths in H n, we have the following immediate result. Proposition 3.6. The map Ψ established by Algorithm A is an involution on the set H n such that for any path µ H n, Ψ (µ) = µ if µ F n, and ρ(ψ (µ)) = y 2 ρ(µ) or y 2 ρ(µ) otherwise. Now we are ready to prove (i) of Theorem.3. Proof of (i) of Theorem.3. By Theorem 2.6 and Proposition 3.2, we have σ B n y fwex(σ) t neg(σ) crob(σ) = (y 2 +yt)ρ(h n ). Thentheexpression σ B n ( ) fwex(σ) 2 t neg(σ) cro B(σ) eualsthesumof thereal partandthe imaginary part of the polynomial (y 2 +yt)ρ(h n ) evaluated at y =. By Proposition

11 3.6 and Lemma 3.5, we have SIGNED COUNTINGS OF TYPES B AND D PERMUTATIONS (y 2 +yt)ρ(h n ) = (y 2 +yt)ρ(f n ) = (y n+ +y n t)r n (t,). Taking the real part and the imaginary part of the above evaluation leads to ] ( ) fwex(σ) 2 t neg(σ) crob(σ) = [( ) n+ 2 +( ) n 2 t R n (t,), σ B n as reuired. In the following we shall prove (ii) of Theorem.3. Recall that the set D n of even-signed permutations consists of the signed permutations with even number of negative entries. Definition 3.7. Let M n M n bethesubsetconsisting of the paths whose weights contain even powers of t. Let H n () (H n (2), respectively) be the subset of H n consisting of the paths whose weights contain odd (even, respectively) powers of t. Notice that the bijection Γ : B n M n in Theorem 2.6 induces a bijection between D n and M n such that y fwex(σ) t neg(σ) crob(σ) = ρ(m n). (7) σ D n Moreover, the involution Ψ : H n H n and the set F n of fixed points have the following properties. Lemma 3.8. The map Ψ established by Algorithm A induces an involution on H n () and H n (2), respectively. Moreover, for any path µ F n, the power of t of ρ(µ) has the same parity of n. Proof. By Proposition 3.6, we observe that the map Ψ : H n H n preserves the powers of t of the weight of the paths. By the weight conditions of µ F n given in Definition 3.4, we observe that every matching pair (U (h),d (h+) ) contributes the parameter t 0 or t 2 to ρ(µ), while every level step contributes the parameter t to ρ(µ). The assertions follow. Now we are ready to prove (ii) of Theorem.3. Proof of (ii) of Theorem.3. By Proposition 3.2 and E.(7), taking the terms with even powers of t yields y fwex(σ) t neg(σ) crob(σ) = y 2 ρ(h (2) n )+ytρ(h() n ). σ D n Consider the polynomial y 2 ρ(h (2) n ) + ytρ(h() n ) evaluated at y =. By Proposition 3.6 and Lemma 3.8, for n odd, we have ρ(h () n ) = 0 and y 2 ρ(h (2) n ) = y 2 ρ(f n ) = y n+ R n (t,), Moreover, for n even, we have ρ(h (2) n ) = 0 and ytρ(h () n ) = ytρ(f n ) = y n tr n (t,).

12 2 SEN-PENG EU, TUNG-SHAN FU, HSIANG-CHUN HSU, AND HSIN-CHIEH LIAO Hence we have σ D n ( ) fwex(σ) 2 t neg(σ) cro B(σ) = The proof of Theorem.3 is completed. { 4. Proof of Theorem.4 ( ) n+ 2 R n (t,) if n is odd, ( ) n 2tR n (t,) if n is even. In this section we prove Theorem.4 in terms of the weighted paths associated to the set B n of signed permutations without fixed points. By the definition of the crossings of signed permutations, for any σ = σ σ 2 σ n B n we observe that if (i,j) is a crossing of σ then σ i i and σ j j, i.e., the fixed points of σ are not involved in any crossing of σ. The following fact is a property of the bijection Γ : B n M n given in Theorem 2.6. Lemma 4.. For a σ = σ σ 2 σ n B n, let Γ(σ) = z z 2 z n M n be the corresponding weighted bicolored Motzkin path. Then for j [n], σ j = j if and only if the step z j is a straight level step with weight y 2. Let M n M n be the subset consisting of the paths containing no straight level steps with weight y 2. It follows from Lemma 4. that the bijection Γ : B n M n induces a bijection between Bn and M n such that y fwex(σ) t neg(σ) crob(σ) = ρ(m n ). (8) σ B n We shall establish an involution Ψ 2 : M n M n that changes the weight of a path by the factor y 2, with the following set of restricted paths as the fixed points. Definition 4.2. Let G n M n be the subset consisting of the paths satisfying the following conditions. For h 0, ρ(u (h),d (h+) ) = (y 2 a, b ) or (yt h+a,yt h++b ) for some a,b {0,,...,h}, for any matching pair (U (h),d (h+) ), ρ(l (h) ) {yt h,yt h+,...,yt 2h }, ρ(w (h) ) {yt h,yt h+,...,yt 2h } for h. Comparing the weight functions of the paths in G n and in the set T n given in Proposition 2.3, the following result can be proved by the same argument as in the proof of Lemma 3.5. Lemma 4.3. We have ρ(g n ) = y n Q n (t,). We describe the construction of the map Ψ 2 : M n M n. Algorithm B Given a path µ M n, the corresponding path Ψ 2(µ) is constructed by the following procedure. (B) If µ contains no straight level steps L (h) with weight y 2 a or wavy level steps W (h) with weight a for any a {,2,...,h} then go to (B2). Otherwise, among such level steps find the first step z, say z = L (h) (W (h), respectively) with weight ρ(z) = y 2 a ( a, respectively), then the path Ψ 2 (µ) is obtained by replacing z by W (h) (L (h), respectively) with weight a (y 2 a, respectively).

13 SIGNED COUNTINGS OF TYPES B AND D PERMUTATIONS 3 (B2) Ifµcontainsnomatchingpairs(U (h),d (h+) )withρ(u (h),d (h+) ) = (y 2 a,yt h++b ) or (yt h+a, b ) for any a,b {0,,...,h} then go to (B3). Otherwise, among such pairs find the first pair with weight, say (y 2 a,yt h++b ) ((yt h+a, b ), respectively) then the corresponding path is obtained by replacing the weight of the pair by (yt h+a, b ) ((y 2 a,yt h++b ), respectively). (B3) Then we have µ G n. Let Ψ 2 (µ) = µ. By the possible weighted steps of the paths in M n, we have the following result. Proposition 4.4. The map Ψ 2 established by Algorithm B is an involution on the set M n such that for any path µ M n, Ψ 2 (µ) = µ if µ G n, and ρ(ψ 2 (µ)) = y 2 ρ(µ) or y 2 ρ(µ) otherwise. Now we are ready to prove Theorem.4. Proof of Theorem.4. (i) To compute the expression ( ) σ Bn fwex(σ) 2 t neg(σ) crob(σ), by E.(8) we consider the polynomial ρ(m n ) evaluated at y =. By Proposition 4.4 and Lemma 4.3, we have Hence we have σ B n ρ(m n ) = ρ(g n ) = y n Q n (t,) ( ) fwex(σ) ( 2 t neg(σ) crob(σ) = ) n 2 Q n (t,). (9) (ii) Recall that Dn Bn is the subset consisting of the fixed point-free signed permutations with even number of negative entries. Let M n M n be the subset consisting of the paths whose weights contain even powers of t. Notice that the bijection Γ : B n M n also induces a bijection between Dn and M n such that y fwex(σ) t neg(σ) crob(σ) = ρ(m n). (20) σ D n Consider the polynomial ρ(m n) evaluated at y =. By Proposition 4.4, we observe that the involution Ψ 2 : M n M n preserves the powers of t of the weight of the paths. Moreover, for the fixed points µ G n of the map Ψ 2, we observe that the power of t of ρ(µ) has the same parity of n. By the expression in E.(9), we have σ D n ( ) fwex(σ) 2 t neg(σ) crob(σ) = The proof of Theorem.4 is completed. { (. )n 2 Q n (t,) if n is even, 0 if n is odd. 5. Refined enumerators for variants of the snakes In this section we shall give a combinatorial interpretation for the polynomials Q n (t,) and R n (t,) as the enumerators for variants of the snakes in signed permutations. We make use of a non-recursive approach, based on Flajolet s combinatorics of continued fractions, to establish a bijection between the snakes of Sn 0 (Sn+ 00, respectively) and the weighted

14 4 SEN-PENG EU, TUNG-SHAN FU, HSIANG-CHUN HSU, AND HSIN-CHIEH LIAO bicolored Motzkin paths of Tn given in Proposition 2.3 (T n given in Proposition 2.2, respectively). The bijections are constructed in the spirit of the classical Françon Viennot bijection [2] by encoding the sign changes and consecutive up-down patterns of snakes into weighted steps of the Motzkin paths. Given a permutation π = π π 2 π n S n, Arnol d [] devised the following rules to determine signs ǫ = ǫ ǫ 2 ǫ n {±} n such that (ǫ π,ǫ 2 π 2,...,ǫ n π n ) is a snake; see also [5]. For 2 i n, (R) if π i < π i < π i+ then ǫ i ǫ i+, (R2) if π i > π i > π i+ then ǫ i ǫ i, (R3) if π i > π i < π i+ then ǫ i = ǫ i+. For a snake σ = σ σ 2...σ n Sn 0 (S00 n, respectively), we make the convention that σ 0 = 0 and σ n+ = ( ) n (n + ) (σ 0 = σ n+ = 0, respectively). Let σ denote the permutation obtained from σ by removing the negative signs of σ, i.e., σ i = σ i for 0 i n+. Recall that the number of sign changes of σ is given by cs(σ) := #{i : σ i σ i+ < 0,0 i n}. For j n, let j = σ i for some i [n], and define cs(σ,j), the number of sign changes recorded by the element j, by cs(σ,j) = 0 if σ i > j < σ i+ and σ i σ i > 0,σ i σ i+ > 0, 2 if σ i > j < σ i+ and σ i σ i < 0,σ i σ i+ < 0, if σ i < j < σ i+ or σ i > j > σ i+, 0 if σ i < j > σ i+. We call the seuence (cs(σ,),...,cs(σ,n)) the cs-vector of σ. Following the rules (R)-(R3) and the condition σ > 0, we observe that the signs of the entries σ,...,σ n of σ can be recovered from left to right by σ and the cs-vector of σ. Lemma 5.. For any snake σ Sn 0 (S00 n, respectively), the sign of each entry of σ is uniuely determined by σ and the vector (cs(σ,),...,cs(σ,n)). Moreover, we have n cs(σ) = cs(σ,j). j= Proof. For the initial condition, we have σ 0 = 0 and σ > 0. For i 2, we determine the sign of σ i according to the following cases: Case. σ i > σ i. Therearetwocases. If σ i > σ i+ thenby(r2)σ i hastheopposite sign of σ i. Otherwise, σ i < σ i+, and by (R3) σ i has the opposite (same, respectively) sign of σ i if cs( σ, σ i ) = 2 (0, respectively). Hence the sign change between σ i and σ i is recorded by cs( σ, σ i ). Case 2. σ i < σ i. There are two cases. If σ i 2 < σ i then by (R) σ i has the opposite sign of σ i. Otherwise, σ i 2 > σ i, and by (R3) σ i has the opposite (same, respectively) sign of σ i if cs( σ, σ i ) = 2 (0, respectively). Hence the sign change between σ i and σ i is recorded by cs( σ, σ i ). The assertions follow. Example 5.2. Given a snake σ = ((0),5, 2,4, 7,, 8,0, 9,6,3,()) S 0 0, note that cs(σ) = 6 and the cs-vector of σ is (0,2,0,,0,,0,,,0). On the other hand, given the permutation σ = (5,2,4,7,,8,0,9,6,3) S 0 and the cs-vector (0,2,0,,0,,0,,,0), we observe that the snake σ can be recovered, following the rules (R)-(R3).

15 SIGNED COUNTINGS OF TYPES B AND D PERMUTATIONS 5 In the following we shall encode the permutation σ by a weighted bicolored Motzkin path. Let S 0 n and S 00 n denote two copies of S n with the following convention π 0 = 0 and π n+ = n+ if π S 0 n, π 0 = π n+ = 0 if π S 00 n. Given a permutation π = π π 2 π n S 0 n or S 00 n, by a block of π restricted to {0,,...,k} we mean a maximal seuence of consecutive entries π i π i+ π j {0,,...,k} for some i j. For 0 k n, let α(π,k) be the number of blocks of π restricted to {0,...,k}, and let β(π,k) be the number of such blocks on the right-hand side of the block containing the element k. By the convention on σ 0 and σ n+, for k = 0 we have α(π,0) = if π S 0 n, while α(π,0) = 2 if π S00 Example 5.3. Let π = ((0),5,2,4,7,,8,0,9,6,3,()) S 0 0. Notice that α(π,6) = 3 and β(π,6) = 0. The three blocks of π restricted to {0,,...,6} are underlined as shown below. (0) () For 0 k 0, the seuences of α(π,k) and β(π,k) of π are shown in Table. n. Table. The seuences α,β of π = ((0),5,2,4,7,,8,0,9,6,3,()). k α(π,k) β(π,k) The enumerator Q n (t,) of Sn 0. We shall establish a map Λ : Sn 0 T n by the following procedure. Algorithm C. Given a snake σ = σ σ 2 σ n Sn 0, we associate σ with a weighted path Λ (σ) = z z 2 z n. For j n, let j = σ i for some i [n] and define the step z j according to the following cases: (i) if σ i > j < σ i+ then z j = U with weight { β( σ,j) if σ ρ(z j ) = i σ i > 0 and σ i σ i+ > 0, t 2 β( σ,j)+2α( σ,j) 3 if σ i σ i < 0 and σ i σ i+ < 0, (ii) if σ i < j < σ i+ then z j = L with weight t β( σ,j)+α( σ,j), (iii) if σ i > j > σ i+ then z j = W with weight t β( σ,j)+α( σ,j), (iv) if σ i < j > σ i+ then z j = D with weight β( σ,j). Notice that the value cs(σ,j) is encoded as the power of t in ρ(z j ). For convenience, the element j in (i) is called a valley, in (ii) a double ascent, in (iii) a double descent, and in (iv) a peak of σ. Example 5.4. Take the snake σ = ((0),5, 2,4, 7,, 8,0, 9,6,3,()) S 0 0. The cs-vector of σ is given in Example 5.2 and the seuences α, β of σ are given in Example 5.3. We observe that z = U with weight β( σ,) = since the element is a valley without sign-changes, and that z 2 = U with weight t 2 β( σ,2)+2α( σ,2) 3 = t 2 4 since the element 2 is a valley with sign-changes. The path Λ (σ) is shown in Figure 2.

16 6 PSfrag replacements SEN-PENG EU, TUNG-SHAN FU, HSIANG-CHUN HSU, AND HSIN-CHIEH LIAO t 2 4 t 5 2 t 2 t 2 t Figure 2. The corresponding path of the snake in Example 5.4. The constraints for the parameters α( σ,k) and β( σ,k) of σ are encoded in the height of the step z k Λ (σ). Lemma 5.5. For a snake σ = σ σ 2 σ n S 0 n, let Λ (σ) = z z 2 z n be the path constructed by Algorithm C. For j n, let h j be the height of the step z j. Then the following properties hold. (i) h j = α( σ,j ). (ii) If z j = W or D then h j and 0 β( σ,j) h j. (iii) If z j = U or L then 0 β( σ,j) h j. Proof. For the initial condition, we have α( σ,0) = and h = 0. The first step is either U or L since the element is either a valley or a double ascent. For j, let j = σ i for some i [n]. By induction, we determine the height of z j+ according to the following cases: If σ i > j < σ i+ then z j = U and the element j itself creates a block of σ restricted to {0,,...,j}. Hence h j+ = h j + = α( σ,j ) = α( σ,j). If σ i < j < σ i+ or σ i > j > σ i+ then z j = L (W, respectively) and the element j is added to the block with σ i ( σ i+, respectively). Hence h j+ = h j = α( σ,j ) = α( σ,j). If σ i < j > σ i+ then z j = D and the element j connects the adjacent two blocks. Hence h j+ = h j = α( σ,j ) 2 = α( σ,j). The assertion (i) follows. (ii) If z j = W or D then j > σ i+. The element j is added to the block with σ i+, which is different from the block containing (0). Then α( σ,j ) 2 and hence h j. Moreover, there are at most α( σ,j ) 2 blocks on the right-hand side of the block containing σ i+. Hence β( σ,j) h j. (iii) If z j = U or L then j < σ i+ and there are at most α( σ,j ) blocks on the right-hand side of the block containing j. Hence β( σ,j) h j. Comparing the weight function of the paths in Tn in Proposition 2.3 and the properties of Λ (σ) in Lemma 5.5, it follows that the path Λ (σ) constructed by Algorithm C is a member of Tn. Next, we shall construct the map Λ : Tn S0 n by the following procedure. Algorithm D. Given a path µ = z z 2 z n Tn, we associate µ with a snake σ = Λ (µ). For j n, let cs( σ,j) (d j, respectively) be the power of t (, respectively) of ρ(z j ), and let h j be the height of z j. To find σ, we construct a seuence ω 0,ω,...,ω n = σ of words, where ω j is the subword consisting of the blocks of σ restricted to {0,,...,j}.

17 SIGNED COUNTINGS OF TYPES B AND D PERMUTATIONS 7 The initial word ω 0 is a singleton (σ 0 ). For j, the word ω j is constructed from ω j and ρ(z j ) according to the following cases: (i) z j = U. There are two cases. If cs( σ,j) = 0, let l = d j. Otherwise cs( σ,j) = 2 and let l = d j 2h j. Then the word ω j is obtained from ω j by inserting j between the lth and the (l+)st block from right as a new block. (ii) z j = L or W. Thenlet l = d j h j. Thewordω j is obtained fromω j byappending j to the right end (left end, respectively) of the (l+)st block from right as a new member of the block if z j = L (W, respectively). (iii) z j = D. Then let l = d j. The word ω j is obtained from ω j by inserting j between the(l+)st and the (l+2)nd block from right and getting the two blocks combined. Then following the rules (R)-(R3), we determine the signs of the elements of ω n by the seuence cs( σ,j) for j =,2,...,n. Hence the reuested snake σ is established. In the following we give an interpretation of the seuences α, β in terms of three-term patterns of the permutation σ. Definition 5.6. Let π = π π 2 π n S 0 n or S 00 n. For i n, we define 3-2(π,i) = #{j : 0 j < i and π j < π i < π j+ }, 2-3(π,i) = #{j : i < j n and π j > π i > π j+ }. Let also 2-3(π) = n i= 2-3(π,i). For any snake σ = σ σ 2 σ n Sn 0 or S00 n, we distinguish the following classes X, Y and Z of elements of σ: (i) the valleys with sign changes, (ii) the double ascents or double descents and (iii) the peaks, namely X(σ) = { σ i : σ i > σ i < σ i+,σ i σ i < 0 and σ i σ i+ < 0}, Y(σ) = { σ i : σ i < σ i < σ i+ or σ i > σ i > σ i+ }, Z(σ) = { σ i : σ i < σ i > σ i+ }. The parameters α( σ,k) and β( σ,k) of the snake σ S 0 n or S 00 n have the following properties. Lemma 5.7. For 0 k n, we have (i) β( σ,k) = 2-3( σ,k), (ii) α( σ,k) = 3-2( σ,k)+2-3( σ,k)+. Proof. Suppose there are l (l, respectively) blocks on the right-hand (left-hand, respectively) side of the block containing k when σ is restricted to {0,,...,k}. Then along with the element k, the two adjacent entries of σ at the left (right, respectively) boundary of each block constitute a 2-3-pattern (3-2-pattern, respectively). Hence 2-3( σ, k) = l and 3-2( σ,k) = l. The assertions follow. For example, let π = ((0),5,2,4,7,,8,0,9,6,3,()) S 0 0. As shown in Example 5.3, α(π,6) = 3 and β(π,6) = 0. We have 3-2(π,6) = 2, where the two reuested 3-2-patterns are (4,7,6) and (,8,6).

18 8 SEN-PENG EU, TUNG-SHAN FU, HSIANG-CHUN HSU, AND HSIN-CHIEH LIAO Following the weighting scheme given in Algorithm C, we define the statistic pat Q of a snake σ Sn 0 by pat Q (σ) = 2 ( 3-2( σ,j) +2-3( σ,j) ) #X(σ) j X(σ) + j Y(σ) ( 3-2( σ,j) +2-3( σ,j) ). (2) By Lemmas 5.5 and 5.7 and Proposition 2.3, we have the following result. Theorem 5.8. The map Λ established by Algorithm C is a bijection between Sn 0 and Tn such that t cs(σ) 2-3( σ )+pat Q (σ) = Q n (t,). σ S 0 n 5.2. The enumerator R n (t,) of Sn+ 00. We shall establish a map Λ 2 : Sn+ 00 T n by the same method as in Algorithm C with a modification on the weighting scheme. Given a snake σ = σ σ 2 σ n+ Sn+ 00, recall that the cs-vector of σ and the parameters α( σ,k), β( σ,k) for k =,2,...,n are computed under the convention σ 0 = σ n+2 = 0. Example 5.9. Let σ = ((0),5, 2,4, 7,, 8,, 9,6,3,0,(0)) S 00. Notice that α( σ,6) = 4 and β( σ,6) = as shown below. (0) (0) For 0 k 0, the seuences α( σ,k) and β( σ,k) of σ are shown in Table 2. Table 2. The α and β vectors of σ. k α( σ,k) β( σ,k) We associate the snake σ with a weighted path Λ 2 (σ) = z z 2 z n by the following procedure. Algorithm C. For j n, let j = σ i for some i [n+] and define the step z j according to the following cases: (i) if σ i > j < σ i+ then z j = U with weight { β( σ,j) if σ ρ(z j ) = i σ i > 0 and σ i σ i+ > 0, t 2 β( σ,j)+2α( σ,j) 5 if σ i σ i < 0 and σ i σ i+ < 0, (ii) if σ i < j < σ i+ then z j = L with weight t β( σ,j)+α( σ,j) 2, (iii) if σ i > j > σ i+ then z j = W with weight t β( σ,j)+α( σ,j) 2, (iv) if σ i < j > σ i+ then z j = D with weight β( σ,j). For example, take the snake σ = ((0),5, 2,4, 7,, 8,, 9,6,3,0,(0)) S 00. From the parameters α( σ,k), β( σ,k) of σ given in Example 5.9, the corresponding path Λ 2 (σ) is shown in Figure 3.

19 PSfrag replacements SIGNED COUNTINGS OF TYPES B AND D PERMUTATIONS 9 t 2 5 t 6 3 t 3 2 t 3 t 2 Figure 3. The corresponding path of the snake σ S 00. Lemma 5.0. For a snake σ = σ σ 2 σ n+ S 00 n+, let Λ 2(σ) = z z 2 z n be the path constructed by Algorithm C. For j n, let h j be the height of the step z j. Then the following properties hold. (i) h j = α( σ,j ) 2. (ii) If z j = D then h j. (iii) If z j = W or D then 0 β( σ,j) h j. (iv) If z j = U or L then β( σ,j) h j +. Proof. By the initial condition α( σ,0) = 2, we have h = 0. The first step is U, L or W. Note that z = L (W, respectively) if σ = ( σ n+ =, respectively) and z = U if σ i = for some i {2,...,n}. For j, let j = σ i for some i [n+]. The assertion (i) can be proved by the same argument as in the proof of (i) of Lemma 5.5. (ii) Note that α( σ,j) 2 since the greatest element n+ is always absent. If z j = D then α( σ,j ) 3 and hence h j. (iii) If z j = W or D then j > σ i+ and the element j is added to the block with σ i+. Then there are at most α( σ,j ) 2 blocks on the right-hand side of the block containing σ i+. Hence 0 β( σ,j) h j. (iv) If z j = U or L then j < σ i+ and there are at least one block and at most α( σ,j ) blocks on the right-hand side of the element j. Hence β( σ,j) h j +. Comparing the weight function of the paths in T n in Proposition 2.2 and the properties of Λ 2 (σ) in Lemma 5.0, it follows that the path Λ 2 (σ) constructed by Algorithm C is a member of T n. To find Λ 2, given a path µ = z z 2 z n T n, we shall construct the corresponding snake σ = Λ 2 (µ) by the following procedure. Algorithm D. For j n, let cs( σ,j) (d j, respectively) be the power of t (, respectively) of ρ(z j ) and let h j be the height of z j. To find σ, we construct a seuence ω 0,ω,...,ω n of words, where ω j is the subword consisting of the blocks of σ restricted to {0,,...,j}. The last word ω n contains exactly two blocks, and the reuested permutation σ is obtained from ω n by inserting the element n+ between the two blocks. The initial word ω 0 consists of the two blocks (σ 0 ) and (σ n+ ). For j, the word ω j is constructed from ω j and ρ(z j ) according to the following cases: (i) z j = U. There are two cases. If cs( σ,j) = 0, let l = d j +. Otherwise cs( σ,j) = 2 and let l = d j 2h j. Then the word ω j is obtained from ω j by inserting j between the lth and the (l+)st block from right as a new block.

20 20 SEN-PENG EU, TUNG-SHAN FU, HSIANG-CHUN HSU, AND HSIN-CHIEH LIAO (ii) z j = L or W. Thenlet l = d j h j. Thewordω j is obtained fromω j byappending j to the right end (left end, respectively) of the (l+)st block from right as a new member of the block if z j = L (W, respectively). (iii) z j = D. Then let l = d j. The word ω j is obtained from ω j by inserting j to ω j between the (l+)st and the (l+2)nd block from right and getting the two blocks combined. Then the signs of the elements of the reuested snake σ can be determined by σ and the seuence cs( σ,j) for j =,2,...,n. Following the weighting scheme given in Algorithm C, we define the statistic pat R of a snake σ Sn+ 00 by pat R (σ) = 2 ( 3-2( σ,j)+2-3( σ,j) ) j X(σ) + j Y(σ) ( 3-2( σ,j) +2-3( σ,j) ) +#Z(σ). (22) Notice that n j= (β( σ,j) ) = 2-3( σ ) n and that Z(σ) contains the element n+, which is not involved in step (iv) of Algorithm C. By Lemmas 5.0 and 5.7 and Proposition 2.2, we have the following result. Theorem 5.. The map Λ 2 established by Algorithm C is a bijection between Sn+ 00 and T n such that t cs(σ) 2-3( σ )+pat R (σ) n = R n (t,). σ S 00 n+ 6. Concluding remarks The first part of this work gives signed countings of types B and D permutations and derangements with the signs controlled by one half of the statistic fwex. The type B case happens to bethe Springer numbers of type B. However, the type D case is not the Springer numbers of type D. Hence a natural uestion is to find a statistic on even-signed permutations that results in the Springer numbers of type D. The γ-nonnegativity result in [7, Theorem 3.9] sheds some light on the uestion. The second part of this work gives an interpretation of the t,-euler numbers Q n (t,) and R n (t,). However the statistics pat Q and pat R for the variate are complicated. We would like to know if there are more natural interpretations. These uestions are left to the interested readers. Acknowledgements. The authors thank the referees for reading the manuscript carefully and providing helpful suggestions. This research is partially supported by MOST grants M MY3 (S.-P. Eu), M MY2 (T.-S. Fu) and MOST postdoctoral fellowship M (H.-C. Hsu). References [] V.I. Arnol d, The calculus of snakes and the combinatorics of Bernoulli, Euler, and Springer numbers for Coxeter groups, Russian Math. Surveys 47 (992) 5.

21 SIGNED COUNTINGS OF TYPES B AND D PERMUTATIONS 2 [2] C.A. Athanasiadis, Edgewise subdivisions, local h-polynomials and excedances in the wreath product Z r S n, SIAM J. Discrete Math. 28 (204) [3] C.A. Athanasiadis, Gamma-positivity in combinatorics and geometry, preprint arxiv: v2 [math.co] (207). [4] C.A. Athanasiadis, C. Savvidou, The local h-vector of the cluster subdivision of a simplex, Sémin. Loth. Combin. 66 (202) B66c. [5] S. Corteel, Crossings and alignments of permutations, Adv. Appl. Math. 38(2) (2007) [6] S. Corteel, M. Josuat-Vergès, J.S. Kim, Crossings of signed permutations and -Eulerian numbers of type B, J. Combin. 4(2) (203) [7] S. Corteel, M. Josuat-Vergès, L.K. Williams, Matrix Ansatz, orthogonal polynomials and permutations, Adv. Appl. Math. 46 (20) [8] P. Flajolet, Combinatorial aspects of continued fractions, Discrete Math. 32 (980) [9] D. Foata, G.-N. Han, The -tangent and -secant numbers via basic eulerian polynomials, Proc. Amer. Math. Soc. 38(2) (200) [0] D. Foata, M.-P. Schützenberger, Théorie géométriue des polynômes eulériens, in: Lecture Notes in Mathematics vol. 38, Springer-Verlag, Berlin, 970. [] D. Foata, D. Zeilberger, Denert s permutation statistic is indeed Euler-Mahonian, Stud. Appl. Math. 83() (990) [2] J. Françon, X. Viennot, Permutations selon leurs pics, creux, doubles montées et double descentes, nombres d Euler et nombres de Genocchi, Discrete Math. 28 (979) [3] G.-N. Han, A. Randrianarivony, J. Zeng, Un autre -analogue des nombres d Euler, Sémin. Loth. Combin. 42 (999) B42e. [4] M. Josuat-Vergès, A -enumeration of alternating permutations, European J. Combin. 3 (200) [5] M. Josuat-Vergès, Enumeration of snakes and cycle-alternating permutations, Australas. J. Combin. 60(3) (204) [6] Z. Lin, J. Zeng, The γ-positivity of basic Eulerian polynomials via group actions, J. Combin. Theory Ser. A 35 (205) [7] T.K. Petersen, Eulerian Numbers, Birkhäuser Advanced Texts Basler Lehrbücher, Birkhäuser, Basel/Springer Science+Business Media New York, 205. [8] P.D. Roselle, Permutations by number of rises and successions, Proc. Amer. Math. Soc. 9 (968) 8 6. [9] J. Shareshian, M.L. Wachs, Eulerian uasisymmetric functions, Adv. Math. 225 (200) [20] H. Shin, J. Zeng, The -tangent and -secant numbers via continued fractions, European J. Combin. 3 (200) [2] H. Shin, J. Zeng, The symmetric and unimodal expansion of Eulerian polynomials via continued fractions, European J. Combin. 33 (202) 27. [22] T.A. Springer, Remarks on a combinatorial problem, Nieuw Arch. Wisk. 9(3) (97) [23] L.K. Williams, Enumeration of totally positive Grassmann cells, Adv. Math. 90 (2005) Department of Mathematics, National Taiwan Normal University, Taipei 677, and Chinese Air Force Academy, Kaohsiung 82047, Taiwan, ROC address: speu@math.ntnu.edu.tw Department of Applied Mathematics, National Pingtung University, Pingtung 90003, Taiwan, ROC address: tsfu@mail.nptu.edu.tw Department of Mathematics, National Taiwan Normal University, Taipei 677, Taiwan, ROC address: hchsu0222@gmail.com Department of Mathematics, National Taiwan Normal University, Taipei 677, Taiwan, ROC address: jeffliao@gmail.com

arxiv: v1 [math.co] 31 Mar 2009

arxiv: v1 [math.co] 31 Mar 2009 A BIJECTION BETWEEN WELL-LABELLED POSITIVE PATHS AND MATCHINGS OLIVIER BERNARDI, BERTRAND DUPLANTIER, AND PHILIPPE NADEAU arxiv:0903.539v [math.co] 3 Mar 009 Abstract. A well-labelled positive path of

More information

arxiv: v1 [math.co] 6 Oct 2009

arxiv: v1 [math.co] 6 Oct 2009 THE DESCENT STATISTIC OVER 123-AVOIDING PERMUTATIONS arxiv:0910.0963v1 [math.co] 6 Oct 2009 MARILENA BARNABEI, FLAVIO BONETTI, AND MATTEO SILIMBANI Abstract We exploit Krattenthaler s bijection between

More information

The Sorting Index and Permutation Codes. Abstract

The Sorting Index and Permutation Codes. Abstract The Sorting Index and Permutation Codes William Y.C. Chen a, George Z. Gong b, Jeremy J.F. Guo b a Center for Applied Mathematics, Tianjin University, Tianjin 300072, P. R. China b Center for Combinatorics,

More information

Inversion Formulae on Permutations Avoiding 321

Inversion Formulae on Permutations Avoiding 321 Inversion Formulae on Permutations Avoiding 31 Pingge Chen College of Mathematics and Econometrics Hunan University Changsha, P. R. China. chenpingge@hnu.edu.cn Suijie Wang College of Mathematics and Econometrics

More information

Notes on the symmetric group

Notes on the symmetric group Notes on the symmetric group 1 Computations in the symmetric group Recall that, given a set X, the set S X of all bijections from X to itself (or, more briefly, permutations of X) is group under function

More information

A relation on 132-avoiding permutation patterns

A relation on 132-avoiding permutation patterns Discrete Mathematics and Theoretical Computer Science DMTCS vol. VOL, 205, 285 302 A relation on 32-avoiding permutation patterns Natalie Aisbett School of Mathematics and Statistics, University of Sydney,

More information

Laurence Boxer and Ismet KARACA

Laurence Boxer and Ismet KARACA SOME PROPERTIES OF DIGITAL COVERING SPACES Laurence Boxer and Ismet KARACA Abstract. In this paper we study digital versions of some properties of covering spaces from algebraic topology. We correct and

More information

On the h-vector of a Lattice Path Matroid

On the h-vector of a Lattice Path Matroid On the h-vector of a Lattice Path Matroid Jay Schweig Department of Mathematics University of Kansas Lawrence, KS 66044 jschweig@math.ku.edu Submitted: Sep 16, 2009; Accepted: Dec 18, 2009; Published:

More information

Quadrant marked mesh patterns in 123-avoiding permutations

Quadrant marked mesh patterns in 123-avoiding permutations Quadrant marked mesh patterns in 23-avoiding permutations Dun Qiu Department of Mathematics University of California, San Diego La Jolla, CA 92093-02. USA duqiu@math.ucsd.edu Jeffrey Remmel Department

More information

LECTURE 3: FREE CENTRAL LIMIT THEOREM AND FREE CUMULANTS

LECTURE 3: FREE CENTRAL LIMIT THEOREM AND FREE CUMULANTS LECTURE 3: FREE CENTRAL LIMIT THEOREM AND FREE CUMULANTS Recall from Lecture 2 that if (A, φ) is a non-commutative probability space and A 1,..., A n are subalgebras of A which are free with respect to

More information

CATEGORICAL SKEW LATTICES

CATEGORICAL SKEW LATTICES CATEGORICAL SKEW LATTICES MICHAEL KINYON AND JONATHAN LEECH Abstract. Categorical skew lattices are a variety of skew lattices on which the natural partial order is especially well behaved. While most

More information

Non replication of options

Non replication of options Non replication of options Christos Kountzakis, Ioannis A Polyrakis and Foivos Xanthos June 30, 2008 Abstract In this paper we study the scarcity of replication of options in the two period model of financial

More information

NEW PERMUTATION CODING AND EQUIDISTRIBUTION OF SET-VALUED STATISTICS. Dominique Foata and Guo-Niu Han

NEW PERMUTATION CODING AND EQUIDISTRIBUTION OF SET-VALUED STATISTICS. Dominique Foata and Guo-Niu Han April 9, 2009 NEW PERMUTATION CODING AND EQUIDISTRIBUTION OF SET-VALUED STATISTICS Dominique Foata and Guo-Niu Han ABSTRACT. A new coding for permutations is explicitly constructed and its association

More information

Classifying Descents According to Parity

Classifying Descents According to Parity Classifying Descents According to Parity arxiv:math/0508570v1 [math.co] 29 Aug 2005 Sergey Kitaev Reyjaví University Ofanleiti 2 IS-103 Reyjaví, Iceland sergey@ru.is Jeffrey Remmel Department of Mathematics

More information

On the Number of Permutations Avoiding a Given Pattern

On the Number of Permutations Avoiding a Given Pattern On the Number of Permutations Avoiding a Given Pattern Noga Alon Ehud Friedgut February 22, 2002 Abstract Let σ S k and τ S n be permutations. We say τ contains σ if there exist 1 x 1 < x 2

More information

GUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv: v1 [math.lo] 25 Mar 2019

GUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv: v1 [math.lo] 25 Mar 2019 GUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv:1903.10476v1 [math.lo] 25 Mar 2019 Abstract. In this article we prove three main theorems: (1) guessing models are internally unbounded, (2)

More information

Laurence Boxer and Ismet KARACA

Laurence Boxer and Ismet KARACA THE CLASSIFICATION OF DIGITAL COVERING SPACES Laurence Boxer and Ismet KARACA Abstract. In this paper we classify digital covering spaces using the conjugacy class corresponding to a digital covering space.

More information

Permutation Factorizations and Prime Parking Functions

Permutation Factorizations and Prime Parking Functions Permutation Factorizations and Prime Parking Functions Amarpreet Rattan Department of Combinatorics and Optimization University of Waterloo Waterloo, ON, Canada N2L 3G1 arattan@math.uwaterloo.ca June 10,

More information

A Combinatorial Proof for the Circular Chromatic Number of Kneser Graphs

A Combinatorial Proof for the Circular Chromatic Number of Kneser Graphs A Combinatorial Proof for the Circular Chromatic Number of Kneser Graphs Daphne Der-Fen Liu Department of Mathematics California State University, Los Angeles, USA Email: dliu@calstatela.edu Xuding Zhu

More information

THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET

THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET MICHAEL PINSKER Abstract. We calculate the number of unary clones (submonoids of the full transformation monoid) containing the

More information

Lie Algebras and Representation Theory Homework 7

Lie Algebras and Representation Theory Homework 7 Lie Algebras and Representation Theory Homework 7 Debbie Matthews 2015-05-19 Problem 10.5 If σ W can be written as a product of t simple reflections, prove that t has the same parity as l(σ). Let = {α

More information

Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem

Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem Joshua Cooper August 14, 006 Abstract We show that the problem of counting collinear points in a permutation (previously considered by the

More information

Algebra homework 8 Homomorphisms, isomorphisms

Algebra homework 8 Homomorphisms, isomorphisms MATH-UA.343.005 T.A. Louis Guigo Algebra homework 8 Homomorphisms, isomorphisms For every n 1 we denote by S n the n-th symmetric group. Exercise 1. Consider the following permutations: ( ) ( 1 2 3 4 5

More information

arxiv: v1 [math.lo] 27 Mar 2009

arxiv: v1 [math.lo] 27 Mar 2009 arxiv:0903.4691v1 [math.lo] 27 Mar 2009 COMBINATORIAL AND MODEL-THEORETICAL PRINCIPLES RELATED TO REGULARITY OF ULTRAFILTERS AND COMPACTNESS OF TOPOLOGICAL SPACES. V. PAOLO LIPPARINI Abstract. We generalize

More information

COMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS

COMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS COMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS DAN HATHAWAY AND SCOTT SCHNEIDER Abstract. We discuss combinatorial conditions for the existence of various types of reductions between equivalence

More information

WAN-CHEN CHUANG, SEN-PENG EU, TUNG-SHAN FU, AND YEH-JONG PAN

WAN-CHEN CHUANG, SEN-PENG EU, TUNG-SHAN FU, AND YEH-JONG PAN ON SIMSUN AND DOUBLE SIMSUN PERMUTATIONS AVOIDING A PATTERN OF LENGTH THREE arxiv:4.964v [math.co] Apr WAN-CHEN CHUANG, SEN-PENG EU, TUNG-SHAN FU, AND YEH-JONG PAN Abstract. A permutation σ S n is simsun

More information

A No-Arbitrage Theorem for Uncertain Stock Model

A No-Arbitrage Theorem for Uncertain Stock Model Fuzzy Optim Decis Making manuscript No (will be inserted by the editor) A No-Arbitrage Theorem for Uncertain Stock Model Kai Yao Received: date / Accepted: date Abstract Stock model is used to describe

More information

Yao s Minimax Principle

Yao s Minimax Principle Complexity of algorithms The complexity of an algorithm is usually measured with respect to the size of the input, where size may for example refer to the length of a binary word describing the input,

More information

COMBINATORIAL CONVOLUTION SUMS DERIVED FROM DIVISOR FUNCTIONS AND FAULHABER SUMS

COMBINATORIAL CONVOLUTION SUMS DERIVED FROM DIVISOR FUNCTIONS AND FAULHABER SUMS GLASNIK MATEMATIČKI Vol. 49(69(014, 351 367 COMBINATORIAL CONVOLUTION SUMS DERIVED FROM DIVISOR FUNCTIONS AND FAULHABER SUMS Bumkyu Cho, Daeyeoul Kim and Ho Park Dongguk University-Seoul, National Institute

More information

ORDERED SEMIGROUPS HAVING THE P -PROPERTY. Niovi Kehayopulu, Michael Tsingelis

ORDERED SEMIGROUPS HAVING THE P -PROPERTY. Niovi Kehayopulu, Michael Tsingelis ORDERED SEMIGROUPS HAVING THE P -PROPERTY Niovi Kehayopulu, Michael Tsingelis ABSTRACT. The main results of the paper are the following: The ordered semigroups which have the P -property are decomposable

More information

SHORT-TERM RELATIVE ARBITRAGE IN VOLATILITY-STABILIZED MARKETS

SHORT-TERM RELATIVE ARBITRAGE IN VOLATILITY-STABILIZED MARKETS SHORT-TERM RELATIVE ARBITRAGE IN VOLATILITY-STABILIZED MARKETS ADRIAN D. BANNER INTECH One Palmer Square Princeton, NJ 8542, USA adrian@enhanced.com DANIEL FERNHOLZ Department of Computer Sciences University

More information

Exponential utility maximization under partial information

Exponential utility maximization under partial information Exponential utility maximization under partial information Marina Santacroce Politecnico di Torino Joint work with M. Mania AMaMeF 5-1 May, 28 Pitesti, May 1th, 28 Outline Expected utility maximization

More information

Game Theory: Normal Form Games

Game Theory: Normal Form Games Game Theory: Normal Form Games Michael Levet June 23, 2016 1 Introduction Game Theory is a mathematical field that studies how rational agents make decisions in both competitive and cooperative situations.

More information

arxiv: v2 [math.lo] 13 Feb 2014

arxiv: v2 [math.lo] 13 Feb 2014 A LOWER BOUND FOR GENERALIZED DOMINATING NUMBERS arxiv:1401.7948v2 [math.lo] 13 Feb 2014 DAN HATHAWAY Abstract. We show that when κ and λ are infinite cardinals satisfying λ κ = λ, the cofinality of the

More information

The Limiting Distribution for the Number of Symbol Comparisons Used by QuickSort is Nondegenerate (Extended Abstract)

The Limiting Distribution for the Number of Symbol Comparisons Used by QuickSort is Nondegenerate (Extended Abstract) The Limiting Distribution for the Number of Symbol Comparisons Used by QuickSort is Nondegenerate (Extended Abstract) Patrick Bindjeme 1 James Allen Fill 1 1 Department of Applied Mathematics Statistics,

More information

Chapter 4. Cardinal Arithmetic.

Chapter 4. Cardinal Arithmetic. Chapter 4. Cardinal Arithmetic. 4.1. Basic notions about cardinals. We are used to comparing the size of sets by seeing if there is an injection from one to the other, or a bijection between the two. Definition.

More information

Theorem 1.3. Every finite lattice has a congruence-preserving embedding to a finite atomistic lattice.

Theorem 1.3. Every finite lattice has a congruence-preserving embedding to a finite atomistic lattice. CONGRUENCE-PRESERVING EXTENSIONS OF FINITE LATTICES TO SEMIMODULAR LATTICES G. GRÄTZER AND E.T. SCHMIDT Abstract. We prove that every finite lattice hasa congruence-preserving extension to a finite semimodular

More information

Hints on Some of the Exercises

Hints on Some of the Exercises Hints on Some of the Exercises of the book R. Seydel: Tools for Computational Finance. Springer, 00/004/006/009/01. Preparatory Remarks: Some of the hints suggest ideas that may simplify solving the exercises

More information

On Existence of Equilibria. Bayesian Allocation-Mechanisms

On Existence of Equilibria. Bayesian Allocation-Mechanisms On Existence of Equilibria in Bayesian Allocation Mechanisms Northwestern University April 23, 2014 Bayesian Allocation Mechanisms In allocation mechanisms, agents choose messages. The messages determine

More information

A Translation of Intersection and Union Types

A Translation of Intersection and Union Types A Translation of Intersection and Union Types for the λ µ-calculus Kentaro Kikuchi RIEC, Tohoku University kentaro@nue.riec.tohoku.ac.jp Takafumi Sakurai Department of Mathematics and Informatics, Chiba

More information

Permutation patterns and statistics

Permutation patterns and statistics Permutation patterns and statistics Theodore Dokos Department of Mathematics, The Ohio State University 100 Math Tower, 231 West 18th Avenue Columbus, OH 43210-1174, USA, t.dokos@gmail.com Tim Dwyer Department

More information

UPWARD STABILITY TRANSFER FOR TAME ABSTRACT ELEMENTARY CLASSES

UPWARD STABILITY TRANSFER FOR TAME ABSTRACT ELEMENTARY CLASSES UPWARD STABILITY TRANSFER FOR TAME ABSTRACT ELEMENTARY CLASSES JOHN BALDWIN, DAVID KUEKER, AND MONICA VANDIEREN Abstract. Grossberg and VanDieren have started a program to develop a stability theory for

More information

Martingales. by D. Cox December 2, 2009

Martingales. by D. Cox December 2, 2009 Martingales by D. Cox December 2, 2009 1 Stochastic Processes. Definition 1.1 Let T be an arbitrary index set. A stochastic process indexed by T is a family of random variables (X t : t T) defined on a

More information

Interpolation of κ-compactness and PCF

Interpolation of κ-compactness and PCF Comment.Math.Univ.Carolin. 50,2(2009) 315 320 315 Interpolation of κ-compactness and PCF István Juhász, Zoltán Szentmiklóssy Abstract. We call a topological space κ-compact if every subset of size κ has

More information

Chain conditions, layered partial orders and weak compactness

Chain conditions, layered partial orders and weak compactness Chain conditions, layered partial orders and weak compactness Philipp Moritz Lücke Joint work with Sean D. Cox (VCU Richmond) Mathematisches Institut Rheinische Friedrich-Wilhelms-Universität Bonn http://www.math.uni-bonn.de/people/pluecke/

More information

SYSM 6304: Risk and Decision Analysis Lecture 6: Pricing and Hedging Financial Derivatives

SYSM 6304: Risk and Decision Analysis Lecture 6: Pricing and Hedging Financial Derivatives SYSM 6304: Risk and Decision Analysis Lecture 6: Pricing and Hedging Financial Derivatives M. Vidyasagar Cecil & Ida Green Chair The University of Texas at Dallas Email: M.Vidyasagar@utdallas.edu October

More information

On Packing Densities of Set Partitions

On Packing Densities of Set Partitions On Packing Densities of Set Partitions Adam M.Goyt 1 Department of Mathematics Minnesota State University Moorhead Moorhead, MN 56563, USA goytadam@mnstate.edu Lara K. Pudwell Department of Mathematics

More information

Characterizing large cardinals in terms of layered partial orders

Characterizing large cardinals in terms of layered partial orders Characterizing large cardinals in terms of layered partial orders Philipp Moritz Lücke Joint work with Sean D. Cox (VCU Richmond) Mathematisches Institut Rheinische Friedrich-Wilhelms-Universität Bonn

More information

On Packing Densities of Set Partitions

On Packing Densities of Set Partitions On Packing Densities of Set Partitions arxiv:1301.1303v1 [math.co] 7 Jan 2013 Adam M.Goyt 1 Department of Mathematics Minnesota State University Moorhead Moorhead, MN 56563, USA goytadam@mnstate.edu Lara

More information

Math 167: Mathematical Game Theory Instructor: Alpár R. Mészáros

Math 167: Mathematical Game Theory Instructor: Alpár R. Mészáros Math 167: Mathematical Game Theory Instructor: Alpár R. Mészáros Midterm #1, February 3, 2017 Name (use a pen): Student ID (use a pen): Signature (use a pen): Rules: Duration of the exam: 50 minutes. By

More information

Non-semimartingales in finance

Non-semimartingales in finance Non-semimartingales in finance Pricing and Hedging Options with Quadratic Variation Tommi Sottinen University of Vaasa 1st Northern Triangular Seminar 9-11 March 2009, Helsinki University of Technology

More information

Homework Assignments

Homework Assignments Homework Assignments Week 1 (p 57) #4.1, 4., 4.3 Week (pp 58-6) #4.5, 4.6, 4.8(a), 4.13, 4.0, 4.6(b), 4.8, 4.31, 4.34 Week 3 (pp 15-19) #1.9, 1.1, 1.13, 1.15, 1.18 (pp 9-31) #.,.6,.9 Week 4 (pp 36-37)

More information

REMARKS ON K3 SURFACES WITH NON-SYMPLECTIC AUTOMORPHISMS OF ORDER 7

REMARKS ON K3 SURFACES WITH NON-SYMPLECTIC AUTOMORPHISMS OF ORDER 7 REMARKS ON K3 SURFACES WTH NON-SYMPLECTC AUTOMORPHSMS OF ORDER 7 SHNGO TAK Abstract. n this note, we treat a pair of a K3 surface and a non-symplectic automorphism of order 7m (m = 1, 3 and 6) on it. We

More information

A construction of short sequences containing all permutations of a set as subsequences Radomirovi, Saša

A construction of short sequences containing all permutations of a set as subsequences Radomirovi, Saša University of Dundee A construction of short sequences containing all permutations of a set as subsequences Radomirovi, Saša Published in: Electronic Journal of Combinatorics Publication date: 2012 Document

More information

Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program June 2017

Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program June 2017 Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program June 2017 The time limit for this exam is four hours. The exam has four sections. Each section includes two questions.

More information

MITCHELL S THEOREM REVISITED. Contents

MITCHELL S THEOREM REVISITED. Contents MITCHELL S THEOREM REVISITED THOMAS GILTON AND JOHN KRUEGER Abstract. Mitchell s theorem on the approachability ideal states that it is consistent relative to a greatly Mahlo cardinal that there is no

More information

ON THE MAXIMUM AND MINIMUM SIZES OF A GRAPH

ON THE MAXIMUM AND MINIMUM SIZES OF A GRAPH Discussiones Mathematicae Graph Theory 37 (2017) 623 632 doi:10.7151/dmgt.1941 ON THE MAXIMUM AND MINIMUM SIZES OF A GRAPH WITH GIVEN k-connectivity Yuefang Sun Department of Mathematics Shaoxing University

More information

Solution of the problem of the identified minimum for the tri-variate normal

Solution of the problem of the identified minimum for the tri-variate normal Proc. Indian Acad. Sci. (Math. Sci.) Vol., No. 4, November 0, pp. 645 660. c Indian Academy of Sciences Solution of the problem of the identified minimum for the tri-variate normal A MUKHERJEA, and M ELNAGGAR

More information

SOME APPLICATIONS OF OCCUPATION TIMES OF BROWNIAN MOTION WITH DRIFT IN MATHEMATICAL FINANCE

SOME APPLICATIONS OF OCCUPATION TIMES OF BROWNIAN MOTION WITH DRIFT IN MATHEMATICAL FINANCE c Applied Mathematics & Decision Sciences, 31, 63 73 1999 Reprints Available directly from the Editor. Printed in New Zealand. SOME APPLICAIONS OF OCCUPAION IMES OF BROWNIAN MOION WIH DRIF IN MAHEMAICAL

More information

Orthogonality to the value group is the same as generic stability in C-minimal expansions of ACVF

Orthogonality to the value group is the same as generic stability in C-minimal expansions of ACVF Orthogonality to the value group is the same as generic stability in C-minimal expansions of ACVF Will Johnson February 18, 2014 1 Introduction Let T be some C-minimal expansion of ACVF. Let U be the monster

More information

A Decentralized Learning Equilibrium

A Decentralized Learning Equilibrium Paper to be presented at the DRUID Society Conference 2014, CBS, Copenhagen, June 16-18 A Decentralized Learning Equilibrium Andreas Blume University of Arizona Economics ablume@email.arizona.edu April

More information

Skew lattices of matrices in rings

Skew lattices of matrices in rings Algebra univers. 53 (2005) 471 479 0002-5240/05/040471 09 DOI 10.1007/s00012-005-1913-5 c Birkhäuser Verlag, Basel, 2005 Algebra Universalis Skew lattices of matrices in rings Karin Cvetko-Vah Abstract.

More information

arxiv: v1 [math.lo] 24 Feb 2014

arxiv: v1 [math.lo] 24 Feb 2014 Residuated Basic Logic II. Interpolation, Decidability and Embedding Minghui Ma 1 and Zhe Lin 2 arxiv:1404.7401v1 [math.lo] 24 Feb 2014 1 Institute for Logic and Intelligence, Southwest University, Beibei

More information

The Binomial Theorem and Consequences

The Binomial Theorem and Consequences The Binomial Theorem and Consequences Juris Steprāns York University November 17, 2011 Fermat s Theorem Pierre de Fermat claimed the following theorem in 1640, but the first published proof (by Leonhard

More information

Comparing Partial Rankings

Comparing Partial Rankings Comparing Partial Rankings Ronald Fagin Ravi Kumar Mohammad Mahdian D. Sivakumar Erik Vee To appear: SIAM J. Discrete Mathematics Abstract We provide a comprehensive picture of how to compare partial rankings,

More information

Best-Reply Sets. Jonathan Weinstein Washington University in St. Louis. This version: May 2015

Best-Reply Sets. Jonathan Weinstein Washington University in St. Louis. This version: May 2015 Best-Reply Sets Jonathan Weinstein Washington University in St. Louis This version: May 2015 Introduction The best-reply correspondence of a game the mapping from beliefs over one s opponents actions to

More information

Equivalence between Semimartingales and Itô Processes

Equivalence between Semimartingales and Itô Processes International Journal of Mathematical Analysis Vol. 9, 215, no. 16, 787-791 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/1.12988/ijma.215.411358 Equivalence between Semimartingales and Itô Processes

More information

arxiv: v1 [math.co] 8 Nov 2017

arxiv: v1 [math.co] 8 Nov 2017 Proof of a conjecture of Morales Pak Panova on reverse plane partitions Peter L. Guo 1, C.D. Zhao 2 and Michael X.X. Zhong 3 arxiv:1711.03048v1 [math.co] 8 Nov 2017 1,2 Center for Combinatorics, LPMC-TJKLC

More information

Generating all nite modular lattices of a given size

Generating all nite modular lattices of a given size Generating all nite modular lattices of a given size Peter Jipsen and Nathan Lawless Dedicated to Brian Davey on the occasion of his 65th birthday Abstract. Modular lattices, introduced by R. Dedekind,

More information

ADDING A LOT OF COHEN REALS BY ADDING A FEW II. 1. Introduction

ADDING A LOT OF COHEN REALS BY ADDING A FEW II. 1. Introduction ADDING A LOT OF COHEN REALS BY ADDING A FEW II MOTI GITIK AND MOHAMMAD GOLSHANI Abstract. We study pairs (V, V 1 ), V V 1, of models of ZF C such that adding κ many Cohen reals over V 1 adds λ many Cohen

More information

Introduction to Probability Theory and Stochastic Processes for Finance Lecture Notes

Introduction to Probability Theory and Stochastic Processes for Finance Lecture Notes Introduction to Probability Theory and Stochastic Processes for Finance Lecture Notes Fabio Trojani Department of Economics, University of St. Gallen, Switzerland Correspondence address: Fabio Trojani,

More information

Palindromic Permutations and Generalized Smarandache Palindromic Permutations

Palindromic Permutations and Generalized Smarandache Palindromic Permutations arxiv:math/0607742v2 [mathgm] 8 Sep 2007 Palindromic Permutations and Generalized Smarandache Palindromic Permutations Tèmítópé Gbóláhàn Jaíyéọlá Department of Mathematics, Obafemi Awolowo University,

More information

4: SINGLE-PERIOD MARKET MODELS

4: SINGLE-PERIOD MARKET MODELS 4: SINGLE-PERIOD MARKET MODELS Marek Rutkowski School of Mathematics and Statistics University of Sydney Semester 2, 2016 M. Rutkowski (USydney) Slides 4: Single-Period Market Models 1 / 87 General Single-Period

More information

Optimizing Portfolios

Optimizing Portfolios Optimizing Portfolios An Undergraduate Introduction to Financial Mathematics J. Robert Buchanan 2010 Introduction Investors may wish to adjust the allocation of financial resources including a mixture

More information

Investigating First Returns: The Effect of Multicolored Vectors

Investigating First Returns: The Effect of Multicolored Vectors Investigating First Returns: The Effect of Multicolored Vectors arxiv:1811.02707v1 [math.co] 7 Nov 2018 Shakuan Frankson and Myka Terry Mathematics Department SPIRAL Program at Morgan State University,

More information

Study of Monotonicity of Trinomial Arcs M(p, k, r, n) when 1 <α<+

Study of Monotonicity of Trinomial Arcs M(p, k, r, n) when 1 <α<+ International Journal of Algebra, Vol. 1, 2007, no. 10, 477-485 Study of Monotonicity of Trinomial Arcs M(p, k, r, n) when 1

More information

Tangent Lévy Models. Sergey Nadtochiy (joint work with René Carmona) Oxford-Man Institute of Quantitative Finance University of Oxford.

Tangent Lévy Models. Sergey Nadtochiy (joint work with René Carmona) Oxford-Man Institute of Quantitative Finance University of Oxford. Tangent Lévy Models Sergey Nadtochiy (joint work with René Carmona) Oxford-Man Institute of Quantitative Finance University of Oxford June 24, 2010 6th World Congress of the Bachelier Finance Society Sergey

More information

A note on the number of (k, l)-sum-free sets

A note on the number of (k, l)-sum-free sets A note on the number of (k, l)-sum-free sets Tomasz Schoen Mathematisches Seminar Universität zu Kiel Ludewig-Meyn-Str. 4, 4098 Kiel, Germany tos@numerik.uni-kiel.de and Department of Discrete Mathematics

More information

SYLLABUS AND SAMPLE QUESTIONS FOR MSQE (Program Code: MQEK and MQED) Syllabus for PEA (Mathematics), 2013

SYLLABUS AND SAMPLE QUESTIONS FOR MSQE (Program Code: MQEK and MQED) Syllabus for PEA (Mathematics), 2013 SYLLABUS AND SAMPLE QUESTIONS FOR MSQE (Program Code: MQEK and MQED) 2013 Syllabus for PEA (Mathematics), 2013 Algebra: Binomial Theorem, AP, GP, HP, Exponential, Logarithmic Series, Sequence, Permutations

More information

TWIST UNTANGLE AND RELATED KNOT GAMES

TWIST UNTANGLE AND RELATED KNOT GAMES #G04 INTEGERS 14 (2014) TWIST UNTANGLE AND RELATED KNOT GAMES Sandy Ganzell Department of Mathematics and Computer Science, St. Mary s College of Maryland, St. Mary s City, Maryland sganzell@smcm.edu Alex

More information

Exponential utility maximization under partial information and sufficiency of information

Exponential utility maximization under partial information and sufficiency of information Exponential utility maximization under partial information and sufficiency of information Marina Santacroce Politecnico di Torino Joint work with M. Mania WORKSHOP FINANCE and INSURANCE March 16-2, Jena

More information

LECTURE 2: MULTIPERIOD MODELS AND TREES

LECTURE 2: MULTIPERIOD MODELS AND TREES LECTURE 2: MULTIPERIOD MODELS AND TREES 1. Introduction One-period models, which were the subject of Lecture 1, are of limited usefulness in the pricing and hedging of derivative securities. In real-world

More information

More On λ κ closed sets in generalized topological spaces

More On λ κ closed sets in generalized topological spaces Journal of Algorithms and Computation journal homepage: http://jac.ut.ac.ir More On λ κ closed sets in generalized topological spaces R. Jamunarani, 1, P. Jeyanthi 2 and M. Velrajan 3 1,2 Research Center,

More information

Applied Mathematics Letters

Applied Mathematics Letters Applied Mathematics Letters 23 (2010) 286 290 Contents lists available at ScienceDirect Applied Mathematics Letters journal homepage: wwwelseviercom/locate/aml The number of spanning trees of a graph Jianxi

More information

Web Appendix: Proofs and extensions.

Web Appendix: Proofs and extensions. B eb Appendix: Proofs and extensions. B.1 Proofs of results about block correlated markets. This subsection provides proofs for Propositions A1, A2, A3 and A4, and the proof of Lemma A1. Proof of Proposition

More information

Virtual Demand and Stable Mechanisms

Virtual Demand and Stable Mechanisms Virtual Demand and Stable Mechanisms Jan Christoph Schlegel Faculty of Business and Economics, University of Lausanne, Switzerland jschlege@unil.ch Abstract We study conditions for the existence of stable

More information

EXTENSIVE AND NORMAL FORM GAMES

EXTENSIVE AND NORMAL FORM GAMES EXTENSIVE AND NORMAL FORM GAMES Jörgen Weibull February 9, 2010 1 Extensive-form games Kuhn (1950,1953), Selten (1975), Kreps and Wilson (1982), Weibull (2004) Definition 1.1 A finite extensive-form game

More information

BROWNIAN MOTION Antonella Basso, Martina Nardon

BROWNIAN MOTION Antonella Basso, Martina Nardon BROWNIAN MOTION Antonella Basso, Martina Nardon basso@unive.it, mnardon@unive.it Department of Applied Mathematics University Ca Foscari Venice Brownian motion p. 1 Brownian motion Brownian motion plays

More information

TWO-PERIODIC TERNARY RECURRENCES AND THEIR BINET-FORMULA 1. INTRODUCTION

TWO-PERIODIC TERNARY RECURRENCES AND THEIR BINET-FORMULA 1. INTRODUCTION TWO-PERIODIC TERNARY RECURRENCES AND THEIR BINET-FORMULA M. ALP, N. IRMAK and L. SZALAY Abstract. The properties of k-periodic binary recurrences have been discussed by several authors. In this paper,

More information

Strong normalisation and the typed lambda calculus

Strong normalisation and the typed lambda calculus CHAPTER 9 Strong normalisation and the typed lambda calculus In the previous chapter we looked at some reduction rules for intuitionistic natural deduction proofs and we have seen that by applying these

More information

A Property Equivalent to n-permutability for Infinite Groups

A Property Equivalent to n-permutability for Infinite Groups Journal of Algebra 221, 570 578 (1999) Article ID jabr.1999.7996, available online at http://www.idealibrary.com on A Property Equivalent to n-permutability for Infinite Groups Alireza Abdollahi* and Aliakbar

More information

DESCENDANTS IN HEAP ORDERED TREES OR A TRIUMPH OF COMPUTER ALGEBRA

DESCENDANTS IN HEAP ORDERED TREES OR A TRIUMPH OF COMPUTER ALGEBRA DESCENDANTS IN HEAP ORDERED TREES OR A TRIUMPH OF COMPUTER ALGEBRA Helmut Prodinger Institut für Algebra und Diskrete Mathematik Technical University of Vienna Wiedner Hauptstrasse 8 0 A-00 Vienna, Austria

More information

THE IRREDUCIBILITY OF CERTAIN PURE-CYCLE HURWITZ SPACES

THE IRREDUCIBILITY OF CERTAIN PURE-CYCLE HURWITZ SPACES THE IRREDUCIBILITY OF CERTAIN PURE-CYCLE HURWITZ SPACES FU LIU AND BRIAN OSSERMAN Abstract. We study pure-cycle Hurwitz spaces, parametrizing covers of the projective line having only one ramified point

More information

Numerical schemes for SDEs

Numerical schemes for SDEs Lecture 5 Numerical schemes for SDEs Lecture Notes by Jan Palczewski Computational Finance p. 1 A Stochastic Differential Equation (SDE) is an object of the following type dx t = a(t,x t )dt + b(t,x t

More information

Lossy compression of permutations

Lossy compression of permutations Lossy compression of permutations The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Wang, Da, Arya Mazumdar,

More information

BEHAVIOUR OF PASSAGE TIME FOR A QUEUEING NETWORK MODEL WITH FEEDBACK: A SIMULATION STUDY

BEHAVIOUR OF PASSAGE TIME FOR A QUEUEING NETWORK MODEL WITH FEEDBACK: A SIMULATION STUDY IJMMS 24:24, 1267 1278 PII. S1611712426287 http://ijmms.hindawi.com Hindawi Publishing Corp. BEHAVIOUR OF PASSAGE TIME FOR A QUEUEING NETWORK MODEL WITH FEEDBACK: A SIMULATION STUDY BIDYUT K. MEDYA Received

More information

Arbitrage Theory without a Reference Probability: challenges of the model independent approach

Arbitrage Theory without a Reference Probability: challenges of the model independent approach Arbitrage Theory without a Reference Probability: challenges of the model independent approach Matteo Burzoni Marco Frittelli Marco Maggis June 30, 2015 Abstract In a model independent discrete time financial

More information

Sy D. Friedman. August 28, 2001

Sy D. Friedman. August 28, 2001 0 # and Inner Models Sy D. Friedman August 28, 2001 In this paper we examine the cardinal structure of inner models that satisfy GCH but do not contain 0 #. We show, assuming that 0 # exists, that such

More information

Order book resilience, price manipulations, and the positive portfolio problem

Order book resilience, price manipulations, and the positive portfolio problem Order book resilience, price manipulations, and the positive portfolio problem Alexander Schied Mannheim University PRisMa Workshop Vienna, September 28, 2009 Joint work with Aurélien Alfonsi and Alla

More information

No-arbitrage theorem for multi-factor uncertain stock model with floating interest rate

No-arbitrage theorem for multi-factor uncertain stock model with floating interest rate Fuzzy Optim Decis Making 217 16:221 234 DOI 117/s17-16-9246-8 No-arbitrage theorem for multi-factor uncertain stock model with floating interest rate Xiaoyu Ji 1 Hua Ke 2 Published online: 17 May 216 Springer

More information