Inversion Formulae on Permutations Avoiding 321
|
|
- Alexandra Goodman
- 5 years ago
- Views:
Transcription
1 Inversion Formulae on Permutations Avoiding 31 Pingge Chen College of Mathematics and Econometrics Hunan University Changsha, P. R. China. Suijie Wang College of Mathematics and Econometrics Hunan University Changsha, P. R. China. Zhousheng Mei College of Mathematics and Econometrics Hunan University Changsha, P. R. China. Submitted: July 9, 015; Accepted: Nov 4, 015; Published: Nov 13, 015 Abstract We will study the inversion statistic of 31-avoiding permutations, and obtain that the number of 31-avoiding permutations on [n] with m inversions is given by S n,m (31) = b m (b) ). l(b) where the sum runs over all compositions b = (b 1,b,...,b k ) of m, i.e., m = b 1 +b + +b k and b i 1, l(b) = k is the length of b, and (b) := b 1 + b b b k b k 1 + b k. We obtain a new bijection from 31-avoiding permutations to Dyck paths which establishes a relation on inversion number of 31-avoiding permutations and valley height of Dyck paths. Keywords: pattern avoidance; Catalan number; Dyck path; generating function Supported by NSFC & the electronic journal of combinatorics (4) (015), #P4.8 1
2 1 Introduction Let S n denote the permutation group on [n] = {1,,...,n}. Write σ S n in the form σ = σ 1 σ σ n. For m n, if σ S n and π = π 1 π m S m, we say that σ contains the pattern π if there is an index subsequence 1 i 1 < i < < i m n such that σ ij < σ ik iff π j < π k for 1 j,k m, that is, σ has a subsequence which is order isomorphic to π. Otherwise, σ avoids the pattern π, or say, σ is π-avoiding. We denote by S n (π) the set of all permutations σ S n that are π-avoiding, i.e., S n (π) = {σ S n σ avoids the pattern π}. For example, the permutation 4153 avoids the pattern 31, but contains the pattern 13 since its subsequence 153 is order isomorphic to 13, hence 4153 S 5 (31) and 4153 / S 5 (13). In 1970 s, Knuth [1, 13] obtained a well known result on permutations avoiding patterns, that is for any π S 3, S n (π) = C n = 1 ( ) n, n+1 n where C n is the n-th Catalan number which counts the number of Dyck paths of length n. In past decades, various articles considered the bijections between 31-avoiding permutations and Dyck paths, see [4, 7, 10, 11, 14, 15, 17, 18, 19, 1, ]. In this paper, we will study the inversion distribution of 31-avoiding permutations. For σ = σ 1 σ σ n S n (π), we define the inversion set Inv(σ) to be Inv(σ) = {(σ i,σ j ) i < j and σ i > σ j }, and denote by inv(σ) = #Inv(σ), called the inversion number of σ, where the hash sign denotes cardinality. The generating function I n (π,q) of the inversion numbers is I n (π,q) = σ S n(π) q inv(σ). for σ S n (π). This generating function was first introduced and explored in [8, 0] and some recurrence formulae have been obtained for π S 3 and π 31. Conjecture 3. of [8] states that, for all n 1, n I n (31,q) = I n 1 (31,q)+ q i+1 I i (31,q)I n i 1 (31,q). (1) i=0 Soon afterwards a bijective proof of the recursive formula (1) was obtained by Szu-En Cheng et al. [6]. There are some other works on inversions of restricted permutations, see [1, 3, 5, 9, 15, 16]. In 014, M. Barnabei, F. Bonetti, S. Elizalde and M. Silimbani [] studied the distribution of descents and major indexes of 31-avoiding involutions. the electronic journal of combinatorics (4) (015), #P4.8
3 Motivated by [, 6], in this paper we will study the inversion distribution of 31- avoiding permutations. As the main result, we give an explicit formula counting the number of 31-avoiding permutations with the fixed inversion number. We also find a bijection between 31-avoiding permutations and Dyck paths, which is new to the best of our knowledge. From this bijection, we show that the inversion number of 31-avoiding permutations and the valley-sum of Dyck paths are equally distributed. Inversions of Permutations Avoiding 31 For 1 k n, let Sn k (31) be the collection of 31-avoiding permutations of [n] and containing 1 k as a subsequence, S k n(31) = {σ S n (31) σ 1 (1) < σ 1 () < < σ 1 (k)}. More precisely, if σ = σ 1 σ σ n S k n(31) and σ i1 = 1,σ i =,...,σ ik = k, then i 1 < i < < i k. Obviously, we have S n (31) = Sn 1 (31) S n (31) Sn n (31) = {id}. For 1 k n, let In k (31,q) be the generating function defined by In k (31,q) = q inv(σ). σ Sn k(31) Then we have I n (31,q) = In 1(31,q) and In n (31,q) = 1 for all n 1. Lemma 1. For 1 k n, we have I k n(31,q) = I k+1 n (31,q)+ q i In+i k 1(31,q). i Proof. Given σ Sn k(31) with 1 k n 1, consider the position of σ 1 (k + 1). Assuming σ 1 (0) = 0, we have either σ 1 (k) < σ 1 (k + 1), or σ 1 (i) < σ 1 (k + 1) < σ 1 (i+1) for some i k 1. (i): If σ Sn k(31) and σ 1 (k) < σ 1 (k+1), it follows that σ Sn k+1 (31). So this case contributes a term In k+1 (31, q) to the generating function In(31,q). k (ii): If σ Sn(31) k and σ 1 (i) < σ 1 (k +1) < σ 1 (i+1) for some i k 1, since σ avoids the pattern 31, it forces that σ 1 (j) > σ 1 (k + 1) for all j k +. Otherwise, we have σ 1 (j) < σ 1 (k+1) < σ 1 (i+1) which is obviously a contradiction. It implies that σ = σ 1 σ σ n satisfies σ 1 = 1,σ =,...,σ i = i,σ i+1 = k + 1. Denote by σ = σ i+ σ i+3 σ n. Then σ is a permutation of {i+1,...,k,k +,...,n} satisfying σ 1 (i+1) < σ 1 (i+) < < σ 1 (k) and inv(σ) = k i+inv( σ). It implies that case (ii)contributes a term q k i I k i n i 1 (31,q) to Ik n (31,q) for 0 i k 1. Changing the index i to k i, the proof will be complete by combining (i)and (ii). the electronic journal of combinatorics (4) (015), #P4.8 3
4 In the sequel, we always denote by δ : R {0,1} a function such that δ(u,v) = { 0, u = v; 1, otherwise. In order to characterize the generating function I n (31,q) as a counting function of lattice points in a lattice polytope, we introduce the following lemma. Lemma. Assuming x 0 = 0, for all 1 t n, we have 1 t t In+1 1 (31,q) = I x 1 =0 x =x 1 t+1 xt n+1 x t (31,q) x t=x t 1 q δ(x i,x i 1 )(i+1 x i ) Proof. The statement is true for t = 1 by Lemma 1. To use induction on t, suppose the above equality holds for t. From Lemma 1, we have I t+1 xt n+1 x t (31,q) = t+1 I t+ xt+1 n+1 x t+1 (31,q) q δ(x t+1,x t)(t+ x t+1 ). x t+1 =x t Using above formula to substitute the term I t+1 xt n+1 x t (31,q) in the formula of this Lemma, we can easily conclude that the equality holds for the case t+1. Let Ω n be a convex lattice polytope defined by Ω n = {(x 1...,x n ) Z n 0 x 1 x i i for all 1 i n}. Recall that I n+1 (31,q) = In+1 1 (31,q) and In+1 xn n (31,q) = 1. From above lemma by taking t = n we can easily obtain Proposition 3. Assuming x 0 = 0, we have I n+1 (31,q) = x Ω n n q δ(x i,x i 1 )(i+1 x i ). In the following we will give a more explicit interpretation about this formula. Let inv k (σ) be the number of inversions of σ whose first element is k, i.e, inv k (σ) = #{i (k,i) Inv(σ)} It is obvious that inv k (σ) k 1. From the definition of I n+1 (31,q) and Proposition 3, we have q inv(σ) = q n δ(x i,x i 1 )(i+1 x i ) x Ω n σ S n+1 (31) Below we recursively define a map ϕ : S n+1 (31) Ω n, ϕ(σ) = (x 1,...,x n ) = x, () the electronic journal of combinatorics (4) (015), #P4.8 4
5 Figure 1: ϕ : σ = (0,0,,0,1,0,,0,3) x = (0,1,1,4,4,5,5,6) such that x 1 = inv (σ) and for k, { x x k = k 1, if inv k+1 (σ) = 0; k +1 inv k+1 (σ), otherwise. Figure.1 shows an example, where the second vector is ( inv 1 (σ),...,inv 9 (σ) ). Theorem 4. The map ϕ defined above is a bijection. Moreover, if ϕ(σ) = (x 1,...,x n ), then n inv(σ) = δ(x i,x i 1 )(i+1 x i ). Proof. We first show that ϕ is well defined in the sense that if x = ϕ(σ) then x Ω n = {(x 1,...,x n ) Z n 0 x 1 x i i for all 1 i n}. We use induction on i. For i = 1, it is obvious x 1 = inv (σ) 1. Suppose 0 x 1 x i 1 i 1. If inv i+1 (σ) = 0, then x i = x i 1 i by the induction hypothesis. If inv i+1 (σ) 0, then x i = i + 1 inv i+1 (σ) i. It remains to show that if inv i+1 (σ) 0, then x i 1 x i. Let k i be maximal such that inv k (σ) 0, i.e., inv k+1 (σ) = = inv i (σ) = 0. It follows that there exists an inversion (k,l) Inv(σ). Since σ is 31-avoiding, we have σ 1 (k) < σ 1 (i+1), otherwise (i+1,k,l) is a subsequence of σ and of type 31. Hence we obtain inv i+1 (σ) inv k (σ)+i k, and x i = i+1 inv i+1 (σ) k +1 inv k (σ) = x k 1 +1 > x k 1. Note that inv k+1 (σ) = = inv i (σ) = 0. By definitions, we have x k 1 = = x i 1 which provesthatϕiswelldefined. Toprovethemapϕisabijection, notethateachpermutation σ can be uniquely recovered from its inversion vector ( inv 1 (σ),...,inv n+1 (σ) ). Now we construct an inverse map ψ : Ω n S n+1 (31) of ϕ recursively as follows. Given x = (x 1,...,x n ), define ψ(x) = σ = σ 1 σ n+1 such that inv 1 (σ) = 0 and for k n+1, { 0 if x inv k (σ) = k 1 = x k ; k x k 1 otherwise. It is not difficult to see that both ψ ϕ and ϕ ψ are identity map, i.e., ϕ is a bijection. This completes the proof. the electronic journal of combinatorics (4) (015), #P4.8 5
6 Figure : x = (0,1,1,4,4,5,5,6) D = uuduuddduuduududdd When n = 3, the inversion polynomial of S n (31) is I 3 (31,q) = q 4 +4q 3 +5q +3q+1. Below is the list of the bijection ϕ, q 0 : {134} ϕ {(0,0,0)}; q 1 : {143,134,134} ϕ {(0,0,3),(1,1,1),(0,,)}; q : {134,143,143,314,314} ϕ {(0,,3),(0,0,),(1,1,3),(1,,),(0,1,1)}; q 3 : {341,413,314,413} ϕ {(1,,3),(1,1,),(0,1,3),(0,0,1)}; q 4 : {341} ϕ {(0,1,)}. A Dyck path D is a lattice path from (0,0) to (n,0) in the (x,y)-plane with up-steps (1,1) (abbreviated as u ) and down-steps (1, 1) (abbreviated as d ), such that D never falls below the x-axis. A valley du of the Dyck path D is a down-step followed by an up-step. The height of a valley is defined to be the y-coordinate of its bottom. Denote by D n the set of all Dyck paths of length n. Several bijections between S n (31) and D n have been established in the literature, see [4, 7, 10, 11, 14, 15, 17, 18, 19, 1, ]. Here we will give a new bijection obtained easily from the above theorem. Morever, this bijection will allow to read the inversion number of a permutation as the sum of all valley heights and the number of valleys in the corresponding Dyck path. Indeed, for x = (x 1,...,x n ) Ω n, assuming x 0 = 0 and x n+1 = n+1, we construct a Dyck path D x as follows. By reading i from 1 to n+1, for each i we add an up-step and x i x i 1 down-steps from left to right. Figure. presents an example. It is obvious that this construction gives an bijection from Ω n+1 to D n+1. If all valleys of a Dyck path D have heights a 1,...,a k, denote by v(d) = (a i +1). Combining with Theorem 4, we can easily obtain our first main result. Theorem 5. The map σ D ϕ(σ) is a bijection from S n+1 (31) to D n+1 such that where ϕ is defined in (). inv(σ) = v(d ϕ(σ) ), As an application of Theorem 5, we will give a counting formula on the number of 31-avoiding permutations with a fixed inversion number. For any D D n, we define a the electronic journal of combinatorics (4) (015), #P4.8 6
7 tunnel of D to be a horizontal segment between two lattice points of D that intersects D only in these two points, and stays always below D. From Theorem 5, for m 0, there is a bijection S n,m (31) := {σ S n (31) : inv(σ) = m} D n,m := {D D n : v(d) = m}. Theorem 6. For every m 0, S n,m (31) = b m (b) ). l(b) where the sum runs over all compositions b = (b 1,b,...,b k ) of m, denoted b m, i.e., m = b 1 +b + +b k and b i 1, l(b) = k is the length of b, and (b) := b 1 + b b b k b k 1 + b k. Proof. It is sufficient to consider D n,m. For any D D n,m, suppose that D has k valleys with heights a 1,a,,a k, then m = v(d) = k (a i + 1). Let l i be the length of the path D located between the i-th and (i+1)-th valley, for i = 0,1,,,k. Then we have l i = a i+1 a i +t i, l i = n, t i 1. i=0 Where t i is the number of tunnels between the i-th and (i+1)-th valley. Let a 0 = 0 and a k+1 = 0 be the heights of the starting point and the terminal point of the Dyck path D, respectively. Write (a) = a i+1 a i. Then i=0 #{D D n all valleys of D have heights a 1,a,...,a k } = #{(l 0,l 1,,l k ) l i = a i+1 a i +t i, l i = n,t i 1}. = #{(t 0,t 1,,t k ) t 0 +t 1 + +t k = n (a),t i 1}. (a) ) 1 = k i=0 So we have D n,m = (a 1 +1)+(a +1)+ +(a k +1)=m a i +1 1 (a) ) 1 k the electronic journal of combinatorics (4) (015), #P4.8 7
8 Let b i = a i +1 for 1 i k, b 0 = b k+1 = 0, obviously (b) = k i=0 b i+1 b i = (a)+. Hence (b) ) D n,m =. k b 1 +b + +b k =m b i 1 Acknowledgements We would like to express our gratitude to the anonymous referee for many useful comments. References [1] J. Bandlow, Eric S. Egge, and K. Killpatrick. A weight-preserving bijection between Schröer paths and Schröer permutations. Ann. Comb., 6(3-4): 35 48, 00. [] M. Barnabei, F. Bonetti, S. Elizalde, and M. Silimbani. Descent sets on 31-avoiding involutions and hook decompositions of partitions. J. Combin. Theory Ser. A, 18:13 148, 014. [3] Andrew M. Baxter. Refining enumeration schemes to count according to the inversion number. Pure Math. Appl. (PU. M. A.), 1(): , 010. [4] S. C. Billey, W. Jockusch, and R. P. Stanley. Some combinatorial properties of Schubert polynomials. J. Algebraic Combin., (4): , [5] William Y. C. Chen, Yu-Ping Deng, and Laura L.M. Yang. Motzkin paths and reduced decompositions for permutations with forbidden patterns. Electron. J. Combin., 9(), #R15, 003. [6] S. E. Cheng, S. Elizalde, A. Kasraouic, and B. E. Sagan. Inversion polynomials for 31-avoiding permutations. Discrete Math., 313():55 565, 013 [7] A. Claesson and S. Kitaev. Classification of bijections between 31- and 13-avoiding permutations. Sém. Lothar. Combin. 60, Art. B60d, 30 pp, 008. [8] T. Dokos, T. Dwyer, B. P. Johnson, B. E. Sagan, and K. Selsor. Permutation patterns and statistics. Discrete Math., 31(18): , 01. [9] Eric S. Egge. Restricted 341-avoiding involutions, continued fractions, and Chebyshev polynomials. Adv. in Appl. Math., 33(3): , 004. [10] S. Elizalde and E. Deutsch. A Simple and Unusual Bijection for Dyck Paths and its Consequences. Ann. Comb., 7(3):81 97, 003. [11] S. Elizalde and I. Pak. Bijections for refined restricted permutations. J. Combin. Theory Ser. A, 105():07 19, 004. [1] D. E. Knuth. The Art of Computer Programming I: Fundamental Algorithms, Addison-Wesley, Publishing Co., Reading, Mass.-London-Don Mills, Ont, the electronic journal of combinatorics (4) (015), #P4.8 8
9 [13] D. E. Knuth. The Art of Computer Programming III: Sorting and Searching, Addison-Wesley, Reading, MA, [14] C. Krattenthaler. Permutations with restricted patterns and Dyck paths. Adv. in Appl. Math., 7(-3): , 001. [15] T. Mansour, Eva Y. D. Deng, and Rosena R. X. Du. Dyck paths and restricted permutations. Discrete Appl. Math., 154(11): , 006. [16] S. Min and S. Park. The maximal-inversion statistic and pattern-avoiding permutations. Discrete Math., 309(9): , 009. [17] A. Reifegerste. A generalization of Simion-Schmidt s bijection for restricted permutations. Electron. J. Combin., 9(), #R14, 003. [18] D. Richards. Ballot sequences and restricted permutations. Ars Combin., 5:83 86, [19] D. Rotem. On a correspondence between binary trees and a certain type of permutations. 4(3):58 61, [0] B. E. Sagan and C. D. Savage. Mahonian pairs. J. Combin. Theory Ser. A, 119(3):56 545, 01. [1] R. Simion and F. W. Schmidt. Restricted Permutations. European J. Combin., 6(4): , [] J. West. Generating trees and the Catalan and Schröder numbers. Discrete Math., 146(1-3):47 6, the electronic journal of combinatorics (4) (015), #P4.8 9
arxiv: v1 [math.co] 6 Oct 2009
THE DESCENT STATISTIC OVER 123-AVOIDING PERMUTATIONS arxiv:0910.0963v1 [math.co] 6 Oct 2009 MARILENA BARNABEI, FLAVIO BONETTI, AND MATTEO SILIMBANI Abstract We exploit Krattenthaler s bijection between
More informationQuadrant marked mesh patterns in 123-avoiding permutations
Quadrant marked mesh patterns in 23-avoiding permutations Dun Qiu Department of Mathematics University of California, San Diego La Jolla, CA 92093-02. USA duqiu@math.ucsd.edu Jeffrey Remmel Department
More informationOn Packing Densities of Set Partitions
On Packing Densities of Set Partitions Adam M.Goyt 1 Department of Mathematics Minnesota State University Moorhead Moorhead, MN 56563, USA goytadam@mnstate.edu Lara K. Pudwell Department of Mathematics
More informationThe Sorting Index and Permutation Codes. Abstract
The Sorting Index and Permutation Codes William Y.C. Chen a, George Z. Gong b, Jeremy J.F. Guo b a Center for Applied Mathematics, Tianjin University, Tianjin 300072, P. R. China b Center for Combinatorics,
More informationarxiv: v1 [math.co] 31 Mar 2009
A BIJECTION BETWEEN WELL-LABELLED POSITIVE PATHS AND MATCHINGS OLIVIER BERNARDI, BERTRAND DUPLANTIER, AND PHILIPPE NADEAU arxiv:0903.539v [math.co] 3 Mar 009 Abstract. A well-labelled positive path of
More informationPermutation patterns and statistics
Permutation patterns and statistics Theodore Dokos Department of Mathematics, The Ohio State University 100 Math Tower, 231 West 18th Avenue Columbus, OH 43210-1174, USA, t.dokos@gmail.com Tim Dwyer Department
More informationLattice Paths and Their Generalizations
and Their Generalizations SeungKyung Park Yonsei University August 9, 2012 Lattice paths Google search : lattice paths About 11,700,000 results (0.18 seconds) Lattice paths Google search : lattice paths
More informationOn Packing Densities of Set Partitions
On Packing Densities of Set Partitions arxiv:1301.1303v1 [math.co] 7 Jan 2013 Adam M.Goyt 1 Department of Mathematics Minnesota State University Moorhead Moorhead, MN 56563, USA goytadam@mnstate.edu Lara
More informationCATEGORICAL SKEW LATTICES
CATEGORICAL SKEW LATTICES MICHAEL KINYON AND JONATHAN LEECH Abstract. Categorical skew lattices are a variety of skew lattices on which the natural partial order is especially well behaved. While most
More informationOn the h-vector of a Lattice Path Matroid
On the h-vector of a Lattice Path Matroid Jay Schweig Department of Mathematics University of Kansas Lawrence, KS 66044 jschweig@math.ku.edu Submitted: Sep 16, 2009; Accepted: Dec 18, 2009; Published:
More informationA relation on 132-avoiding permutation patterns
Discrete Mathematics and Theoretical Computer Science DMTCS vol. VOL, 205, 285 302 A relation on 32-avoiding permutation patterns Natalie Aisbett School of Mathematics and Statistics, University of Sydney,
More informationOn the Number of Permutations Avoiding a Given Pattern
On the Number of Permutations Avoiding a Given Pattern Noga Alon Ehud Friedgut February 22, 2002 Abstract Let σ S k and τ S n be permutations. We say τ contains σ if there exist 1 x 1 < x 2
More informationLECTURE 3: FREE CENTRAL LIMIT THEOREM AND FREE CUMULANTS
LECTURE 3: FREE CENTRAL LIMIT THEOREM AND FREE CUMULANTS Recall from Lecture 2 that if (A, φ) is a non-commutative probability space and A 1,..., A n are subalgebras of A which are free with respect to
More informationNotes on the symmetric group
Notes on the symmetric group 1 Computations in the symmetric group Recall that, given a set X, the set S X of all bijections from X to itself (or, more briefly, permutations of X) is group under function
More informationDESCENDANTS IN HEAP ORDERED TREES OR A TRIUMPH OF COMPUTER ALGEBRA
DESCENDANTS IN HEAP ORDERED TREES OR A TRIUMPH OF COMPUTER ALGEBRA Helmut Prodinger Institut für Algebra und Diskrete Mathematik Technical University of Vienna Wiedner Hauptstrasse 8 0 A-00 Vienna, Austria
More informationCOMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS
COMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS DAN HATHAWAY AND SCOTT SCHNEIDER Abstract. We discuss combinatorial conditions for the existence of various types of reductions between equivalence
More informationPermutation Factorizations and Prime Parking Functions
Permutation Factorizations and Prime Parking Functions Amarpreet Rattan Department of Combinatorics and Optimization University of Waterloo Waterloo, ON, Canada N2L 3G1 arattan@math.uwaterloo.ca June 10,
More informationarxiv: v1 [math.co] 8 Nov 2017
Proof of a conjecture of Morales Pak Panova on reverse plane partitions Peter L. Guo 1, C.D. Zhao 2 and Michael X.X. Zhong 3 arxiv:1711.03048v1 [math.co] 8 Nov 2017 1,2 Center for Combinatorics, LPMC-TJKLC
More informationNEW PERMUTATION CODING AND EQUIDISTRIBUTION OF SET-VALUED STATISTICS. Dominique Foata and Guo-Niu Han
April 9, 2009 NEW PERMUTATION CODING AND EQUIDISTRIBUTION OF SET-VALUED STATISTICS Dominique Foata and Guo-Niu Han ABSTRACT. A new coding for permutations is explicitly constructed and its association
More informationGUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv: v1 [math.lo] 25 Mar 2019
GUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv:1903.10476v1 [math.lo] 25 Mar 2019 Abstract. In this article we prove three main theorems: (1) guessing models are internally unbounded, (2)
More informationNon replication of options
Non replication of options Christos Kountzakis, Ioannis A Polyrakis and Foivos Xanthos June 30, 2008 Abstract In this paper we study the scarcity of replication of options in the two period model of financial
More informationGenerating all modular lattices of a given size
Generating all modular lattices of a given size ADAM 2013 Nathan Lawless Chapman University June 6-8, 2013 Outline Introduction to Lattice Theory: Modular Lattices The Objective: Generating and Counting
More informationCollinear Triple Hypergraphs and the Finite Plane Kakeya Problem
Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem Joshua Cooper August 14, 006 Abstract We show that the problem of counting collinear points in a permutation (previously considered by the
More informationInvestigating First Returns: The Effect of Multicolored Vectors
Investigating First Returns: The Effect of Multicolored Vectors arxiv:1811.02707v1 [math.co] 7 Nov 2018 Shakuan Frankson and Myka Terry Mathematics Department SPIRAL Program at Morgan State University,
More informationPATTERNS IN RANDOM PERMUTATIONS AVOIDING THE PATTERN 321
PATTERNS IN RANDOM PERMUTATIONS AVOIDING THE PATTERN 321 SVANTE JANSON Abstract. We consider a random permutation drawn from the set of 321-avoiding permutations of length n and show that the number of
More informationAlgebra homework 8 Homomorphisms, isomorphisms
MATH-UA.343.005 T.A. Louis Guigo Algebra homework 8 Homomorphisms, isomorphisms For every n 1 we denote by S n the n-th symmetric group. Exercise 1. Consider the following permutations: ( ) ( 1 2 3 4 5
More informationA Property Equivalent to n-permutability for Infinite Groups
Journal of Algebra 221, 570 578 (1999) Article ID jabr.1999.7996, available online at http://www.idealibrary.com on A Property Equivalent to n-permutability for Infinite Groups Alireza Abdollahi* and Aliakbar
More informationBijections for a class of labeled plane trees
Bijections for a class of labeled plane trees Nancy S. S. Gu,2, Center for Combinatorics Nankai Uniersity Tianjin 0007 PR China Helmut Prodinger 2 Department of Mathematical Sciences Stellenbosch Uniersity
More informationUPWARD STABILITY TRANSFER FOR TAME ABSTRACT ELEMENTARY CLASSES
UPWARD STABILITY TRANSFER FOR TAME ABSTRACT ELEMENTARY CLASSES JOHN BALDWIN, DAVID KUEKER, AND MONICA VANDIEREN Abstract. Grossberg and VanDieren have started a program to develop a stability theory for
More informationEssays on Some Combinatorial Optimization Problems with Interval Data
Essays on Some Combinatorial Optimization Problems with Interval Data a thesis submitted to the department of industrial engineering and the institute of engineering and sciences of bilkent university
More informationLaurence Boxer and Ismet KARACA
THE CLASSIFICATION OF DIGITAL COVERING SPACES Laurence Boxer and Ismet KARACA Abstract. In this paper we classify digital covering spaces using the conjugacy class corresponding to a digital covering space.
More informationSy D. Friedman. August 28, 2001
0 # and Inner Models Sy D. Friedman August 28, 2001 In this paper we examine the cardinal structure of inner models that satisfy GCH but do not contain 0 #. We show, assuming that 0 # exists, that such
More informationOrthogonality to the value group is the same as generic stability in C-minimal expansions of ACVF
Orthogonality to the value group is the same as generic stability in C-minimal expansions of ACVF Will Johnson February 18, 2014 1 Introduction Let T be some C-minimal expansion of ACVF. Let U be the monster
More informationLECTURE 2: MULTIPERIOD MODELS AND TREES
LECTURE 2: MULTIPERIOD MODELS AND TREES 1. Introduction One-period models, which were the subject of Lecture 1, are of limited usefulness in the pricing and hedging of derivative securities. In real-world
More informationAn orderly algorithm to enumerate finite (semi)modular lattices
An orderly algorithm to enumerate finite (semi)modular lattices BLAST 23 Chapman University October 6, 23 Outline The original algorithm: Generating all finite lattices Generating modular and semimodular
More informationPalindromic Permutations and Generalized Smarandache Palindromic Permutations
arxiv:math/0607742v2 [mathgm] 8 Sep 2007 Palindromic Permutations and Generalized Smarandache Palindromic Permutations Tèmítópé Gbóláhàn Jaíyéọlá Department of Mathematics, Obafemi Awolowo University,
More informationSingle Machine Inserted Idle Time Scheduling with Release Times and Due Dates
Single Machine Inserted Idle Time Scheduling with Release Times and Due Dates Natalia Grigoreva Department of Mathematics and Mechanics, St.Petersburg State University, Russia n.s.grig@gmail.com Abstract.
More informationThe Pill Problem, Lattice Paths and Catalan Numbers
The Pill Problem, Lattice Paths and Catalan Numbers Margaret Bayer University of Kansas Lawrence, KS 66045-7594 bayer@ku.edu Keith Brandt Rockhurst University Kansas City, MO 64110 Keith.Brandt@Rockhurst.edu
More informationCONGRUENCES AND IDEALS IN A DISTRIBUTIVE LATTICE WITH RESPECT TO A DERIVATION
Bulletin of the Section of Logic Volume 42:1/2 (2013), pp. 1 10 M. Sambasiva Rao CONGRUENCES AND IDEALS IN A DISTRIBUTIVE LATTICE WITH RESPECT TO A DERIVATION Abstract Two types of congruences are introduced
More informationThe illustrated zoo of order-preserving functions
The illustrated zoo of order-preserving functions David Wilding, February 2013 http://dpw.me/mathematics/ Posets (partially ordered sets) underlie much of mathematics, but we often don t give them a second
More informationLossy compression of permutations
Lossy compression of permutations The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Wang, Da, Arya Mazumdar,
More informationGödel algebras free over finite distributive lattices
TANCL, Oxford, August 4-9, 2007 1 Gödel algebras free over finite distributive lattices Stefano Aguzzoli Brunella Gerla Vincenzo Marra D.S.I. D.I.COM. D.I.C.O. University of Milano University of Insubria
More informationGenerating all nite modular lattices of a given size
Generating all nite modular lattices of a given size Peter Jipsen and Nathan Lawless Dedicated to Brian Davey on the occasion of his 65th birthday Abstract. Modular lattices, introduced by R. Dedekind,
More informationarxiv: v2 [math.lo] 13 Feb 2014
A LOWER BOUND FOR GENERALIZED DOMINATING NUMBERS arxiv:1401.7948v2 [math.lo] 13 Feb 2014 DAN HATHAWAY Abstract. We show that when κ and λ are infinite cardinals satisfying λ κ = λ, the cofinality of the
More informationComputing Unsatisfiable k-sat Instances with Few Occurrences per Variable
Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Shlomo Hoory and Stefan Szeider Department of Computer Science, University of Toronto, shlomoh,szeider@cs.toronto.edu Abstract.
More informationClassifying Descents According to Parity
Classifying Descents According to Parity arxiv:math/0508570v1 [math.co] 29 Aug 2005 Sergey Kitaev Reyjaví University Ofanleiti 2 IS-103 Reyjaví, Iceland sergey@ru.is Jeffrey Remmel Department of Mathematics
More informationADDING A LOT OF COHEN REALS BY ADDING A FEW II. 1. Introduction
ADDING A LOT OF COHEN REALS BY ADDING A FEW II MOTI GITIK AND MOHAMMAD GOLSHANI Abstract. We study pairs (V, V 1 ), V V 1, of models of ZF C such that adding κ many Cohen reals over V 1 adds λ many Cohen
More informationNOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE INTRODUCTION 1. FIBONACCI TREES
0#0# NOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE Shizuoka University, Hamamatsu, 432, Japan (Submitted February 1982) INTRODUCTION Continuing a previous paper [3], some new observations
More informationTABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC
TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC THOMAS BOLANDER AND TORBEN BRAÜNER Abstract. Hybrid logics are a principled generalization of both modal logics and description logics. It is well-known
More informationWada s Representations of the. Pure Braid Group of High Degree
Theoretical Mathematics & Applications, vol2, no1, 2012, 117-125 ISSN: 1792-9687 (print), 1792-9709 (online) International Scientific Press, 2012 Wada s Representations of the Pure Braid Group of High
More informationGeneralising the weak compactness of ω
Generalising the weak compactness of ω Andrew Brooke-Taylor Generalised Baire Spaces Masterclass Royal Netherlands Academy of Arts and Sciences 22 August 2018 Andrew Brooke-Taylor Generalising the weak
More informationEpimorphisms and Ideals of Distributive Nearlattices
Annals of Pure and Applied Mathematics Vol. 18, No. 2, 2018,175-179 ISSN: 2279-087X (P), 2279-0888(online) Published on 9 November 2018 www.researchmathsci.org DOI: http://dx.doi.org/10.22457/apam.v18n2a5
More informationThe reverse self-dual serial cost-sharing rule M. Josune Albizuri, Henar Díez and Amaia de Sarachu. April 17, 2012
The reverse self-dual serial cost-sharing rule M. Josune Albizuri, Henar Díez and Amaia de Sarachu April 17, 01 Abstract. In this study we define a cost sharing rule for cost sharing problems. This rule
More informationOutside nested decompositions and Schur function determinants. Emma Yu Jin
Outside nested decompositions and Schur function determinants Emma Yu Jin Technische Universität Wien 77th SLC, Strobl September 12, 2016 1 2 (Semi)standard Young tableaux (Semi)standard Young tableaux
More informationarxiv: v1 [math.lo] 24 Feb 2014
Residuated Basic Logic II. Interpolation, Decidability and Embedding Minghui Ma 1 and Zhe Lin 2 arxiv:1404.7401v1 [math.lo] 24 Feb 2014 1 Institute for Logic and Intelligence, Southwest University, Beibei
More informationTHE TRAVELING SALESMAN PROBLEM FOR MOVING POINTS ON A LINE
THE TRAVELING SALESMAN PROBLEM FOR MOVING POINTS ON A LINE GÜNTER ROTE Abstract. A salesperson wants to visit each of n objects that move on a line at given constant speeds in the shortest possible time,
More informationMaximum Contiguous Subsequences
Chapter 8 Maximum Contiguous Subsequences In this chapter, we consider a well-know problem and apply the algorithm-design techniques that we have learned thus far to this problem. While applying these
More informationNotes on Natural Logic
Notes on Natural Logic Notes for PHIL370 Eric Pacuit November 16, 2012 1 Preliminaries: Trees A tree is a structure T = (T, E), where T is a nonempty set whose elements are called nodes and E is a relation
More informationExtender based forcings, fresh sets and Aronszajn trees
Extender based forcings, fresh sets and Aronszajn trees Moti Gitik August 31, 2011 Abstract Extender based forcings are studied with respect of adding branches to Aronszajn trees. We construct a model
More informationINTERVAL DISMANTLABLE LATTICES
INTERVAL DISMANTLABLE LATTICES KIRA ADARICHEVA, JENNIFER HYNDMAN, STEFFEN LEMPP, AND J. B. NATION Abstract. A finite lattice is interval dismantlable if it can be partitioned into an ideal and a filter,
More informationA class of coherent risk measures based on one-sided moments
A class of coherent risk measures based on one-sided moments T. Fischer Darmstadt University of Technology November 11, 2003 Abstract This brief paper explains how to obtain upper boundaries of shortfall
More informationStructural Induction
Structural Induction Jason Filippou CMSC250 @ UMCP 07-05-2016 Jason Filippou (CMSC250 @ UMCP) Structural Induction 07-05-2016 1 / 26 Outline 1 Recursively defined structures 2 Proofs Binary Trees Jason
More informationTHE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET
THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET MICHAEL PINSKER Abstract. We calculate the number of unary clones (submonoids of the full transformation monoid) containing the
More informationTheorem 1.3. Every finite lattice has a congruence-preserving embedding to a finite atomistic lattice.
CONGRUENCE-PRESERVING EXTENSIONS OF FINITE LATTICES TO SEMIMODULAR LATTICES G. GRÄTZER AND E.T. SCHMIDT Abstract. We prove that every finite lattice hasa congruence-preserving extension to a finite semimodular
More informationA Translation of Intersection and Union Types
A Translation of Intersection and Union Types for the λ µ-calculus Kentaro Kikuchi RIEC, Tohoku University kentaro@nue.riec.tohoku.ac.jp Takafumi Sakurai Department of Mathematics and Informatics, Chiba
More informationBINOMIAL TRANSFORMS OF QUADRAPELL SEQUENCES AND QUADRAPELL MATRIX SEQUENCES
Journal of Science and Arts Year 17, No. 1(38), pp. 69-80, 2017 ORIGINAL PAPER BINOMIAL TRANSFORMS OF QUADRAPELL SEQUENCES AND QUADRAPELL MATRIX SEQUENCES CAN KIZILATEŞ 1, NAIM TUGLU 2, BAYRAM ÇEKİM 2
More informationThe Turing Definability of the Relation of Computably Enumerable In. S. Barry Cooper
The Turing Definability of the Relation of Computably Enumerable In S. Barry Cooper Computability Theory Seminar University of Leeds Winter, 1999 2000 1. The big picture Turing definability/invariance
More informationCTL Model Checking. Goal Method for proving M sat σ, where M is a Kripke structure and σ is a CTL formula. Approach Model checking!
CMSC 630 March 13, 2007 1 CTL Model Checking Goal Method for proving M sat σ, where M is a Kripke structure and σ is a CTL formula. Approach Model checking! Mathematically, M is a model of σ if s I = M
More informationTHE IRREDUCIBILITY OF CERTAIN PURE-CYCLE HURWITZ SPACES
THE IRREDUCIBILITY OF CERTAIN PURE-CYCLE HURWITZ SPACES FU LIU AND BRIAN OSSERMAN Abstract. We study pure-cycle Hurwitz spaces, parametrizing covers of the projective line having only one ramified point
More informationIntroduction to Probability Theory and Stochastic Processes for Finance Lecture Notes
Introduction to Probability Theory and Stochastic Processes for Finance Lecture Notes Fabio Trojani Department of Economics, University of St. Gallen, Switzerland Correspondence address: Fabio Trojani,
More informationA construction of short sequences containing all permutations of a set as subsequences Radomirovi, Saša
University of Dundee A construction of short sequences containing all permutations of a set as subsequences Radomirovi, Saša Published in: Electronic Journal of Combinatorics Publication date: 2012 Document
More informationThe equivariant volumes of the permutahedron
The equivariant volumes of the permutahedron Federico Ardila Anna Schindler Andrés R. Vindas-Meléndez Abstract We consider the action of the symmetric group S n on the permutahedron Π n. We prove that
More informationEquivalence between Semimartingales and Itô Processes
International Journal of Mathematical Analysis Vol. 9, 215, no. 16, 787-791 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/1.12988/ijma.215.411358 Equivalence between Semimartingales and Itô Processes
More informationCharacterizing large cardinals in terms of layered partial orders
Characterizing large cardinals in terms of layered partial orders Philipp Moritz Lücke Joint work with Sean D. Cox (VCU Richmond) Mathematisches Institut Rheinische Friedrich-Wilhelms-Universität Bonn
More informationMore On λ κ closed sets in generalized topological spaces
Journal of Algorithms and Computation journal homepage: http://jac.ut.ac.ir More On λ κ closed sets in generalized topological spaces R. Jamunarani, 1, P. Jeyanthi 2 and M. Velrajan 3 1,2 Research Center,
More informationCONSTRUCTION OF CODES BY LATTICE VALUED FUZZY SETS. 1. Introduction. Novi Sad J. Math. Vol. 35, No. 2, 2005,
Novi Sad J. Math. Vol. 35, No. 2, 2005, 155-160 CONSTRUCTION OF CODES BY LATTICE VALUED FUZZY SETS Mališa Žižović 1, Vera Lazarević 2 Abstract. To every finite lattice L, one can associate a binary blockcode,
More informationRises in forests of binary shrubs
Discrete Mathematics and Theoretical Computer Science DMTCS vol. 9:, 07, #5 Rises in forests of binary shrubs Jeffrey Remmel Sainan Zheng arxiv:6.0908v4 [math.co] 8 Jul 07 Department of Mathematics, University
More informationYao s Minimax Principle
Complexity of algorithms The complexity of an algorithm is usually measured with respect to the size of the input, where size may for example refer to the length of a binary word describing the input,
More informationFinding Equilibria in Games of No Chance
Finding Equilibria in Games of No Chance Kristoffer Arnsfelt Hansen, Peter Bro Miltersen, and Troels Bjerre Sørensen Department of Computer Science, University of Aarhus, Denmark {arnsfelt,bromille,trold}@daimi.au.dk
More informationLaurence Boxer and Ismet KARACA
SOME PROPERTIES OF DIGITAL COVERING SPACES Laurence Boxer and Ismet KARACA Abstract. In this paper we study digital versions of some properties of covering spaces from algebraic topology. We correct and
More informationTWO-PERIODIC TERNARY RECURRENCES AND THEIR BINET-FORMULA 1. INTRODUCTION
TWO-PERIODIC TERNARY RECURRENCES AND THEIR BINET-FORMULA M. ALP, N. IRMAK and L. SZALAY Abstract. The properties of k-periodic binary recurrences have been discussed by several authors. In this paper,
More informationChain conditions, layered partial orders and weak compactness
Chain conditions, layered partial orders and weak compactness Philipp Moritz Lücke Joint work with Sean D. Cox (VCU Richmond) Mathematisches Institut Rheinische Friedrich-Wilhelms-Universität Bonn http://www.math.uni-bonn.de/people/pluecke/
More informationEquivalence Nucleolus for Partition Function Games
Equivalence Nucleolus for Partition Function Games Rajeev R Tripathi and R K Amit Department of Management Studies Indian Institute of Technology Madras, Chennai 600036 Abstract In coalitional game theory,
More informationHierarchical Exchange Rules and the Core in. Indivisible Objects Allocation
Hierarchical Exchange Rules and the Core in Indivisible Objects Allocation Qianfeng Tang and Yongchao Zhang January 8, 2016 Abstract We study the allocation of indivisible objects under the general endowment
More informationTHE LYING ORACLE GAME WITH A BIASED COIN
Applied Probability Trust (13 July 2009 THE LYING ORACLE GAME WITH A BIASED COIN ROBB KOETHER, Hampden-Sydney College MARCUS PENDERGRASS, Hampden-Sydney College JOHN OSOINACH, Millsaps College Abstract
More informationGame Theory: Normal Form Games
Game Theory: Normal Form Games Michael Levet June 23, 2016 1 Introduction Game Theory is a mathematical field that studies how rational agents make decisions in both competitive and cooperative situations.
More informationSome Remarks on Finitely Quasi-injective Modules
EUROPEAN JOURNAL OF PURE AND APPLIED MATHEMATICS Vol. 6, No. 2, 2013, 119-125 ISSN 1307-5543 www.ejpam.com Some Remarks on Finitely Quasi-injective Modules Zhu Zhanmin Department of Mathematics, Jiaxing
More informationA Learning Theory of Ranking Aggregation
A Learning Theory of Ranking Aggregation France/Japan Machine Learning Workshop Anna Korba, Stephan Clémençon, Eric Sibony November 14, 2017 Télécom ParisTech Outline 1. The Ranking Aggregation Problem
More informationThreshold logic proof systems
Threshold logic proof systems Samuel Buss Peter Clote May 19, 1995 In this note, we show the intersimulation of three threshold logics within a polynomial size and constant depth factor. The logics are
More informationInterpolation of κ-compactness and PCF
Comment.Math.Univ.Carolin. 50,2(2009) 315 320 315 Interpolation of κ-compactness and PCF István Juhász, Zoltán Szentmiklóssy Abstract. We call a topological space κ-compact if every subset of size κ has
More informationThe Limiting Distribution for the Number of Symbol Comparisons Used by QuickSort is Nondegenerate (Extended Abstract)
The Limiting Distribution for the Number of Symbol Comparisons Used by QuickSort is Nondegenerate (Extended Abstract) Patrick Bindjeme 1 James Allen Fill 1 1 Department of Applied Mathematics Statistics,
More informationOn Forchheimer s Model of Dominant Firm Price Leadership
On Forchheimer s Model of Dominant Firm Price Leadership Attila Tasnádi Department of Mathematics, Budapest University of Economic Sciences and Public Administration, H-1093 Budapest, Fővám tér 8, Hungary
More informationInterpolation. 1 What is interpolation? 2 Why are we interested in this?
Interpolation 1 What is interpolation? For a certain function f (x we know only the values y 1 = f (x 1,,y n = f (x n For a point x different from x 1,,x n we would then like to approximate f ( x using
More informationAlain Hertz 1 and Sacha Varone 2. Introduction A NOTE ON TREE REALIZATIONS OF MATRICES. RAIRO Operations Research Will be set by the publisher
RAIRO Operations Research Will be set by the publisher A NOTE ON TREE REALIZATIONS OF MATRICES Alain Hertz and Sacha Varone 2 Abstract It is well known that each tree metric M has a unique realization
More informationContinuous images of closed sets in generalized Baire spaces ESI Workshop: Forcing and Large Cardinals
Continuous images of closed sets in generalized Baire spaces ESI Workshop: Forcing and Large Cardinals Philipp Moritz Lücke (joint work with Philipp Schlicht) Mathematisches Institut, Rheinische Friedrich-Wilhelms-Universität
More informationFuzzy L-Quotient Ideals
International Journal of Fuzzy Mathematics and Systems. ISSN 2248-9940 Volume 3, Number 3 (2013), pp. 179-187 Research India Publications http://www.ripublication.com Fuzzy L-Quotient Ideals M. Mullai
More information4: SINGLE-PERIOD MARKET MODELS
4: SINGLE-PERIOD MARKET MODELS Marek Rutkowski School of Mathematics and Statistics University of Sydney Semester 2, 2016 M. Rutkowski (USydney) Slides 4: Single-Period Market Models 1 / 87 General Single-Period
More informationMechanism Design and Auctions
Mechanism Design and Auctions Game Theory Algorithmic Game Theory 1 TOC Mechanism Design Basics Myerson s Lemma Revenue-Maximizing Auctions Near-Optimal Auctions Multi-Parameter Mechanism Design and the
More informationCatalan functions and k-schur positivity
Catalan functions and k-schur positivity Jonah Blasiak Drexel University joint work with Jennifer Morse, Anna Pun, and Dan Summers April 2018 Strengthened Macdonald positivity conjecture Theorem (Haiman)
More informationLecture 2: The Simple Story of 2-SAT
0510-7410: Topics in Algorithms - Random Satisfiability March 04, 2014 Lecture 2: The Simple Story of 2-SAT Lecturer: Benny Applebaum Scribe(s): Mor Baruch 1 Lecture Outline In this talk we will show that
More information