Centrosymmetric words avoiding 3-letter permutation patterns
|
|
- Albert Rodgers
- 5 years ago
- Views:
Transcription
1 Centrosymmetric words avoiding 3-letter permutation patterns Luca S. Ferrari Dipartimento di Matematica, Università di Bologna Piazza di Porta San Donato, Bologna, Italy Mathematics Subject Classification: 05A05, 05A5 Abstract A word is centrosymmetric if it is invariant under the reverse-complement map. In this paper, we give enumerative results on k-ary centrosymmetric words of length n avoiding a pattern of length 3 with no repeated letters. Introduction Asequenceofpositiveintegers... n (for instance, a permutation or a word) is said to avoid a pattern =... s if it does not contain any subsequence i i... i s which is order isomorphic to. In the last two decades, the study of pattern avoidance has interested several research fields in combinatorics: many results have been found on permutations, which is still the most advanced area, and a considerable work has been made on words since 998. Burstein [4] gave for the first time an explicit formula for the number of words avoiding asetofpermutationpatternsins 3 ; later, Burstein and Mansour [5] extended the results to patterns with repeated letters. Many improvement and generalizations have been made in the last years. In 006 Firro and Mansour [7] presented a new method, the scanning-element algorithm (that we exploit in Section 5) to obtain an easier proof of Burstein s results for the pattern 3; in the same year, Mansour [] applied the block decomposition method for the pattern 3. Brändén and Mansour [3] used finite automata theory to give a combinatorial explanation for the number of words avoiding patterns of length three; furthermore, Jelínek and Mansour [9] determined all the Wilf-equivalence classes of subsequence patterns of length at most six. In this paper, we focus on centrosymmetric words, namely, words that are invariant under the reverse-complement map, or, equivalently, whose corresponding tableaux via the Robinson-Schensted-Knuth algorithm are invariant under Schützenberger s involution (see [8], [0] and [3] for more details). We find the generating functions for the number
2 ! Figure. The words 8387 W 5,8, 6465 W 5,{,4,5,6,8} and 553 W 5,6 are all order isomorphic. Their common renormalization, as well as the representative of their equivalence class, is 443 W 5,4. of centrosymmetric words avoiding a pattern of length 3 with no repeated letters, and, for the pattern 3, even the explicit formulae. In the special case of centrosymmetric surjective words, we also reobtain some of the results described in Egge s paper [6]. Preliminaries Definition. A word of length n over a k-letter alphabet (also said a k-ary word of length n, oraword of type (n, k)) is any map : {,,...,n}!a k, where A k is a set of positive integers such that A k = k. We denote the set of all words of length n over A k by W n,ak ;inparticular,whena k = {,,...,k} we use the symbol W n,k instead of W n,{,,...,k}. A word in W n,ak will be represented either by the one-line notation... n, or by the usual graphical representation, as in figure (). Definition. Let W n be the set of all words of length n: W n = [ k W n,ak. We say that two words, W n are order isomorphic if, for every apple a, b apple n, we have a b () a b for any relation {<, =,>}.
3 Figure. The word W 8,7 is centrosymmetric while W 8,7 is not (figures above). Moreover, two words containing the same letters can be or not centrosymmetric depending on the alphabet: the word W 7,7 is centrosymmetric while W 7,8 is not (figures below). Roughly speaking, two words are order isomorphic if and only if, ignoring the row numbering, their graphical representations are identical, or, alternatively, one can be obtained from the other by erasing or adding a certain number of empty rows. Observe that each word in a given equivalence class of order isomorphic words contains the same number d of di erent letters. Hence, it is natural to give the following definition. Definition.3 Given a word W n containing exactly d di erent letters, we call renormalization of the only word ( ) W n,d which is order isomorphic to. This word will also be taken as the representative of the equivalence class that contains. Definition.4 A word W n,ak is said to contain a pattern W s,t, where s apple n and t apple k, if there exist indices apple i apple applei s apple n such that the subsequence i... i s is order isomorphic to =... s. Otherwise, is said to avoid. For example, the word 3536 avoids the pattern 3 but contains, since the subsequence 336 is order isomorphic to. We denote the set of words in W n,ak which avoid by the symbol W n,ak ( ). Definition.5 A word W n,k is centrosymmetric if, for every i =,,...,n, i + n+ i = k +. In this case, we say that i is the conjugate letter of n+ i. 3
4 Figure 3. The centrosymmetric word C 6,{,3,5,8,9,}. We denote the set of centrosymmetric words of length n over the alphabet {,,...,k} by the symbol C n,k. Needless to say, a word is centrosymmetric if and only if its graphical representation is symmetric with respect to the center of the grid (see figure ). Observe that there are no centrosymmetric words with n odd and k even, since in this case there is no type (n, k) thatsatisfies (n+)/ = k +. Inall theother cases, the number of k-ary centrosymmetric words of length n is C n,k = k b n c. We need the following generalization of centrosymmetry. Definition.6 Let A k = {a,a,...,a k } be a k-letter alphabet, with a <a < <a k, and let =... n W n,ak, with i = a j(i) for every i =,...,n. The word is said to be centrosymmetric if, for every i =,...,n, j(i)+j(n + i) =k +. We denote the set of centrosymmetric words in W n,ak by the symbol C n,ak. 3 Symmetries Definition 3. We call reverse and complement, respectively, the transformations 7 7 r : W n,k! W n,k c: W n,k! W n,k! r! c such that ( r ) i = n+ i and ( c ) i = k + i. The transformations r and c generate the group G = hr, ci = {id, r, c, rc}, whichis isomorphic to the group of symmetries of a rectangle D 4 (the dihedral group). The action of G on W n,k allows us to state that, for every W n,k, W s,t and ' G avoids () '( )avoids'( ). Hence, in order to find the cardinality of C n,k ( ) foreverypermutationpattern of length three it is su cient to study the sets C n,k (3) and C n,k (3). 4
5 We finally remark that centrosymmetric words are exactly those words which are invariant under the reverse-complement (rc) operation. Then, for every C n,k, avoids () avoids rc and hence C n,k ( ) = C n,k ( rc ) = C n,k (, rc ). () 4 Surjective words From definition (.), it is natural to define a surjective word of length n over a k-letter alphabet A k to be a surjective map : {,,...,n}!a k. In other terms, a surjective word is a word in W n,ak which contains all the letters of its alphabet. We denote the set of surjective words in W n,ak by S n,ak,andthesetofcentrosymmetricsurjectivewordsin W n,ak by CS n,ak. As usual, when A k = {,,...,k}, we use the symbols S n,k and CS n,k, respectively. Obviously, S n,ak 6=? if and only if n k. We also observe that the set S n of permutations of length n can be seen as the set S n,n of surjective words with length equal to the cardinality of the alphabet. Now, we focus on centrosymmetric words. Let c n,k be the number of centrosymmetric words of type (n, k) andcs n,k the number of centrosymmetric surjective words of the same type: c n,k = C n,k, cs n,k = CS n,k. Proposition 4. For m, h (i) c m,h = (ii) c m,h+ = the following relations hold: h i= (iii) c m+,h+ = h cs m,i i h i= h cs m,i + i h i=0 h i=0 h cs m+,i+ i h cs m,i+ i Proof. Let d be the number of distinct letters contained in a fixed word C n,k, and consider the graphical representation. In case (i) and (iii), is obtained from its renormalization ( ) CS n,d,whichhasthesametypeparitiesof,byaddingasuitable number (possibly zero) of pairs of empty rows, and relabelling the alphabet letters from tok. Topreservecentrosymmetry,everypairconsistsoftworowsinsertedatthesame distance from the center. In the remaining case (ii), the renormalization ( ) CS n,d of an even-odd centrosymmetric word (i.e. a word with even length over an odd cardinality alphabet) can either be even-even, or even-odd. In both cases, to obtain from ( )we have to add again some pairs of empty rows, while in the first case a further central empty row is needed. 5 ()
6 ! Figure 4. Two words in C 6,7 obtained from their renormalizations by adding the central row and another pair (figure above) or two pairs of rows (figure below).! By definition, a word contains a given pattern whenever its renormalization ( ) contains. This implies that relations () hold also for restricted words. Hence, to get the desired enumeration of C n,k ( ) it is su cient to obtain the number CS n,k ( ) of centrosymmetric surjective words avoiding, andthenuse(). Obviously, the same can be done for the related generating functions. Define and let c n,k = C n,k ( ) and cs n,k = CS n,k ( ), C (x, y) = n 0 cn,k x n y k be the ordinary generating function for the number of centrosymmetric words avoiding the pattern. Definingtheseries C ee(x, y) = n 0 n even C eo(x, y) = n 0 n even C oo(x, y) = n 0 n odd k even k odd k odd c n,k x n y k, CS ee(x, y) = n 0 n even c n,k x n y k, CS eo(x, y) = n 0 n even c n,k x n y k, CS oo(x, y) = n 0 n odd k even k odd k odd cs n,k x n y k, cs n,k x n y k, cs n,k x n y k, (3) 6
7 by inverse binomial transform (see e.g. [4]), relations () imply that the following relations hold:! Cee(x, y) = y CS y ee x, p, y! C eo(x, y) = y y CS ee x, C oo(x, y) = y p y + p y CS oo x, p y CS eo x,! y p. y! y p y y y, Hence, since C (x, y) =Cee(x, y)+ceo(x, y)+coo(x, y), we finally obtain that!! C (x, y) = y CS ee y x, p + p CS y y y eo x, p + y + p CS y y oo x, p y! y y. (4) 5 The pattern 3 In order to compute the cardinality of the set CS n,k (3) we exploit the scanningelement algorithm, presented in [7]. Denote by csn,k,i 3 the number of centrosymmetric surjective words avoiding 3 and starting with the letter i. Ofcourse,wehave cs 3 n,k = k i= cs 3 n,k,i. Observe that a word CS n,k starting with such that apple apple k containsthe pattern 3. In fact, by surjectivity there exists a letter x such that the subsequence x n is a 3-pattern. Hence, the preceding formula reduces to k csn,k 3 = csn,k,i. 3 i=d k e Now, our first goal is to find a recurrence relation for the terms csn,k,i 3. In order to do this, we consider the number csn,k,i,j 3 (with n 4andk 3) of centrosymmetric surjective words, that avoid 3, with first letter i and second letter j. Bythepreceding considerations, we have cs 3 n,k,i = k j=d k e 7 cs 3 n,k,i,j. (5)
8 The case j = k holds only in some special cases, that we present in the next result. Theorem 5. For n 4 and k 3, if csn,k,i,j 3 holds: (i) k apple i<j= k, (ii) k i = j k, (iii) k i>j, k (iv) n is even, i = k and j = k (v) n and k are even, i = k + and j = k., 6=0then only one of the following cases Moreover, for each one of the preceding cases we have the following recurrences: (i) csn,k,i,j = csn,k,i + csn,k,i, (ii) csn,k,i,j 3 3 = csn,k,i, ( cs 3 (iii) csn,k,i,j 3 = n,k, k csn 3,k,j if i = k +, j = k 3 + csn,k,j otherwise and n, k are even, (iv) cs 3 n,k,d k e,d k e = ( cs 3 n,k, k cs 3 n,k, k (v) cs 3 3 = cs. n,k, k +, k n,k, k if n and k are even if n is even and k is odd, Proof. Let =... n be a word in CS n,k (3) with = i and = j, respectively. Recall that i k and j k. Suppose i<j. If j 6= k, surjectivity implies that the sequence ijk is a 3-pattern: hence, j = k. In this case, the symbol k in the second position of and its conjugate inthe(n )-th position cannot form any 3 pattern. Hence, the number csn,k,i,j 3 is completely determined by the subsequence = 3... n n, whosesymbolscan belong either to the alphabet {,...,k }, or{,...,k}. Obviously,inthefirstcasewe can renormalize, soitsfirstletterbecomesi anditsalphabet{,...,k }. All these considerations prove recurrence (i). The case i = j is quite simple: when has two identical starting letters, it avoids 3 if and only if its subword =... n does. Furthermore, surjectivity is preserved between and, andhencerecurrence(ii) isproved. Now, suppose that i>j. In this case, the only fact that there is no 3-pattern with first letter j implies that no 3-pattern with first letter i occurs. The same is true for the conjugates of i and j, andhencethenumbercsn,k,i,j 3 is completely determined by the subword = 3... n. To preserve surjectivity, may either be over the alphabet {,...,k} r {, n}, or{,...,k}. Thisleadstothesecondrecurrenceof(iii). Observe 8
9 that, for particular values of i and j only one of the alphabets holds. In the even-even case, if i = k +andj = k the subword can only be over {,...,k}: thisprovesthe first recurrence of (iii). The last case j = k holds if and only if i = k (with n even) or i = k + (with both n and k even), otherwise a 3-pattern occurs. For the same reason, there cannot be any letter equal to i or its conjugate in the subword, hencethe only {,...,k} r {, n} alphabet is allowed for. Thisyieldsrecurrences(iv) and(v). Theorem (5.) and relation (5), for n 4, k 3(nand k not odd and even, respectively) and for every i such that k apple i apple k, yieldthefollowingrecurrencerelationfor csn,k,i 3 : csn,k,i 3 = cs cs n,k,d + cs k e n,k,i+ where and n,k,d k e + d k e+appleiapplek + i d k e+ j=d k e+ (cs3 n,k,i + cs 3 i A = n,k,i )+ (cs 3 n,k,i + cs 3 n,k,i )+ i=d k if A holds 0 otherwise 8 >< cs 3 if n and k are even n,k, k '(n, k) = 0 if n is even and k is odd >: if n and k are odd. cs 3 n,k, k Now, the base cases of the recurrence are needed. First of all, we set e '(n, k), (6) cs 3 0,0,0 =, cs 3 n,0,0 =0 and cs 3 0,k,i =0 (7) for every n, k andforeveryi such that apple i apple k. If k = or k = it is straightforward that csn,, 3 = 8 n, (8) n csn,, 3 = csn,, 3 if n, n even = (9) 0 if n, n odd. Moreover, we recall that, for every i, csn,k,i 3 =0ifk>n. Hence, the only remaining base cases necessary for the recurrence are cs 3 3,3, = cs 3 3,3, =0 and cs 3 3,3,3 =. Now we are ready to use the scanning-element algorithm. We will show its application only for the even-even case, since the remaining two cases can be treated analogously. First of all, we consider P 3 ee (x, y, v) = n 0 n even 9 k even cs 3 x n y k v k n,k, k.
10 Recurrence (6), for every n, k 4andfori = k,yields cs 3 n,k, k =cs 3 n,k, k +cs 3 n,k, k Hence, multiplying by x n y k v k, summing over all even n, k 4 and solving the resulting equation we get Pee 3 (x, y, v) = x x y v x x y v. (0) Now, define CS 3 n,k (v) = k cs 3 n,k,i v i. i= k and CS 3 ee (x, y, v) = n 0 n even k even k i= k cs 3 n,k,i x n y k v i = n 0 n even k even CS 3 n,k (v) x n y k. Multiplying recurrence (6) by v i and summing over all i from k to k we obtain CSn,k 3(v) = v v Observe that cs 3 n,k,k = CS 3 n v k+ 3 CSn v,k() + v 3 CSn,k v (v),k(v) v k+ 3 CSn,k v () + cs 3 v k n,k, k csn 3,k,k v k. k cs 3 n 4,k,i + k () cs 3 n 4,k,i = CS 3 n 4,k() + CS 3 n 4,k (). () i= k i= k Substituting () in (), multiplying () by x n y v k and summing over all possible even n, k 4weget v x y v x v( v) vx vx y = v v where and obviously x 4 CSee x, 3 y v,v = x 4 y CS 3 ee (x, y, ) + x y v Pee 3 x, y v,v (0) = v x v x y v x v x y CS 3 ee (x, y, ) = CSee 3 (x, y). 0 Pee x, 3 y v,v +(x ), (3)
11 Now, we apply the kernel method (for further details and examples, see [] and []). The coe cient of CSee 3 x, y,v in (3) vanishes for v where v ± (x, y) = x ± p (x, y), ( x ) (x, y) = 4x ( x )( + y ). Hence, substituting v = v (x, y) in(3) andsolvingtheresultingequationwefinally obtain that CSee 3 (x, y) = y + p (x, y) ( + y ) p (x, y). (4) The same method, used for the even-odd and the odd-odd case, yields CSeo 3 (x, y) = y( p x )( (x, y)) ( x )( + y ) p (x, y) and (5) CS 3 oo (x, y) = y( p (x, y)) x( x )( + y ). (6) The desired generating function C 3 (x, y) isnowimmediatelyobtainedby(4): C 3 (x, y) = y y + y x( x) y( x y) p +y x x( x) p y p y x. Moreover, evaluating the coe cients of the series expansions of the generating functions (4), (5) and (6), we get the following explicit formulae for the number of surjective centrosymmetric words avoiding 3: cs 3 m,h = cs 3 m,h+ = cs 3 m+,h+ = m i=0 m i= m i=0 i i ( ) m i i m i i m ( ) m i ( ) m i i + i, h m, h, i, m i h m, h 0, i i i, i m i h m 0, h 0. As already observed, the set S n,n corresponds to the set S n of permutations of length n. We recall that, as Egge already proved in [6] (Theorems. and.7), centrosymmetric permutations avoiding 3 are counted by the central binomial coe cients and the Catalan numbers, according to the parity of their length (for a bijective proof, see also []). We submit that this result can be reobtained from the preceding formulae by setting m = h in the first and last of (7). (7)
12 Now, using relations () we finally obtain the formulae for the number of centrosymmetric words avoiding 3: c 3 m,h = c 3 m,h+ = c 3 m+,h+ = m i=0 m i= m i=0 i i ( ) m i i m i ( ) m i m +h i i ( ) m i i + i i i + h h i i + h i m i h i i + h m i h, m, h,, m, h 0,, m 0, h 0. (8) 6 The pattern 3 Theorem 6. A word W n,k, with n, k 6, n and k not odd and even respectively, is a centrosymmetric surjective word that avoids 3 if and only if is of one of the following types: (i) = k, where is a centrosymmetric surjective word of length n, that avoids 3, either over the alphabet {,...,k }, or {,...,k}; (ii) = 0, where (a) =... j is a binary word over the alphabet {k,k}, with = k and j = k, such that it is the longest prefix of of this kind; (b) is a (possibly empty) centrosymmetric surjective word, that avoids 3, either over the alphabet {3,...,k }, or {,...,k }; (c) 0 = ( ) rc ; (iii) = 0, where (a) =... j is a surjective weakly increasing word over the alphabet {,..., j}, with k +apple apple k and j = k, such that it is the longest prefix of of this kind; (b) is a (possibly empty) centrosymmetric surjective word, that avoids 3, either over the alphabet {k+,..., } (if > k +), or {k+,..., }; (c) 0 = ( ) rc ; (iv) is a weakly increasing centrosymmetric surjective word over the alphabet {,...,k}. Proof. It is easily checked that a word either of type (i), (ii), (iii) or(iv) isacentrosymmetric surjective word that avoids 3. To prove the converse, let =... n be a centrosymmetric surjective word over the alphabet {,...,k} and avoiding 3. First
13 (a) Type (i) (b) Type (ii) (c) Type (iii) (d) Type (iv) Figure 5. Some examples of the four types of words descripted in Theorem (6.). 3
14 of all, observe that we can t have apple apple k,otherwise n = k + and hence the sequence k n would be an occurrence of 3. Therefore, we analyse the remaining cases for. (i) If = k then, by centrosymmetry, we have n =. Hence, the subword 3... n is a surjective word either over the alphabet {,...,k } or {,...,k} that avoids 3. (ii) If = k, let j be the rightmost position such that j = k. Then, the prefix =... j contains only the letters k andk: otherwise,itwouldcontainan occurrence of the pattern 3, and hence, by centrosymmetry, would contain the pattern 3. It is immediately checked that j apple n and that = 0,where 0 = ( ) rc and, if j 6= n, is a centrosymmetric surjective word either over the alphabet {3,...,k }, or{,...,k }. Ifj = n, is necessarily the empty word. (iii) If k +apple apple k, then is necessarily the first letter of a weakly increasing subword =... j, wherej apple n is the rightmost position such that j = k. If not, would contain a pattern that yields a 3 by the surjectivity of.moreover, in order to avoid both 3 and 3 (see relation ()), we have i apple for every i>j. Hence, = 0 0,where = ( ) rc and, if j 6= n, is a centrosymmetric surjective word, that avoids 3, either over the alphabet {k +,..., } (if k + apple, i.e. > k +), or {k +,..., }. As in the previous case, if j = n, is necessarily the empty word. (iv) If =then n = k, so,inordertoavoidboth3and3,thesubword... n cannot contain any pattern. Therefore, is weakly increasing. Theorem (6.) allows us to determine a recurrence relation for the number csn,k 3 of k-ary centrosymmetric surjective words of length n that avoid 3. In order to do this, it is convenient to analyse the first values of n and k. We recall that csn,k 3 =0ifn is odd and k is even, and we set cs 3 0,0 =, cs 3 n,0 =0 and cs 3 0,k =0 8n, k. For k =ork =,wehave cs 3 n, = 8 n, (9) n csn, 3 if n, n even = (0) 0 if n, n odd. If k =3andn 3, a word CS n,3 (3) can be either of type (i), (ii) or(iv) of Theorem (6.). If is of type (i) thenitscentralsubword belongs either to CS n,3 (3), or CS n, (3); then, there are csn 3,3 +ofsuchwords. 4
15 If is of type (ii) thenthecentralsubwordisnecessarily =..., so we have b n c n = b n c n = of such words. It is easily checked that there are n words Hence, the preceding considerations lead to the recurrence csn,3 3 = csn 3,3 + b l n c n m +, of type (iv). which yields cs 3 n,3 = 8 >< >: n + n if n is even n + n + n 3 if n is odd. If n, k 4, denote by csn,k (i), csn,k (ii), csn,k (iii) and csn,k (iv) the number of elements of CS n,k (3) of type (i), (ii), (iii) and(iv), respectively (see Theorem 6.). Of course, we have cs 3 n,k = cs 3 n,k (i) + cs 3 n,k (ii) + cs 3 n,k (iii) + cs 3 n,k (iv). We deduce a recurrence formula for each one of the sequences cs 3 n,k ( ). (i) It is immediately verified that cs 3 n,k (i) = cs 3 n,k + cs 3 n,k. (ii) Fix the length n of the subword. There are n of such subwords, and each one matches with csn 3 3 n,k + csn n,k 4 surjective subwords. Hence, cs 3 n,k (ii) = b n c n = n csn 3 n,k + csn 3 n,k 4. (iii) Of course, csn,k 3 (iii) 6=0ifandonlyifn 6andk 5. Fix the length n and the number of symbols k of the subword. We have 3 apple n apple n and 3 apple k apple min{n, k }.Thereare n of such subwords, and each of them n k is associated with: csn 3 3 n,k k + + csn n,k k subwords, ifk 6andk apple k the only subword = k+ k+ k+ 5 ; k+,ifk 5isoddandk =.
16 Hence, for n while, for n, k 6, cs 3 n,k (iii) = = 6andk =5,wehavek =3andthen b n c n =3 cs 3 n,5(iii) = min{n,b k c} k =3 c k+ b n c n =3 n n k n n 3 n = 3, cs 3 n n,k k + + cs 3 n n,k k b n n + (k odd) n k = n =d k e b n c min{n,b k c} n csn 3 n,k k + + csn 3 n,k k n k n =3 k =3 n + (k odd). (iv) The number of weakly increasing centrosymmetric surjective words is trivially n csn,k 3 (iv) = k. Hence, for n, k 4, we conclude that b n c csn,k 3 = csn 3,k + csn 3,k + b n c + (n 6^k 6) n = min{n,b k c} n n k n =3 k =3 n n + (k 5^kodd) + k. k+ n csn 3 n,k + csn 3 n,k 4 + cs 3 n n,k k + + cs 3 n n,k k Further computations in the special cases k =4andk =5yield 8 >< csn,5 3 = >: cs 3 n,4 = n + n n if n is even, n, n n 4 + n4 +4n 3 00n 08n (n +7) n 5 + n4 58n 384n if n is even, n if n is odd, n
17 n/ Table. The first values for csn,k 3. The values for 6 apple k apple n apple 9 have been computed directly. Routine calculations yield the following recurrence. Formula 6. The number csn,k 3 of k-ary centrosymmetric surjective words of length n that avoid 3, with n 0 and k 6, is given by the following recurrence relation: cs 3 n,k = 6cs 3 n,k +cs 3 n,k 4cs 3 n 4,k 9cs 3 n 4,k +6csn 3 6,k+ 5cs 3 n 6,k + cs 3 n 6,k 4 9cs 3 n 8,k cs 3 n 8,k cs 3 n 8,k 4+ cs 3 n 0,k +3cs 3 n 0,k cs 3 n 0,k 6. Multiplying the above equation by x n y k,summingoverallevenn and k (with n 0 and k 6) and solving the resulting equation we obtain that CS 3 ee (x, y) = Similarly, CS 3 eo (x, y) = and 6x +4x 4 6x 6 +9x 8 x 0 + +x 4 y 3x 6 y +3x 8 y x 0 y x 6 y 4 + x 8 y 4 + x 0 y 4 ( x + x 4 + x 4 y )( 4x +5x 4 x 6 x y +4x 4 y x 6 y + x 6 y 4 ). () x y ( + x y 5x +9x 4 x 4 y 7x 6 +x 8 x 8 y 4 + x 8 y ) ( x + x 4 + x 4 y )( 4x +5x 4 x 6 x y +4x 4 y x 6 y + x 6 y 4 ) () CS 3 oo (x, y) = xy ( 3x +x 4 ) 4x +5x 4 x 6 x y +4x 4 y x 6 y + x 6 y 4. (3) Even in this case, in the series expansions of () and (3) the coe cients of the monomials associated to words of length equal to their alphabet cardinality agree with Egge s result (see [6]). Hence, for every m 0wehave cs 3 m,m = m and cs 3 m+,m+ = m. 7
18 Using relation (4), we finally obtain that the generating function for the number of centrosymmetric words that avoid 3 is the rational function C 3 (x, y) = (x, y) (x, y), where (x, y) = and (x, y) = 6x 6 x 0 +8x 4 y 3 5x 4 y 7x 6 y 3 +9x 8 6x 4x 4 y +4x 4 + xy +45x 6 y +8x y 3y 43x 6 y 4 4x 8 y +x 8 y 4 +5x 0 y 3x 0 y 4 7x 7 y 8x y 4 +3y 4 +40x 4 y 4 8x 5 y 7 +5x 3 y 7 xy 7 +4x 7 y 7 +3xy 5 +5x 5 y 5 5x 3 y 5 4x 9 y 3 +x 9 y 5 +5x 3 y 3 3xy 3 5x 7 y 5 +9x 5 y +8x 7 y 3 +x 9 y 5x 3 y 6x 5 y 3 3x 4 y 6 7x 8 y 6 +6x y 6 y 6 3x 0 y 3 x y 3 +7x 6 y 5 +3x 8 y 3 + x 6 y 7 6x 8 y 5 x y 5 x 4 y 5 x 4 y 7 +x y 7 +4x 6 y 6 +9x 6 y 7x 8 y + x y +x 0 y ( y )( x + x 4 +x y y ) ( x 6 +3x 6 y 6x 4 y + x 4 y 4 +5x 4 +6x y x y 4 4x + y 4 y ). References [] M. Barnabei, F. Bonetti and M. Silimbani, The Eulerian numbers on restricted centrosymmetric permutations, Pure Mathematics and Applications, :99-8, 00. [] C. Banderier, M. Bousquet-Mélou, A. Denise, P. Flajolet, D. Gardy and D. Gouyou- Beauchamps, Generating functions for generating trees, DiscreteMathematics,46(- 3):9-55, 00. [3] P. Brändén and T. Mansour, Finite automata and pattern avoidance in words, Journal of Combinatorial Theory, Series A, 0():7-45, 005. [4] A. Burstein, Enumeration of words with forbidden patterns, Ph.D. Thesis, University of Pennsylvania, 998. [5] A. Burstein and T. Mansour, Words restricted by patterns with at most distinct letters, Electronic Journal of Combinatorics, 9():#R3, 00/03. [6] E. S. Egge, Restricted symmetric permutations, Annals of Combinatorics, : , 007. [7] G. Firro and T. Mansour, Three-letter-pattern-avoiding permutations and functional equations, Electronic Journal of Combinatorics, 3():#R5,
19 [8] William Fulton, Young Tableaux, with Applications to Representation Theory and Geometry, Cambridge University Press, 997. [9] V. Jelínek and T. Mansour, Wilf-equivalence on k-ary words, compositions, and parking functions, Electronic Journal of Combinatorics, 6():#R58, 009. [0] D. E. Knuth, Permutations, matrices and generalized Young tableaux, Pacific Journal of Mathematics, 34:709-77, 970. [] T. Mansour, Restricted 3-avoiding k-ary words, Chebyshev polynomials, and continued fractions, Advances in Applied Mathematics, 36():75-93, 006. [] H. Prodinger, The kernel method: a collection of examples, SéminaireLotharingien de Combinatoire, 50:B50f, 004. [3] M. P. Schützenberger, Quelques remarques sur une construction de Schensted, Mathematica Scandinavica, :7-8, 963. [4] N. J. A. Sloane and S. Plou e, The Encyclopedia of Integer Sequences, Academic Press,
arxiv:math/ v1 [math.co] 2 Oct 2002
PARTIALLY ORDERED GENERALIZED PATTERNS AND k-ary WORDS SERGEY KITAEV AND TOUFIK MANSOUR arxiv:math/020023v [math.co] 2 Oct 2002 Matematik, Chalmers tekniska högskola och Göteborgs universitet, S-42 96
More informationEnumeration Schemes for Words Avoiding Permutations
Enumeration Schemes for Words Avoiding Permutations Lara Pudwell November 27, 2007 Abstract The enumeration of permutation classes has been accomplished with a variety of techniques. One wide-reaching
More informationSome statistics on permutations avoiding generalized patterns
PUMA Vol 8 (007), No 4, pp 7 Some statistics on permutations avoiding generalized patterns Antonio Bernini Università di Firenze, Dipartimento di Sistemi e Informatica, viale Morgagni 65, 504 Firenze,
More informationON MULTI-AVOIDANCE OF RIGHT ANGLED NUMBERED POLYOMINO PATTERNS
INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 4 (2004), #A21 ON MULTI-AVOIDANCE OF RIGHT ANGLED NUMBERED POLYOMINO PATTERNS Sergey Kitaev Department of Mathematics, University of Kentucky,
More informationCombinatorial properties of the numbers of tableaux of bounded height
Combinatorial properties of the numbers of tableaux of bounded height Marilena Barnabei, Flavio Bonetti, and Matteo Sibani Abstract We introduce an infinite family of lower triangular matrices Γ (s), where
More informationOn the Sequence A and Its Combinatorial Interpretations
1 2 47 6 2 11 Journal of Integer Sequences, Vol. 9 (2006), Article 06..1 On the Sequence A079500 and Its Combinatorial Interpretations A. Frosini and S. Rinaldi Università di Siena Dipartimento di Scienze
More informationA Combinatorial Interpretation of the Numbers 6 (2n)! /n! (n + 2)!
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 8 (2005), Article 05.2.3 A Combinatorial Interpretation of the Numbers 6 (2n)! /n! (n + 2)! Ira M. Gessel 1 and Guoce Xin Department of Mathematics Brandeis
More informationThe sigma-sequence and occurrences of some patterns, subsequences and subwords
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 29 (2004), Pages 187 200 The sigma-sequence and occurrences of some patterns, subsequences and subwords Sergey Kitaev Matematik Chalmers tekniska högskola och
More informationA solution to the tennis ball problem
A solution to the tennis ball problem Anna de Mier Marc Noy Universitat Politècnica de Catalunya Abstract We present a complete solution to the so-called tennis ball problem, which is equivalent to counting
More informationToufik Mansour 1. Department of Mathematics, Chalmers University of Technology, S Göteborg, Sweden
COUNTING OCCURRENCES OF 32 IN AN EVEN PERMUTATION Toufik Mansour Department of Mathematics, Chalmers University of Technology, S-4296 Göteborg, Sweden toufik@mathchalmersse Abstract We study the generating
More informationarxiv: v1 [math.co] 25 May 2011
arxiv:1105.4986v1 [math.co] 25 May 2011 Gog and Magog triangles, and the Schützenberger involution Hayat Cheballah and Philippe Biane Abstract. We describe an approach to finding a bijection between Alternating
More informationA BIJECTION BETWEEN WELL-LABELLED POSITIVE PATHS AND MATCHINGS
Séminaire Lotharingien de Combinatoire 63 (0), Article B63e A BJECTON BETWEEN WELL-LABELLED POSTVE PATHS AND MATCHNGS OLVER BERNARD, BERTRAND DUPLANTER, AND PHLPPE NADEAU Abstract. A well-labelled positive
More informationECO-generation for some restricted classes of compositions
ECO-generation for some restricted classes of compositions Jean-Luc Baril and Phan-Thuan Do 1 LE2I UMR-CNRS 5158, Université de Bourgogne BP 47 870, 21078 DIJON-Cedex France e-mail: barjl@u-bourgognefr
More informationThe distribution of run lengths in integer compositions
The distribution of run lengths in integer compositions Herbert S Wilf University of Pennsylvania Philadelphia PA 19104-6395, USA wilf@mathupennedu Submitted: Mar 7, 2010; Accepted: Oct 9, 2011; Published:
More informationA PASCAL-LIKE BOUND FOR THE NUMBER OF NECKLACES WITH FIXED DENSITY
A PASCAL-LIKE BOUND FOR THE NUMBER OF NECKLACES WITH FIXED DENSITY I. HECKENBERGER AND J. SAWADA Abstract. A bound resembling Pascal s identity is presented for binary necklaces with fixed density using
More informationWords restricted by patterns with at most 2 distinct letters
Words restricted by patterns with at most 2 distinct letters Alexander Burstein Department of Mathematics Iowa State University Ames, IA 50011-2064 USA burstein@math.iastate.edu Toufik Mansour LaBRI, Université
More informationPLACE-DIFFERENCE-VALUE PATTERNS: A GENERALIZATION OF GENERALIZED PERMUTATION AND WORD PATTERNS
#A INTEGERS 0 (200), 29-54 PLACE-DIFFERENCE-VALUE PATTERNS: A GENERALIZATION OF GENERALIZED PERMUTATION AND WORD PATTERNS Sergey Kitaev The Mathematics Institute, School of Computer Science, Reykjavík
More informationENUMERATING PERMUTATIONS AVOIDING A PAIR OF BABSON-STEINGRíMSSON PATTERNS
ENUMERATING PERMUTATIONS AVOIDING A PAIR OF BABSON-STEINGRíMSSON PATTERNS ANDERS CLAESSON AND TOUFIK MANSOUR Abstract. Babson and Steingrímsson introduced generalized permutation patterns that allow the
More informationCounting k-marked Durfee Symbols
Counting k-marked Durfee Symbols Kağan Kurşungöz Department of Mathematics The Pennsylvania State University University Park PA 602 kursun@math.psu.edu Submitted: May 7 200; Accepted: Feb 5 20; Published:
More informationStandard paths in another composition poset
Standard paths in another composition poset Jan Snellman Department of Mathematics, Stockholm University SE-10691 Stockholm, Sweden Jan.Snellmanmath.su.se Submitted: Oct 8, 2003; Accepted: Oct 17, 2004;
More informationCombinatorial Structures
Combinatorial Structures Contents 1 Permutations 1 Partitions.1 Ferrers diagrams....................................... Skew diagrams........................................ Dominance order......................................
More informationIsomorphisms between pattern classes
Journal of Combinatorics olume 0, Number 0, 1 8, 0000 Isomorphisms between pattern classes M. H. Albert, M. D. Atkinson and Anders Claesson Isomorphisms φ : A B between pattern classes are considered.
More informationEnumerating rc-invariant Permutations with No Long Decreasing Subsequences
Enumerating rc-invariant Permutations with No Long Decreasing Subsequences Eric S. Egge Department of Mathematics Carleton College Northfield, MN 55057 USA eegge@carleton.edu Abstract We use the Robinson-Schensted-Knuth
More informationQUADRANT MARKED MESH PATTERNS IN 132-AVOIDING PERMUTATIONS III
#A39 INTEGERS 5 (05) QUADRANT MARKED MESH PATTERNS IN 3-AVOIDING PERMUTATIONS III Sergey Kitaev Department of Computer and Information Sciences, University of Strathclyde, Glasgow, United Kingdom sergey.kitaev@cis.strath.ac.uk
More informationCounting permutations by cyclic peaks and valleys
Annales Mathematicae et Informaticae 43 (2014) pp. 43 54 http://ami.ektf.hu Counting permutations by cyclic peaks and valleys Chak-On Chow a, Shi-Mei Ma b, Toufik Mansour c Mark Shattuck d a Division of
More informationLeapfrog Constructions: From Continuant Polynomials to Permanents of Matrices
Leapfrog Constructions: From Continuant Polynomials to Permanents of Matrices Alberto Facchini Dipartimento di Matematica Università di Padova Padova, Italy facchini@mathunipdit André Leroy Faculté Jean
More informationq-alg/ v2 15 Sep 1997
DOMINO TABLEAUX, SCH UTZENBERGER INVOLUTION, AND THE SYMMETRIC GROUP ACTION ARKADY BERENSTEIN Department of Mathematics, Cornell University Ithaca, NY 14853, U.S.A. q-alg/9709010 v 15 Sep 1997 ANATOL N.
More informationarxiv: v1 [math.co] 13 Jul 2017
A GENERATING FUNCTION FOR THE DISTRIBUTION OF RUNS IN BINARY WORDS arxiv:1707.04351v1 [math.co] 13 Jul 2017 JAMES J. MADDEN Abstract. Let N(n, r, k) denote the number of binary words of length n that begin
More informationSilvia Heubach* Dept. of Mathematics, California State University Los Angeles
(1,k)-Compositions Phyllis Chinn Dept. of Mathematics, Humboldt State University phyllis@math.humboldt.edu Silvia Heubach* Dept. of Mathematics, California State University Los Angeles sheubac@calstatela.edu
More information1. Introduction
Séminaire Lotharingien de Combinatoire 49 (2002), Article B49a AVOIDING 2-LETTER SIGNED PATTERNS T. MANSOUR A AND J. WEST B A LaBRI (UMR 5800), Université Bordeaux, 35 cours de la Libération, 33405 Talence
More informationInvolutions by Descents/Ascents and Symmetric Integral Matrices. Alan Hoffman Fest - my hero Rutgers University September 2014
by Descents/Ascents and Symmetric Integral Matrices Richard A. Brualdi University of Wisconsin-Madison Joint work with Shi-Mei Ma: European J. Combins. (to appear) Alan Hoffman Fest - my hero Rutgers University
More informationFactorization of the Robinson-Schensted-Knuth Correspondence
Factorization of the Robinson-Schensted-Knuth Correspondence David P. Little September, 00 Abstract In [], a bijection between collections of reduced factorizations of elements of the symmetric group was
More informationSelf-dual interval orders and row-fishburn matrices
Self-dual interval orders and row-fishburn matrices Sherry H. F. Yan Department of Mathematics Zhejiang Normal University Jinhua 321004, P.R. China huifangyan@hotmail.com Yuexiao Xu Department of Mathematics
More informationLARGE SCHRÖDER PATHS BY TYPES AND SYMMETRIC FUNCTIONS
Bull. Korean Math. Soc. 51 (2014), No. 4, pp. 1229 1240 http://dx.doi.org/10.4134/bkms.2014.51.4.1229 LARGE SCHRÖDER PATHS BY TYPES AND SYMMETRIC FUNCTIONS Su Hyung An, Sen-Peng Eu, and Sangwook Kim Abstract.
More informationThe q-exponential generating function for permutations by consecutive patterns and inversions
The q-exponential generating function for permutations by consecutive patterns and inversions Don Rawlings Abstract The inverse of Fedou s insertion-shift bijection is used to deduce a general form for
More informationAperiodic languages and generalizations
Aperiodic languages and generalizations Lila Kari and Gabriel Thierrin Department of Mathematics University of Western Ontario London, Ontario, N6A 5B7 Canada June 18, 2010 Abstract For every integer k
More informationNotes on the Matrix-Tree theorem and Cayley s tree enumerator
Notes on the Matrix-Tree theorem and Cayley s tree enumerator 1 Cayley s tree enumerator Recall that the degree of a vertex in a tree (or in any graph) is the number of edges emanating from it We will
More informationPattern Avoidance in the Rook Monoid
Pattern Avoidance in the Rook Monoid Dan Daly Department of Mathematics Southeast Missouri State University Cape Girardeau, MO, 63701 ddaly@semo.edu Lara K. Pudwell Department of Mathematics and Statistics
More informationRANDOM PERMUTATIONS AND BERNOULLI SEQUENCES. Dominique Foata (Strasbourg)
RANDOM PERMUTATIONS AND BERNOULLI SEQUENCES Dominique Foata (Strasbourg) ABSTRACT. The so-called first fundamental transformation provides a natural combinatorial link between statistics involving cycle
More informationA New Shuffle Convolution for Multiple Zeta Values
January 19, 2004 A New Shuffle Convolution for Multiple Zeta Values Ae Ja Yee 1 yee@math.psu.edu The Pennsylvania State University, Department of Mathematics, University Park, PA 16802 1 Introduction As
More informationMatrix compositions. Emanuele Munarini. Dipartimento di Matematica Politecnico di Milano
Matrix compositions Emanuele Munarini Dipartimento di Matematica Politecnico di Milano emanuelemunarini@polimiit Joint work with Maddalena Poneti and Simone Rinaldi FPSAC 26 San Diego Motivation: L-convex
More informationGENERATING TREES FOR PERMUTATIONS AVOIDING GENERALIZED PATTERNS
GENERATING TREES FOR PERMUTATIONS AVOIDING GENERALIZED PATTERNS SERGI ELIZALDE Abstract. We construct generating trees with with one, two, and three labels for some classes of permutations avoiding generalized
More informationBoolean Inner-Product Spaces and Boolean Matrices
Boolean Inner-Product Spaces and Boolean Matrices Stan Gudder Department of Mathematics, University of Denver, Denver CO 80208 Frédéric Latrémolière Department of Mathematics, University of Denver, Denver
More informationPattern avoidance in compositions and multiset permutations
Pattern avoidance in compositions and multiset permutations Carla D. Savage North Carolina State University Raleigh, NC 27695-8206 Herbert S. Wilf University of Pennsylvania Philadelphia, PA 19104-6395
More informationLEVEL GENERATING TREES AND PROPER RIORDAN ARRAYS
Applicable Analysis and Discrete Mathematics, (008), 69 9 Available electronically at http://pefmathetfbgacyu LEVEL GENERATING TREES AND PROPER RIORDAN ARRAYS D Baccherini, D Merlini, R Sprugnoli We introduce
More informationAsymptotics for minimal overlapping patterns for generalized Euler permutations, standard tableaux of rectangular shapes, and column strict arrays
Discrete Mathematics and Theoretical Computer Science DMTCS vol. 8:, 06, #6 arxiv:50.0890v4 [math.co] 6 May 06 Asymptotics for minimal overlapping patterns for generalized Euler permutations, standard
More informationPattern Avoidance of Generalized Permutations
Pattern Avoidance of Generalized Permutations arxiv:1804.06265v1 [math.co] 17 Apr 2018 Zhousheng Mei, Suijie Wang College of Mathematics and Econometrics Hunan University, Changsha, China. zhousheng@hnu.edu.cn,
More informationPattern avoidance in partial permutations
Pattern avoidance in partial permutations Anders Claesson Department of Computer and Information Sciences, University of Strathclyde, Glasgow, G1 1XH, UK anders.claesson@cis.strath.ac.uk Vít Jelínek Fakultät
More informationCompositions of n with no occurrence of k. Phyllis Chinn, Humboldt State University Silvia Heubach, California State University Los Angeles
Compositions of n with no occurrence of k Phyllis Chinn, Humboldt State University Silvia Heubach, California State University Los Angeles Abstract A composition of n is an ordered collection of one or
More informationA Catalan-Hankel Determinant Evaluation
A Catalan-Hankel Determinant Evaluation Ömer Eğecioğlu Department of Computer Science, University of California, Santa Barbara CA 93106 (omer@cs.ucsb.edu) Abstract Let C k = ( ) 2k k /(k +1) denote the
More informationTableau sequences, open diagrams, and Baxter families
Tableau sequences, open diagrams, and Baxter families Sophie Burrill a, Julien Courtiel a, Eric Fusy b, Stephen Melczer c, Marni Mishna a, a Department of Mathematics, Simon Fraser University, Burnaby,
More informationd-regular SET PARTITIONS AND ROOK PLACEMENTS
Séminaire Lotharingien de Combinatoire 62 (2009), Article B62a d-egula SET PATITIONS AND OOK PLACEMENTS ANISSE KASAOUI Université de Lyon; Université Claude Bernard Lyon 1 Institut Camille Jordan CNS UM
More informationComputing the rank of configurations on Complete Graphs
Computing the rank of configurations on Complete Graphs Robert Cori November 2016 The paper by M. Baker and S. Norine [1] in 2007 introduced a new parameter in Graph Theory it was called the rank of configurations
More informationCOMPOSITIONAL INVERSION OF TRIANGULAR SETS OF SERIES. Marilena BARNABEI
Publ. I.R.M.A. Strasbourg, 1984, 229/S 08 Actes 8 e Séminaire Lotharingien, p. 5 10 COMPOSITIONAL INVERSION OF TRIANGULAR SETS OF SERIES BY Marilena BARNABEI There are two possible definitions of formal
More informationq xk y n k. , provided k < n. (This does not hold for k n.) Give a combinatorial proof of this recurrence by means of a bijective transformation.
Math 880 Alternative Challenge Problems Fall 2016 A1. Given, n 1, show that: m1 m 2 m = ( ) n+ 1 2 1, where the sum ranges over all positive integer solutions (m 1,..., m ) of m 1 + + m = n. Give both
More informationCombinatorial Interpretations of a Generalization of the Genocchi Numbers
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 7 (2004), Article 04.3.6 Combinatorial Interpretations of a Generalization of the Genocchi Numbers Michael Domaratzki Jodrey School of Computer Science
More informationA RELATION BETWEEN SCHUR P AND S. S. Leidwanger. Universite de Caen, CAEN. cedex FRANCE. March 24, 1997
A RELATION BETWEEN SCHUR P AND S FUNCTIONS S. Leidwanger Departement de Mathematiques, Universite de Caen, 0 CAEN cedex FRANCE March, 997 Abstract We dene a dierential operator of innite order which sends
More informationBinomial Coefficient Identities/Complements
Binomial Coefficient Identities/Complements CSE21 Fall 2017, Day 4 Oct 6, 2017 https://sites.google.com/a/eng.ucsd.edu/cse21-fall-2017-miles-jones/ permutation P(n,r) = n(n-1) (n-2) (n-r+1) = Terminology
More informationk-protected VERTICES IN BINARY SEARCH TREES
k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from
More informationPolynomial Properties in Unitriangular Matrices 1
Journal of Algebra 244, 343 351 (2001) doi:10.1006/jabr.2001.8896, available online at http://www.idealibrary.com on Polynomial Properties in Unitriangular Matrices 1 Antonio Vera-López and J. M. Arregi
More informationYOUNG TABLEAUX AND THE REPRESENTATIONS OF THE SYMMETRIC GROUP
YOUNG TABLEAUX AND THE REPRESENTATIONS OF THE SYMMETRIC GROUP YUFEI ZHAO ABSTRACT We explore an intimate connection between Young tableaux and representations of the symmetric group We describe the construction
More informationThe Littlewood-Richardson Rule
REPRESENTATIONS OF THE SYMMETRIC GROUP The Littlewood-Richardson Rule Aman Barot B.Sc.(Hons.) Mathematics and Computer Science, III Year April 20, 2014 Abstract We motivate and prove the Littlewood-Richardson
More informationCOUNTING NONINTERSECTING LATTICE PATHS WITH TURNS
COUNTING NONINTERSECTING LATTICE PATHS WITH TURNS C. Krattenthaler Institut für Mathematik der Universität Wien, Strudlhofgasse 4, A-1090 Wien, Austria. e-mail: KRATT@Pap.Univie.Ac.At Abstract. We derive
More informationPattern Avoidance in Ordered Set Partitions
Pattern Avoidance in Ordered Set Partitions arxiv:1212.2530v2 [math.co] 24 Mar 2013 Anant Godbole 1 Department of Mathematics and Statistics East Tennessee State University Johnson City, TN 37614, USA
More informationCounting Peaks and Valleys in a Partition of a Set
1 47 6 11 Journal of Integer Sequences Vol. 1 010 Article 10.6.8 Counting Peas and Valleys in a Partition of a Set Toufi Mansour Department of Mathematics University of Haifa 1905 Haifa Israel toufi@math.haifa.ac.il
More informationSpherical Venn Diagrams with Involutory Isometries
Spherical Venn Diagrams with Involutory Isometries Frank Ruskey Mark Weston Department of Computer Science University of Victoria PO BOX 3055, Victoria, BC Canada V8W 3P6 {ruskey,mweston}@cs.uvic.ca Submitted:
More informationThesis submitted in partial fulfillment of the requirement for The award of the degree of. Masters of Science in Mathematics and Computing
SOME n-color COMPOSITION Thesis submitted in partial fulfillment of the requirement for The award of the degree of Masters of Science in Mathematics and Computing Submitted by Shelja Ratta Roll no- 301203014
More informationThe initial involution patterns of permutations
The initial involution patterns of permutations Dongsu Kim Department of Mathematics Korea Advanced Institute of Science and Technology Daejeon 305-701, Korea dskim@math.kaist.ac.kr and Jang Soo Kim Department
More informationOn Descents in Standard Young Tableaux arxiv:math/ v1 [math.co] 3 Jul 2000
On Descents in Standard Young Tableaux arxiv:math/0007016v1 [math.co] 3 Jul 000 Peter A. Hästö Department of Mathematics, University of Helsinki, P.O. Box 4, 00014, Helsinki, Finland, E-mail: peter.hasto@helsinki.fi.
More informationAlgorithmic Approach to Counting of Certain Types m-ary Partitions
Algorithmic Approach to Counting of Certain Types m-ary Partitions Valentin P. Bakoev Abstract Partitions of integers of the type m n as a sum of powers of m (the so called m-ary partitions) and their
More informationAppendix to: Generalized Stability of Kronecker Coefficients. John R. Stembridge. 14 August 2014
Appendix to: Generalized Stability of Kronecker Coefficients John R. Stembridge 14 August 2014 Contents A. Line reduction B. Complementation C. On rectangles D. Kronecker coefficients and Gaussian coefficients
More informationCounting Permutations by their Rigid Patterns
Counting Permutations by their Rigid Patterns A. N. Myers anmyers@math.upenn.edu University of Pennsylvania Philadelphia, PA 19104-6395 September 20, 2002 1 Abstract In how many permutations does the pattern
More informationGrand Dyck consecutive patterns avoiding binary words
Grand Dyck consecutive patterns avoiding binary words A.Bernini S.Bilotta E.Pergola R.Pinzani UNIVERSITA DEGLI STUDI DI FIRENZE Dipartimento di Matematica e Informatica Permutation Patterns 203 A.Bernini
More informationpatterns Lara Pudwell faculty.valpo.edu/lpudwell
faculty.valpo.edu/lpudwell joint work with Andrew Baxter Permutation 2014 East Tennessee State University July 7, 2014 Ascents Definition An ascent in the string x 1 x n is a position i such that x i
More informationEnumerating split-pair arrangements
Journal of Combinatorial Theory, Series A 115 (28 293 33 www.elsevier.com/locate/jcta Enumerating split-pair arrangements Ron Graham 1, Nan Zang Department of Computer Science, University of California
More informationRow-strict quasisymmetric Schur functions
Row-strict quasisymmetric Schur functions Sarah Mason and Jeffrey Remmel Mathematics Subject Classification (010). 05E05. Keywords. quasisymmetric functions, Schur functions, omega transform. Abstract.
More informationPaths, Permutations and Trees. Enumerating Permutations Avoiding Three Babson - Steingrímsson Patterns
Paths, Permutations and Trees Center for Combinatorics Nankai University Tianjin, February 5-7, 004 Enumerating Permutations Avoiding Three Babson - Steingrímsson Patterns Antonio Bernini, Elisa Pergola
More informationWieland drift for triangular fully packed loop configurations
Wieland drift for triangular fully packed loop configurations Sabine Beil Ilse Fischer Fakultät für Mathematik Universität Wien Wien, Austria {sabine.beil,ilse.fischer}@univie.ac.at Philippe Nadeau Institut
More informationarxiv: v1 [math.co] 8 Feb 2014
COMBINATORIAL STUDY OF THE DELLAC CONFIGURATIONS AND THE q-extended NORMALIZED MEDIAN GENOCCHI NUMBERS ANGE BIGENI arxiv:1402.1827v1 [math.co] 8 Feb 2014 Abstract. In two recent papers (Mathematical Research
More informationTHE S 1 -EQUIVARIANT COHOMOLOGY RINGS OF (n k, k) SPRINGER VARIETIES
Horiguchi, T. Osaka J. Math. 52 (2015), 1051 1062 THE S 1 -EQUIVARIANT COHOMOLOGY RINGS OF (n k, k) SPRINGER VARIETIES TATSUYA HORIGUCHI (Received January 6, 2014, revised July 14, 2014) Abstract The main
More informationPrimary classes of compositions of numbers
Annales Mathematicae et Informaticae 41 (2013) pp. 193 204 Proceedings of the 15 th International Conference on Fibonacci Numbers and Their Applications Institute of Mathematics and Informatics, Eszterházy
More informationCitation Osaka Journal of Mathematics. 43(2)
TitleIrreducible representations of the Author(s) Kosuda, Masashi Citation Osaka Journal of Mathematics. 43(2) Issue 2006-06 Date Text Version publisher URL http://hdl.handle.net/094/0396 DOI Rights Osaka
More informationOn the Average Complexity of Brzozowski s Algorithm for Deterministic Automata with a Small Number of Final States
On the Average Complexity of Brzozowski s Algorithm for Deterministic Automata with a Small Number of Final States Sven De Felice 1 and Cyril Nicaud 2 1 LIAFA, Université Paris Diderot - Paris 7 & CNRS
More informationarxiv:math/ v1 [math.co] 11 Oct 2002
COUNTING THE OCCURRENCES OF GENERALIZED PATTERNS IN WORDS GENERATED BY A MORPHISM arxiv:math/0210170v1 [math.co] 11 Oct 2002 Sergey Kitaev and Toufik Mansour 1 Matematik, Chalmers tekniska högskola och
More informationFIXED POINTS OF MORPHISMS AMONG BINARY GENERALIZED PSEUDOSTANDARD WORDS
#A21 INTEGERS 18 (2018) FIXED POINTS OF MORPHISMS AMONG BINARY GENERALIZED PSEUDOSTANDARD WORDS Tereza Velká Department of Mathematics, Faculty of Nuclear Sciences and Physical Engineering, Czech Technical
More informationMULTI-ORDERED POSETS. Lisa Bishop Department of Mathematics, Occidental College, Los Angeles, CA 90041, United States.
INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 7 (2007), #A06 MULTI-ORDERED POSETS Lisa Bishop Department of Mathematics, Occidental College, Los Angeles, CA 90041, United States lbishop@oxy.edu
More informationWords with the Smallest Number of Closed Factors
Words with the Smallest Number of Closed Factors Gabriele Fici Zsuzsanna Lipták Abstract A word is closed if it contains a factor that occurs both as a prefix and as a suffix but does not have internal
More informationAnimals and 2-Motzkin Paths
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol 8 (2005), Article 0556 Animals and 2-Motzkin Paths Wen-jin Woan 1 Department of Mathematics Howard University Washington, DC 20059 USA wwoan@howardedu
More informationOn certain combinatorial expansions of the Legendre-Stirling numbers
On certain combinatorial expansions of the Legendre-Stirling numbers Shi-Mei Ma School of Mathematics and Statistics Northeastern University at Qinhuangdao Hebei, P.R. China shimeimapapers@163.com Yeong-Nan
More informationA matrix A is invertible i det(a) 6= 0.
Chapter 4 Determinants 4.1 Definition Using Expansion by Minors Every square matrix A has a number associated to it and called its determinant, denotedbydet(a). One of the most important properties of
More informationPostorder Preimages. arxiv: v3 [math.co] 2 Feb Colin Defant 1. 1 Introduction
Discrete Mathematics and Theoretical Computer Science DMTCS vol. 19:1, 2017, #3 Postorder Preimages arxiv:1604.01723v3 [math.co] 2 Feb 2017 1 University of Florida Colin Defant 1 received 7 th Apr. 2016,
More informationFactorizations of the Fibonacci Infinite Word
2 3 47 6 23 Journal of Integer Sequences, Vol. 8 (205), Article 5.9.3 Factorizations of the Fibonacci Infinite Word Gabriele Fici Dipartimento di Matematica e Informatica Università di Palermo Via Archirafi
More informationAscent sequences and the binomial convolution of Catalan numbers
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 64(1) (2016), Pages 21 43 Ascent sequences and the binomial convolution of Catalan numbers Lara K. Pudwell Department of Mathematics and Statistics Valparaiso
More informationMultiplicity Free Expansions of Schur P-Functions
Annals of Combinatorics 11 (2007) 69-77 0218-0006/07/010069-9 DOI 10.1007/s00026-007-0306-1 c Birkhäuser Verlag, Basel, 2007 Annals of Combinatorics Multiplicity Free Expansions of Schur P-Functions Kristin
More informationChapter 2 Linear Transformations
Chapter 2 Linear Transformations Linear Transformations Loosely speaking, a linear transformation is a function from one vector space to another that preserves the vector space operations. Let us be more
More informationExhaustive generation for ballot sequences in lexicographic and Gray code order
Exhaustive generation for ballot sequences in lexicographic and Gray code order Ahmad Sabri Department of Informatics Gunadarma University, Depok, Indonesia sabri@staff.gunadarma.ac.id Vincent Vajnovszki
More informationTHE LECTURE HALL PARALLELEPIPED
THE LECTURE HALL PARALLELEPIPED FU LIU AND RICHARD P. STANLEY Abstract. The s-lecture hall polytopes P s are a class of integer polytopes defined by Savage and Schuster which are closely related to the
More informationarxiv: v1 [math.co] 24 Jul 2013
ANALYTIC COMBINATORICS OF CHORD AND HYPERCHORD DIAGRAMS WITH k CROSSINGS VINCENT PILAUD AND JUANJO RUÉ arxiv:307.6440v [math.co] 4 Jul 03 Abstract. Using methods from Analytic Combinatorics, we study the
More informationLatin squares: Equivalents and equivalence
Latin squares: Equivalents and equivalence 1 Introduction This essay describes some mathematical structures equivalent to Latin squares and some notions of equivalence of such structures. According to
More information(Ref: Schensted Part II) If we have an arbitrary tensor with k indices W i 1,,i k. we can act on it 1 2 k with a permutation P = = w ia,i b,,i l
Chapter S k and Tensor Representations Ref: Schensted art II) If we have an arbitrary tensor with k indices W i,,i k ) we can act on it k with a permutation = so a b l w) i,i,,i k = w ia,i b,,i l. Consider
More information