ARS MATHEMATICA CONTEMPORANEA Volume 16, Number 2, Spring/Summer 2019, Pages 277-641 Covered by: Mathematical Reviews zbMATH (formerly Zentralblatt MATH) COBISS SCOPUS Science Citation Index-Expanded (SCIE) Web of Science ISI Alerting Service Current Contents/Physical, Chemical & Earth Sciences (CC/PC & ES) dblp computer science bibliography The University of Primorska The Society of Mathematicians, Physicists and Astronomers of Slovenia The Institute of Mathematics, Physics and Mechanics The Slovenian Discrete and Applied Mathematics Society The publication is partially supported by the Slovenian Research Agency from the Call for co-financing of scientific periodical publications. ARS MATHEMATICA CONTEMPORANEA Petra Spar! Award 2020: Call for Nominations The Petra Sparl Award was established in 2017 to recognise (in each even-numbered year) the best paper published recently by a young woman mathematician in one of the two journals Ars Mathematica Contemporanea (AMC) and The Art of Discrete and Applied Mathematics (ADAM). The award is named in memory of Dr Petra Sparl, a talented woman mathematician with promising future who worked in graph theory and combinatorics, but died mid-career in 2016 after a battle with cancer. This award consists of a certificate with the recipient's name, and an invitation to give a lecture at the Mathematics Colloquium at the University of Primorska, and to give lectures at the University of Maribor and University of Ljubljana. The first award was made in May 2018 to Dr Monika Pilsniak (AGH University, Kra-ków, Poland), for her work on the distinguishing index, in Ars Mathematica Contemporanea 13 (2017), 259-274. The Petra Sparl Award Committee is now calling for nominations for the second award. Eligibility: Each nominee must be a woman author or co-author of a paper published either in AMC or ADAM in the last five years, who was at most 40 years old at the time of the paper's first submission. Nomination format: Each nomination should specify the following: (a) the name, birth-date and affiliation of the candidate; (b) the title and other bibliographic details of the paper for which the award is recommended; (c) reasons why the candidate's contribution to the paper is worthy of the award, in at most 500 words; and (d) names and email addresses of one or two referees who could be consulted with regard to the quality of the paper. Procedure: Nominations should be submitted by email to any one of the three members of the Petra Sparl Award Committee (see below), by 31 August 2019. Award Committee: • Marston Conder, m.conder@auckland.ac.nz • Asia Ivic Weiss, weiss@mathstat.yorku.ca • Aleksander Malnic, aleksander.malnic@guest.arnes.si Marston Conder, Asia Ivic Weiss and Aleksander Malnic Members of the 2020 Petra Sparl Award Committee viii ARS MATHEMATICA CONTEMPORANEA Contents Smallest snarks with oddness 4 and cyclic connectivity 4 have order 44 Jan Goedgebeur, Edita Mäcajovä, Martin Skoviera .............277 Order-chain polytopes Takayuki Hibi, Nan Li, Teresa Xueshan Li, Li Li Mu, Akiyoshi Tsuchiya . 299 Comparing topologies on linearly recursive sequences Laiachi El Kaoutit, Paolo Saracco......................319 Intrinsic linking with linking numbers of specified divisibility Christopher Tuffley..............................331 Decomposition method related to saturated hyperball packings Jeno Szirmai..................................349 A characterization of graphs with disjoint total dominating sets Michael A. Henning, Iztok Peterin......................359 The Möbius function of PSU(3, 22") Giovanni Zini.................................377 Regular self-dual and self-Petrie-dual maps of arbitrary valency Jay Fraser, Olivia Jeans, Jozef Siräft.....................403 A generalization of the parallelogram law to higher dimensions Alessandro Fonda...............................411 S2 coverings by isosceles and scalene triangles - adjacency case I Catarina P. Avelino, Altino F. Santos.....................419 Ascending runs in permutations and valued Dyck paths Marilena Barnabei, Flavio Bonetti, Niccolo Castronuovo, Matteo Silimbani 445 Some extensions of optimal stopping with financial applications Mihael Perman, Ana Zalokar.........................465 Convertible subspaces that arise from different numberings of the vertices of a graph Henrique F. da Cruz, Ilda Inäcio, Rog6rio Serodio..............473 Linear separation of connected dominating sets in graphs Nina Chiarelli, Martin Milanic........................487 Smooth skew morphisms of dihedral groups Na-Er Wang, Kan Hu, Kai Yuan, Jun-Yang Zhang..............527 xxiii ARS MATHEMATICA CONTEMPORANEA A q-queens problem. VI. The bishops' period Seth Chaiken, Christopher R. H. Hanusa, Thomas Zaslavsky........549 Classification of some reflexible edge-transitive embeddings of complete bipartite graphs Jin Ho Kwak, Young Soo Kwon.......................563 A Carlitz type result for linearized polynomials Bence Csajbók, Giuseppe Marino, Olga Polverino..............585 Embedding of orthogonal Buekenhout-Metz unitals in the Desarguesian plane of order q2 Gábor Korchmáros, Alessandro Siciliano ..................609 The dimension of the negative cycle vectors of signed graphs Alex Schaefer, Thomas Zaslavsky......................625 Corrigendum to: On zero sum-partition of Abelian groups into three sets and group distance magic labeling Sylwia Cichacz................................641 Volume 16, Number 2, Spring/Summer 2019, Pages 277-641 viii ARS MATHEMATICA CONTEMPORANEA ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 16 (2019) 277-298 https://doi.org/10.26493/1855-3974.1601.e75 (Also available at http://amc-journal.eu) Smallest snarks with oddness 4 and cyclic connectivity 4 have order 44* * Jan Goedgebeur Department of Applied Mathematics, Computer Science & Statistics, Ghent University, Krijgslaan 281-S9, 9000 Ghent, Belgium and Computer Science Department, University ofMons, Place du Parc 20, 7000 Mons, Belgium Department of Computer Science, Comenius University, 842 48 Bratislava, Slovakia Received 14 February 2018, accepted 22 September 2018, published online 6 January 2019 The family of snarks - connected bridgeless cubic graphs that cannot be 3-edge-colour-ed - is well-known as a potential source of counterexamples to several important and long-standing conjectures in graph theory. These include the cycle double cover conjecture, Tutte's 5-flow conjecture, Fulkerson's conjecture, and several others. One way of approaching these conjectures is through the study of structural properties of snarks and construction of small examples with given properties. In this paper we deal with the problem of determining the smallest order of a nontrivial snark (that is, one which is cyclically 4-edge-connected and has girth at least 5) of oddness at least 4. Using a combination of structural analysis with extensive computations we prove that the smallest order of a snark with oddness at least 4 and cyclic connectivity 4 is 44. Formerly it was known that such a snark must have at least 38 vertices and one such snark on 44 vertices was constructed by Lukot'ka, Mâcajovâ, Mazâk and Skoviera in 2015. The proof requires determining all cyclically 4-edge-connected snarks on 36 vertices, which extends the previously compiled list of all such snarks up to 34 vertices. As a by-product, we use this new list to test the validity of several conjectures where snarks can be smallest counterexamples. Keywords: Cubic graph, cyclic connectivity, edge-colouring, snark, oddness, computation. Math. Subj. Class.: 05C15, 05C21, 05C30, 05C40, 05C75, 68R10 *The first author was supported by a Postdoctoral Fellowship of the Research Foundation Flanders (FWO). The second and the third author were partially supported by VEGA 1/0876/16 and by APVV-15-0220. Most computations for this work were carried out using the Stevin Supercomputer Infrastructure at Ghent University. E-mail addresses: jan.goedgebeur@ugent.be (Jan Goedgebeur), macajova@dcs.fmph.uniba.sk (Edita Macajova), skoviera@dcs.fmph.uniba.sk (Martin Skoviera) Edita Mácajová, Martin Skoviera Abstract ©® This work is licensed under https://creativecommons.Org/licenses/by/4.0/ 302 Ars Math. Contemp. 16(2019)203-213 1 Introduction Snarks are an interesting, important, but somewhat mysterious family of cubic graphs whose characteristic property is that their edges cannot be properly coloured with three colours. Very little is known about the nature of snarks because the reasons which cause the absence of 3-edge-colourability in cubic graphs are not well understood. Snarks are also difficult to find because almost all cubic graphs are hamiltonian and hence 3-edge-colourable [44]. On the other hand, deciding whether a cubic graph is 3-edge-colourable or not is NP-complete [26], implying that the family of snarks is sufficiently rich. The importance of snarks resides mainly in the fact that many difficult conjectures in graph theory, such as Tutte's 5-flow conjecture or the cycle double cover conjecture, would be proved in general if they could be established for snarks [29, 30]. While most of these problems are trivial for 3-edge-colourable graphs, and exceedingly difficult for snarks in general, they often become tractable for snarks that are in a certain sense close to being 3-edge-colourable. There exist a number of measures of uncolourability of cubic graphs (see [16] for a recent survey). Among them, the smallest number of odd circuits in a 2-factor of a cubic graph, known as oddness, has received the widest attention. Note that the oddness of a cubic graph is an even integer which equals zero precisely when the graph is 3-edge-colourable. It is known, for example, that the 5-flow conjecture and the Fan-Raspaud conjecture are true for cubic graphs of oddness at most two [30, 37], while the cycle double cover conjecture is known to hold for cubic graphs of oddness at most 4 [24, 27]. Snarks with large oddness thus still remain potential counterexamples to these conjectures and therefore merit further study. Several authors have provided constructions of infinite families of snarks with increasing oddness, see, for example, [25, 33, 35, 49]. Most of them focus on snarks with cyclic J. Goedgebeur et al.: Smallest snarks with oddness 4 and cyclic connectivity 4 have order 44 279 connectivity at least 4 and girth at least 5, because snarks that lack these two properties can be easily reduced to smaller snarks. We call such snarks nontrivial. All currently available constructions indicate that snarks of oddness greater than 2 are extremely rare. From [7, Observation 4.10] it follows that there exist no nontrivial snarks of oddness greater than 2 on up to 36 vertices. The smallest known example of a nontrivial snark with oddness at least 4 has 44 vertices and its oddness equals 4. It was constructed by Lukot'ka et al. in [35], superseding an earlier construction of Hagglund [25] on 46 vertices; it is shown in Figure 1 in a form different from the one displayed in [35]. In [35, Theorem 12] it is also shown that if we allow trivial snarks, the smallest one with oddness greater than 2 has 28 vertices and oddness 4. As explained in [22, 34], there are exactly three such snarks, one with cyclic connectivity 3 and two with cyclic connectivity 2. (The latter result rectifies the false claim made in [35] that there are only two snarks of oddness 4 on 28 vertices.) The aim of the present paper is to prove the following result. Theorem 1.1. The smallest number of vertices of a snark with cyclic connectivity 4 and oddness at least 4 is 44. The girth of each such snark is at least 5. This theorem bridges the gap between the order 36 up to which all nontrivial snarks have been generated (and none of oddness greater than 2 was found [7]) and the order 44 where an example of oddness 4 has been constructed [35]. Since generating all nontrivial snarks beyond 36 vertices seems currently infeasible, it would be hardly possible to find a smallest nontrivial snark with oddness at least 4 by employing computational force alone. On the other hand, the current state-of-the-art in the area of snarks, with constructions significantly prevailing over structural theorems, does not provide sufficient tools for a purely theoretical proof of our theorem. Our proof is therefore an inevitable combination of structural analysis of snarks with computations. The proof consists of two steps. First we prove that every snark with oddness at least 4, cyclic connectivity 4, and minimum number of vertices can be decomposed into two smaller cyclically 4-edge-connected snarks Gi and G2 by removing a cycle-separating 4-edge-cut, adding at most two vertices to each of the components, and by restoring 3-regularity. Conversely, every such snark arises from two smaller cyclically 4-edge-con-nected snarks Gi and G2 by the reverse process. In the second step of the proof we computationally verify that no combination of Gi and G2 can result in a cyclically 4-edge-connected snark of oddness at least 4 on fewer than 44 vertices. This requires checking all suitable pairs of cyclically 4-edge-connected snarks on up to 36 vertices, including those that contain 4-cycles. Such snarks have been previously generated only up to order 34 [7], which is why we had to additionally generate all cyclically 4-edge-connected snarks on 36 vertices containing a 4-cycle. This took about 80 CPU years and yielded exactly 404 899 916 cyclically 4-edge-connected snarks. It is important to realise that Theorem 1.1 does not yet determine the order of a smallest nontrivial snark with oddness at least 4. The reason is that it does not exclude the existence of cyclically 5-connected snarks with oddness at least 4 on fewer than 44 vertices. However, the smallest currently known cyclically 5-edge-connected snark with oddness at least 4 has 76 vertices (see Steffen [49, Theorem 2.3]), which indicates that a cyclically 5-edge-connected snark with oddness at least 4 on fewer than 44 vertices either does not exist or will be very difficult to find. Our paper is organised as follows. Section 2 provides the necessary background material for the proof of Theorem 1.1 and for the results that precede it, in particular for the 298 Ars Math. Contemp. 16(2019)203-213 decomposition theorems proved in Section 3. In Section 4 we employ these decomposition theorems to prove Theorem 1.1. We further discuss this theorem in Section 5 where we also pose two related problems. In the final section we report about the tests which we have performed on the set of all cyclically 4-edge-connected snarks of order 36 concerning the validity of several interesting conjectures in graph theory, such as the dominating cycle conjecture, the total colouring conjecture, and the Petersen colouring conjecture. We will continue our investigation of the smallest snarks with oddness at least 4 and cyclic connectivity 4 in the sequel of this paper [23]. We will display a set of 31 such snarks, analyse their properties, and prove that they constitute the complete set of snarks with oddness at least 4 and cyclic connectivity 4 on 44 vertices. 2 Preliminaries 2.1 Graphs and multipoles All graphs in this paper are finite. For the sake of completeness, we have to permit graphs containing multiple edges or loops, although these features will in most cases be excluded by the imposed connectivity or colouring restrictions. Besides graphs we also consider graph-like structures, called multipoles, that may contain dangling edges and even isolated edges. Multipoles serve as a convenient tool for constructing larger graphs from smaller building blocks. They also naturally arise as a result of severing one or several edges of a graph, in particular edges forming an edge-cut. In this paper all multipoles will be cubic (3-valent). Every edge of a multipole has two ends and each end can, but need not, be incident with a vertex. An edge which has both ends incident with a vertex is called proper. If one end of an edge is incident with a vertex and the other is not, then the edge is called a dangling edge and, if neither end of an edge is incident with a vertex, it is called an isolated edge. An end of an edge that is not incident with a vertex is called a semiedge. A multipole with k semiedges is called a k-pole. Two semiedges s and t of a multipole can be joined to produce an edge s * t connecting the end-vertices of the corresponding dangling edges. Given two k-poles M and N with semiedges si,..., sk and t1,... ,tk, respectively, we define their complete junction M * N to be the graph obtained by performing the junctions sj * tj for each i e {1,..., k}. A partial junction is defined in a similar way except that a proper subset of semiedges of M is joined to semiedges of N. Partial junctions can be used to construct larger multipoles from smaller ones. In either case, whenever a junction of two multipoles is to be performed, we assume that their semiedges are assigned a fixed order. For a more detailed formal development of concepts related to multipoles we refer the reader, for example, to [15, 36] or [13]. 2.2 Cyclic connectivity Let G be a connected graph. An edge-cut of a graph G, or just a cut for short, is any set S of edges of G such that G - S is disconnected. An edge-cut is said to be trivial if it consists of all edges incident with one vertex, and nontrivial otherwise. An important kind of an edge-cut is a cocycle, which arises by taking a set of vertices or an induced subgraph H of G and letting S to be the set SG (H) of all edges with exactly one end in H. We omit the subscript G whenever G is clear from the context. An edge-cut is said to be cycle-separating if at least two components of G - S contain J. Goedgebeur et al.: Smallest snarks with oddness 4 and cyclic connectivity 4 have order 44 279 cycles. We say that a connected graph G is cyclically k-edge-connected if no set of fewer than k edges is cycle-separating in G. The cyclic connectivity of G, denoted by Z(G), is the largest number k < ¡3(G), where ¡3(G) = | E(G) | - | V(G) | + 1 is the cycle rank of G, for which G is cyclically k-connected (cf. [41, 43]). It is not difficult to see that for a cubic graph G with Z(G) < 3 the value Z(G) coincides with the usual vertex-connectivity or edge-connectivity of G. Thus cyclic connectivity in cubic graphs is a natural extension of the common versions of connectivity (which unlike cyclic connectivity are bounded above by 3). Another useful observation is that the value of cyclic connectivity remains invariant under subdivisions and adjoining new vertices of degree 1 . The following well-known result [41, 43] relates Z(G) to the length of a shortest cycle in G, denoted by g(G) and called the girth of G. Proposition 2.1. For every connected cubic graph G we have Z(G) < g(G). Let us observe that in a connected cubic graph every edge-cut S consisting of independent edges is cycle-separating: indeed the minimum valency of G - S is 2, so each component of G - S contains a cycle. Conversely, a cycle-separating edge-cut of minimum size is easily seen to be independent; moreover, G - S has precisely two components, called cyclic parts or fragments. A fragment minimal under inclusion will be called an atom. A nontrivial atom is any atom different from a shortest cycle. The following two propositions provide useful tools in handling cyclic connectivity. The first of them follows easily by mathematical induction. For the latter we refer the reader to [41, Proposition 4 and Theorem 11]. Lemma 2.2. Let H be a connected acyclic subgraph of a cubic graph separated from the rest by a k-edge-cut. Then H has k — 2 vertices. Proposition 2.3. Let G be a connected cubic graph. The following statements hold: (i) Every fragment of G is connected, and every atom is 2-connected. Moreover, if Z (G) > 3, then every fragment is 2-connected. (ii) If A is a nontrivial atom of G, then Z (A) > Z (G)/2. In the present paper we focus on cyclically 4-edge-connected cubic graphs, in particular on those with cyclic connectivity exactly 4. From the results mentioned earlier it follows that a cyclically 4-edge-connected cubic graph has no bridges and no 2-edge-cuts. Furthermore, every 3-edge-cut separates a single vertex, and every 4-edge-cut which is not cycle-separating consists of the four edges adjacent to some edge. An important method of constructing cyclically 4-edge-connected cubic graphs from smaller ones applies the following operation which we call an I-extension. In a cubic graph G take two edges e and f, subdivide each of e and f with a new vertex ve and vf, respectively, and by add a new edge between ve and vf. The resulting graph, denoted by G(e, f) is said to be obtained by an I-extension across e and f. It is not difficult to see that if G is cyclically 4-edge-connected and e and f are non-adjacent edges of G, then so is G(e, f). A well-known theorem of Fontet [19] and Wormald [51] states that all cyclically 4-edge-connected cubic graphs can be obtained from the complete graph K4 and the cube Q3 by repeatedly applying I-extensions to pairs of non-adjacent edges. However, I-extensions 282 Ars Math. Contemp. 16(2019)203-213 are also useful for constructing cubic graphs in general. For example, in [8] all connected cubic graphs up to 32 vertices have been generated by using I-extensions as main construction operation. For more information on cyclic connectivity the reader may wish to consult [41]. 2.3 Edge-colourings A k-edge-colouring of a graph G is amapping ^: E (G) ^ C where C is a set of k colours. If all pairs of adjacent edges receive distinct colours, ^ is said to be proper; otherwise it is called improper. Graphs with loops do not admit proper edge-colourings because of the self-adjacency of loops. Since we are mainly interested in proper colourings, the adjective "proper" will usually be dropped. For multipoles, edge-colourings are defined similarly; that is to say, each edge receives a colour irrespectively of the fact whether it is, or it is not, incident with a vertex. The result of Shannon [47] implies that every loopless cubic graph, and hence every loopless cubic multipole, can be properly coloured with four colours, see also [32]. In the study of snarks it is often convenient to take the set of colours C to be the set Z2 x Z2 = {(0,0), (0,1), (1,0), (1,1)} where (0,0), (0,1), (1,0), and (1,1) are identified with 0, 1, 2, and 3, respectively. We say that a multipole is colourable if it admits a 3-edge-colouring and uncolourable otherwise. For a 3-edge-colouring of a cubic graph or a cubic multipole we use the colour-set C = {1, 2,3} because such a colouring is in fact a nowhere-zero Z2 x Z2-flow. This means that for every vertex v the sum of colours incident with v, the outflow at v, equals 0 in Z2 x Z2. The following fundamental result [5, 14] is a direct consequence of this fact. Theorem 2.4 (Parity Lemma). Let M be a k-pole endowed with a proper 3-edge-colouring with colours 1, 2, and 3. If the set of all semi-edges contains k edges of colour i for i e {1,2,3}, then ki = k2 = k3 = k (mod 2). Now let M be a loopless cubic multipole that cannot be properly 3-edge-coloured. Then M has a proper 4-edge-colouring with colours from the set C = Z2 x Z2. Such a colouring will not be a Z2 x Z2 -flow anymore since every vertex incident with an edge coloured 0 will have a non-zero outflow. It is natural to require the colour 0 to be used as little as possible, that is, to require the set of edges coloured 0 to be the minimum-size colour class. Such a 4-edge-colouring will be called minimum. In a minimum 4-edge-colouring of M every edge e coloured 0 must be adjacent to edges of all three non-zero colours; in particular, e must be a proper edge. It follows that exactly one colour around e appears twice. By summing the outflows at vertices incident with edges coloured 0 we obtain the following useful result due to Fouquet [20, Theorem 1] and Steffen [48, Lemma 2.2]. Theorem 2.5. Let ^ be a minimum 4-edge-colouring of a loopless cubic multipole M with m edges coloured 0, and for i e {1, 2,3} let mj denote the number of those edges coloured 0 that are adjacent to two edges coloured i. Then mi = m-2 = m.3 = m (mod 2). We finish the discussion of colourings with the definition of the standard recolouring tool, a Kempe chain. Let M be a cubic multipole whose edges have been properly coloured J. Goedgebeur et al.: Smallest snarks with oddness 4 and cyclic connectivity 4 have order 44 279 with colours from the set {0,1,2,3} = Z2 x Z2. For any two distinct colours i, j £ {1, 2,3} we define an i-j-Kempe chain P to be a non-extendable walk that alternates the edges with colours i and j. Clearly, P is either an even circuit, or is a path that ends with either a semiedge or with a vertex incident with an edge coloured 0. It is easy to see that switching the colours i and j on P gives rise to a new proper 4-edge-colouring of M. Furthermore, if the original colouring was a minimum 4-edge-colouring, so is the new one. 2.4 Snarks A snark is, essentially, a nontrivial cubic graph that has no 3-edge-colouring. Precise definitions vary depending on what is to be considered "nontrivial". In many papers, especially those dealing with snark constructions, snarks are required to be cyclically 4-edge-connected and have girth at least 5; see for example [12, 16]. However, in [9, 25] the girth requirement is dropped, demanding snarks to be cyclically 4-edge-connected but allowing them to have 4-cycles. Another group of papers, especially those dealing with the structural analysis of snarks, adopts the widest possible definition of a snark, permitting all kinds of trivial features such as triangles, digons and even bridges; see, for example [11, 13,42]. In this paper, our usage of the term snark agrees with the latter group: we define a snark to be a connected cubic graph that cannot be 3-edge-coloured. This paper deals with snarks that are far from being 3-edge-colourable. Two measures of uncolourability will be prominent in this paper. The oddness w(G) of a bridgeless cubic graph G is the smallest number of odd circuits in a 2-factor of G. The resistance p(G) of a cubic graph G is the smallest number of edges of G which have to be removed in order to obtain a colourable graph. Obviously, if G is colourable, then w(G) = p(G) = 0. If G is uncolourable, then both w(G) > 2 and p(G) > 2. Furthermore, p(G) < w(G) for every bridgeless cubic graph G. The following lemma is due to Steffen [48]. Lemma 2.6. Let G be a bridgeless cubic graph. Then p(G) = 2 if and only if w(G) = 2. One of the methods of constructing snarks from smaller ones uses I-extensions (cf. Subsection 2.2). The following result from [42] tells us when an I-extension of a snark is again a snark. Lemma 2.7. Let G be a snark and e and f be distinct edges of G. Then G(e, f) is a snark if and only if the graph G — {e, f} is uncolourable. Another method of constructing snarks is based on extending multipoles to cubic graphs, see [13]. If the multipole in question is uncolourable, it can be extended to a snark simply by restoring 3-regularity. We are therefore interested in extending colourable multipoles. For k > 2, we say that a k-pole M extends to a snark if there exists a colourable multipole N such that M * N is a snark. The graph M * N is called a snark extension of M. Given a k-pole M with semiedges ei, e2,..., ek, we define its colouring set to be the following set of k-tuples: Col(M) = {^(e1)^(e2)... ^(efc) : ^ is a 3-edge-colouring of M} . Note that the set Col(M) depends on the ordering in which the semiedges are listed. We therefore implicitly assume that such an ordering is given. As the colourings "inside" 284 Ars Math. Contemp. 16(2019)203-213 a multipole can usually be ignored, we define two multipoles M and N to be colour-equivalent if Col(M) = Col(N). Any colouring of a colourable multipole can be changed to a different colouring by permuting the set of colours. The particular colour of a semiedge is therefore not important, it is only important whether it equals or differs from the colour of any other semiedge. By saying this we actually define the type of a colouring ^ of a multipole M: it is the lexicographically smallest sequence of colours assigned to the semiedges of M which can be obtained from ^ by permuting the colours. By the Parity Lemma (Theorem 2.4), each colouring of a 4-pole has one of the following types: 1111,1122,1212, and 1221. Observe that every colourable 4-pole admits at least two different types of colourings. Indeed, we can start with any colouring and switch the colours along an arbitrary Kempe chain to obtain a colouring of another type. Colourable 4-poles thus can have two, three, or four different types of colourings. Those attaining exactly two types are particularly important for the study of snarks; we call them colour-open 4-poles, as opposed to colour-closed multipoles discussed in more detail in [42]. The following result appears in [13]. Proposition 2.8. A colourable 4-pole extends to a snark if and only if it is colour-open. A 4-pole M will be called isochromatic if its semiedges can be partitioned into two pairs such that in every colouring of M the semiedges within each pair are coloured with the same colour. A 4-pole M will be called heterochromatic of its semiedges can be partitioned into two pairs such that in every colouring of M the semiedges within each pair are coloured with distinct colours. The pairs of semiedges of an isochromatic or a heterochromatic 4-pole mentioned above will be called couples. Note that the 4-pole C4 obtained from a 4-cycle by attaching one dangling edge to every vertex is colour-closed, and hence neither isochromatic nor heterochromatic. Indeed, with respect to a cyclic ordering of its semiedges it admits colourings of three types, namely 1111,1122, and 1221 (but not 1212). In particular, if a snark G contains a 4-cycle C, then, as is well-known, G - V(C) stays uncolourable. The following two results are proved in [13]: Proposition 2.9. Every colour-open 4-pole is either isochromatic or heterochromatic, but not both. Moreover, it is isochromatic if and only if it admits a colouring of type 1111. Proposition 2.10. Every colour-open 4-pole can be extended to a snark by adding at most two vertices, and such an extension is unique. A heterochromatic multipole extends by joining the semiedges within each couple, that is, by adding no new vertex. An isochro-matic multipole extends by attaching the semiedges ofeach couple to a new vertex, and by connecting these two vertices with a new edge. Colour-open 4-poles can be combined to form larger 4-poles from smaller ones by employing partial junctions: we take two 4-poles M and N, choose two semiedges in each of them, and perform the individual junctions. In general, such a junction need not respect the structure of the couples of the 4-poles participating in the operation. In this manner it may happen that, for example, a partial junction of two heterochromatic 4-poles results in an isochromatic dipole or in a heterochromatic dipole. In Theorem 3.5, one of our decomposition theorems, partial junctions of 4-poles will occur in the reverse direction. J. Goedgebeur et al.: Smallest snarks with oddness 4 and cyclic connectivity 4 have order 44 279 3 Decomposition theorems The aim of this section is to show that every snark with oddness at least 4, cyclic connectivity 4, and minimum number of vertices can be decomposed into two smaller cyclically 4-edge-connected snarks G1 and G2 by removing a cycle-separating 4-edge-cut, adding at most two vertices to each of the components, and by restoring 3-regularity. This will be proved in two steps - Theorem 3.3 and Theorem 3.5. Theorem 3.3 is a decomposition theorem for cyclically 4-edge-connected cubic graphs proved in 1988 by Andersen et al. [2, Lemma 7]. Roughly speaking, it states that every cubic graph G whose cyclic connectivity equals 4 can be decomposed into two smaller cyclically 4-edge-connected cubic graphs Gi and G2 by removing a cycle-separating 4-edge-cut, adding two vertices to each of the components, and by restoring 3-regularity. Our proof is different from the one in [2] and provides useful insights into the problem. For instance, it offers the possibility to determine conditions under which it is feasible to extend a 4-pole to a cyclically 4-edge-connected cubic graph by adding two isolated edges rather than by adding two new vertices. Theorem 3.5 deals with a particular situation where the cyclically 4-edge-connected cubic graph G in question is a snark. As explained in the previous section, every snark containing a cycle-separating 4-edge-cut that leaves a colour-open component can be decomposed into two smaller snarks Gi and G2 by removing the cut, adding at most two vertices to each of the components, and by restoring 3-regularity. Unfortunately, G1 or G2 are not guaranteed to be cyclically 4-edge-connected because snark extensions forced by the colourings need not coincide with those forced by the cyclic connectivity (see Example 3.1 below). Moreover, Proposition 2.10 suggests that restoring 3-regularity by adding no new vertices, that is, by joining pairs of the four 2-valent vertices to each other in one of the components, may be necessary in order for G1 or G2 to be a snark. If this is the case, Theorem 3.3 cannot be applied. Nevertheless, Theorem 3.5 shows that if G is a smallest nontrivial snark with oddness at least 4, then we can form G1 and G2 in such a way that they indeed will be cyclically 4-edge-connected snarks. Example 3.1. We give an example of a cyclically 4-edge-connected snark in which a decomposition along a given cycle-separating 4-edge-cut forces one of the resulting smaller snarks to have cyclic connectivity smaller than 4. To construct such a snark take the Pe-tersen graph and form a 4-pole H of order 10 by severing two non-adjacent edges and a 4-pole I of order 8 by removing two adjacent vertices. It is easy to see that H is heterochro-matic with couples being formed by the semiedges obtained from the same edge, and I is isochromatic with couples formed by the semiedges formerly incident with the same vertex. Let us create a cubic graph G by arranging two copies of H and one copy of I into a cycle, and by performing junctions that respect the structure of the couples. The partial junction of two copies of H contained in G, denoted by H2, is again a heterochromatic 4-pole, so G is a junction of an isochromatic 4-pole I with a heterochromatic 4-pole, and therefore a snark. Furthermore, the cyclic connectivity of G equals 4. Let us decompose G by removing from G the 4-edge-cut S separating I from H2 and by completing each of the components to a snark. Proposition 2.10 implies that I can be completed to a copy G' of the Petersen graph while H2 extends to a snark G'' of order 20 by joining the semiedges within each couple, that is, by adding no new vertex. The same Proposition states that the decomposition of G into G' and G'' is uniquely determined by S. However, G'' has a cycle-separating 2-edge-cut connecting the two copies of H contained in it. Therefore the 286 Ars Math. Contemp. 16 (2019) 245-255 low connectivity of G" is unavoidable. We proceed to Theorem 3.3. It requires one auxiliary result about comparable cuts. Let S and T be two edge-cuts in a graph G. Let us denote the two components of G - S by Hi and H2 and those of G - T by K and K2. The cuts S and T are called comparable if Hi C Kj or Kj C Hi for some i, j G {1,2}. Lemma 3.2. Leí G be a cyclically 4-edge-connected cubic graph and let K be a component arising from the removal of a cycle-separating 4-edge-cut from G. Then any two nontrivial 2-edge-cuts in K are comparable, or K is a 4-cycle. Proof. Let S be the cycle-separating 4-edge-cut that separates K from the rest of G, and let A = {ai, a2, a3, a4} be the set of the vertices of K incident with an edge from S. Since S is independent, the vertices of A are pairwise distinct. Proposition 2.3 (i) implies that K is 2-connected. It follows that for every nontrivial 2-edge-cut Q in K the graph K - Q consists of two components, each containing exactly two vertices of A. Let R and T be two nontrivial 2-edge-cuts in K. Denote the components of K - R by Xi and X2, and those of K - T by Yi and Y2. Observe that the subgraphs Xi n Yj for i, j G {1, 2} need not all be non-empty. Let a be the number of edges between Xi n Yi and Xi n Y2, b the number of edges between Xi n Yi and X2 n Y2, c the number of edges between Xi n Yi and X2 n Yi, d the number of edges between Xi n Y2 and X2 n Yi, e the number of edges between X2 n Yi to X2 n Y2, and finally f the number of edges between Xi n Y2 and X2 n Y2; see Figure 2. Figure 2: Crossing edge-cuts R and T. If at least one of the sets X1 n Y1; X1 n Y2, X2 n Y1; and X2 n Y2 is empty, then the definition of comparable cuts directly implies that the cuts R and T are comparable, as required. Thus we can assume that all the subgraphs X¿ n Y are nonempty. Our aim is to show that in this case K is a 4-cycle. We start by showing that each of the subgraphs X1 n Y1, X1 n Y2, X2 n Y1, and X2 n Y2 contains exactly one element of A. Suppose that one of them, say X1 n Y1, contains no vertex from A. Since both R and T separate J. Goedgebeur et al.: Smallest snarks with oddness 4 and cyclic connectivity 4 have order 44 279 the vertices from A in such a way that both components contain two vertices from A, we deduce that both X1 n Y2 and X2 n Y1 contain two vertices from A each, while X2 n Y2 contains no vertex from A. Now |SK (X1 n Y1)| = a + b + c > 3, because G has no bridges and no 2-edge-cuts. Further, since X1 n Y2 contains two vertices from A and G is cyclically 4-edge-connected, we see that |SK(X1 n Y2) | = a + d + f > 2. However, R is a 2-cut, so b + c + d + f = 2. Therefore 2a > 3 and hence a > 2. Similarly, e > 2. But then |T| > a + e > 4, which contradicts the fact that T is a 2-edge-cut. Thus all the subgraphs Xj n Yj contain an element of A, which in turn implies that each Xj n Xj contains exactly one vertex from A. To finish the proof we show that a = c = e = f =1 and b = d = 0. Suppose that a = 2. Since T is a 2-edge-cut, we have that b = d = e = 0. Now c + d + e > 2 and b + e + f > 2 because G is 3-edge-connected, so c > 2 and f > 2, and hence |R| > c + f > 4, a contradiction. Thus a < 1. Similarly, we can derive that c < 1, e < 1, and f < 1. If b = 2, then a = c = d = e = f = 0 implying that G has a bridge, which is absurd. Hence b < 1 and similarly d < 1. Suppose that a = 0. As G is 3-edge-connected, we have 2 < a + b + c = b + c < 2 and similarly 2 < a + d + f = d + f < 2. It follows that that b = c = d = f = 1 and hence |R| = b + c + d + f = 4, which contradicts the fact that R is a 2-cut. Therefore a =1 and similarly c = e = f =1, which also implies that b = d = 0. Finally, every subgraph Xj n Yj has |SG(Xj n Yj)| = 3, so Xj n Yj is acyclic and therefore, by Lemma 2.2, a single vertex. In other words, K is a 4-cycle. This completes the proof. □ We are ready to prove the decomposition theorem of Andresen et al. [2]. Theorem 3.3. Let G be a cyclically 4-edge-connected cubic graph with a cycle-separating 4-edge-cut whose removal leaves components G1 and G2. Then each of G1 and G2 can be extended to a cyclically 4-edge-connected cubic graph by adding two adjacent vertices and restoring 3-regularity. Proof. It suffices to prove the statement for G1. If G1 is a 4-cycle, we can easily extend it to the complete bipartite graph K3 3 which is cyclically 4-edge-connected, as required. We therefore assume that G1 is not a 4-cycle. Let A = {a1, a2, a3, a4} be the set of vertices of G1 incident with an edge of Sg(G1). By Lemma 3.2, every 2-edge-cut in G1 separates the vertices of A into the same two 2-element sets, say {a1, a2} from {a3, a4}. We extend G1 to a cyclically 4-edge-connected cubic graph G1 as follows. Let us take two new vertices x1 and x2 and construct G1 from G1 by adding to G1 the edges x1x2, x1a1, x1a3, x2a2, X\ x2 Figure 3: Extending G1 to ¿?1. 288 Ars Math. Contemp. 16(2019)203-213 and x2a4, see Figure 3. We now verify that Gi is indeed cyclically 4-edge-connected. Suppose to the contrary that G1 is not cyclically 4-edge-connected. Then G1 has a minimum-size cycle-separating edge-cut F such that |F| < 4. Let H1 and H2 be the components of G1 - F. The cut F cannot consist entirely of edges of G1 U ¿g(G1) for otherwise F would be a cycle-separating edge-cut of G of size smaller than 4. Therefore the edge x1x2 is contained in F. Since F is an independent cut, the edges x1a1, x1a3, x2a2, and x2a4 do not belong to F. This in turn implies that a1 and a3 belong to one component of G1 - F while a2 and a4 belong to the other component of G1 - F; without loss of generality, let a1 and a3 belong to H1. Since G1 contains no bridge, there exist edges e1 and e2 in G1 such that F = {x1x2, e1, e2}. But then {e1, e2} is a 2-edge cut in G1 that separates the set {a1, a3} from {a2, a4}, which is a contradiction. This completes the proof. □ Before proving the second main result of this section we need the following fact. Proposition 3.4. Let G be a cubic graph with a cycle-separating 4-edge-cut whose removal leaves components G1 and G2. If both G1 and G2 are 3-edge-colourable, then w(G) < 2. Proof. Assume that both G1 and G2 are 3-edge-colourable. If G is 3-edge-colourable, then w(G) = 0. Therefore we may assume that G is not 3-edge-colourable. In this situation G1 admits two types of colourings and G2 admits the other two types of colourings. One of them, say G1 has a colouring of the type 1111; by Proposition 2.9, G1 is isochromatic and G2 is heterochromatic. Parity Lemma (Theorem 2.4) implies that if we take an arbitrary 3-edge-colouring of G2, then exactly two colours occur on the dangling edges of G2. Let e and f be any two of the dangling edges that receive the same colour. Then, after permuting the colours in G1, if necessary, and can be easily combined to a 3-edge-colouring of G - {e, f}. This shows that p(G) = 2 and therefore w(G) = 2. □ Now we are in position to prove our second decomposition theorem. Theorem 3.5. Let G be a snark with oddness at least 4, cyclic connectivity 4, and minimum number of vertices. Then G contains a cycle-separating 4-edge-cut S such that both components of G - S can be extended to a cyclically 4-edge-connected snark by adding at most two vertices. In fact, we prove the following stronger and more detailed result which will also be needed in our next paper [23]. Theorem 3.6. Let G be a snark with oddness at least 4, cyclic connectivity 4, and minimum number of vertices. Let S be a cycle-separating 4-edge-cut in G whose removal leaves components G1 and G2. Then, up to permutation of the index set {1,2}, exactly one of the following occurs. (i) Both G1 and G2 are uncolourable, in which case each of them can be extended to a cyclically 4-edge-connected snark by adding two vertices. (ii) G1 is uncolourable and G2 is heterochromatic, in which case G1 can be extended to a cyclically 4-edge-connected snark by adding two vertices, and G2 can be extended to a cyclically 4-edge-connected snark by adding two isolated edges. J. Goedgebeur et al.: Smallest snarks with oddness 4 and cyclic connectivity 4 have order 44 289 (iii) G1 is uncolourable and G2 is isochromatic, in which case G1 can be extended to a cyclically 4-edge-connected snark by adding two vertices, and G2 can be extended to a cyclically 4-edge-connected snark by adding two vertices, except possibly Z (G2) = 2. In the latter case, G2 is a partial junction of two colour-open 4-poles, which may be isochromatic or heterochromatic in any combination. Proof. Let G be a snark with w(G) > 4, Z(G) = 4, and with minimum number of vertices. Let S = {si, s2, s3, s4} be an arbitrary fixed cycle-separating 4-edge-cut in G, and let Gi and G2 be the components of G - S. According to Proposition 3.4, at least one of Gi and G2 is uncolourable. If both Gi and G2 are uncolourable, we can extend each of them to a cyclically 4-edge-connected snark by applying Theorem 3.3, establishing (i). For the rest of the proof we may therefore assume that G2 is colourable and Gi is not. Again, Gi can be extended to a cyclically 4-edge-connected snark by Theorem 3.3. Let Gi be an extension of Gi to a cyclically 4-edge-connected snark by adding two adjacent vertices yi and y2 according to Theorem 3.3. Without loss of generality we may assume that the vertex yi is incident with the edges si and s2 while y2 is incident with s3 and s4. As regards G2, we prove that either (ii) or (iii) holds. Our first step in this direction is showing that G2 can be extended to a snark. In view of Proposition 2.8, this amounts to verifying that G2 is colour-open. Claim 1. The 4-pole G2 is colour-open. Proof of Claim 1. Suppose to the contrary that G2 is not colour-open. This means that it has at least three types of colourings. Since G is a smallest cyclically 4-edge-connected snark with oddness at least 4 and Gi is a cyclically 4-edge-connected snark with fewer vertices than G, we infer that w(Gi) = 2. By Lemma 2.6, there exist two nonadjacent edges ei and e2 in Gi such that Gi - {ei, e2} is colourable. Equivalently, by Lemma 2.7, the cubic graph Gi(ei, e2) is colourable. We claim that the edge yiy2 is one of ei and e2. Suppose not. Then both ei and e2 have at least one end-vertex in Gi. As mentioned, ¿?i(ei, e2) is a colourable cubic graph. Hence Gi(ei, e2) is a colourable 4-pole, and therefore it has at least two types of colourings. Since G2 has at least three of the four types, both Gi(ei, e2) and G2 admit colourings of the same type. These colourings can be combined into a colouring of G(ei, e2), implying that G - {ei, e2} is also colourable. However, from Lemma 2.6 we get that w(G) = 2, which is a contradiction proving that one of ei and e2 coincides with yiy2. Assuming that yiy2 = ei, let us consider a minimum 4-edge-colouring of Gi where ei and e2 are the only edges of Gi coloured 0. Theorem 2.5 implies that there exist a unique non-zero colour that is repeated at both ei and e2. Without loss of generality we may assume that the repeated colour is 1 and that ^i(si) = ^i(s3) = 1, ^i(s2) = 2, and ^i(s4) = 3. In this situation, G2 cannot have a colouring of type 1212 for otherwise we could combine this colouring with to produce a 3-edge-colouring of G - {e2, s4}, which is impossible since w(G) > 4. Therefore G2 has colourings of all the remaining three types 1111, 1122, and 1221. Consider the 1-2-Kempe chain P in Gi with respect to the colouring beginning at the vertex y2. Clearly, the other end of P must be the end-vertex of e2 incident with edges of colours 1, 3, and 0. If P does not pass through the vertex yi, we switch the colours on P producing a 4-edge-colouring of Gi where ^'i(si) = 1, ^i(s2) = ^i(s3) = 2, and ^i(s4) = 3. However, can be combined with a colouring of G2 of type 1221 290 Ars Math. Contemp. 16(2019)203-213 to obtain a 3-edge-colouring of G - {e2, s4}, which is impossible since w(G) > 4. If P passes through y, we switch the colours only on the segment P0 between y2 and y, producing an improper colouring of G1 with y1 being its only faulty vertex. Depending on whether P0 ends with an edge coloured 1 or 2 we get 4>'{(s1) = 4>1(s2) = 4>1(s3) = 2 and (S4) = 3, or (s 1) = ^"(s2) = 1, 4>"(«3) = 2, and (s4) = 3. In the latter case we can combine 4>1 with a colouring of G2 of type 1122, producing a 3-edge-colouring of G - {e2, s4}. In the former case we first interchange the colours 1 and 2 on G 1 and then combine the resulting colouring with a colouring of G2 of type 1111, again producing a 3-edge-colouring of G - {e2, s4}. Since w(G) > 4, in both cases we have reached a contradiction. This establishes Claim 1. □ Proposition 2.10 now implies that G2 can be extended to a snark G2 by adding at most two vertices. Recall that such an extension is unique up to isomorphism and depends only on whether G2 is isochromatic or heterochromatic. We discuss these two cases separately. Case 1. G2 is isochromatic. First note that in this case G2 arises from G2 by adding two new vertices x 1 and x2 joined by an edge and by attaching each of the new vertices to the semiedges in the same couple. From Proposition 2.3 (i) we get that Z(G2) > 2. If Z(G2) > 4, then the same obviously holds for G2. Assume that Z(G2) = 3, and let A denote the set of end-vertices in G2 of the edges of the edge-cut S. Note that |A| = 4 because S is independent. Since Z(G) = 4, every cycle separating 3-edge-cut R in G2 has the property that each component of G2 - R contains at least one vertex from A. This readily implies that Z (G2) > 4 and establishes the statement (iii) whenever Z (G2) > 3. It remains to consider the case where Z(G2) = 2. Let U be a cycle-separating 2-edge-cut in G2 and let Q 1 and Q2 be the components of G2 - U. Since G is cyclically 4-edge-connected, each Qj contains exactly two vertices from A and thus both Q 1 and Q2 are 4-poles. Each Qj is colourable because any 3-edge-colouring of G2 provides one for Qj. Furthermore, each Qj is colour-open, because G2 and hence also Qj has an extension to G2. Thus G2 is a partial junction of two colour-open 4-poles. It is not difficult to show that an isochromatic 4-pole can arise from a partial junction of any combination of isochromatic and heterochromatic 4-poles, as claimed. Case 2. G2 is heterochromatic. In this case G2 arises from a snark by severing two independent edges. Suppose to the contrary that G2 is not cyclically 4-edge-connected. Then G2 has at least twelve vertices, because there is only one 2-edge-connected snark of order less than twelve - the Petersen graph - and its cyclic connectivity equals 5. Let us take a heterochromatic 4-pole H of order 10 obtained from the Petersen graph and substitute G2 in G with H, creating a new cubic graph G'. Clearly, G' is a snark of order smaller than G. To derive a final contradiction with the minimality of G we show that G' is cyclically 4-edge-connected and has oddness at least 4. Claim 2. w(G') > 4. Proof of Claim 2. Suppose to the contrary that w(G') < 4. Since G 1 is uncolourable and G 1 C G', we infer that w(G') = 2 which in turn implies that p(G') = 2. Therefore there exist edges e 1 and e2 in G' such that G' - {e 1, e2} is colourable. In other words, G' has a minimum 4-edge-colouring ^ where e 1 and e2 are the only edges of G' coloured 0. Since G is uncolourable, at least one of e and e2 must have both end-vertices in G . Without loss of generality assume that at e has both end-vertices in G . If e2 had at least J. Goedgebeur et al.: Smallest snarks with oddness 4 and cyclic connectivity 4 have order 44 291 one end-vertex in Gi, we could take a 3-edge-colouring of G' - jei, e2}, remove H and reinstate G2 coloured in such a way that the edges in S -{ e2} receive the same colours from G2 as they did from H; this is possible since G2 and H are colour-equivalent. However, in this way we would produce a 3-edge-colouring of G — {e1, e2}, contrary to the assumption that w(G) = 4. Therefore e2 has both ends in H. Since H is heterochromatic, the edges of S can be partitioned into couples such that for every 3-edge-colouring of H the colours of both edges within a couple are always different. Let {s», Sj} and {sk, s;} be the couples of H. Further, since ^ is a minimum 4-edge-colouring of G', all three non-zero colours are present on the edges adjacent to each of e», one of the colours being represented twice. By Theorem 2.5, the same colour occurs twice at both e1 and e2, say colour 1. If we regard ^ as a Z2 x Z2-valuation and sum the outflows from vertices of G1 we see that the flow through S equals ^(s1) + ^(s2) + ^(s3) + ^(s4) = 1. Hence, the distribution of colours in the couples of S, the set {{^(sj), ^(sj)}, {^(sfc), ^(s;)}}, must have one of the following four forms: D1 = {{1,1}, {2, 3}}, D = {{1, 2}, {1, 3}}, D3 = {{2, 2}, {2, 3}}, D4 = {{2, 3}, {3, 3}}. We now concentrate on the restriction of ^ to G1 and show that it can be modified to a 4-edge-colouring A of G1 with distribution either D2 or D3. If the colouring ^ of G' has distribution D4, we can simply interchange the colours 2 and 3 to obtain the distribution D3. Assume that ^ has distribution D1. Let us consider the unique end-vertex u of e1 in G1 such that the edges incident with u receive colours 1, 3, and 0 from The 1-2-Kempe chain P starting at u ends with a vertex incident with e2, which means that P traverses S. Let s be the first edge of S that belongs to P. If ^(s) = 1, then the desired 4-edge-colouring A of G1 with distribution D2 can be obtained by the Kempe switch on the segment of P that ends with s and by a subsequent permutation of colours interchanging 1 and 2. If ^(s) = 2, then a 4-edge-colouring of G1 with distribution D3 can be obtained similarly. In both cases, e1 is the only edge coloured 0 under A. If A has distribution D2, then A and a 3-edge-colouring of H of type 1212 can be combined to a 3-edge-colouring of G' — {e1, s;}. However, as observed earlier, by removing H and reinstating G2 we could produce a 3-edge-colouring of G — {e1, s;}, which is impossible because w(G) > 4. If A has distribution D3, we can similarly combine A with a 3-edge-colouring of H of type 1221 to a 3-edge-colouring of G' — {e1, sj} which is impossible for the same reason. This contradiction completes the proof of Claim 2. □ Claim 3. Z(G') = 4. Proof of Claim 3. Suppose to the contrary that Z (G') < 4. Let S' be a minimum size cycle-separating edge-cut in G'. If all the edges of S' had at least one end vertex in G1, then S' would be a cycle-separating cut also in G, which is impossible. Therefore at least one edge of S' has both ends in H, which means that S' intersects H. Since H is connected, we conclude that S'H = S' n E(H) is an edge-cut of H. Note that S'H is an independent set of edges, so S'H must be a cycle-separating edge-cut in H. Recall, however, that H arises from the Petersen graph by severing two independent edges e and f. It follows that S'H U {e, f} is a cycle-separating edge-cut in the Petersen graph. Hence, |SH U {e, f }| > 5, 292 Ars Math. Contemp. 16(2019)203-213 and consequently 3 < |SH| < |S'| < 3. This shows that S'H = S' and therefore S' is completely contained in H; in particular S' n S = 0. Because S' is an edge-cut of the entire G', all the edges of S must join Gi to the same component of H - S'. On the other hand, the Petersen graph is cyclically 5-edge-connected, therefore both e and f have end-vertices in different components of H - S'. The way how G' was constructed from G now implies that the set of end-vertices of S in H coincides with the set of end-vertices of e and f. Therefore S has an end-vertex in each component of H - S', contradicting the previous observation. This contradiction establishes Claim 3. □ Claim 2 and Claim 3 combined provide a final contradiction with the choice of G, which concludes the proof. □ We proceed to proving our second decomposition theorem. Proof of Theorem 3.5. Let G be a snark with oddness at least 4, cyclic connectivity 4, and minimum number of vertices. If G contains a cycle-separating 4-edge-cut whose removal leaves either two uncolourable components or one uncolourable component and one hete-rochromatic component, then the conclusion follows directly from Theorem 3.6 (i) or (ii), respectively. Otherwise one of the components is uncolourable and the other one, denoted by G2, is isochromatic. In this case, G2 contains a subgraph K which is an atom, possibly K = G2. Clearly, K is colourable and SG(K) is a cycle-separating 4-edge-cut. If K is heterochromatic, then the conclusion again follows from Theorem 3.6 (ii). Therefore we may assume that K is isochromatic. Since 4 = Z(G) < 5 < g(G), we see that K is a nontrivial atom and from Proposition 2.3 (ii) we infer that Z(K) > 3. Applying statement (iii) of Theorem 3.6 with S = SG (K) we finally get the desired result. □ 4 Main result We are now ready to prove our main result. Theorem 1.1. The smallest number of vertices of a snark with cyclic connectivity 4 and oddness at least 4 is 44. The girth ofeach such snark is at least 5. Proof. Let G be a snark with oddness at least 4, cyclic connectivity 4, and minimum order. We first prove that G has girth at least 5. By Proposition 2.1, the girth of G is at least 4. Suppose to the contrary that G contains a 4-cycle C, and let S be the edge-cut separating C from the rest of G. Since S is cycle-separating, it has to satisfy one of the statements (i) — (iii) of Theorem 3.6. In the notation of Theorem 3.6, C necessarily plays the role of G2, because it is colourable. In particular, S does not satisfy (i). However, S satisfies neither (ii) because G2 is not heterochromatic, nor (iii) since G2 is not isochromatic. Thus we have reached a contradiction proving that the girth of G is at least 5. In Figure 1 we have displayed a snark with oddness at least 4, cyclic connectivity 4 on 44 vertices. It remains to show that there are no snarks of oddness at least 4 and cyclic connectivity 4 with fewer than 44 vertices. Our main tool is Theorem 3.5. It implies that every snark with oddness at least 4, cyclic connectivity 4, and minimum number of vertices can be obtained from two smaller cyclically 4-edge-connected snarks Gi and G2 by the following process: • Form a 4-pole H from each Gj by either removing two adjacent vertices or two nonadjacent edges and by retaining the dangling edges. J. Goedgebeur et al.: Smallest snarks with oddness 4 and cyclic connectivity 4 have order 44 293 • Construct a cubic graph G by identifying the dangling edges of H i with those of H2 after possibly applying a permutation to the dangling edges of Hi or H2. Any graph G obtained in this manner will be called a 4-join of Gi and G2. Note that the well-known operation of a dot product of snarks [1, 28] is a special case of a 4-join. We proceed to proving that every snark with cyclic connectivity 4 on at most 42 vertices has oddness 2. If G is a snark with cyclic connectivity 4 on at most 42 vertices, then by Theorem 3.5 it contains a cycle-separating 4-edge-cut S such that both components Ki and K2 of G - S can be extended to snarks Gi and G2, respectively, by adding at most two vertices; in other words, G is a 4-join of Gi and G2. Clearly, |V(Ki)| + |V(K2)| = |V(G)| < 42. Assuming that |V(Ki)| < |V(K2)| we see that |V(Ki)| > 8, because the smallest cyclically 4-edge-connected snark has 10 vertices, and hence |V(K2)| < 34. Therefore both Gi and G2 have order at least 10 and at most 36. Let Sn denote the set of all pairwise non-isomorphic cyclically 4-edge-connected snarks of order not exceeding n. To finish the proof it remains to show that every 4-join of two snarks from S36 with at most 42 vertices has oddness 2. Unfortunately, verification of this statement in a purely theoretical way is far beyond currently available methods. The final step of our proof has been therefore performed by a computer. We have written a program which applies a 4-join in all possible ways to two given input graphs and have applied this program to the complete list of snarks from the set S36. More specifically, given an arbitrary pair of input graphs, the program removes in all possible ways either two adjacent vertices or two nonadjacent edges from each of the graphs (retaining the dangling edges) and then identifies the dangling edges from the first graph in the pair with the dangling edges of the second graph, again in all possible (i.e., 4! = 24) ways. We also use the nauty library [39, 40] to determine the orbits of edges and edge pairs in the input graphs, so the program only removes two adjacent vertices or two nonadjacent edges once from every orbit of edges or edge pairs, respectively. The resulting graphs can still contain isomorphic copies, therefore we also use nauty to compute a canonical labelling of the graphs and remove the isomorphic copies. Until now, only the set S34 has been known; it was determined by Brinkmann, Häg-glund, Markström, and the first author [7] in 2013 and was shown to contain exactly 27 205 766 snarks. Using the program snarkhunter [7, 8] we have been able to generate all cyclically 4-edge-connected snarks on 36 vertices, thereby completing the determination of S36. This took about 80 CPU years and yielded exactly 404 899 916 such graphs. The size of S36 thus totals to 432 105 682 graphs. (The new list of snarks can be downloaded from the House of Graphs [6] at http://hog.grinvin.org/Snarks.) Finally, we have performed all possible 4-joins of two snarks from S36 that produce a snark with at most 42 vertices and checked their oddness. This computation required approximately 75 CPU days. We have used two independent programs to compute the oddness of the resulting graphs (the source code of these programs can be obtained from [21]) and in each case the results of both programs were in complete agreement. No snark of oddness greater than 2 among them was found, which completes the proof of Theorem 1.1. □ 5 Remarks and open problems We have applied the 4-join operation to all valid pairs of snarks from S36 to construct cyclically 4-edge-connected snarks on 44 vertices and checked their oddness. In this manner we have produced 31 cyclically 4-edge-connected snarks of oddness 4, including the one from 294 Ars Math. Contemp. 16(2019)203-213 Figure 1, all of them having girth 5. The most symmetric of them is shown in Figure 4. We will describe and analyse these 31 snarks in the sequel of this paper [23], where we also prove that they constitute a complete list of all snarks with oddness at least 4, cyclic connectivity 4, and minimum number of vertices. As we have already mentioned in Introduction (Section 1), Theorem 1.1 does not yet determine the smallest order of a nontrivial snark with oddness 4, because there might exist snarks with oddness at least 4 of order 38, 40, or 42 with cyclic connectivity greater than 4. Furthermore, it is not immediately clear why a snark G with w (G) > m and minimum order should have oddness exactly m. This situation suggests two natural problems which require the following definition: Given integers w > 2 and k > 2, let m(w, k) denote the minimum order of a cyclically k-edge-connected snark with oddness at least w. For example, one has m(2, 2) = m(2, 3) = m(2,4) = m(2,5) = 10 as exemplified by the Petersen graph, and m(2, 6) = 28 as exemplified by the Isaacs flower snark J7. The values m(2, k) for k > 7 are not known, however the well-known conjecture of Jaeger and Swart [31] that there are no cyclically 7-edge-connected snarks would imply that these values are not defined. For w = 4, Lukot'ka et al. [35, Theorem 12] showed that m(4, 2) = m(4,3) = 28. The value m(4,4) remains unknown although our Theorem 1.1 seems to suggest that m(4,4) = 44. Problem 5.1. Determine the value m(4,4). Our second problem asks whether the function m(w, k) is monotonous in both coordinates. Problem 5.2. Is it true that m(w +1, k) > m(w, k) and m(w, k + 1) > m(w, k) whenever the involved values are defined? J. Goedgebeur et al.: Smallest snarks with oddness 4 and cyclic connectivity 4 have order 44 295 6 Testing conjectures After having generated all snarks from the set S34 and those from S36 that have girth at least 5, Brinkmann et al. [7] tested the validity of several important conjectures whose minimal counterexamples, provided that they exist, must be snarks. For most of the considered conjectures the potential minimal counterexamples are proven to be nontrivial snarks, that is, those with cyclic connectivity at least 4 and girth at least 5. Nevertheless, in some cases the girth condition has not been established. Therefore it appears reasonable to check the validity of such conjectures on the set S36 \ S34 of all cyclically 4-edge-connected snarks of order 36. We have performed these tests and arrived at the conclusions discussed below; for more details on the conjectures we refer the reader to [7]. A dominating circuit in a graph G is a circuit C such that every edge of G has an end-vertex on C. Fleischner [17] made the following conjecture on dominating cycles. Conjecture 6.1 (Dominating circuit conjecture). Every cyclically 4-edge-connected snark has a dominating circuit. The dominating circuit conjecture exists in several different forms (see, for example, [3, 18]) and is equivalent to a number of other seemingly unrelated conjectures such as the Matthews-Sumner conjecture about the hamiltonicity of claw-free graphs [38]. For more information on these conjectures see [10]. Our tests have resulted in the following claim. Claim 6.2. Conjecture 6.1 has no counterexample on 36 or fewer vertices. The total chromatic number of a graph G is the minimum number of colours required to colour the vertices and the edges of G in such a way that adjacent vertices and edges have different colours and no vertex has the same colour as its incident edges. The total colouring conjecture [4, 50] suggests that the total chromatic number of every graph with maximum degree A is either A +1 or A + 2. For cubic graphs this conjecture is known to be true by a result of Rosenfeld [45], therefore the total chromatic number of a cubic graph is either 4 or 5. Cavicchioli et al. [12, Problem 5.1] asked for a smallest nontrivial snark with total chromatic number 5. Brinkmann et al. [7] showed that such a snark must have at least 38 vertices. Sasaki et al. [46] displayed examples of snarks with connectivity 2 or 3 whose total chromatic number is 5 and asked [46, Question 2] for the order of a smallest cyclically 4-edge-connected snark with total chromatic number 5. Brinkmann et al. [9] constructed cyclically 4-edge-connected snarks with girth 4 and total chromatic number 5 for each even order greater than or equal to 40. Our next claim shows that the value asked for by Sasaki et al. is either 38 or 40. Claim 6.3. All cyclically 4-edge-connected snarks with at most 36 vertices have total chromatic number 4. The following conjecture was made by Jaeger [30] and is known as the Petersen colouring conjecture. If true, this conjecture would imply several other profound conjectures, in particular, the 5-cycle double cover conjecture and the Fulkerson conjecture. Conjecture 6.4 (Petersen colouring conjecture). Every bridgeless cubic graph G admits a colouring of its edges using the edges of the Petersen graph as colours in such a way that any three mutually adjacent edges of G are coloured with three mutually adjacent edges of the Petersen graph. 296 Ars Math. Contemp. 16 (2019) 277-298 It is easy to see that the smallest counterexample to this conjecture must be a cyclically 4-edge-connected snark. Brinkmann et al. [7] showed that the smallest counterexample to the Petersen colouring conjecture must have order at least 36. Here we improve the latter value to 38. Claim 6.5. Conjecture 6.4 has no counterexamples on 36 or fewer vertices. References [1] G. M. Adelson-Velsky and V. K. Titov, On edge 4-chromatic cubic graphs (in Russian), in: V. K. Zakharov, V. P. Kozyrev, K. A. Rybnikov, V. N. Sachkov, V. E. Stepanov and V. E. Tarakanov (eds.), Voprosy Kibernetiki, Proceedings of the Seminar on Combinatorial Mathematics (Moscow State University, Moscow, January 27-29, 1971), Moscow, 1973 pp. 5-14. [2] L. D. Andersen, H. Fleischner and B. Jackson, Removable edges in cyclically 4-edge-connected cubic graphs, Graphs Combin. 4 (1988), 1-21, doi:10.1007/bf01864149. [3] P. Ash and B. Jackson, Dominating cycles in bipartite graphs, in: J. A. Bondy and U. S. R. Murty (eds.), Progress in Graph Theory, Academic Press, Toronto, Ontario, 1984 pp. 81-87, proceedings of the conference on combinatorics held at the University of Waterloo, Waterloo, Ontario, 1982. [4] M. Behzad, G. Chartrand and J. K. Cooper, Jr., The colour numbers of complete graphs, J. London Math. Soc. 42 (1967), 226-228, doi:10.1112/jlms/s1-42.1.226. [5] D. Blanusa, Problem cetiriju boja, GlasnikMat. Fiz. Astr. Ser. II1 (1946), 31-42. [6] G. Brinkmann, K. Coolsaet, J. Goedgebeur and H. Mflot, House of Graphs: a database of interesting graphs, Discrete Appl. Math. 161 (2013), 311-314, doi:10.1016/j.dam.2012.07.018, available at http://hog.grinvin.org/. [7] G. Brinkmann, J. Goedgebeur, J. Hagglund and K. Markstrom, Generation and properties of snarks, J. Comb. Theory Ser. B 103 (2013), 468-488, doi:10.1016/j.jctb.2013.05.001. [8] G. Brinkmann, J. Goedgebeur and B. D. McKay, Generation of cubic graphs, Discrete Math. Theor. Comput. Sci. 13 (2011), 69-80, https://www.dmtcs.org/dmtcs-ojs/ index.php/dmtcs/article/view/18 01/0.html. [9] G. Brinkmann, M. Preissmann and D. Sasaki, Snarks with total chromatic number 5, Discrete Math. Theor. Comput. Sci. 17 (2015), 369-382, https://www.dmtcs.org/ dmtcs-ojs/index.php/dmtcs/article/view/2 5 67.1.html. [10] H. Broersma, G. Fijavz, T. Kaiser, R. Kuzel, Z. Ryjdcek and P. Vrdna, Contractible subgraphs, Thomassen's conjecture and the dominating cycle conjecture for snarks, Discrete Math. 308 (2008), 6064-6077, doi:10.1016/j.disc.2007.11.026. [11] P. J. Cameron, A. G. Chetwynd and J. J. Watkins, Decomposition of snarks, J. Graph Theory 11 (1987), 13-19, doi:10.1002/jgt.3190110104. [12] A. Cavicchioli, T. E. Murgolo, B. Ruini and F. Spaggiari, Special classes of snarks, Acta Appl. Math. 76 (2003), 57-88, doi:10.1023/a:1022864000162. [13] M. Chladn^ and M. Skoviera, Factorisation of snarks, Electron. J. Combin. 17 (2010), #R32, https://www.combinatorics.org/ojs/index.php/eljc/article/view/ v17i1r32. [14] B. Descartes, Network-colourings, Math. Gaz. 32 (1948), 67-69, doi:10.2307/3610702. [15] M. A. Fiol, A Boolean algebra approach to the construction of snarks, in: Y. Alavi, G. Chartrand, O. R. Oellermann and A. J. Schwenk (eds.), Graph Theory, Combinatorics, and Applications, Volume 1, John Wiley & Sons, New York, Wiley-Interscience Publication, 1991 pp. J. Goedgebeur et al.: Smallest snarks with oddness 4 and cyclic connectivity 4 have order 44 297 493-524, proceedings of the Sixth Quadrennial International Conference on the Theory and Applications of Graphs held at Western Michigan University, Kalamazoo, Michigan, May 30 -June 3, 1988. [16] M. A. Fiol, G. Mazzuoccolo and E. Steffen, On measures of edge-uncolorability of cubic graphs: A brief survey and some new results, 2017, arXiv:1702.07156 [math.CO]. [17] H. Fleischner, Cycle decompositions, 2-coverings, removable cycles, and the four-color disease, in: J. A. Bondy and U. S. R. Murty (eds.), Progress in Graph Theory, Academic Press, Toronto, Ontario, 1984 pp. 233-246, proceedings of the conference on combinatorics held at the University of Waterloo, Waterloo, Ontario, 1982. [18] H. Fleischner and M. Kochol, A note about the dominating circuit conjecture, Discrete Math. 259 (2002), 307-309, doi:10.1016/s0012-365x(02)00588-5. [19] M. Fontet, Graphes 4-essentiels, C. R. Acad. Sci. Paris Ser. A 287 (1978), 289-290. [20] J.-L. Fouquet, Graphes cubiques d'indice chromatique quatre, Ann. Discrete Math. 9 (1980), 23-28, doi:10.1016/s0167-5060(08)70028-1. [21] J. Goedgebeur, Source code of two programs to compute the oddness of a graph, http:// caagt.ugent.be/oddness/. [22] J. Goedgebeur, On the smallest snarks with oddness 4 and connectivity 2, Electron. J. Combin. 25 (2018), #P2.15, https://www.combinatorics.org/ojs/index.php/eljc/ article/view/v25i2p15. [23] J. Goedgebeur, E. Mdcajovd and M. Skoviera, The smallest nontrivial snarks of oddness 4, in prepration. [24] R. Haggkvist and S. McGuinness, Double covers of cubic graphs with oddness 4, J. Comb. Theory Ser. B 93 (2005), 251-277, doi:10.1016/j.jctb.2004.11.003. [25] J. Hagglund, On snarks that are far from being 3-edge colorable, Electron. J. Combin. 23 (2016), #P2.6, https://www.combinatorics.org/ojs/index.php/eljc/ article/view/v2 3i2p6. [26] I. Holyer, The NP-completeness of edge-coloring, SIAM J. Comput. 10 (1981), 718-720, doi: 10.1137/0210055. [27] A. Huck and M. Kochol, Five cycle double covers of some cubic graphs, J. Comb. Theory Ser. B 64 (1995), 119-125, doi:10.1006/jctb.1995.1029. [28] R. Isaacs, Infinite families of nontrivial trivalent graphs which are not Tait colorable, Amer. Math. Monthly 82 (1975), 221-239, doi:10.2307/2319844. [29] F. Jaeger, A survey of the cycle double cover conjecture, in: B. R. Alspach and C. D. Godsil (eds.), Cycles in Graphs, North-Holland, Amsterdam, volume 115 of North-Holland Mathematics Studies, 1985 pp. 1-12, doi:10.1016/s0304-0208(08)72993-1, papers from the workshop held at Simon Fraser University, Burnaby, British Columbia, July 5 - August 20, 1982. [30] F. Jaeger, Nowhere-zero flow problems, in: L. W. Beineke and R. J. Wilson (eds.), Selected Topics in Graph Theory, Volume 3, Academic Press, San Diego, California, pp. 71-95, 1988. [31] F. Jaeger and T. Swart, Problem session, Ann. Discrete Math. 9 (1980), 304-305, doi:10.1016/ s0167-5060(08)70086-4. [32] E. L. Johnson, A proof of 4-coloring the edges of a cubic graph, Amer. Math. Monthly 73 (1966), 52-55, doi:10.2307/2313923. [33] M. Kochol, Superposition and constructions of graphs without nowhere-zero k-flows, European J. Combin. 23 (2002), 281-306, doi:10.1006/eujc.2001.0563. 298 Ars Math. Contemp. 16(2019)203-213 [34] R. Lukot'ka, E. Mdcajovd, J. Mazik and M. Skoviera, Erratum to "Small snarks with large oddness", in preparation. [35] R. Lukot'ka, E. Mdcajovd, J. Mazdk and M. Skoviera, Small snarks with large oddness, Electron. J. Combin. 22 (2015), #P1.51, https://www.combinatorics.org/ojs/ index.php/eljc/article/view/v22i1p51. [36] E. Mdcajovd and M. Skoviera, Irreducible snarks of given order and cyclic connectivity, Discrete Math 306 (2006), 779-791, doi:10.1016/j.disc.2006.02.003. [37] E. Mdcajovd and M. Skoviera, Sparsely intersecting perfect matchings in cubic graphs, Com-binatorica 34 (2014), 61-94, doi:10.1007/s00493-014-2550-4. [38] M. M. Matthews and D. P. Sumner, Hamiltonian results in K1>3-free graphs, J. Graph Theory 8 (1984), 139-146, doi:10.1002/jgt.3190080116. [39] B. D. McKay, nauty User's Guide (Version 1.5), Technical Report TR-CS-90-02, Department of Computer Science, Australian National University, 1990, the latest version of the software is available at http://cs.anu.edu.au/~bdm/nauty. [40] B. D. McKay and A. Piperno, Practical graph isomorphism, II, J. Symbolic Comput. 60 (2014), 94-112, doi:10.1016/j.jsc.2013.09.003. [41] R. Nedela and M. Skoviera, Atoms of cyclic connectivity in cubic graphs, Math. Slovaca 45 (1995), 481-499. [42] R. Nedela and M. Skoviera, Decompositions and reductions of snarks, J. Graph Theory 22 (1996), 253-279, doi:10.1002/(sici)1097-0118(199607)22:3<253::aid-jgt6>3.0.co;2-l. [43] N. Robertson, Minimal cyclic-4-connected graphs, Trans. Amer. Math. Soc. 284 (1984), 665687, doi:10.2307/1999101. [44] R. W. Robinson and N. C. Wormald, Almost all cubic graphs are Hamiltonian, Random Structures Algorithms 3 (1992), 117-125, doi:10.1002/rsa.3240030202. [45] M. Rosenfeld, On the total coloring of certain graphs, Israel J. Math. 9 (1971), 396-402, doi: 10.1007/bf02771690. [46] D. Sasaki, S. Dantas, C. M. H. de Figueiredo and M. Preissmann, The hunting of a snark with total chromatic number 5, Discrete Appl. Math. 164 (2014), 470-481, doi:10.1016/j.dam.2013. 04.006. [47] C. E. Shannon, A theorem on coloring the lines of a network, J. Math. Physics 28 (1949), 148-151, doi:10.1002/sapm1949281148. [48] E. Steffen, Classification and characterizations of snarks, Discrete Math. 188 (1998), 183-203, doi:10.1016/s0012-365x(97)00255-0. [49] E. Steffen, Measurements of edge-uncolorability, Discrete Math. 280 (2004), 191-214, doi: 10.1016/j.disc.2003.05.005. [50] V. G. Vizing, On an estimate of the chromatic class of a p-graph (in Russian), Diskret. Analiz 3 (1964), 25-30. [51] N. C. Wormald, Classifying k-connected cubic graphs, in: A. F. Horadam and W. D. Wallis (eds.), Combinatorial Mathematics VI, Springer, Berlin, volume 748 of Lecture Notes in Mathematics, pp. 199-206, 1979, doi:10.1007/bfb0102696, proceedings of the Sixth Australian Conference held at the University of New England, Armidale, August, 1978. ARS MATHEMATICA CONTEMPORANEA ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 16 (2019) 299-317 https://doi.org/10.26493/1855-3974.1164.2f7 (Also available at http://amc-journal.eu) Order-chain polytopes * Takayuki Hibi Department of Pure and Applied Mathematics, Graduate School of Information Science and Technology, Osaka University, Suita, Osaka 565-0871, Japan Nan Li Department of Mathematics, Massachusetts Institute of Technology, Cambridge, MA 02139, USA Teresa Xueshan Li t School of Mathematics and Statistics, Southwest University, Chongqing 400715, PR China Li Li Mu School of Mathematics, Liaoning Normal University, Dalian 116029, PR China Akiyoshi Tsuchiya Department of Pure and Applied Mathematics, Graduate School of Information Science and Technology, Osaka University, Suita, Osaka 565-0871, Japan Received 18 July 2016, accepted 28 November 2018, published online 6 January 2019 Given two families X and Y of integral polytopes with nice combinatorial and algebraic properties, a natural way to generate a new class of polytopes is to take the intersection P = Pi n P2, where Pi G X, P2 G Y. Two basic questions then arise: 1) when P is integral and 2) whether P inherits the "old type" from P1, P2 or has a "new type", that is, whether P is unimodularly equivalent to a polytope in X U Y or not. In this paper, we focus on the families of order polytopes and chain polytopes. Following the above framework, we create a new class of polytopes which are named order-chain polytopes. When studying *This work was initiated when the third author and the fourth author were visiting the MIT Department of Mathematics. These two authors would like to thank Professor Richard Stanley for many helpful discussions. This work was supported by the China Scholarship Council, the National Science Foundation of China (Grant No. 11601440, 11701249), the Natural Science Foundation of Chongqing (Grant No. cstc2016jcyjA0245) and Fundamental Research Funds for Central Universities (Grant No. XDJK2018C075). t Corresponding author. Abstract ©® This work is licensed under https://creativecommons.Org/licenses/by/4.0/ 300 Ars Math. Contemp. 16(2019)203-213 their volumes, we discover a natural relation with Ehrenborg and Mahajan's results on maximizing descent statistics. Keywords: Poset, order-chain polytope, unimodular equivalence. Math. Subj. Class.: 52B05, 52B20 1 Introduction This paper was motivated by the following two questions about intersecting two integral polytopes Pi and P2, which come from two given families X and Y of polytopes respectively: 1) when the intersection P = P1 n P2 is integral and 2) whether P inherits the "old type" from P1, P2 or has a "new type", that is, whether P is unimodularly equivalent to a polytope in X U Y or not. Usually, we shall start with those families X and Y of polytopes which have nice combinatorial and algebraic properties. In this paper, we focus on the families of order polytopes and chain polytopes. Instead of considering the intersection of an arbitrary d-dimensional order polytope and an arbitrary d-dimensional chain polytope, we will consider the intersection of an order polytope O(P') and a chain polytope C(P"), both of which arise from weak subposets P', P" of a given poset. The resulting polytope is called an order-chain polytope, which generalizes both order polytope and chain polytope. The order polytope O(P) as well as the chain polytope C (P) arising from a finite partially ordered set P has been studied by many authors from viewpoints of both combinatorics and commutative algebra. Especially, in [16], the combinatorial structures of order polytopes and chain polytopes are explicitly discussed. Furthermore, in [9], the natural question when the order polytope O(P) and the chain polytope C(P) are unimodularly equivalent is solved completely. It follows from [5] and [8] that the toric ring ([7, p. 37]) of O(P) and that of C(P) are algebras with straightening laws ([6, p. 124]) on finite distributive lattices. Thus in particular the toric ideal ([7, p. 35]) of each of O(P) and C(P) possesses a squarefree quadratic initial ideal ([7, p. 10]) and possesses a regular unimodular triangulation ([7, p. 254]) arising from a flag complex. Furthermore, toric rings of order polytopes naturally appear in algebraic geometry (e.g., [2]) and in representation theory (e.g., [18]). We begin by introducing some basic notation and terminology. Given a convex polytope P C Rd, a facet hyperplane of P C Rd is defined to be a hyperplane in Rd which contains a facet of P. If H = {(xi, X2,..., xd) G Rd : aixi + a^ +-----+ adxd - b = 0}, where each a4 and b belong to R, is a hyperplane of Rd and v = (y1, y2,..., yd) G Rd, then we set H(v) = aiyi + a2y2 +-----+ a,dVd - b. E-mail addresses: hibi@math.sci.osaka-u.ac.jp (Takayuki Hibi), amenda860111@gmail.com (Nan Li), pmgb@swu.edu.cn (Teresa Xueshan Li), lly-mu@hotmail.com (Li Li Mu), a-tsuchiya@ist.osaka-u.ac.jp (Akiyoshi Tsuchiya) T. Hibi et al.: Order-chain polytopes 301 Let (P, be a finite partially ordered set (poset, for short) on [d] = {1,..., d}. For each subset S C P, we define p(S) = J2ieS ei, where ei,..., ed are the canonical unit coordinate vectors of Rd. In particular p(0) = (0,0,..., 0), the origin of Rd. A subset I of P is an order ideal of P if i e I, j G [d] together with j ^ i in P imply j G I. An antichain of P is a subset A of P such that any two elements in A are incomparable. We say that j covers i if i -< j and there is no k G P such that i -< k < j. A chain j1 < j2 -< • • • -< js is saturated if jq covers jq-1 for 1 < q < s, and it is called a maximal chain if, moreover, j1 is a minimal element and js is a maximal element of P. A poset can be represented with its Hasse diagram, in which each cover relation i -< j corresponds to an edge denoted by e = {i, j}. For a finite poset P, we let c(P), m*(P) and m*(P) denote the number of maximal chains, the number of minimal elements and the number of maximal elements of P, respectively. We denote by E(P) the set of edges in the Hasse diagram of P. In [16], Stanley introduced two convex polytopes arising from a finite poset, the order polytope and the chain polytope. Following [9], we employ slightly different definitions. Given a finite poset (P, on [d], the order polytope O(P) is defined to be the convex polytope consisting of those (x1,..., xd) e Rd such that (1) 0 < xi < 1 for 1 < i < d; (2) xi > Xj if i ^ j in P. The chain polytope C(P) of P is defined to be the convex polytope consisting of those (x1,..., xd) e Rd such that (1) xi > 0 for 1 < i < d; (2) xi1 + • • • + xik < 1 for every maximal chain i1 -< • • • ^ ik of P. Recall (see [16] for details) that there is a close connection between the combinatorial structure of P and the geometric structures of O(P) and C(P). For instance, the following connections are not hard to prove: • The number fd-1(O(p)) of facets of O(P) is equal to m*(P) + m*(P) + |E(P)|. Equivalently, if we let P = P U {0, i} be the poset obtained from P by adjoining a minimum element 0 and a maximum element then we have fd-1(O(P)) = |E(i°)|. • The number fd-1(C(P)) of facets of C(P) is equal to d + c(P). • The vertices of O(P) are exactly those p(1) for which I is an order ideal of P, and the vertices of C(P) are exactly those p(A) for which A is an antichain of P. Since it is well known that order ideals of P are in one-to-one correspondence with antichains of P, the order polytope O(P) and the chain polytope C(P) have the same number of vertices. Let P be a finite poset, we define an edge partition of P to be a map e: E(P) -^{o,c}. Equivalently, an edge partition of P is an ordered pair (oE(P ),cE(P)) 302 Ars Math. Contemp. 16(2019)203-213 of subsets of E(P) such that oE(P) U cE(P) = E(P) and oE(P) n cE(P) = 0. An edge partition I is called proper if oE(P) = 0 and cE(P) = 0. Suppose that (P, is a poset on [d] with an edge partition I = (oE(P), cE(P)). Let Pj and Pj' denote the d-element weak subposets of P with cover relations given by the edge sets oE(P) and cE(P) respectively. Here by a weak subposet of P, we mean a subset Q of elements of P and a partial ordering of Q such that if x y in Q, then x ^ y in P. The order-chain polytope OC^P) with respect to the edge partition I of P is defined to be the convex polytope O(P') n C(Pj') in Rd. Clearly the notion of order-chain polytope is a natural generalization of both order polytope and chain polytope of a finite poset. For example, let P be the chain 1 -< 2 -< • • • ^ 7 with oE(P) = {{1, 2}, {4, 5}, {5, 6}}, cE(P) = {{2, 3}, {3, 4}, {6, 7}}. Then Pj is the disjoint union of the following four chains: 1 ^ 2, 3, 4 ^ 5 ^ 6, 7 and Pj' is the disjoint union of 1, 2 ^ 3 ^ 4, 5 and 6 ^ 7. Hence the order-chain polytope OC¿(P) is the convex polytope consisting of those (xx1,..., x7) € R7 such that (1) 0 < xi < 1 for 1 < i < 7; (2) xi > x2, x4 > x5 > x6; (3) x2 + x3 + x4 < 1, x6 + x7 < 1. It should be noted that, for any poset P on [d] and any edge partition I of P, the dimension of the order-chain polytope OC£(P) is equal to d. In fact, let x = (1/d,..., 1/d) € Rd, clearly, we have x € OCe(P). If Pj, is an antichain, then O(P£') is the d-cube [0,1]d. In this case, OC^(P) is exactly the same as the chain polytope C(P) and so is d-dimensional. If Pj is not an antichain, then P, is not a d-element chain. In this case, x € dO(Pj) and x € C(Pj') \ dC(Pj'), since no facet hyperplane of C(Pj') contains x. In this case, we can find a ball Bd(x) centered at x such that Bd(x) C C(Pj') \ dC(Pj'). Keeping in mind that x belongs to the boundary of O(Pj), we deduce that Bd(x) n (O(P') \ dO(Pj)) = 0. It follows that (O(Pj) \ dO(Pj)) n (C(Pj') \ dC(Pj')) = 0, as desired. Recall that an integral convex polytope (a convex polytope is integral if all of its vertices have integer coordinates) is called compressed ([15]) if all of its "pulling triangulations" are unimodular. Equivalently, a compressed polytope is an integral convex polytope any of whose reverse lexicographic initial ideals are squarefree ([17]). It follows from [13, Theorem 1.1] that all order polytopes and all chain polytopes are compressed. Hence the intersection of an order polytope and a chain polytope is compressed if it is integral. In particular every integral order-chain polytope is compressed. It then follows that every integral order-chain polytope possesses a unimodular triangulation and is normal ([12]). T. Hibi et al.: Order-chain polytopes 303 Then one of the natural question, which we study in Section 2, is when an order-chain polytope is integral. We call an edge partition I of a finite poset P integral if the order-chain polytope OCg(P) is integral. We show that every edge partition of a finite poset P is integral if and only if P is cycle-free. Here by a cycle-free poset P we mean that the Hasse diagram of P is a cycle-free graph (i.e., an unoriented graph that does not have cycles). Furthermore, we prove that every poset P with |E(P)| > 2 possesses at least one proper integral edge partition. In Section 3, we consider the problem when an integral order-chain polytope is unimod-ularly equivalent to either an order polytope or a chain polytope. This problem is related to the work [9], in which the authors characterize all finite posets P such that O(P) and C(P) are unimodularly equivalent. We show that if P is either a disjoint union of chains or a zigzag poset, then the order-chain polytope OC£(P), with respect to each edge partition 1 of P, is unimodularly equivalent to the chain polytope of some poset (Theorem 3.3 and Theorem 3.4). On the other hand, for each positive integer d > 6, we find a d-dimensional integral order-chain polytope which is not unimodularly equivalent to any chain polytope nor order polytope. This means that the notion of order-chain polytope is a nontrivial generalization of order polytope or chain polytope. We conclude the present paper with an observation on the volume of order-chain poly-topes in Section 4. An interesting question is to find an edge partition I of a poset P which maximizes the volume of OC£(P). In general, it seems to be very difficult to find a complete answer. We shall discuss the case when P is a chain on [d], which involves Ehrenborg and Mahajan's problem (see [3]) of maximizing the descent statistics over certain family of subsets. 2 Integral order-chain polytopes In this section, we consider the problem when an order-chain polytope is integral. We shall prove that every edge partition of a poset P is integral if and only if P is cycle-free. We also prove that every finite poset P with | E(P) | > 2 has at least one proper integral edge partition. Theorem 2.1. Let P be a finite poset. Then every edge partition of P is integral if and only if P is a cycle-free poset. Proof. Suppose that each edge partition I of P is integral. If the Hasse diagram of P has a cycle C, then it is easy to find a non-integral edge partition. In fact, let e = {i, j} be an arbitrary edge from C and I = (E(P) \ {e}, {e}). We now show that I is not integral. To this end, let I be the connected component of the Hasse diagram of P¡ which contains i and j and let v = (vi, v2,..., vd) G Rd with 2, 11 k G 1 0, otherwise. if k G I Then it is easy to see that v = D H,, p| Htp| Hij, {p,q}eE(I) I 304 Ars Math. Contemp. 16(2019)203-213 where Hpq = {(xi,X2,... ,Xd) | Xp = Xq} for e = {p, q} € E(I) Ht = {(xi,X2,... ,Xd) | xt = 0} fort € I Hij = {(Xi,X2,... ,Xd) | Xi + Xj = 1} are all facet hyperplanes of OC^(P). So we deduce that v is a vertex of OC^(P), and I is not integral. Conversely, suppose that P is a cycle-free poset on [d] and I is an edge partition of P. If v = (a1, a2,..., ad) is a vertex of OC^(P), then we can find d independent facet hyperplanes of OC^(P) such that ^ d—m dh ninh (2.1) . i=1 U=1 where m = dim ( Hi—™ H), each Hi is a facet hyperplane of O(P[) and each Hj' is a facet hyperplane of C (P£") which corresponds to a chain Cj of length > 2 in P£". By [16, Theorem 2.1], there is a set partition n = {B1 , B2,... ,Bm+1} of [d] such that B1, B2,..., Bm are connected as subposets of P£', Bm+1 = {i G [d] : aj =0 or 1} and d-m n Hj = {(x1, x2,..., xd) | xj = Xj if {i, j} Ç Bk for some 1 < k < m, and xr = ar if r G Bm+1}. j=1 Let Bm+1 = jri, r2,..., rs} and for 1 < k < m, let bk denote the same values of all ais, i G Bk. Then it suffices to show that each bk is an integer. Keeping in mind the assumption that the Hasse diagram of P is cycle-free, we find that |Cj n Bj | < 1 for 1 < i, j < m. For 1 < i, j < m, let jj 1, if |cj n Bj | = 1 0, otherwise (2.2) and for 1 < i < m, 1 < j < s, let dj,m+j 1, if rj G Cj 0, otherwise. (2.3) By (2.1), (b1, b2,..., bm, ari, ar2,..., ars) must be the unique solution of the following linear system: Y^m+s j j = 1 cjj yj + j=m+1 djj yj c ym+1 ari ym+2 = ar2 *Vm+s ars 1, 1 i m (2.4) v T. Hibi et al.: Order-chain polytopes 305 Now it suffices to show that the determinant of the coefficient matrix / C11 ••• Cim dl,m+1 ••• di,m+s\ A- cm1 ' ' ' cmm dm,m+1 • •• d 0 0 1 m,m+s 0 \ 0 ••• 0 0 ••• 1 j is equal to 1 or -1. Now construct a bipartite graph G with vertex set {Bi, B2,..., Bm, Ci, C2,..., Cm}, and edge set Let {{Bi, C j }| 1 < i, j < m, | Bi n Cj | = 1}. C = C11 \cm1 c1m Then we have det(C) = E sign(a)c1CTl (2.5) (2.6) Clearly, each nonzero term in (2.6) corresponds to a perfect matching in the graph G. Since the Hasse diagram of P is cycle-free, the graph G must be a cycle-free bipartite graph, which means that there is at most one perfect matching in G. So we have det(C) =0,1 or -1. Note that the linear equations (2.4) has unique solution (b1,b2,... ,bm,ari,... ,ars). Then we find that det(C) = ±1. It follows that each bj is an integer. So the vertex v of OC£(P) is integral. □ For a general finite poset P with |E (P) | > 2, the following theorem indicates that there exists at least one proper integral edge partition. Theorem 2.2. Suppose that P is a finite poset. Let Min(P) denote the set of all minimal elements in P. For S C Min(P), let ES (P) denote the set of all edges in E(P) which are incident to some elements in S. Then the edge partition i =(E(P) \ Es(P),Es(P)) c mm c ma is integral. Proof. Suppose that v is a vertex of OC£(P). Then v can be represented as intersection of d independent facet hyperplanes, as in (2.1). Keeping the notation in the proof of Theorem 2.1, we can deduce that |C| = 2 and IB n Cj| < 1 for 1 < i,j < m. So we can construct in the same way two matrices A and C as those in the proof of Theorem 2.1. Then, we can construct a graph G with vertex set {B1, B2,..., Bm, r1,r2,... ,rs} and 306 Ars Math. Contemp. 16(2019)203-213 edge set determined by C1,C2,..., Cm. More precisely, {Bi, Bj} is an edge of G if and only if there exists 1 < k < m such that Ck = {i',j'} for some i' e Bi,j' e Bj, and {Bi, rj } is an edge of G if and only if there exists 1 < k < m such that Ck = {rj, i'} for some i' G Bi. Obviously, G is a bipartite graph with bipartition (B\, B2), where B2 = {Bj : 1 < j < m, Bj = {k} for some k e S} U {rt : 1 < t < s, rt G S}, and Bi = {Bi,B2,...,Bm,ri,r2,...,rs}\B2. Moreover, by the construction of the graph G, its incidence matrix is / cii \cmi c1m d 1,m+1 * * * d1,m+s dm,m+1 * * * dm,m+s > c mm where cij, di,m+j are defined in (2.2) and in (2.3) respectively. A well known fact shows that the incidence matrix of any bipartite graph is totally unimodular (a matrix A is totally unimodular if every square submatrix has determinant 0, +1, or -1). So the submatrix C has determinant 0,1 or -1. This completes the proof. □ Example 2.3. By Theorem 2.1, if the Hasse diagram of P has a cycle, then there exists at least one non-integral edge partition I. (1) For example, let P denote the poset whose Hasse diagram is a 4-cycle (see Figure 1) and let E1 = {{1,2}, {2,4}, {3,4}}. Then the edge partition i1 = (E1, {1,3}) is non-integral, since v = (1,1,1,1) is a vertex of OC^ (P) given by ÍX1 = X2 = X4 = X3 X1 + X3 = 1. However, it is easy to see that the edge partition l2 = ({1, 3}, E1) is integral. So we find that the complementary edge partition tc = (cE(P), oE(P)) of an integral edge partition I = (oE(P), cE(P)) is not necessarily integral. (2) For any poset P whose Hasse diagram is a cycle and any edge partition I of P, it is not hard to show that all coordinates of each vertex of OCe(P) are 0, 1 or 1. 4 2 3 1 Figure 1: Hasse diagram of poset P from Example 2.3. T. Hibi et al.: Order-chain polytopes 307 3 Unimodular equivalence In this section, we shall compare the newly constructed order-chain polytopes with some known polytopes. Specifically, we will focus on integral order-chain polytopes and consider their unimodular equivalence relation with order polytopes or chain polytopes. Recall (see, for example, [9]) that a d x d integral matrix U is unimodular if det(U) = ±1. A map (: Rd ^ Rd is a unimodular transformation if there exist a d x d unimodular matrix U and an integral vector w e Zd such that f(v) = vU + w. Two integral polytopes P and Q in Rd are unimodularly equivalent if there exists a unimodular transformation (: Rd ^ Rd such that Q = f(P). Much of the importance of unimodular equivalence arises from the fact that combinatorial type and Ehrhart polynomial of an integral polytope are invariant modulo unimodular equivalence. For instance, classification of polytopes with certain properties (modulo unimodular equivalence) has gained some attentions recently (see, for example, [1, 10, 11]). We shall use the ideas in the proof of the following theorem due to Hibi and Li [9]. Theorem 3.1 ([9, Theorem 1.3]). The order polytope O(P) and the chain polytope C(P) of a finite poset P are unimodularly equivalent if and only if the poset shown in Figure 2 does not appear as a subposet of P. 4 5 1 2 Figure 2: The "forbidden" poset from Theorem 3.1. Definition 3.2. A poset P on [d] is said to be a zigzag poset if its cover relations are given by 1 -< • • • ^ i 1 >- i 1 + 1 ¡^ • • • ^ ¿2 ^ ¿2 + 1 ¿3 ik ^ ik + 1 d for some 0 < i1 < i2 < • • • < ik < d. Theorem 3.3. Suppose that P is a disjoint union of chains. Then for any edge partition £, the order-chain polytope OCg(P) is unimodularly equivalent to a chain polytope C(Q), where Q is a disjoint union of zigzag posets. Proof. We firstly assume that P is a chain: 1 ^ 2 ^ 3 ^----< d. 308 Ars Math. Contemp. 16(2019)203-213 and i is an edge partition of P given by: o: 1 -< 2 -< • • • -< ¿1 c: ¿1 -< ¿1 + 1 -< • • • -< ¿2 o: ¿2 -< ¿2 + 1 -< • • • -< ¿3 c: ¿t-1 -< ¿t-1 + 1 -< • • • -< ¿t o: ¿t -< ¿t + 1 -< • • • -< ¿t+1 c: ¿fc-1 -< ¿fc-1 + 1 -< • • • -< ¿k = d, where 1 < ¿1 < ¿2 < • • • < ¿k-1 < ¿k = d. Then the order-chain polytope OC¿(P) is given by X1 > X2 > • • • > Xi1 + 1 + 1 + ^ ^ ^ + Xi2 < 1 Xi2 > Xi2 + 1 > • • • > Xi3 < xit-1 + xit_1 + 1 +-----+ Xit < 1 (3.1) Xit > Xit + 1 > • • • > Xit+1 Xik-1 + Xifc_1 + 1 +-----+ Xd < 1 0 < Xi < 1, 1 < ¿ < d. Now define a map ^: Rd ^ Rd as follows: (1) if ¿ is a maximal element in P£', then let Xi = Xi; (2) if ¿ is not a maximal element in P£', then {¿, ¿ + 1} must be an edge in the Hasse diagram of P£'. Let Xi = Xi - Xi+1. Let y(X1, X2,..., Xd) = (x1, x2, ..., x'). Now it is easy to show that ^ is a unimodular transformation. Moreover, the system (3.1) is transformed into: 'xi + x2 + ••• + xi1 < 1 < + xi1 + 1 + ••• + Xi2 + xi2 + 1 + ••• + Xi3 < 1 < Xit_1 + Xit_1+1 + • • • + Xit + Xit+1 + • • • + Xit+1 <1 Xik_1 + Xik_1 + 1 + + Xd < 1 0 < xi < 1, 1 < ¿ < d. T. Hibi et al.: Order-chain polytopes 309 Obviously, this system corresponds to the chain polytope C(Q) for the zigzag poset Q: 1 " 2 " • • • " ¿1 > ¿1 + 1 > • • • > ¿2 > ¿2 + 1 > • • • > ¿3 " • • • or the dual zigzag poset Q* : 1 > 2 >----> ¿1 " ¿1 + 1 ¿2 " ¿2 + 1 ¿3 ¡> • • • So we deduce that OC;(P) is unimodularly equivalent to the chain polytope of some zigzag poset. Now we continue to prove the general case that P is a disjoint union of k chains: Since we have P = Cl I±I C2 I • • • I Ck. O(P I Q) = O(P ) xO(Q) and C (P I Q) = C(P ) xC (Q), OC;(P W Q) = O((P W Q);) n C((P W Q);') = o(p; w q;) n C(P/ w q;') = [O(P;') X o(q;)] n [C(p;') X c (q;')] = [O(P;') ne(P;'')] x [o(q;) nC(Q;')] = OC;(P) X OC;(Q). Hence we conclude that OC;(C1 W • • • W Ck) = OC;(C1) X • • • X OC;(Cfc) X ••• x^k ^ C(Q1) X • • • X C(Qk) = C(Q1 W • • • W Qk), where Qj are zigzag posets. (3.2) □ Similarly, we can modify the proof of Theorem 3.3 slightly to get the following result: Theorem 3.4. Suppose that P is a finite zigzag poset. Then for any edge partition £, the order-chain polytope OC^(P) is unimodularly equivalent to a chain polytope C(Q) for some zigzag poset Q. Proof. Suppose that P is a zigzag poset on [d] and I is an edge partition of P. Define a map ^: Rd ^ Rd as follows: (1) if i is covered by at most one element in P£', let {xj, if i is a maximal element in P£' xj - xj, if i is covered by j in P£' (j = i - 1 or i + 1). (2) if i is covered by both i - 1 and i + 1 in P£', let 310 Ars Math. Contemp. 16(2019)203-213 Let ^(xi,x2,...,xd) = (x'1,x2,. .. ,xd). It is not hard to show that ^ is the desired unimodular transformation. □ The following example shows that not every order-chain polytope OC¿(P) of a cycle-free poset P is unimodularly equivalent to some chain polytope. Example 3.5. Let P be the poset shown in Figure 2 with an edge partition I =({{1, 3}, {3, 4}, {3, 5}}, {2, 3}). Let <^(xi, X2, X3, X4, X5) = (xi, 1 — X2, X3, X4, X5). It is obvious that ^ is a unimodular transformation and <^(0C^(P)) = O(P). However, by checking all 63 different non-isomorphic posets with 5 elements, we find that O(P) is not equivalent to any chain polytope. Furthermore, for any d > 6, we shall find an integral order-chain polytope in Rd which is not unimodularly equivalent to any chain polytope or order polytope. To this end, we need the following lemma. Lemma 3.6. (1) None of the chain polytopes of finite posets on [d] possesses d + 4 vertices and d + 7 facets. (2) None of the order polytopes of finite posets on [d] possesses d + 4 vertices and d +7 facets. Proof. (1) Assume, by contradiction, that P is a finite poset on [d] such that C(P) has d + 4 vertices and d +7 facets. Since the vertices of C(P) are those p(A) for which A is an antichain of P, we can deduce that P possesses exactly d + 4 antichains. Keeping in mind that 0, {1},..., {d} are antichains of P, we find that there is no antichain A in P with |A| > 3. Otherwise, the number of antichains of P is at least d +5. It then follows that there are exactly three 2-element antichains in P. We need to consider the following four cases: (i) Let, say, {1,2}, {1,3}, {1,4} be the 2-element antichains of P. Then the maximal chains of P are P \ {1} and P \ {2,3,4}. (ii) Let, say, {1,2}, {1,3}, {2,4} be the 2-element antichains of P. Then the maximal chains of P are P \ {1, 2}, P \ {1,4} and P \ {2,3}. (iii) Let, say, {1,2}, {1,3}, {4,5} be the 2-element antichains of P. Then the maximal chains of P are P \ {1,4}, P \ {1,5}, P \ {2,3,4} and P \ {2,3,5}. (iv) Let, say, {1, 2}, {3,4}, {5, 6} be the 2-element antichains of P. It can be shown easily that P possesses exactly eight maximal chains. Recall that the number of facets of C (P) is equal to d+c(P), it follows from the assumption that there are exactly 7 maximal chains in P, which is a contradiction. As a result, none of the chain polytopes C (P) of a finite poset P on [d] with d + 4 vertices can possess d + 7 facets, as desired. T. Hibi et al.: Order-chain polytopes 311 (2) Let P be a finite poset on [d] and suppose that the number of vertices of O(P) is d + 4 and the number of facets of O(P) is d + 7. Since the number of vertices of O(P) and that of C(P) coincide, it follows from the proof of (a) that there is no antichain A in P with |A| > 3 and that P includes exactly three 2-element antichains. On the other hand, it is known [9, Corollary 1.2] that the number of facets of O(P) is less than or equal to that of C (P). Hence the number of maximal chains of P is at least 7. Thus, by using the argument in the proof of (a), we can assume that the antichains of P are {1, 2}, {3,4} and {5, 6}. Then, it is easy to prove that the number |E(P)| of edges in the Hasse diagram of P = P U {Ô, 1} is at most d + 6. So we deduce that the number of facets of O(P) is at most d + 6, a contradiction with the assumption. □ We remark that, by modifying the argument of the statement (1) in Lemma 3.6, we can prove directly that the order polytope of Example 3.5 cannot be unimodularly equivalent to any chain polytope. Example 3.7. Let P be the finite poset shown in Figure 3. Let I be the edge partition with Figure 3: Poset P from Example 3.7. oE(P) = {{3, 5}, {3, 6}} and cE(P) = E(P) \ oE(P). Then it is easy to verify that OC^(P) is an integral polytope with 10 vertices and 13 facets. (Since the number of facets of the order-chain polytope is small, we can compute this by hand. Of course, we can also compute this by using the software polymake [4].) So it follows from Lemma 3.6 that the integral order-chain polytope OC^(P) cannot be unimodularly equivalent to any order polytope or any chain polytope. In fact, for any d > 6, let Pd be the poset shown in Figure 4 and let I be the edge partition with oE(Pd) = {{3, 5}, {3, 6}, {5, 7}, {6, 7}, {7, 8},..., {d - 1, d}} . It is easy to see that the order-chain polytope OC^(Pd) has d + 4 vertices and d + 7 facets. Therefore OC^(Pd) cannot be unimodularly equivalent to any order polytope or any chain polytope. Recall that Example 3.5 shows that there is an order polytope which is not unimodularly equivalent to any chain polytope. To conclude this section, we will prove that, for each d > 9, there exists a finite poset P on [d] for which the chain polytope C(P) cannot be unimodularly equivalent to any order polytope. Recall that, for a finite poset P on [d], we have /d_i(O(P )) = m*(P ) + m*(P ) + |E(P )| 312 Ars Math. Contemp. 16(2019)203-213 Figure 4: Poset Pd from Example 3.7. and fd-l(C(P )) = d + c(P), To present our results, we firstly discuss upper bounds for fd-1(O(P)) and fd-1(C(P)). By [9, Theorem 2.1], if d < 4, then O(P) and C(P) are unimodularly equivalent and fd-i(O(P)) = fd-i(C(P)) < 2d. Moreover, for each 1 < d < 4, there exists a finite poset P on [d] with fd-i(O(P)) = fd-i(C(P)) = 2d. Lemma 3.8. Let d > 5 and P be a finite poset on [d]. Then fd-i(O(P)) < d +1 ( d - d + 1 _ 2 V 2 _ and + d 3k + d, d = 3k fd-i(C(P)) ^ 4 • 3k-1 + d, d = 3k +1 2 • 3k + d, d = 3k + 2. (3.3) (3.4) Furthermore, both upper bounds for fd-1(O(P)) and fd-1(C (P)) are tight. Proof. (Order polytope) Let d = 4. Since the right-hand side of (3.3) is equal to 2d (= 8), the inequality (3.3) also holds for d = 4. Let d > 5 and P be a finite poset on [d]. We will prove (3.3) by induction on d. Suppose that 1 is a minimal element of P and let a be the number of elements in P which cover 1 . T. Hibi et al.: Order-chain polytopes 313 If a = 0, then O(P) = O(P \ {1}) x [0,1] and so fd-i(O(P)) = /d_2(O(P \{1}))+2 ' d (d - 1 - d A V 2 d + 1 / d + 1 < < 2 2 + d- 1 + 2 + d. If 1 < a < [d/2j, then from the facts that |E(P\{1})| = |E(P)| - a, m*(P\{1}) > m*(P) - 1 and m*(P \ {1}) = m*(P), we have fd-i(O(P )) = m*(P ) + m*(P ) + |E(P )| < m*(P \ {1}) + m*(P \ {1}) + 1 + |E(P \ {1})| + a < < d 2 d + 1 2 d - 1 - d d 2 d + 1 2 + (d - 1) + + d. +1 Now we consider the case |_d/2j +1 < a < d — 1. Let, say, 2 be an element of P which covers 1. Since the set of the elements of P which cover 1 is an antichain of P, it follows that |E (P\{2})| > |E(P )|- (d - a), m* (P\{2}) > m*(P) and m*(P\{2}) > m*(P) — 1. Hence fd-i (O(P)) = m*(P) + m*(P) + |E (P )| < m*(P \ {2}) + 1 + m*(P \ {2}) + |E(P \ {2})| + (d — a) < < d 2 d + 1 2 d1 d d 2 d + 1 2 + (d - 1)+ (d - + d. - 1 + 1 Therefore, the inequality (3.3) holds. We proceed to show that this upper bound for fd-i(O(P)) is tight. In fact, let P be the finite poset P on [d] with + 1< j< 4. e(P) = j|i,j}€ [d] x [d] : 1 < i < Clearly, we have fd-i(O(P )) d +1 d + 1 _ 2 , 2 _ d + 1 dd- d + 1 _ 2 2 _ + d. (Chain polytope) Let d > 5. Let P1 be a finite poset on [d] and M1 the set of minimal elements of P^ If P1 is an antichain, then fd-1(C(P1)) = 2d. Suppose that P1 is not an antichain. Let P2 = P1 \ M1 and M2 be the set of minimal elements of P2. In general, if Pi is not an antichain and Mi is the set of minimal element of Pi, then we set Pi+1 = Pi \ Mi. By continuing this construction, we can get an integer r > 1 such that each of the P1;..., Pr-1 is not an antichain and that Pr is an antichain. Let P be the finite poset 314 Ars Math. Contemp. 16(2019)203-213 on [d] such that i1 -< i2 -< • • • -< ir if ij G Mj for 1 < j < r. One has c(P1) < c(P) = |M1| • • • |Mr |. For any integer d > 5, let M(d) = max <| mj : 1 < r < d, m1 + m2 + • • • + mr = d, mj G N+ j> . Then the desired inequalities (3.4) follows immediately from the following claim: {3fc, d =3k 4 • 3k-1, d =3k + 1 (3.5) 2 • 3k, d =3k + 2. So it suffices to prove this claim. Since for any integer m > 4, m < m + 1 ( m+1 m 2 m- 2 _ we can assume that, to maximize the product f]r=1 m4, all parts mj < 3. We can also assume without loss of generality that there are at most two mjs that are equal to 2, since 23 < 32. Then the claim (3.5) follows immediately. Finally, for each d > 5, the existence of a finite poset P on [d] for which the equality holds in (3.4) follows easily from the above argument. □ Remark 3.9. The special case d = 1976 of claim (3.5) is exactly the problem 4 in the International Mathematical Olympiad (IMO) in 1976, where the maximum value of a product of positive integers summing up to 1976 is asked for. The answer is 2 • 3658 since 1976 = 3 • 658 + 2. A routine computation shows that, for each 1 < d < 8, the right-hand side of (3.3) coincides with that of (3.4) and that, for each d > 9, the right-hand side of (3.3) is strictly less than that of (3.4). Hence Corollary 3.10. For each d > 9, there exists a finite poset P on [d] for which the chain polytope C (P) cannot be unimodularly equivalent to any order polytope. 4 Volumes of OCt(P) Given a poset P on [d], Corollary 4.2 in [16] shows that the volumes of O(P) and C(P) are given by V (O(P)) = V (C(P)) = ^, where e(P) is the number of linear extensions of P. (Recall that a linear extension of P is a permutation n = nin2 • • • nd of [d] such that n-1(¿) < n-1(j) if i ^ j in P.) For order-chain polytopes, different edge partitions usually give rise to polytopes with T. Hibi et al.: Order-chain polytopes 315 different volumes. For example, let P be the poset as follows: 4 It is easy to see that V (O(P )) = V (C (P )) = -. Let £ =({1, 2}, {{1, 3}, {3, 4}}), £' = ({{1, 2}, {1, 3}}, {3,4}), then we have 1 5 V (OC, (P)) = 4 and V (OC, (P)) = 4. Hence one has the following inequality: V(OC,(P)) < V(O(P)) = V(C(P)) < V(OCf-(P)). It should be noted that, for an arbitrary poset P, we can not always find edge partitions such that this inequality holds. For example, if P is a chain, then there is no edge partition £ such that V(OC,(P)) < V(O(P)) = V(C(P)). Then a natural question is to ask which edge partition £ gives rise to an order-chain polytope with maximum volume. It seems very difficult to solve this problem in general case. In this section, we consider the special case when P is a chain P on [d]. We transform it to a problem of maximizing descent statistics over certain family of subsets. For references on this topic, we refer the reader to [3] and [14]. Let P be a chain on [d]. By the proof of Theorem 3.3, for an edge partition £ of P, the order-chain polytope OC,(P) is unimodularly equivalent to a chain polytope C(Pi), where Pi is a zigzag poset such that all maximal chains, except the first one (containing 1) and the last one (containing d), consist of at least three elements. So we have V (OC,(P ))= V (C(Pi)) = ^. Conversely, for such a zigzag poset Pi, it is easy to find an edge partition £ of P such that OC, (P) is unimodularly equivalent to C(Pi). Denote by Z(d) the set of such zigzag posets Pi on [d]. Thus, to compute the maximum volume over all order-chain polytopes of the chain P, it suffices to compute the maximum number of linear extensions for all zigzag posets Pi € Z(d). Next we shall represent this problem as a problem of maximizing descent statistic over a certain class of subsets. To this end, we recall some notions and basic facts. Given a permutation n = nin2 • • • nd, let Des(n) denote its descent set {i € [d - 1] : n > ni+i}. For S C [d - 1], define the descent statistic ft(S) to be the number of permutations of [d] with descent set S. Note that there is an obvious bijection between zigzag posets on [d] and subsets of [d - 1] given by 2 3 S: P ^{j € [d - 1]: j ^ j + 1}. 316 Ars Math. Contemp. 16(2019)203-213 Moreover, a permutation n = nin2 • • • nd of [d] is a linear extension of P if and only if Des(n-1) = S(P). Let F(d) = S(Z(d)). Then we can transform the problem of maximizing volume of order-chain polytopes of a d-chain to the problem of maximizing the descent statistic ^(S), where S ranges over F(d). Observe that ^(S) = ^(S?), where S = [d - 1] \ S. Following [3], we will encode both S and S by a list L = (11, l2,..., lk) of positive integers such that 11 + l2 + • • • + lk = d - 1. Given S C [d - 1], a run of S is a set R C [d - 1] of consecutive integers of maximal cardinality such that R C S or R C S For example, if d = 10, then the set S = {1,2, 5, 8, 9} has 5 runs: {1, 2}, {3,4}, {5}, {6,7}, {8, 9}. Suppose that S has k runs Ri,R2,..., Rk with |Rj| = lj, let L(S) = (li,l2,... ,lk). Lemma 4.1. Suppose that S C [d - 1] and L(S) = (l1, l2,..., lk). Then S G F (d) if and only if lj > 2 for all 2 < i < k - 1. Proof. The lemma follows immediately from the fact that Z (d) consists of zigzag posets P such that all maximal chains in P, except the first one (containing 1) and the last one (containing d), contain at least three elements. □ Denote by Fd the dth Fibonacci number. By Lemma 4.1, it is easy to see that |F(d) | = 2Fd for d > 2. Based on computer evidences, we conjectured the following results about maximizing descent statistic over F(d), which in fact1 is a special case of Theorem 6.1 in [3]. Proposition 4.2. Suppose that d > 2 and S Ç [d - 1]. (1) If d = 2m and L(S) = (1, 2, 2,..., 2) or L(S) = (2, 2,..., 2,1), V "V" m—1 m—1 then £(T ) < ^ (S ) for any T G F (d). (2) If d = 2m + 1 and L(S ) = (1, 2, 2,..., 2,1), "-^-' m— 1 then ^(T ) < ^ (S ) for any T G F (d). Equivalently, by the proof of Theorem 3.3, we have Proposition 4.3. Let P be a chain on [d]. Then the alternating edge partition £ = (oE(P),cE(P)) with oE(P) = {{{1, 2}, i3,4},..., {d - 1, d}}, if d is even ° ( ) ( {{1, 2}, {3, 4},..., {d - 2, d - 1}}, otherwise gives rise to an order-chain polytope OC^(P) with maximum volume. 1 We thank Joe Gallian and Mitchell Lee for bringing [3, Theorem 6.1] to our attention. T. Hibi et al.: Order-chain polytopes 317 References [1] M. Blanco and F. Santos, Lattice 3-polytopes with few lattice points, SIAM J. Discrete Math. 30 (2016), 669-686, doi:10.1137/15m1014450. [2] J. Brown and V. Lakshmibai, Singular loci of Bruhat-Hibi toric varieties, J. Algebra 319 (2008), 4759-4779, doi:10.1016/j.jalgebra.2007.10.033. [3] R. Ehrenborg and S.Mahajan, Maximizing the descent statistic, Ann. Comb.2 (1998), 111-129, doi:10.1007/bf01608482. [4] E. Gawrilow and M. Joswig, polymake: a framework for analyzing convex polytopes, in: G. Kalai and G. M. Ziegler (eds.), Polytopes — Combinatorics and Computation, Birkhauser, Basel, volume 29 of DMV Seminar, pp. 43-73, 2000, doi:10.1007/978-3-0348-8438-9_2, including papers from the DMV-Seminar "Polytopes and Optimization" held in Oberwolfach, November 1997. [5] T. Hibi, Distributive lattices, affine semigroup rings and algebras with straightening laws, in: M. Nagata and H. Matsumura (eds.), Commutative Algebra and Combinatorics, North-Holland, Amsterdam, volume 11 of Advanced Studies in Pure Mathematics, pp. 93-109, 1987, papers from the U.S.-Japan Joint Seminar held in Kyoto, August 25-31, 1985. [6] T. Hibi, Algebraic Combinatorics on Convex Polytopes, Carslaw Publications, Glebe, New South Wales, 1992. [7] T. Hibi (ed.), Grobner Bases: Statistics and Software Systems, Springer, Tokyo, 2013, doi: 10.1007/978-4-431-54574-3. [8] T. Hibi and N. Li, Chain polytopes and algebras with straightening laws, Acta Math. Vietnam. 40 (2015), 447-452, doi:10.1007/s40306-015-0115-2. [9] T. Hibi and N. Li, Unimodular equivalence of order and chain polytopes, Math. Scand. 118 (2016), 5-12, doi:10.7146/math.scand.a-23291. [10] T. Hibi and A. Tsuchiya, Classification of lattice polytopes with small volumes, 2018, arXiv:1708.00413 [math.CO]. [11] F. Liu, On positivity of Ehrhart polynomials, 2018, arXiv:1711.09962 [math.CO] . [12] H. Ohsugi and T. Hibi, Normal polytopes arising from finite graphs, J. Algebra 207 (1998), 409-426, doi:10.1006/jabr.1998.7476. [13] H. Ohsugi and T. Hibi, Convex polytopes all of whose reverse lexicographic initial ideals are squarefree, Proc. Amer. Math. Soc. 129 (2001), 2541-2546, doi:10.1090/ s0002-9939-01-05853-1. [14] B. E. Sagan, Y.-N. Yeh and G. M. Ziegler, Maximizing Mobius functions on subsets of Boolean algebras, Discrete Math. 126 (1994), 293-311, doi:10.1016/0012-365x(94)90273-9. [15] R. P. Stanley, Decompositions of rational convex polytopes, Ann. Discrete Math. 6 (1980), 333-342, doi:10.1016/s0167-5060(08)70717-9. [16] R. P. Stanley, Two poset polytopes, Discrete Comput. Geom. 1 (1986), 9-23, doi:10.1007/ bf02187680. [17] B. Sturmfels, Grobner Bases and Convex Polytopes, volume 8 of University Lecture Series, American Mathematical Society, Providence, RI, 1996. [18] Y. Wang, Sign Hibi cones and the anti-row iterated Pieri algebras for the general linear groups, J. Algebra 410 (2014), 355-392, doi:10.1016/j.jalgebra.2014.01.039. ARS MATHEMATICA CONTEMPORANEA ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 16 (2019) 319-329 https://doi.org/10.26493/1855-3974.1436.7a2 (Also available at http://amc-journal.eu) Comparing topologies on linearly recursive sequences* Laiachi El Kaoutitf Universidad de Granada, Departamento de Algebra and IEMath-Granada, Facultad de Educación, Economía y Tecnología de Ceuta, Cortadura del Valle, s/n. E-51001 Ceuta, Spain Paolo Saracco * Université Libre de Bruxelles, Département de Mathématique, Boulevard du Triomphe, B-1050 Brussels, Belgium Received 29 June 2017, accepted 24 March 2018, published online 9 January 2019 The space of linearly recursive sequences of complex numbers admits two distinguished topologies. Namely, the adic topology induced by the ideal of those sequences whose first term is 0 and the topology induced from the Krull topology on the space of complex power series via a suitable embedding. We show that these topologies are not equivalent. Keywords: Linearly recursive sequences, adic topologies, power series, Hopf algebras. Math. Subj. Class.: 13J05, 40A05, 16W70, 13J10, 54A10, 16W80 1 Introduction A linearly recursive sequence of complex numbers is a sequence of elements of C which satisfies a recurrence relation with constant coefficients. These sequences arise widely in mathematics and have been studied extensively and from different points of view, see [12] *This paper was written while P. Saracco was member of the "National Group for Algebraic and Geometric Structures, and their Applications" (GNSAGA - INdAM). His stay as visiting researcher at the campus of Ceuta of the University of Granada was financially supported by IEMath-GR. Research supported by grant PRX16/00108, and Spanish Ministerio de Economia y Competitividad and the European Union FEDER, grant MTM2016-77033-P. The authors thank A. Ardizzoni for the fruitful (coffees and) discussions. The first author would like to thank all the members of the dipartimento di Matematica "Giuseppe Peano" for providing a very fruitful working ambience. ^Homepage: https://www.ugr.es/~kaoutit/ ^ Home page: https://sites.google.com/site/paolosaracco/ E-mail addresses: kaoutit@ugr.es (Laiachi El Kaoutit), paolo.saracco@ulb.ac.be (Paolo Saracco) Abstract ©® This work is licensed under https://creativecommons.Org/licenses/by/4.0/ 320 Ars Math. Contemp. 16(2019)203-213 for a survey on the subject. Classically they are related with formal power series, in the sense that a sequence (s„)„>0 is linearly recursive if and only if its generating function E„>0 snZn is a rational function p(Z)/q(Z), where p(Z), q(Z) G C[Z] and q(0) = 0. Nevertheless, few topological properties seems to be known. For instance, it is known that the space Lin(C) of all linearly recursive sequences of any order forms an augmented algebra under the Hurwitz product, with augmentation given by the projection on the 0-th component. As such, it comes endowed with a natural topology, which is the adic topology induced by the kernel J of this augmentation. Besides, there is a monomor-phism of algebras which assigns every linearly recursive sequence (sn)n>0 to the power series J2n> 0 (sn/n0 Zn. Through this monomorphism, the algebra of linearly recursive sequences can be considered as a subalgebra of C[[Z]] and, as such, it inherits another natural topology, namely the one induced by the Krull topology on C[[Z]] (the adic topology induced by the unique maximal ideal m of C[[Z]], which is also the augmentation ideal induced by the evaluation at 0). These two topologies are very close. Namely, up to the embedding above, one can see that J = m n Lin(C), so that the adic topology is finer than the induced one. A natural question which arises is if these are equivalent or not. Notice that, since the finiteness hypotheses are not fulfilled, Artin-Rees Lemma fails to be applied in this context. In fact, in this note we will compare these two topologies and we will give a negative answer to the previous question: the J-adic topology is strictly finer than the induced one. As a by-product, we will see that the adic completion of Lin(C) is larger than its completion with respect to the induced topology, which in fact can be identified with C[[Z]] itself, in the sense that we will provide a split surjective morphism Lm(C) ^ C[[Z]]. Our approach will take advantage of the fact that, from an algebraic point of view, linearly recursive sequences may be identified with the finite (or continuous) dual of the algebra C[X] of polynomial functions of the additive affine algebraic C-group, and that the formal power series can be considered as its full linear dual C[X]*. The main motivation behind this note comes from studying the completion of the finite dual Hopf algebra of the universal enveloping algebra of a finite-dimensional complex Lie algebra. 2 The space of linearly recursive sequences and Hurwitz's product We assume to work over the field C of complex numbers. However, it will be clear that this choice is not restrictive as the results will hold as well if we consider any algebraically closed field k of characteristic 0 instead. An augmented complex algebra A, is an algebra endowed with a morphism of algebras A ^ C, called the augmentation. All vector spaces, algebras and coalgebras are assumed to be over C. The unadorned tensor product < denotes the tensor product over C. All maps are assumed to be at least C-linear. For every vector space V, the C-linear dual of V is V* = HomC (V, C) (i.e., the vector space of all linear forms from V to C). Given a coalgebra C, for dealing with the comultiplication of an element x G C we will resort to the Sweedler's Sigma notation A(x) = xi < x2. Consider the vector space CN of all sequences (zn)n>0 of complex numbers. A sequence (zn)n>0 G CN is said to be linearly recursive if there exists a family of constant L. E. Kaoutit and P. Saracco: Comparing topologies on linearly recursive sequences 321 coefficients ci,..., cr G C, r > 1, such that z„ = ciZn-i + C2Z„_2 +----+ crz„_r for all n > r. Denote by Lin(C) C CN the vector subspace of all linearly recursive sequences. Then the study of the algebraic and/or topological properties of the vector space Lin (C) depends heavily on which product we are choosing on the vector space CN, since the latter can be endowed with at least two algebra structures, as the subsequent Lemma 2.1 entails. Lemma 2.1. The assignment ®: CN ^ C[X]* given by [®((z„)„>o)](Xm) = zm for all m > 0 is an isomorphism of vector spaces. Next we recall how the vector space Lin(C) can be endowed with a Hopf algebra structure, by using the Hurwitz's product. Recall first that C[X] is in fact a Hopf algebra, as it can be identified with the algebra of polynomial functions on the affine complex line AC = C, viewed as an algebraic group with the sum. Comultiplication, counit and antipode are the algebra morphisms induced by the assignments A(X )= X 1 + 1 X, e(X )=0, S(X ) = -X. From this it follows that C[X]* is an augmented algebra under the convolution product nV(Xk) g (Xn-k) for all n > 0. (2.1) k=o (f * g) (Xn) = ]T H f (Xk) g (Xn-k) for all n > 0. b—n V / The unit of C[X] * is the counit e of C[X]. The augmentation e* is given by evaluation at 1. As a consequence, the vector space CN turns out to be an augmented algebra as well in such a way that ® becomes an algebra isomorphism. The product of this algebra is the so-called Hurwitz's product (zn )n>0 * (un)n>0 = > , zk un—k . (2.2) n>0 The unit is the sequence (zn)n>0 with z0 = 1 and zn = 0 for all n > 1. The augmentation is given by the projection on the 0-th component. The vector space of all sequences CN endowed with this algebra structure will be denoted by HCN. Recall also that given a Hopf algebra as C[X], we may consider its finite dual1 Hopf algebra C[XThis is the vector subspace of all linear maps which vanish on a finite-codimensional ideal (i.e., one that leads to a finite-dimensional quotient algebra). Here we will focus only on the case of our interest and we refer to [4, Chapter 9] and [9, Chapter VI] for a more extended treatment. 1 In the literature, it appears also under the names Sweedler dual or continuous dual, where continuity is with respect to the linear topology whose neighbourhood base at 0 consists exactly of the finite-codimensional ideals, see e.g. [6, §3]. 322 Ars Math. Contemp. 16(2019)203-213 Lemma 2.2. Given the Hopf algebra C[X], the set C[X]° = {/ e C[X]* | ker(/) D I, for I a non-zero ideal of C[X]} is an augmented subalgebra of C[X ]* which is also a Hopf algebra. The augmentation e° is given by the restriction of e*. The comultiplication on C[X]° is defined in such a way that for / e C[X ]°, we have A°(/) = ^ /i << /2 ^ (/(pq) = ^ /i(p)/2(q), for all e C[X]) . (2.3) The antipode is given by pre-composing with the one of C[X], i.e., S°(/) = / o S for all / e C[X]°. Since the algebra C[X] is a principal ideal domain, it turns out that the space of linearly recursive sequences Lin(C) can be identified with C[X]° via the isomorphism whence it becomes an augmented subalgebra of HCN and a Hopf algebra. For further reading, we refer the interested reader to [3, 6, 10] and [11, Chapter 2]. 3 Two filiations on the space of linearly recursive sequences In this and in the next section, we will implicitly make use of the identifications HCN = C[X ]* and Lin (C) = C[X ]°, via the isomorphism of algebras ® of Lemma 2.1. As augmented algebras, both C[X]* and C[X]° inherit a natural filtration. Namely, if we let I := ker(e^) and J := ker(e°) be their augmentation ideals, then we can consider C[X]* and C[X]° as filtered with the adic filtrations Fn (C[X]*) = In and Fn (C[X]°) = Jn, n > 0. Moreover, C[X]° inherits a filtration Fn (C[X]°) = In n C[X]° induced from the canonical inclusion C[X]° C C[X]* as well and it is clear that Fn (C[X]°) C Fn (C[X]°). Hence, the J-adic filtration on C[X]° is finer than the induced one. As we will show in this section, it is in fact strictly finer. For every A e C we define ¿A: C[X] ^ C to be the algebra map such that ¿A (X) = A. The set Ga := AlgC (C[X], C) = {¿A | A e C} is a group with group structure given by ¿a • ¿A' := ¿a * ¿A' = ¿a+a', eGa := e = ¿o, (¿a) 1 := ¿a ◦ S = ¿-a. Lemma 3.1 ([4, Example 9.1.7]). Denote by £ the distinguished element in C[X]* which satisfies £(Xn) = Jn,1 for all n > 0 (Kronecker's delta). Then the convolution product (2.1) induces an isomorphism of Hopf algebras ¥: C[£] CGa C[X]°, (> << ¿a £n * ¿a) , (3.1) where CGa is the group algebra on Ga and C[£] is a polynomial Hopf algebra as in Section 2. We denote by $: C[£] c—^^ C[X]° c-^ C[X]* (3.2) the algebra monomorphism induced by ¥. L. E. Kaoutit and P. Saracco: Comparing topologies on linearly recursive sequences 323 Remark 3.2. It is worthy to point out that Lemma 3.1 is a particular instance of the renowned Cartier-Gabriel-Kostant-Milnor-Moore Theorem, which states that for a cocom-mutative Hopf k-algebra H over an algebraically closed field k of characteristic zero, the multiplication in H induces an isomorphism of Hopf algebras U (P (H)) # CG (H) = H, where the left-hand side is endowed with the smash product algebra structure (see [4, Corollary 5.6.4 and Theorem 5.6.5], [9, Theorems 8.1.5, 13.0.1 and §13.1] and [8, Theorem 15.3.4]). Denote by ea : CGa ^ C the counit of the group algebra, which acts via ea(^) = ^a(1) = 1 for all A G C, and by e5: C[£] ^ C the counit of the polynomial algebra in £ defined by e5 (£) = 0. These maps are in fact the restrictions of the counit e0 : C[X]° ^ C to the vector subspaces of C[X]° generated by Ga and {£n | n > 0}, respectively. Thus, up to the isomorphism ¥ of equation (3.1), we have e° = e5 ( ea. Lemma 3.3. The isomorphism ¥ of (3.1) induces an isomorphism of vector spaces - ker(ea) J C£® kercea)2 = j , where £ = £ + (£2) in the quotient (£}/(£2). Proof. First of all, as ¥ is an isomorphism of Hopf algebras, it induces an isomorphism of vector spaces between J/J2 and ker(e5 ( ea)/ker(e5 ( ea)2. Set K := ker(e5 ( ea). The family of assignments (£k} ker(ea)h v Kn (£k+1) ker(ea)h+! Kn+1 (£k + (£k+1)) ( (x + ker(ea)h+1) —^ (£k ( x) + Kn+1 for h,k > 0 and n = h + k induces a graded isomorphism of graded vector spaces gr(C[£]) ( gr(CGa) = gr(C[£] ( CGa), see e.g. [5, Lemma VIII.2]. In particular, the degree 1 component of this together with ¥ induce the stated isomorphism ker(ea) ^ (j£) CGa A (C[£] ker(ea) \ ^ = J C£ ® ker(ea)2 ~ ^ (£2) ( ker(ea)J ® I (£} ( ker(ea)2 J ~ K2 ~ J2 ' ° The key fact is that the quotient ker(ea)/ker(ea)2 does not vanish, as we will show in the subsequent lemma. To this aim, recall that there is an algebra isomorphism Q: C[X]* C[[Z]], / —^ £ f (ek)Zk), (3.3) k>0 where ek = Xk/k! for all k > 0. Notice that Q o $(£) = Z, where $ is the morphism given in (3.2). Lemma 3.4. The element — e + ker(ea)2 in the quotient ker(ea)/ker(ea)2 is non-zero. 324 Ars Math. Contemp. 16(2019)203-213 Proof. Assume by contradiction that - e G ker(ea)2. By applying ¥, this implies that - e G J2, whence - e G I2 in C[X]*. Since © induces a bijection between 1n and (Zn) Ç C[[Z]] for all n — 1, claiming that ^ - e G /2 in C[X]* would imply that 2fc> 1 Zk/k! G (Z2), which is a contradiction. Thus, - e G ker(ea)2. □ It follows from Lemma 3.3 and Lemma 3.4 that the elements £ + J2 and - e + J2 are linearly independent in J/J2. In particular, - e - £ G J2. However, - e - £ as an element of C[X]* maps e0 = 1 and e1 = X to 0 and it maps en = Xn/n! to 1/n! for all n — 2. Hence - e - £ = £2 * h(2) G 12, where for every k — 0 h(fc)(e") := (n + k)! foraU n > 0. Indeed, (£2 * h(2))(en)= Ç £2(ei)h(2)(ej) = J 0 n = 0,1 -1 n > 2 n! — This shows that - e - £ is an element in C[X]° n I2 but not in J2, so that J2 C C[X]° n 12. Now, by induction one may see that for every n > 1 the element ¿1 - (E ¡1! M = * h(n) G 1" n C[X ]° (3.4) \fc=o ' J does not belong to J", so that the two filtrations do not coincide. We point out that, under the isomorphism C[X]* = C[[Z]] of equation (3.3), the element of equation (3.4) corresponds to exp(Z) - (E i Z k) = Z "(E Z k \fc=0 / \fc>0 v ' Summing up, we have shown that the J-adic filtration on C[X]° is strictly finer than the filtration induced from the inclusion i: C[X]° ^ C[X]*. 4 Comparing the two topologies on C[X]° Recall that a filtration on an algebra naturally induces on it a linear topology, whose neighbourhood base at 0 is given exactly by the elements of the filtration (see for example [1, III.49, Example 3] or [5, §I, Chapter D]). Furthermore, given an algebra A endowed with the m-adic filtration associated to an ideal m C A, the completion of A with respect to the linear topology induced by this filtration is, by definition, A = ljm" (A/m"), i.e., the projective limit of the projective system A/m" with the obvious projection maps A/m" ^ A/mm for n > m. An algebra A is said to be Hausdorff and complete if the canonical map A ^ A is an isomorphism. For further details, we refer to [5, §II, Chapter D]. Example 4.1. For every n > 0, there is a linear isomorphism between C[X]*//"+1 and the linear dual of the vector subspace C[X] 0. By the right-hand side of equation (4.2), we mean the image in C[X ]* of the element via the isomorphism (4.1). Since (ej ) = 5i j for all i, j > 0, given any p = ^1=0 Piei € C[X] the sequence (J2^=0 g(ek)£fc) (p), n > 0, eventually becomes constant and it equals the element J2i=0 Pig(e») = g(p). In light of this interpretation, In = (£"} for all n > 0, in the algebra C[X]*. We already know from Section 3 that the J-adic filtration on C[X]° does not coincide with the one induced by the inclusion C[X]° ç C[X]*. Nevertheless, the topologies they induce may still be equivalent ones (that is, the two filtrations may be equivalent). Our next aim is to show that these topologies are not even equivalent, by showing that the J-adic completion of C[X]° is not homeomorphic to C[X]* via the completion of the inclusion map i: C[X]° ^ C[X]*. Remark 4.3. It is worthy to mention that C [X] ° is dense in C [X] * with respect to the finite topology on C[X]* (the one induced by the product topology on CC[X]), see for instance [2, Exercise 1.5.21]. On the other hand, since for every f € C[X]* and for all n > 0, we have that f + (£"} = O (f ; e0, ei,..., en_i), the space of linear maps which coincide with f on e0, e1,..., en-1, it turns out that the I-adic topology on C[X]* is coarser then the linear one. It follows then that C[X]° ç C[X]* is dense with respect to the I-adic topology as well and hence one may check that Now, consider the completion : C[[£]] ^ C[X]◦, where ^ is the filtered monomorphism of algebras given in (3.2). In view of Remark 4.2, one shows that I o = Therefore, I is a split epimorphism, as $ is an homeomorphism whose inverse is ©. Remark 4.4. In fact C[X]* is a complete Hopf algebra in the sense of [7, Appendix A] and I: C[X]° ^ C[X]* becomes an effective epimorphism of complete Hopf algebras (see [7, Proposition 2.19, page 274]). g = E g(ek )£fc, (4.2) 326 Ars Math. Contemp. 16 (2019) 277-298 The subsequent proposition gives conditions under which t becomes an homeomor-phism. Proposition 4.5. The following assertions are equivalent: (1) the canonical map t: C[X]° ^ C[X]* is injective; (2) the canonical map t: C[X]° ^ C[X]* is an homeomorphism; (3) the J-adic and the inducedfiltrations on C[X]° coincide; (4) the J-adic and the induced topologies on C[X]° are equivalent. Proof. We already observed that it o © is a continuous section of t. Thus, if t injective then it will be bijective with inverse it o ©, and so an homeomorphism. This proves the implication (1) ^ (2). To show that (2) ^ (3), let us denote by Fn (c|X]°) = ker (c|X]° ^ C[X]°/J") the canonical filtration on C[X]°. If t is an homeomorphism, then its inverse has to be it o ©. As a consequence, we obtain the second of the following chain of isomorphisms C[X]° _ CjXp _ C[X]* Jn Fn (c[X]°) In for every n > 1. Their composition sends f + Jn e C[X]°/Jn to i(f) + In e C[X]*/In, which shows that Jn = InnC[X]°. Thus the two filtrations coincide. Since the implication (3) ^ (4) is clear, let us show that (4) ^ (1). Saying that the two topologies are equivalent, implies that every Jn (which is open in the J-adic topology) has to be open in the induced topology as well. In particular, it has to contain an element of the neighbourhood base of 0. Therefore, we may assume that for every n > 0, there exists m > n such that Im n C[X]° C Jn. Given (fn + Jn)n>0 an element in the kernel of t, we have that fn e In for every n > 0. This implies that for every n > 0, there exists m > n such that fn + Jn = fm + Jn e (Im n C[X]°) + Jn = Jn, which means that (fn + Jn)n>0 = 0 and this settles the proof. □ In conclusion, it follows from the result of Section 3 that none of the equivalent conditions in Proposition 4.5 holds, as the two filtrations do not coincide. An explicit non-zero element which lies in the kernel of tis exactly the one coming from equation (3.4). Indeed, on the one hand - £ k^ + Jn+1) e C[XT° V k=0 ' /n>o is non-zero, but on the other hand a direct check shows that Vi - v1 e + Jn+1! I = L - v1 e+in+ll =0 ^kr r1 ^ k! k=0 / n>0/ \ k=0 'n>0 in C[X ]*. L. E. Kaoutit and P. Saracco: Comparing topologies on linearly recursive sequences 327 Remark 4.6. Observe that an element (/„ + Jk+1)n>0 in C[X]° can be considered as the formal limit (/n) of the Cauchy sequence {/n | n > 0} in C[X]° with the J-adic topology. The element + Jk+1)n>0 can be identified with itself, as limit of a constant sequence. On the other hand the element (J2k=0 £k/k! + Jk+1)n>0 can be considered as the limit lim„^TO k=0 £k/k!). As we already noticed, is associated with the exponential function, in the sense that its power series expansion in C[X]* is J2k>0 £k/k! = exp(£). However, it follows from what we showed that in C[X]° the Cauchy sequence {Y^k=0 £k/k! | n > 0} does not converge to 5 Final remarks As we mentioned in the introduction, linearly recursive sequences have already been studied deeply as "rational" power series. What we plan to do in this section is to provide a possible explanation of why the topological richness expounded in the previous sections didn't enter the picture before and to provide an overview of the different interpretations of these sequences. The commutative diagram of algebras in (5.1) summarizes the state of the art. Therein, CN is endowed with the algebra structure given by the product (xk)k>0 (yk)k>0 = ( ^2k=0 Xkyn-k)n>0. Cin (C) • ■C[X ]c Cm (C) C[X ]* C[[Z ]] (5.1) e The isomorphism Q sends any sequence (xn)n>0 to the power series J2n>o xnZn, while the isomorphism Z sends a sequence (zn)n>0 to the sequence (zn/n!)n>0. The algebra C[Z](Z> denotes the localization of C[Z] at the maximal ideal (Z}, that is, the set of fractions p(Z)/q(Z) with q(0) = 0. Lastly, the isomorphism w is induced by the restriction of Q to Cin(C) and it is given as follows. For a sequence (an)n>0 in Cin(C), let cr = 1, cr-1,..., c0 G C, r > 1 be the family of constant coefficients such that a+r + cr-iai+r-i + cr_2ai+r-2 + • • • + C0a; = 0, for all l > 0. If we consider r r-1( j \ q(Z) = Y Cr-iZ' and p(Z) = Y Y C^-i Zj, i=0 j=0 V i=0 J 328 Ars Math. Contemp. 16(2019)203-213 then q(Z) = p(Z). Thus, w acts via w((a„)„>0) := p(Z)/q(Z) G C[Z]. As one can realize from diagram (5.1), there are essentially two linear topologies which can be induced on Lin(C): one from HCN, which we denote by TH, and the other from CN, which we denote by T. Apart from these, Lin(C) has its own two adic topologies given by the ideals I := Lin(C) n a, where a is the augmentation ideal of HCN, and J := Lin(C) n b, where b is the augmentation ideal of CN. It follows from the definitions that the I-adic topology on Lin(C) is finer than TH and the J-adic one is finer than T. On the one hand, in view of the previous sections, the I-adic topology is in fact strictly finer than TH. On the other hand, however, one can show that the J-adic topology turns out to be equivalent to T, since it is known that C[Zis homeomorphic to C[Z] = C[[Z]], and this may be the reason why topologies on Lin(C) weren't analysed before. Finally, comparing the topologies T and TH on Lin(C) seems to be more involved. Apparently it is possible that these are different. However, it is not clear to us how to show, for instance, that any open neighbourhood of the form Lin(C) n an (the product is that of CN) is not contained in some open Lin(C) n bm (the product now is in HCN). What is clear instead is that the isomorphism Z does not map linearly recursive sequences in HCN to linearly recursive sequences in CN. References [1] N. Bourbaki, Topologie generate: Chapitres 1 ii4, Elements demathematique, Hermann, Paris, 1971. [2] S. Dascalescu, C. Nastasescu and §. Raianu, Hopf Algebras: An Introduction, volume 235 of Monographs and Textbooks in Pure and Applied Mathematics, Marcel Dekker, New York, 2001. [3] C. A. Futia, E. F. Muller and E. J. Taft, Bialgebras of recursive sequences and combinatorial identities, Adv. Appl. Math. 28 (2002), 203-230, doi:10.1006/aama.2001.0778. [4] S. Montgomery, Hopf Algebras and Their Actions on Rings, volume 82 of CBMS Regional Conference Series in Mathematics, American Mathematical Society, Providence, Rhode Island, 1993, doi:10.1090/cbms/082. [5] C. Nastasescu and F. van Oystaeyen, Graded Ring Theory, volume 28 of North-Holland Mathematical Library, North-Holland, Amsterdam, 1982. [6] B. Peterson and E. J. Taft, The Hopf algebra of linearly recursive sequences, Aequationes Math. 20 (1980), 1-17, doi:10.1007/bf02190488. [7] D. Quillen, Rational homotopy theory, Ann. Math. 90 (1969), 205-295, doi:10.2307/1970725. [8] D. E. Radford, Hopf Algebras, volume 49 of Series on Knots and Everything, World Scientific, Hackensack, New Jersey, 2012, doi:10.1142/8055. [9] M. E. Sweedler, Hopf Algebras, Mathematics Lecture Note Series, W. A. Benjamin, New York, 1969. L. E. Kaoutit and P. Saracco: Comparing topologies on linearly recursive sequences 329 [10] E. J. Taft, Algebraic aspects of linearly recursive sequences, in: J. Bergen and S. Montgomery (eds.), Advances in Hopf Algebras, Marcel Dekker, New York, volume 158 of Lecture Notes in Pure and Applied Mathematics, 1994 pp. 299-317, papers from the NSF-CBMS Conference on Hopf Algebras and their Actions on Rings held at DePaul University, Chicago, Illinois, August 10- 14, 1992. [11] R. G. Underwood, Fundamentals of Hopf Algebras, Universitext, Springer, Cham, 2015, doi: 10.1007/978-3-319-18991-8. [12] A. J. van der Poorten, Some facts that should be better known, especially about rational functions, in: R. A. Mollin (ed.), Number Theory and Applications, Kluwer Academic Publishers, Dordrecht, volume 265 of NATO Advanced Science Institutes Series C: Mathematical and Physical Sciences, 1989 pp. 497-528, proceedings of the NATO Advanced Study Institute held in Banff, Alberta, April 27 - May 5, 1988. ARS MATHEMATICA CONTEMPORANEA ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 16 (2019) 331-348 https://doi.org/10.26493/1855-3974.1427.75c (Also available at http://amc-journal.eu) Intrinsic linking with linking numbers of specified divisibility Christopher Tuffley School of Fundamental Sciences, Massey University, Private Bag 11 222, Palmerston North 4442, New Zealand Received 20 June 2017, accepted 29 November 2018, published online 16 January 2019 Abstract Let n, q and r be positive integers, and let KN be the n-skeleton of an (N - 1)-simplex. We show that for N sufficiently large every embedding of Kr^ in M2n+1 contains a link consisting of r disjoint n-spheres, such that every pairwise linking number is a nonzero multiple of q. This result is new in the classical case n =1 (graphs embedded in R3) as well as the higher dimensional cases n > 2; and since it implies the existence of an r-component link with all pairwise linking numbers at least q in absolute value, it also extends a result of Flapan et al. from n =1 to higher dimensions. Additionally, for r = 2 we obtain an improved upper bound on the number of vertices required to force a two-component link with linking number a nonzero multiple of q. Our new bound has growth O(nq2), in contrast to the previous bound of growth O(Vn4"qn+2). Keywords: Intrinsic linking, complete n-complex, Ramsey theory. Math. Subj. Class.: 57Q45, 57M25, 57M15 1 Introduction In the early 1980s Sachs [11] and Conway and Gordon [1] proved that every embedding of the complete graph K6 in R3 contains a pair of disjoint cycles that form a nontrivial link, and Conway and Gordon also showed that every embedding of K7 in R3 contains a nontrivial knot. These facts are expressed by saying that K6 is intrinsically linked, and K7 is intrinsically knotted. Since then, a number of authors have shown that embeddings of larger complete graphs necessarily exhibit more complex linking behaviour, such as non-split many-component links [4, 6]; two component links with linking number large in absolute value [2]; and two component links with linking number a nonzero multiple of a given integer [5, 6]. Embeddings of larger complete graphs must also exhibit more E-mail address: c.tuffley@massey.ac.nz (Christopher Tuffley) ©® This work is licensed under https://creativecommons.Org/licenses/by/4.0/ 332 Ars Math. Contemp. 16(2019)203-213 complicated knotting behaviour, such as knots with second Conway co-efficient large in absolute value [2]. Such Ramsey-type results for intrinsic linking can also be shown to hold in higher dimensions. Let KN be the n-skeleton of an (N — 1)-simplex, which we call the complete n-complex on N vertices. Then Knn+4 is intrinsically linked, in the sense that every embedding in M2n+1 contains a pair of disjoint n-spheres that have nonzero linking number [10, 12]; and moreover, the linking results described above can all be extended to embeddings of sufficiently large complete n-complexes in M2n+1 [13]. Flapan, Mellor and Naimi [3, Theorem 1] have shown that intrinsic linking of graphs is arbitrarily complex, in the following sense: Given positive integers r and a, every embedding of a sufficiently large complete graph in R3 contains an r-component link in which the linking number of each pair of components is at least a in absolute value. The main goal of this paper is to prove an analogue of this result in all dimensions, with the condition on the magnitude of the linking numbers replaced by a divisibility condition instead. Namely, we show that, given positive integers r and q, every embedding of a sufficiently large complete n-complex in R2n+1 contains a link consisting of r disjoint n-spheres, in which all pairwise linking numbers are nonzero multiples of q. This result is new in the classical case n = 1 as well as the higher dimensional cases n > 2. Since a nonzero multiple of q has magnitude at least q, it also extends the Flapan-Mellor-Naimi result to n > 2. The techniques used to prove it draw heavily on those of Flapan, Mellor and Naimi (for the construction of many-component links with all pairwise linking numbers nonzero), as well as those of our previous paper [13] (for intrinsic linking with n > 2, and constructing links with linking numbers divisible by q). By refining a technique from [13] we also obtain a vastly improved upper bound on the number of vertices required in the case r = 2. Our new bound has growth O(nq2), in contrast to the previous best bound [13, Theorem 1.4] of growth O(^n4"q"+2). We note that Flapan, Mellor and Naimi [3, Theorem 2] further show that intrinsic linking of complete graphs is arbitrarily complex in an even stronger sense: one can additionally require that the second co-efficient of the Conway polynomial of each component has absolute value at least a as well. As an integral measure of the complexity of a knot, the second Conway co-efficient may be regarded as the natural analogue of the pairwise linking number, viewed as an integral measure of the complexity of a two-component link. By Hoste [7, Lemma 2.1(i)] the Conway polynomial V L (z) of an oriented r-component link L = K1 U K2 U • • • U Kr has the form V l(z) = zr-1[ao + a1z2 + • • • + amz2m ], and by the second Conway co-efficient we mean the co-efficient a1. When L = K1 is a knot we have a0 = 1 (Kauffman [9, Proposition 4.1], or see Hoste [7, Lemma 2.1(iii)]), so a1 is the first nontrivial co-efficient of VL(z); and when L = K1 U K2 is a two-component link we have a0 = ^k(K1, K2) (Hoste [7, Lemma 2.1(iv)]), so here it is the linking number that is the first nontrivial co-efficient of VL (z). Moreover, for a knot K the mod two reduction of a1 is equal to the Arf invariant of K (Kauffman [9, Section 4(a)], or see [7, Lemma 2.1(iii)]), so the linking number and the second Conway co-efficient may both be regarded as integral lifts of the mod two invariants used to establish the first results in intrinsic knotting and linking: the intrinsic linking of K6 is proved by considering a sum of pairwise linking numbers mod two, and the intrinsic knotting of K7 is proved by considering the sum of the Arf invariants of the Hamiltonian cycles in an embedding of K7 C. Tuffley: Intrinsic linking with linking numbers of specified divisibility 333 in R3 [1]. We do not consider knotting of the components in this paper. This is chiefly for reasons of dimension: knotting of n-spheres occurs in Rn+2, whereas linking of n-spheres occurs in r2k+i, so the only dimension in which we can consider intrinsic knotting and linking of n-complexes simultaneously is the classical case n =1. We have not given this case separate consideration, instead giving uniform arguments that work for all n. To our knowledge there are at present no known divisibility results for intrinsic knotting, and we pose the following question: Question 1.1. Let q > 2 be a positive integer. Does there exist N such that every embedding of Kn in R3 contains a knot with second Conway co-efficient a nonzero multiple of q? Hoste [8] shows that the first Conway co-efficient a0 of an r-component oriented link L is equal to any cofactor of a certain matrix of pairwise linking numbers associated with L. It then follows from Theorem 1.3 below that for N sufficiently large every embedding of Kn in R2n+1 contains a non-split r-component link satisfying a0 = 0 (mod q). As a strengthening of Theorem 1.3, we might additionally ask that a0 be nonzero, motivating the following question: Question 1.2. Let n, q and r be positive integers, with q > 2 and r > 3. Does there exist N such that every embedding of K^ in R2n+1 contains an r-component link with first Conway co-efficient a nonzero multiple of q? We conjecture that the answer to both questions above is yes. 1.1 Statement of results Throughout this paper, an r-component link means r disjoint oriented n-spheres embedded in R2n+1. Given a 2-component link L1 U L2 we will write ih(L1, L2) for their linking number, and £k2(L1,L2) for their linking number mod two. For {i,j} = {1,2} the integral linking number is given by the homology class [Li] in H„(R2n+1 - Lj; Z) = Z. Our main result is as follows: Theorem 1.3. Let n, q and r be positive integers, with r > 2. For N sufficiently large every embedding of Kn in R2n+1 contains an r-component link L1 U • • • U Lr such that, for every i = j, £k(Li, Lj) is a nonzero multiple of q. Since every nonzero multiple of q has absolute value at least q, Theorem 1.3 immediately gives us the following extension of Theorem 1 of Flapan et al. [3] to higher dimensions: Corollary 1.4. Let n, A and r be positive integers, with r > 2. For N sufficiently large every embedding of Kn in R2n+1 contains an r-component link L1 U • • • U Lr such that, for every i = j, \ik(Li, Lj)| > A. The r = 2 case of Theorem 1.3 is proved as Theorem 1.4 of [13], with an upper bound of growth O(Vn4"qn+2) on the number of vertices required. We re-prove this result with a greatly improved bound with growth O(nq2): 334 Ars Math. Contemp. 16(2019)203-213 Theorem 1.5. For r = 2, the conclusion of Theorem 1.3 holds for N > Kn(q) = 24 q2, n = 1, 4q2 (2n + 4) + n + i42^! + 1, n > 2. In other words, every embedding of (q) in M2n+1 contains a two component link L1 U L2 such that the linking number £k(L1, L2) is a nonzero multiple of q. We note that the bound of Theorem 1.5 is equal to the best known upper bound on the number of vertices required to force the existence of a generalised key ring with q keys (see Flapan et al. [3, Lemma 1] for the case n = 1 (although they don't state the bound explicitly), and Tuffley [13, Theorem 1.2] for n > 2). 1.2 Overview As is the case with most Ramsey-type results on intrinsic linking, Theorems 1.3 and 1.5 are proved by using the connect sum operation to combine simpler links into more complicated ones. To achieve the divisibility condition we will require the building block components to be "large", in the sense that they all contain two copies of a fixed suitably triangulated disc. The triangulation will not only need to have many n-simplices, but must also have a combinatorial structure analogous to a path in a graph. Accordingly, we call such a triangulated disc an n-path. We give a precise definition of a path in Section 2, and then re-establish a number of known results on intrinsic linking to show that we can require the necessary components to be large in this sense. The bulk of the work required to prove Theorem 1.3 is done in Proposition 3.1, which forms the main technical lemma of the paper. Section 3 is devoted to the proof of this. The proposition plays the role of Flapan, Mellor and Naimi's Lemma 2, and the statement and proof are heavily modelled on theirs, making modifications as needed for it to work in all dimensions and achieve the divisibility condition. From an arithmetic standpoint, realising the divisibility condition largely boils down to repeatedly applying the following simple number-theoretic observation, used by both Fleming [5] and Tuffley [13]: Let £1,£2,... ,£q be integers. Then there exist 0 < a 2, however, and it will not be sufficient to simply work with spheres with many vertices or n-simplices. Instead, we will additionally require our components to be large in the following sense, where D is chosen in advance: Definition 2.1. Let D be an n-dimensional triangulated disc. A triangulated n-sphere is large with respect to D or D-large if it contains two disjoint oppositely oriented copies of D. When it comes time to prove Theorem 1.3 we will choose D so that it has a triangulation of the following form: Definition 2.2. Let D be an n-dimensional triangulated disc with i n-simplices. Then D is a path of length i if its n-simplices may be labelled Ai,..., Ae such that b Dab = U Ai i=a is a disc for any 1 < a < b < i. For n = 1 this definition co-incides with the usual meaning of a path in a graph. To construct a path for n > 2 we may start with i n-simplices A1,..., A^, and choose distinct (n - 1)-simplices 7i, Si belonging to Aj. Choose simplicial isomorphisms ^ : Si ^ 7i+1 for 1 < i < i - 1, and glue the Ai according to the The result is a disc Dn, and the triangulation Dn = A1 U • • • U Ae satisfies Definition 2.2 by construction. In Lemma 2.6 of [13] it is shown that a disc constructed in this way has i + n vertices, and the number of (n - 1)-simplices in dDn is i(n - 1) + 2. We note that for n > 2 a path does not necessarily have this form: for instance, for n = 2 the triangulation of a regular n-gon by radii may be given the structure of a path. We begin by establishing the existence of D-large n-spheres with arbitrarily many additional n-simplices. For convenience, we let an (D, m) be the minimal number of vertices of a triangulated sphere satisfying the conditions of the following lemma. Lemma 2.3. Let D be a triangulated disc, and let m be a positive integer. There is a triangulation of Sn that contains two disjoint oppositely oriented copies of D, together with at least m additional n-simplices. Proof. Consider D x I. If V = {v0,..., vN} is the vertex set of D, then D x I has a triangulation with vertex set V x {0,1}, and simplices of the form Sj = [(vio, 0),..., (vij, 0), (vij, 1),..., (vifc, 1)] for 0 < j < k and each k-simplex S = [vio,..., vik] of D with i0 < i1 < • • • < ik. As a first pass we let S = d(D x I) with the induced triangulation. The n-sphere S contains two disjoint copies of D, namely D x {0} and D x {1}, and they are oppositely oriented because they are exchanged by reflection in the equator dD x {1}. Suppose that dD contains a total of t simplices of dimension n - 1. Each contributes a total of n simplices of dimension n to dD x I, so S has a total of nt additional n-simplices. If nt > m does not hold then let S' be a triangulated n-sphere with at least m - nt + 1 simplices of dimension n (such a triangulated sphere certainly exists, for example by taking the boundary of a sufficiently long (n + 1)-path, as constructed above). C. Tuffley: Intrinsic linking with linking numbers of specified divisibility 337 Choose n-simplices 5 and 5' belonging to dD x I and S', respectively, and form the connected sum of S and S' by gluing the discs S - 5 and S' - 5' along their boundaries. The resulting sphere satisfies the conditions given in the conclusion of the lemma. □ We now use Lemma 2.3 to prove the existence of generalised key rings with large rings. To do this we require the following slight strengthening of Lemma 3.2 of [13], which is in turn an extension of Lemma 1 of Flapan et al. [3] to all dimensions. Lemma 2.4. Let D be a triangulated disc. Suppose that KN is embedded in R2n+1 such that it contains a link L U J1 U • • • U Jm2 U X1 U • • • U Xm2, where ¿k2( Jj, Xj) = 1 for all i, and L contains two disjoint oppositely oriented copies of D and at least m2 additional n-simplices. Then there is an n-sphere Z in KN with all its vertices on L U J1 U • • • U Jm2, and an index set I with |I| > mm, such that ^k2(Z, Xj) = 1 for all j G I and Z contains two disjoint oppositely oriented copies of D. In Lemma 3.2 of [13] we require only that L has at least m2 n-simplices. Thus, the difference between the two results is the stronger condition that L contains the two copies of D and a further m2 n-simplices, and the additional conclusion that Z contains two disjoint oppositely oriented copies of D. To prove the stronger form it is only necessary to observe that in proving the original result we can ensure that the copies of D in L end up in Z. Proof. The first step in the proof of [13, Lemma 3.2] is to construct an n-sphere S with all its vertices on L U J1 U • • • U Jm2, and meeting each sphere Jj in an n-simplex S.j. This is done by choosing a distinct n-simplex Sj belonging to L for each i = 1,..., m2, and applying [13, Corollary 2.2] to obtain a sphere Qj C KN with all its vertices on Sj U S-, and meeting Jj in Sj and L in Sj. The sphere S is then constructed from L and the Qj by omitting the interiors of the discs S-. Thus, we can ensure that S contains two disjoint oppositely oriented copies of D by choosing the S- from among the m2 additional n-simplices of L, leaving the copies of D intact. At the final step in the proof of [13, Lemma 3.2], the required sphere Z is constructed from S and a (possibly empty) subset of the Jj, by omitting the interiors of the corresponding n-simplices Sj. Therefore, since S contains the required copies of D, we are guaranteed that Z does too. □ Corollary 2.5. Let D be a triangulated disc, and r a positive integer. For N sufficiently large, every embedding of KN in R2n+1 contains an (r + 1)-component link R U L1 U • • • U Lr such that ¿k2 (R, Lj) = 1 for all i, and R contains two disjoint oppositely oriented copies of D. It suffices to take N > Kn(D, r) = 4r2(2n + 4) + a„(D, 4r2). Proof. Given an embedding of K^(D r) in R2n+1, choose 4r2 disjoint copies of Kn„+4 contained in the embedding, together with a copy of K^(D 4r2). By Taniyama [12] the ith copy of K2nn+4 contains a 2-component link Jj U Xj such that ^k2( Jj, Xj) = 1, and the copy of Kff" (D 4r2) contains a triangulated sphere L that contains two disjoint oppositely 338 Ars Math. Contemp. 16(2019)203-213 oriented copies of D and at least 4r2 additional n-simplices. The result now follows by applying Lemma 2.4 with m = 2r to the link L U Ji U • • • U J4r2 U Xi U • • • U X4r2. □ Finally, we extend Proposition 1 of Flapan et al. [3] to higher dimensions, with the additional conclusion that all components are large with respect to a chosen triangulated disc D. This result serves as the base case for the inductive argument proving Theorem 1.3 in Section 4. Proposition 2.6. Let D be a triangulated disc, and let r be a positive integer. For N sufficiently large, every embedding of K^ in R2n+i contains a 2r-component link Ji U • • • U Jr U Li U • • • U Lr, such that ¿k2(Ji, Lj) is nonzero for all i and j, and each component contains two disjoint oppositely oriented copies of D. The link given by this result has mod two linking pattern containing the complete bipartite graph Kr r, because each component Ji has nonzero mod 2 linking number with each component Lj. The argument to prove the existence of such a link is exactly that of Flapan et al.'s proof of their Proposition 1, and the extension to higher dimensions already follows from our paper [13]: as noted in Section 1.2.2 of [13] their Proposition 1 is a purely combinatorial argument that depends only on their Lemma 1 and the existence of generalised key rings, and these are generalised to higher dimensions in [13]. So the work to be done here is to ensure that each component contains copies of the disc D. For n =1 this already follows from Flapan et al.'s Proposition 1, because we may simply subdivide each edge of a sufficiently large complete graph into paths of length I. A similar approach could be taken in higher dimensions, using the subdivisions of K^ constructed in [13], but this introduces many unnecessary vertices. We give a simpler argument that doesn't make use of subdivision, and requires far fewer vertices. Proof. Following Flapan et al. [3] let m = ^—, and let N = mKn(D, r) + ra„(D, m). Then K^ contains m copies of K^(D r) and r copies of K^(D m), all disjoint from one another. Given an embedding of K^ in R2n+i, by Corollary 2.5 the ith copy of Krn (D r) contains a generalised key ring n Ri U Jii U • • • U Jir such that the ring R is D-large; and the jth copy of K^ (D m) contains a D-large sphere Lj that contains at least m additional n-simplices. n Apply Lemma 2.4 to the link Li U Jii U • • • U Jmi U Ri U • • • U R„. This yields a D-large sphere Zi with all its vertices on Li U Jii U • • • U Jmi, and an index set Ii with |1i| > ^T = ^— = mi, such that ^2(Zi,Ri) = 1 for all i G Ii. Suppose now that for some 1 < k < r we have constructed D-large spheres Zi,..., Zk and an index set Ik such that C. Tuffley: Intrinsic linking with linking numbers of specified divisibility 339 (1) all vertices of Zj lie on Lj U J1j U • • • U Jmj for 1 < j < k; (2) |Ik | > mk = t4^; (3) ik2(Zj, Ri) = 1 for all 1 < j < k and i e Ik. Applying Lemma 2.4 to the link Lk+i U I U Ji(k+ 1)1 U I U Ri) \ieik ) \ieik ) we obtain a D-large sphere Zk+1 with all its vertices on Lk+1 U J1(k+1) U • • • U Jm(k+1), and an index set Ik+1 C Ik with |Ik+1| > = (4r) 4- = mk+1, such that ik2(Zk+1, Ri) = 1 for all i e Ik+1. This gives us D-large spheres Z1,..., Zk+1 and an index set Ik+1 such that conditions (1)-(3) hold with k replaced by k + 1, so by induction there are D-large spheres Z1,...,Zr and an index set Ir such that they hold for k = r. Since mr = (4r)4— = r, the first 2r components of Z1 U • • • U Zr U ^ U Ri j are the required link. □ 3 The main technical lemma This section is dedicated to proving the following analogue of Lemma 2 of Flapan et al. [3], which forms the main technical lemma of this paper: Proposition 3.1 (Main technical lemma). Let q G N. Suppose that K]N is embedded in R2n+1 such that it contains a link with oriented components Ji,..., JA, Li,..., LB, X1,..., XS and Y1,... ,YT satisfying (1) A > 2sqS+T; (2) B > 3s2t(S + T)qS+T; (3) £k(Ja,Xs) is nonzero for all a and s; (4) lk(Lb, Yt) is nonzero for all b and t; and (5) each component Ja, Lb contains two disjoint oppositely oriented copies of a fixed path D of length X > (2q)S+T. Then K] contains an n-sphere Z with all its vertices on J1 U • • • U JA U L1 U • • • U LB such that, for each s and t, £k(Z, Xs) and tk(Z, Yt) are nonzero multiples of q. We note that the hypotheses of our Proposition 3.1 are much stronger than the hypotheses of Flapan et al.'s Lemma 2: we require A and B to be much greater, and we have the additional hypothesis (5) that the components Ja, Lb are large with respect to a certain path. This is to be expected, since our conclusion is strictly stronger than theirs: any nonzero multiple of q is necessarily at least q in magnitude. Before proving Proposition 3.1 we first establish the following lemma on sums of vectors in Rd, which we will use in the proof. 340 Ars Math. Contemp. 16(2019)203-213 Lemma 3.2. Let f G Rd be a vector with all entries nonzero, and for i = 0,..., N let vi G Rd. If N > 2d then there exist 0 < j < k < N such that every entry of f + vk — Vj is nonzero. Proof. The proof is by induction on d. In the base case d = 1, suppose that N > 2. If either f + v, — v0 or f + v2 — v, is nonzero then we are done, and otherwise f + v2 — vo = (f + v2 — vi) + (f + vi — vo) — f = —f = 0. Thus the lemma holds in the base case d =1. Suppose now that the lemma holds for some d > 1, and let v0, v1,..., vN be N + 1 > 2d+1 + 1 vectors in Rd+1. We claim that there is N' > 2d and N' + 1 indices 0 < i0 < i1 < • • • < iN' < N such that, for any 0 < j < k < N', the (d + 1)th entry of f + vik — vij is nonzero. The inductive step will then follow by applying the inductive hypothesis to the first d entries of f and vi0,..., viN,. Write x(i) for the ith entry of x G Rm. To prove the claim we consider the graph with vertex set {0,1,..., N}, and an edge between j and k if j < k and the difference 4d+1) — vjd+1) is equal to the forbidden value —f(d+1). Now observe that for any path (i0, i1,..., im) in this graph we have m— 1 v(m+1)—vid+1)=E[v?+1)—v£1)]=—f(d+1) t sign(ij—ij—1). In particular, if the path is a cycle then im = io, and it follows that m—1 fd+1 T sign(ij+i — ij) = 0. j=i Since f(d+1) is nonzero by hypothesis the sum must be zero, and since each term is ±1, for this to occur it must involve an even number of terms. Thus any cycle must be of even length, and it follows that our graph is bipartite. Colour the vertices black and white in such a way that there is no edge between vertices of the same colour, and let 0 < i0 < i, < • • • < iN/ < N be the vertices belonging to the larger colour class. Then N' + 1 > |"(N + 1)/2] > |~(2d+1 + 1)/2] = 2d + 1, and for any 0 < j < k < N' we have f(d+1) + v(d+1) — v(d+1) = 0, as required. Lemma 3.2 now follows by our discussion above. □ ProofofProposition 3.1. Let J = J, u • • • u ja, X = X, u • • • u xs , L = L, U---U lb , Y = Yi u^^^u yt. Following Flapan et al. [3], we begin by replacing the links J and L with sublinks J', L'' for which we have some control over the signs of the entries of the linking matrices ^k( J', X), ^k(L'', Y) and ^k(L'', X). To do this, we first consider the patterns of signs of the entries of the vectors ^k( Ja, X). Since these vectors have S entries, and all are nonzero, there are 2S possibilities for the patterns of signs (positive and negative) in each one. It follows that we can choose at least A/2S > qS+T of them that all have the same pattern of C. Tuffley: Intrinsic linking with linking numbers of specified divisibility 341 signs. Moreover, after reversing the orientation of some components of X if necessary, we may assume that these signs are all positive. Thus, setting J' = J1 U • • • U Jqs+T, we may assume without loss of generality that the linking matrix ^k( J', X) is positive. Applying the same argument to the vectors ¿k(Lb, Y), we obtain a sublink L' of L with at least 3S(S + T)qS+T components such that the linking matrix ik(C, Y) is positive. We now consider the patterns of signs (positive, negative or zero) of the vectors ¿k(Lb, X) for Lb a component of L'. There are now 3S possibilities for these patterns, so we may choose at least (S + T)qS+T components that have the same pattern. Setting L'' = L U • • • U )qs+T we may therefore assume without loss of generality that the linking matrix ^k(L'', Y) is positive, and that each column of ^k(L'', X) is either positive, negative, or zero. From now on we restrict our attention to the sublinks J' and L'' of J and L. Our next goal is to construct a sublink Z = Z1 U • • • U ZC of J' U L'' such that every entry of C z = ^ ¿k(Zc, X U Y) c=l is a nonzero multiple of q. At the final step we will obtain the required n-sphere Z as a connect sum of the components of Z. To this end we begin by considering the sums a ja = ^ ¿k(J0, X U Y) a=1 modulo q for 1 < a < qS+T. Each vector ja has S + T entries, so there are qS+T possibilities when considered mod q. Since we have qS+T vectors in total, by the pigeonhole principle we can either find one that is zero modulo q, or two that are equal modulo q. In either case, there are integers 0 < a0 < a1 < qS+T such that the vector ai j = ^ ¿k(Ja, X U Y) a=ao + 1 is zero modulo q. Moreover, the first S entries of j are given by J2 a= a+1 ^k( Ja, X), and are therefore nonzero, because the vector ^k( Ja X) is positive for each a. We will use Jao+1 U • • • U Jai as the first a1 - a0 components of Z. We now consider the sums £ ^k(L6, X U Y) b=1 modulo q for 1 < ft < (S + T)qS+T. Since there are again qS+T possibilities mod q, and we have (S + T)qS+T sums in total, we can either find S + T of them that are zero mod q, or S + T + 1 of them that are identical mod q. In either case, there are integers 0 < fto < < • • • < fts+T < (S + T)qS+T such that the vectors ft ¿i = ^ ¿k(Lb, X U Y) b=£o + 1 are zero modulo q. Any additional components of Z will be chosen from among L^0+1 U L£o + 2 u • • • u l£s+T . 342 Ars Math. Contemp. 16(2019)203-213 To choose the remaining components of Z we consider the sequence of S + T + 1 vectors j, j + £1,..., j + £s+t. From above these vectors are all zero when considered modulo q, and we claim that it is possible to choose at least one of them that is nonvanishing when considered as an integer vector. To see this, consider first the (S+1)-entries for some 1 < t < T, which are given by ai j(S+t) = £ £k(Ja,Yt), a=ao + 1 ai Pi (j + ii)(S+t) = £ ik(Ja,Yt)+ £ £k(Lb, Y). a=ao + 1 b=Po + 1 Since the linking matrix £k(C", Y) is positive these form a strictly increasing sequence, and consequently the (S +1)-entry vanishes for at most one of our S + T + 1 vectors. Next, consider the s-entries for some 1 < s < S, which are given by ai j(s) = £ ik(Ja,Xs), a=ao + 1 ai ft (j + ti)(s) = £ lk(Ja,Xs)+ £ ik(Lb,Xs). a=ao + 1 b=Po + 1 Recall that the first sum is positive, and that each column of the linking matrix £k(C", X) is either positive, negative, or zero. It follows that the above sequence of integers is either constant (in which case it is positive), or it is strictly increasing or strictly decreasing. In any case we again conclude that the s-entry vanishes for at most one of our S + T + 1 vectors. Thus there are at most S + T vectors for which one of the entries vanishes, and so there is at least one for which no entry vanishes, proving the claim. We may then set z = z1 u • • • u zc {Jao+1 U • • • U Jai if j is nonvanishing, or Jao+1 U • • • U Jai U Lpo+1 U • • • U Lpi if j + £j is nonvanishing. With this choice of Z, every entry of C zo = £ ik(Zc, X U Y) c=1 is a nonzero multiple of q, as required. Our final task is to obtain the required n-sphere as a suitable connect sum of the components of Z. To do this we will inductively construct oriented spheres F1,..., FC-1 such that, for each 1 < 7 < C - 1, (a) the vertices of FY lie on ZY U Z7+1 (and so FY is disjoint from X, Y, and the rest of Z); (b) Fy-1 n ZY and FY n ZY are disjoint discs, each of which is oppositely oriented by ZY and Fy-1 or FY; C. Tuffley: Intrinsic linking with linking numbers of specified divisibility 343 (c) every entry of the vector Y z7 = zo + E XUY) ¿=1 is a nonzero multiple of q. We will then obtain the required sphere Z from the union of Z and the Fc by omitting the interiors of the discs Fc n Zc and Fc n Zc+1. Conditions (a) and (b) imply that Fc and Fc are disjoint for all c and c', and it follows that Z is a connect sum of spheres, and hence itself a sphere. Moreover, as a chain we have Z = J2 C=1 Zc + J2^=1 Fc, so C-1 ¿fc(Z, X U Y) = z0 + E ^k(Fc, X U Y), c=1 and by condition (c) every entry of this vector is a nonvanishing multiple of q. The underlying technique for constructing the spheres Fc comes from the proof of Theorem 1.4 of Tuffley [13], but additional work is required to ensure that condition (c) is satisfied. By hypothesis (5) each sphere Zc contains two disjoint copies of the path D, one of each orientation. We begin by labelling these Dc and Dc' in such a way that there is an orientation reversing simplicial isomorphism : Dc ^ D'c +1. This may be done inductively: first label the copies of D contained in Z1 arbitrarily, and then once Dc and Dc have been chosen, choose Dc+1 and Dc+1 so that D'c +1 is oppositely oriented to Dc. We will choose the spheres Fc so that the following strengthened form of condition (a) holds for 1 < y < C - 1: (a') the vertices of FY lie on DY U DY +1. This condition serves to ensure that FY-1 n ZY and FY n ZY are disjoint, as required by condition (b). Suppose that for some 0 < c < C - 1 the spheres F,..., Fc have been constructed so that conditions (a'), (b) and (c) hold for 0 < y < c. When c = 0 conditions (a') and (b) are empty, and condition (c) is that every entry of z0 is a nonzero multiple of q, so we may take c = 0 as our base case. Let A1;..., Aa be a labelling of the n-simplices of the path Dc+1 as in Definition 2.2, and for 1 < I < A let P^ be the oriented sphere satisfying Pe n Zc+1 = A£, Pe n Zc+2 = ^c+1(A£) that results from applying Corollary 2.2 of Tuffley [13] to the pairs (Zc+1, Dc+1) and (Zc+2, Dc+2). The vertices of these spheres all lie on Dc+1 U D'c+2, and for any 1 < ^ < v < A, the chain J2V=M P^ represents a sphere meeting Dc+1 in the disc |JV=M A^, and dc+2 in the disc UV=M ^+1^). For 1 < I < A we consider the sums E ^(Pi, XUY) ¿=1 modulo q. As above there are qS+T possibilities for these modulo q, and we have A > 2s+tqS+T of them, so we can either find 2S+T of them that are identically zero mod q, or 344 Ars Math. Contemp. 16(2019)203-213 2s+t + 1 of them that are equal mod q. In either case there are integers 0 < m0 < Mi < • • • < M2S+T such that the vectors Mj Pj = £ ik(pi,XUY) i=Mo + 1 are identically zero mod q for 1 < j < 2S+T. Set p0 = 0, and apply Lemma 3.2 to the vectors p0, p1;..., p2s+T G RS+T with f = zc. This yields indices 0 < j < k < 2S+T such that no entry of Mk zc + pfc - pj = zc + £ ik(P, XUY) i=Mj + 1 is zero. Moreover, the vectors zc, pj and pk are all identically zero mod q, so every entry of zc + pk - pj is a nonzero multiple of q. Let Fc+1 = J2i=Mj+1 Pi. Then Fc+1 represents an n-sphere with all its vertices on Zc+1 U Zc+2, and meeting Zc+1 and Zc+2 in the discs Fc+1 n Zc+1 = U Ai C Dc+1, Fc+1 n Zc+2 = ^c+1 I U Ai) g DC+2. i=Mj + 1 \i=Mj + 1 J The construction of Corollary 2.2 of Tuffley [13] ensures that these discs are oppositely oriented by Fc+1 and Zc+1 U Zc+2, so conditions (a') and (b) are satisfied; and with this choice of Fc+1 we have zc+1 = zc + pk - pj, so condition (c) is too. This completes the inductive step, and we now obtain the required sphere Z as described above. □ 4 Proof of Theorem 1.3 We are now in a position to prove our main result, Theorem 1.3. The strategy is that of Flapan et al.'s proof of their Theorem 1. Proof of Theorem 1.3. Following Flapan et al. [3], for each u,v G N let H (u, v) denote the complete (u + 2)-partite graph with parts P1 and P2 containing v vertices each, and parts Q1,... ,Qu containing a single vertex each. We will prove by induction on u that for every u > 0 and v, i > 1, for N sufficiently large every embedding of in R2n+1 contains a link L such that (L1) the linking pattern of L contains the graph H(u, v); (L2) the linking number between any two distinct components in Q1 U • • • U Qu is a nonzero multiple of q; and (L3) every component in P1 U P2 contains disjoint oppositely oriented copies of a path D of length at least i. For simplicity, we will say that a link L satisfying conditions (L1)-(L3) with the given parameter values satisfies property (u, v, i). C. Tuffley: Intrinsic linking with linking numbers of specified divisibility 345 The base case u = 0 follows from Proposition 2.6 with r = v, by choosing D to be a path of length I. Suppose then that the claim holds for some u > 0. Given v,l > 0, let S = v, T = u + v, A = B = 2t3s(S + T)qS+T > 2sqS+T, X = max{£, (2q)S+T}, and let w = S + A = S + B. By our inductive hypothesis, for N sufficiently large every embedding of K]] in M2n+1 contains a link L satisfying property (u, w, X). We will show that every such embedding also contains a link l satisfying property (u + 1, v, £). Given an embedding of K] in M2n+1 and a link L contained in it satisfying property (u, w, X), label the components of L such that P1 = {x1,...,xs ,L1,...,LB }, P2 = {Y1,... ,Ys ,J1,..., J A}, and Qi = {Yv+i} for 1 < i < u. Then all linking numbers lk(Ja, Xs) and £k(Lb, Yt) are nonzero by (L1), and every component Ja, Lb contains two disjoint copies of a path D of length at least X > (2q)S+T, by (L3). So we may apply Proposition 3.1 to L to obtain a sphere Z with all its vertices on J1U • • • U JA U L1U • • • U LB and linking every component Xs, Yt with linking number a nonzero multiple of q. Let l = x1 u • • • u xs u y1 u • • • u yt u z = x1 u • • • u xv u y1 u • • • u yu+v u z, and partition the components as P[ U P2' U Q[ U • • • U Q'u+1 such that and P1 = {Xi,...,Xv }, f {Yv+i} 1 < i < u, 1 {Z} i = u +1. Then with respect to this partition the linking pattern of L contains the graph H(u + 1, v); any two components in Q[ U • • • U Q'u+1 have linking number a nonzero multiple of q; and every component in P1 U P2 contains a copy of D, which is a path of length at least A > I. So L satisfies property (u + 1, v, I), completing the inductive step. By (L2) the result now follows by restricting attention to Q1 U • • • U Qu, with u = r. □ 5 The two component case We now turn to the two component case, and establish the improved bound of Theorem 1.5. From the proof of [13, Theorem 1.4] it suffices to prove every embedding of K£ (q) contains a generalised key ring with q keys each large with respect to a path D of length q. The approach of [13] was to work with a subdivision of K], in which each n-simplex was subdivided into qn simplices. This is a fairly extravagant approach, since only 2q 346 Ars Math. Contemp. 16 (2019) 277-298 n-simplices from each component are used to form the required paths. The reduction in the number of vertices required comes from Lemma 5.1, which gives us a simple and economical way to enlarge the keys of an existing generalised key ring. A further modest saving comes from "recycling" some of the vertices leftover from the construction of the initial key ring. Lemma 5.1. Let KN be embedded in R2n+1 such that it contains a link X U Y with tk(X, Y) = 0. Let D be a triangulated n-disc with d vertices, and suppose that V is a set of 2d — (n +1) vertices of KN disjoint from X U Y. Then KN contains a D-large sphere Z with all its vertices on Y U V such that tk(X, Z) = 0. The result also holds with all linking numbers calculated mod 2. Proof. Choose an n-simplex A belonging to Y, and let S = d(D x I) with the triangulation with 2d vertices from the proof of Lemma 2.3. Then A U V contains a total of (n+1) + (2d — (n+1)) = 2d vertices, so we may embed S in KN such that all vertices of S lie on A U V and A is an n-simplex of dD x I. Orient S such that A receives opposite orientations from S and Y, and consider the chains S and T = S + Y. Both represent D-large n-spheres with all their vertices on Y U V, and the linking numbers ik(X, S), ik(X, T) cannot both be zero because in the homology group Hn(R2n+1 — X) we have [T ] — [S] = [S + Y ] — [S] = [Y ]=0. (5.1) We may therefore choose one of S and T to be Z so that lk(X, Z) = 0. If lk2(X, Y) = 0 then equation (5.1) holds in Hn(R2n+1 — X; Z/2Z), and we may again choose Z to be one of S and T so that ik2 (X, Z) = 0. □ Corollary 5.2. Let q be a positive integer. Then every embedding of Kn (q) in R2n+1 contains a generalised key ring in which each key is large with respect to a path D of length q. Proof. By [13, Theorem 1.2] every embedding of K^(q) in R2n+1 contains a generalised key ring L with q keys. This link is constructed by applying [13, Lemma 3.2] (the extension of [3, Lemma 1] to higher dimensions) to a link L U J1 U • • • U J4q2 U K1 U • • • U K4q2, in which ik2(Ji, Ki) is nonzero for all i, and each component Ji, Ki is the boundary of an (n + 1)-simplex. This yields an n-sphere R with all vertices on L U J1 U • • • U J4q2 and linking at least q of the Ki, which forms the ring of the generalised key ring. Let Ki1,..., Kiq be the keys. Recall that a path D of length q can be constructed using as few as d = q + n vertices. Since only q of the Ki are components of L this leaves at least (4q2 — q)(n + 2) = q(4q — 1)(n + 2) vertices of Kn (q) that do not belong to L. Observe that (4q — 1)(n + 2) = (4q — 1)n + 8q — 2 > 2n + 2q = 2d > 2d — (n + 1). The spare vertices are therefore more than enough to apply Lemma 5.1 q times to R and each key Kij in turn, replacing Kij with a D-large sphere Zj that still links R. Then R U Z1 U • • • U Z, q is the desired link. □ C. Tuffley: Intrinsic linking with linking numbers of specified divisibility 347 For completeness' sake we sketch the steps needed to prove Theorem 1.5 from this point. For any missing details see the proof of [13, Theorem 1.4], or the corresponding step of the proof of Proposition 3.1. Proof of Theorem 1.5. By Corollary 5.2, every embedding of Kn (q) in M2n+1 contains a generalised key ring R U Z1 U • • • U Zq such that each key Zj is large with respect to a path D of length q. Orient the Zj so that all linking numbers with R are positive. Working in the homology group H„(M2n+1 - R; Z), let 1 < a < b < q be such that ¿[Zj] = 0 (mod q), and note that this sum is positive. From now on we restrict our attention to the spheres Za, . . . , Zb. If a = b we are done. Otherwise, we use the fact that each component Zj is D-large to construct oriented spheres Fa,..., Fb-1 such that, for a < i < b - 1, (a) the vertices of Fj lie on Zj U Zj+1 (and so Fj is disjoint from R and the rest of the Zj); (b) Fj-1 n Zj and Fj n Zj are disjoint discs, each of which is oppositely oriented by Zj and Fj-1 or Fj; (c) the linking number ¿k(R, Fj) is zero mod q. The construction of the Fj is identical to that of the corresponding spheres in Proposition 3.1, except that the simpler condition (c) means we only require D to have length q, and the spheres can all be constructed simultaneously instead of inductively. Now if ¿k(R, Fj) is nonzero for some i then R U Fj is the required link; and otherwise, we let Z be the connect sum of Za,..., Zb, Fa,..., Fb-1 obtained by omitting the interiors of the discs Fj n Zj and Fj n Zj+1 for each i. Then Z is an n-sphere, and in ff„(R2n+1 - R) we have b b-1 b [Z ] = ¿[Zj] + ¿[Fj] = ¿[Zj], i=a j=a j=a which is a nonzero multiple of q. □ References [1] J. H. Conway and C. McA. Gordon, Knots and links in spatial graphs, J. Graph Theory 7 (1983), 445-453, doi:10.1002/jgt.3190070410. [2] E. Flapan, Intrinsic knotting and linking of complete graphs, Algebr. Geom. Topol. 2 (2002), 371-380, doi:10.2140/agt.2002.2.371. [3] E. Flapan, B. Mellor and R. Naimi, Intrinsic linking and knotting are arbitrarily complex, Fund. Math. 201 (2008), 131-148, doi:10.4064/fm201-2-3. [4] E. Flapan, J. Pommersheim, J. Foisy and R. Naimi, Intrinsically n-linked graphs, J. Knot Theory Ramifications 10 (2001), 1143-1154, doi:10.1142/s0218216501001360. [5] T. Fleming, Intrinsically linked graphs with knotted components, J. Knot Theory Ramifications 21 (2012), 1250065 (10 pages), doi:10.1142/s0218216512500654. 348 Ars Math. Contemp. 16(2019)203-213 [6] T. Fleming and A. Diesl, Intrinsically linked graphs and even linking number, Algebr. Geom. Topol. 5 (2005), 1419-1432, doi:10.2140/agt.2005.5.1419. [7] J. Hoste, The Arf invariant of a totally proper link, Topology Appl. 18 (1984), 163-177, doi: 10.1016/0166-8641(84)90008-7. [8] J. Hoste, The first coefficient of the Conway polynomial, Proc. Amer. Math. Soc. 95 (1985), 299-302, doi:10.2307/2044531. [9] L. H. Kauffman, The Conway polynomial, Topology 20 (1981), 101-108, doi:10.1016/ 0040-9383(81)90017-3. [10] L. Lovasz and A. Schrijver, A Borsuk theorem for antipodal links and a spectral characterization of linklessly embeddable graphs, Proc. Amer. Math. Soc. 126 (1998), 1275-1285, doi: 10.1090/s0002-9939-98-04244-0. [11] H. Sachs, On a spatial analogue of Kuratowski's theorem on planar graphs—an open problem, in: M. Borowiecki, J. W. Kennedy and M. M. Syslo (eds.), Graph Theory, Springer, Berlin, volume 1018 of Lecture Notes in Mathematics, pp. 230-241, 1983, doi:10.1007/bfb0071633, proceedings of a conference held in Lag6w, February 10 - 13, 1981. [12] K. Taniyama, Higher dimensional links in a simplicial complex embedded in a sphere, Pacific J. Math. 194 (2000), 465-467, doi:10.2140/pjm.2000.194.465. [13] C. Tuffley, Some Ramsey-type results on intrinsic linking of n-complexes, Algebr. Geom. Topol. 13 (2013), 1579-1612, doi:10.2140/agt.2013.13.1579. ARS MATHEMATICA CONTEMPORANEA ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 16 (2019) 349-358 https://doi.org/10.26493/1855-3974.1485.0b1 (Also available at http://amc-journal.eu) Decomposition method related to saturated hyperball packings Jeno Szirmai Budapest University of Technology and Economics, Institute of Mathematics, Department of Geometry, H-1521 Budapest, Hungary Received 14 September 2017, accepted 28 November 2018, published online 22 January 2019 In this paper we study the problem of hyperball (hypersphere) packings in 3-dimen-sional hyperbolic space. We introduce a new definition of the non-compact saturated ball packings with generalized balls (horoballs, hyperballs) and describe to each saturated hyperball packing, a new procedure to get a decomposition of 3-dimensional hyperbolic space H3 into truncated tetrahedra. Therefore, in order to get a density upper bound for hyperball packings, it is sufficient to determine the density upper bound of hyperball packings in truncated simplices. Keywords: Hyperbolic geometry, hyperball packings, Dirichlet-Voronoi cell, packing density, Coxeter tilings. Math. Subj. Class.: 52C17, 52C22, 52B15 1 Introduction In n-dimensional hyperbolic space Hn (n > 2) there are 3 kinds of generalized "balls" (spheres): the usual balls (spheres), horoballs (horospheres) and hyperballs (hyperspheres). The classical problems of ball packings and coverings with congruent generalized balls of hyperbolic spaces Hn are extensively discussed in the literature, however there are several essential open questions e.g.: 1. What are the optimal ball packing and covering configurations of usual spheres and what are their densities (n > 3) (see [1, 5, 7, 12])? 2. The monotonicity of the density related to the Boroczky type ball configurations depending on the radius of the congruent balls (n > 4) (see [4, 10]). E-mail address: szirmai@math.bme.hu (Jeno Szirmai) Abstract ©® This work is licensed under https://creativecommons.Org/licenses/by/4.0/ 350 Ars Math. Contemp. 16(2019)203-213 3. What are the optimal horoball packing and covering configurations and what are their densities allowing horoballs in different types (n > 4) (see [3, 8, 9])? 4. What are the optimal packing and covering arrangements using non-compact balls (horoballs and hyperballs) and what are their densities? These are the so-called hyp-hor packings and coverings (see [21]). 5. What are the optimal hyperball packing and covering configurations and what are their densities (n > 3)? In this paper we study the 5th question related to saturated, congruent hyperball packings in 3-dimensional hyperbolic space H3. In the hyperbolic plane H2 the universal upper bound of the hypercycle packing density is n, proved by I. Vermes in [24] and the universal lower bound of the hypercycle covering density is ^n2 determined by I. Vermes in [25]. In [15] and [16] we studied the regular prism tilings (simply truncated Coxeter or-thoscheme tilings) and the corresponding optimal hyperball packings in Hn (n = 3,4) and we extended the method developed in the former paper [20] to 5-dimensional hyperbolic space. Moreover, their metric data and their densities have been determined. In paper [19] we studied the n-dimensional hyperbolic regular prism honeycombs and the corresponding coverings by congruent hyperballs and we determined their least dense covering densities. Furthermore, we formulated conjectures for the candidates of the least dense hyperball covering by congruent hyperballs in the 3- and 5-dimensional hyperbolic space (n G N, 3 < n < 5). In [22] we discussed congruent and non-congruent hyperball (hypersphere) packings of the truncated regular tetrahedron tilings. These are derived from the Coxeter simplex tilings {p, 3, 3} (7 < p G N) and {5,3, 3, 3,3} in 3- and 5-dimensional hyperbolic space. We determined the densest hyperball packing arrangement and its density with congruent hyperballs in H5 and determined the smallest density upper bounds of non-congruent hyperball packings generated by the above tilings in Hn (n = 3,5). In [21] we deal with packings derived by horo- and hyperballs (briefly hyp-hor packings) in n-dimensional hyperbolic spaces Hn (n = 2, 3) which form a new class of the classical packing problems. We constructed in the 2- and 3-dimensional hyperbolic spaces hyp-hor packings that are generated by complete Coxeter tilings of degree 1 i.e. the fundamental domains of these tilings are simple frustum orthoschemes and we determined their densest packing configurations and their densities. We proved using also numerical approximation methods that in the hyperbolic plane (n = 2) the density of the above hyp-hor packings arbitrarily approximate the universal upper bound of the hypercycle or horocycle packing density 3 and in H3 the optimal configuration belongs to the {7,3,6} Coxeter tiling with density « 0.83267. Furthermore, we analyzed the hyp-hor packings in truncated orthoschemes {p, 3,6} (6 < p < 7, p G R) whose density function is attained its maximum for a parameter which lies in the interval [6.05, 6.06] and the densities for parameters lying in this interval are larger that « 0.85397. That means that these locally optimal hyp-hor configurations provide larger densities that the Boroczky-Florian density upper bound (« 0.85328) for ball and horoball packings but these hyp-hor packing configurations can not be extended to the entirety of hyperbolic space H3. In [23] we studied a large class of hyperball packings in H3 that can be derived from truncated tetrahedron tilings. In order to get a density upper bound for the above hyperball packings, it is sufficient to determine this density upper bound locally, e.g. in truncated J. Szirmai: Decomposition method related to saturated hyperball packings 351 tetrahedra. Thus, we proved that if the truncated tetrahedron is regular, then the density of the densest packing is « 0.86338. This is larger than the Boroczky-Florian density upper bound for balls and horoballs but our locally optimal hyperball packing configuration cannot be extended to the entirety of H3. However, we described a hyperball packing construction, by the regular truncated tetrahedron tiling under the extended Coxeter group {3, 3,7} with maximal density « 0.82251. Recently, (to the best of author's knowledge) the candidates for the densest hyperball (hypersphere) packings in the 3,4 and 5-dimensional hyperbolic space Hn are derived by the regular prism tilings that have been published in papers [15, 16] and [20]. In this paper we study hyperball (hypersphere) packings in 3-dimensional hyperbolic space. We develope a decomposition algorithm that for each saturated hyperball packing provides a decomposition of H3 into truncated tetrahedra. Therefore, in order to get a density upper bound for hyperball packings, it is sufficient to determine the density upper bound of hyperball packings in truncated simplices. 2 Projective model and saturated hyperball packings in H3 We use for H3 (and analogously for Hn, n > 3) the projective model in the Lorentz space E1,3 that denotes the real vector space V4 equipped with the bilinear form of signature (1, 3), (x, y) = -x0y0 + x V + x2y2 + x3y3, where the non-zero vectors x = (x0,x1,x2,x3) € V4 and y = (y0,y1,y2,y3) G V4, are determined up to real factors, for representing points of Pn(R). Then H3 can be interpreted as the interior of the quadric Q = {(x) G P3 | (x, x) =0} =: dH3 in the real projective space P3(V4, V4) (here V4 is the dual space of V4). Namely, for an interior point y holds (y, y) < 0. Points of the boundary dH3 in P3 are called points at infinity, or at the absolute of H3. Points lying outside dH3 are said to be outer points of H3 relative to Q. Let (x) g P3, a point (y) G P3 is said to be conjugate to (x) relative to Q if (x, y) = 0 holds. The set of all points which are conjugate to (x) form a projective (polar) hyperplane pol(x) := {(y) G P3 | (x, y) =0}. Thus, the quadric Q induces a bijection (linear polarity V4 ^ V4) from the points of P3 onto their polar hyperplanes. Point X (x) and hyperplane a (a) are incident if xa = 0 (x G V4 \ {0}, a G V4 \ {0}). The hypersphere (or equidistance surface) is a quadratic surface at a constant distance from a plane (base plane) in both halfspaces. The infinite body of the hypersphere, containing the base plane, is called hyperball. The half hyperball with distance h to a base plane ft is denoted by H+. The volume of a bounded hyperball piece H+ (A), delimited by a 2-polygon Ac A and its prism orthogonal to A can be determined by the classical formula (2.1) of J. Bolyai [2]. Vol(H+(A)) = - Area(A) , , 2h k sinh ——+ 2h k (2.1) The constant k = y — is the natural length unit in H3, where K denotes the constant negative sectional curvature. In the following we may assume that k =1. 352 Ars Math. Contemp. 16(2019)203-213 Let Bh be a hyperball packing in H3 with congruent hyperballs of height h. The notion of saturated packing follows from that fact that the density of any packing can be improved by adding further packing elements as long as there is sufficient room to do so. However, we usually apply this notion for packings with congruent elements. Now, A„ An (a) (b) Figure 1: (a) Saturated hyp-hor packing, at present a = 0.7. (b) Saturated horocycle packing with parameter a = —. we modify the classical definition of saturated packing for non-compact ball packings with generalized balls (horoballs, hyperballs) in n-dimensional hyperbolic space Hn (n > 2 integer parameter): Definition 2.1. A ball packing with non-compact balls (horoballs or/and hyperballs) in Hn is saturated if no new non-compact ball can be added to it. We illustrate the meaning of the above definition by 2-dimensional Coxeter tilings given by the Coxeter symbol [to] (see Figure 1), which are denoted by Ta. The fundamental domain of Ta is a Lambert quadrilateral A0AiP0Pi (see [21]) that is denoted by Fa. It is derived by the truncation of the orthoscheme A0AiA2 by the polar line n of the outer vertex A2. The other initial principal vertex A0 of the orthoscheme is lying on the absolute quadric of the Beltrami-Cayley-Klein model. The images of Fa under reflections on its sides fill the hyperbolic plane H2 without overlap. The tilings Ta contain a free parameter 0 < a < 1, a G R. The polar straight line of A2 is n and n n A0A2 = P0, n n AiA2 = Pi. If we fix the parameter a then a optimal hypercycle tiling can be derived from the mentioned Coxeter tiling (see Figure 1(a)) but here there are sufficient rooms to add horocycles with centre A0 and with centres at the images of A0. This saturated hyp-hor packing (packing with horo- and hyperballs) is illustrated in Figure 1(a). The Figure 1(b) shows a saturated horocycle packing belonging to the same Coxeter tiling. To obtain hyperball (hypersphere) packing bounds it obviously suffices to study saturated hyperball packings (using the above definition) and in what follows we assume that all packings are saturated unless otherwise stated. J. Szirmai: Decomposition method related to saturated hyperball packings 353 3 Decomposition into truncated tetrahedra We take the set of hyperballs {Hh } of a saturated hyperball packing Bh (see Definition 2.1). Their base planes are denoted by Thus, in a saturated hyperball packing the distance between two ultraparallel base planes d(pi; Pj) is at least 2h (where for the natural indices holds i < j and d is the hyperbolic distance function). In this section we describe a procedure to get a decomposition of 3-dimensional hyperbolic space H3 into truncated tetrahedra corresponding to a given saturated hyperball packing. Step 1. The notion of the radical plane (or power plane) of two Euclidean spheres can be extended to the hyperspheres. The radical plane (or power plane) of two non-intersecting hyperspheres is the locus of points at which tangents drawn to both hyperspheres have the same length (so these points have equal power with respect to the two non-intersecting hyperspheres). If the two non-intersecting hyperspheres are congruent also in Euclidean sense in the model then their radical plane coincides with their "Euclidean symmetry plane" and any two congruent hypersphere can be transformed into such an hypersphere arrangement. Using the radical planes of the hyperballs Hh, similarly to the Euclidean space, can be constructed the unique Dirichlet-Voronoi (in short D-V) decomposition of H3 to the given hyperball packing Bh. Now, the D-V cells are infinite hyperbolic polyhedra containing the corresponding hyperball, and its vertices are proper points of H3. We note here (it is easy to see), that a vertex of any D-V cell cannot be outer or boundary point of H3 relative to Q, because the hyperball packing Bh is saturated by the Definition 2.1. Step 2. We consider an arbitrary proper vertex P e H3 of the above D-V decomposition and the hyperballs Hh (P) whose D-V cells meet at P. The base planes of the hyperballs Hh(P) are denoted by pi(P), and these planes determine a non-compact polyhedron Di (P) with the intersection of their halfspaces containing the vertex P. Moreover, denote A1, A2, A3,... the outer vertices of Di (P) and cut off Di (P) with the polar planes aj (P) of its outer vertices Aj. Thus, we obtain a convex compact polyhedron D(P). This is bounded by the base planes Pi(P) and "polar planes" aj (P). Applying this procedure for all vertices of the above Dirichlet-Voronoi decomposition, we obtain an other decomposition of H3 into convex polyhedra. Step 3. We consider D(P) as a tile of the above decomposition. The planes from the finite set of base planes {Pi(P)} are called adjacent if there is a vertex As of Di(P) that lies on each of the above plane. We consider non-adjacent planes pkl (P), pk2 (P), pk3 (P),..., Pkm (P) e {Pi(P)} (h e N+, l = 1, 2, 3,..., m) that have an outer point of intersection denoted by Akl... km. Let ND(P) e N denote the finite number of the outer points Akl... km related to D(P). It is clear, that its minimum is 0 if Di(P) is tetrahedron. The polar plane ak 1 • • km of Afci... km is orthogonal to planes Pki (P ),Pk2 (P),.. .,Pkm (P) (thus, it contains their poles Bkl, Bk2,..., Bkm) and divides D(P) into two convex polyhedra D1(P) and D2(P). m Step 4. If Ndi(p) = 0 and Nv2 (p) = 0 then N®i(p) < Nv{p) and N^p) < Nv{p) then we apply the Step 3 for polyhedra Di (P), i e {1,2}. Step 5. If NDi(P) =0 or NDj(P) =0 (i = j, i,j e {1, 2}) then we consider the polyhedron Di(P) where NDi(P) = ND(P) - 1 because the vertex Akl...km is left out and apply the Step 3. 354 Ars Math. Contemp. 16(2019)203-213 Step 6. If NDl(P) = 0 and ND2(P) = 0 then the procedure is over for D(P). We continue the procedure with the next cell. Step 7. It is clear, that the above plane akl •..km intersects every hyperball Hj(P) (j = ki,... ,km). Lemma 3.1. The plane akl... km of Akl ... km does not intersect the hyperballs Hlh(P) where Aki-• • km 1. In order to determine an upper bound for the density of congruent hyperball packings in H we used an extended notion of such local density. Therefore, we had to construct a decomposition of Hn into compact cells to define local density to a given hyperball packing and these corresponding cells are (not absolutely congruent) truncated tetrahedra (see the above algorithm and [23]). 2. From the above section it follows that, to each saturated hyperball packing Bh of hyperballs Hh there is a decomposition of H3 into truncated tetrahedra. Therefore, in order to get a density upper bound for hyperball packings, it is sufficient to determine the density upper bound of hyperball packings in truncated simplices. We observed in [23] that some extremal properties of hyperball packings naturally belong to the regular truncated tetrahedron (or simplex, in general, see Lemma 3.2 and Lemma 3.3 in [23]). Therefore, we studied hyperball packings in regular truncated tetrahedra, and prove that if the truncated tetrahedron is regular, then the density of the densest packing is « 0.86338 (see Theorem 5.1 in [23]). However, these hyperball packing configurations are only locally optimal, and cannot be extended to the whole space H3. Moreover, we showed that the densest known hyperball packing, dually related to the regular prism tilings, introduced in [15], can be realized by a regular truncated tetrahedron tiling with density « 0.82251. 3. In [22] we discussed the problem of congruent and non-congruent hyperball (hyper-sphere) packings to each truncated regular tetrahedron tiling. These are derived from the Coxeter simplex tilings {p, 3,3} and {5, 3,3,3,3} in the 3- and 5-dimensional hyperbolic space. We determined the densest hyperball packing arrangement and its density with congruent hyperballs in H5 (« 0.50514) and determined the smallest density upper bounds of non-congruent hyperball packings generated by the above tilings: in H3 (« 0.82251); in H5 (« 0.50514). The question of finding the densest hyperball packings and horoball packings with horoballs of different types in the n-dimensional hyperbolic spaces n > 3 has not been settled yet either (see e.g. [8, 9, 13, 23]). Optimal sphere packings in other homogeneous Thurston geometries represent another huge class of open mathematical problems. For these non-Euclidean geometries only very few results are known (e.g. [17,18]). Detailed studies are the objective of ongoing research. The applications of the above projective method seem to be interesting in (non-Euclidean) crystallography as well, a topic of much current interest. J. Szirmai: Decomposition method related to saturated hyperball packings 357 References [1] K. Bezdek, Sphere packings revisited, European J. Combin. 27 (2006), 864-883, doi:10.1016/ j.ejc.2005.05.001. [2] J. Bolyai, Appendix: Scientiam spatii absolute veram exhibens, in: F. Bolyai (ed.), Tentamen juventutem studiosam in elementa matheseos purae, elementaris ac sublimioris, methodo intuitiva, evidentiaque huic propria, introducendi, Tomus primus, Maros Vasarhelyini: J. & S. Kali, 1832. [3] K. Boroczky, Packing of spheres in spaces of constant curvature, Acta Math. Acad. Sci. Hungar. 32 (1978), 243-261, doi:10.1007/bf01902361. [4] K. Boroczky and A. Florian, Über die dichteste Kugelpackung im hyperbolischen Raum, Acta Math. Acad. Sci. Hungar. 15 (1964), 237-245, doi:10.1007/bf01897041. [5] G. Fejes Toth, G. Kuperberg and W. Kuperberg, Highly saturated packings and reduced coverings, Monatsh. Math. 125 (1998), 127-145, doi:10.1007/bf01332823. [6] G. Fejes Toth and W. Kuperberg, Packing and covering with convex sets, in: P. M. Gruber and J. M. Wills (eds.), Handbook of Convex Geometry, Volume B, North-Holland, Amsterdam, pp. 799-860, 1993, doi:10.1016/c2009-0-15706-9. [7] R. Kellerhals, Ball packings in spaces of constant curvature and the simplicial density function, J. Reine Angew. Math. 494 (1998), 189-203, doi:10.1515/crll.1998.006. [8] R. T. Kozma and J. Szirmai, Optimally dense packings for fully asymptotic Coxeter tilings by horoballs of different types, Monatsh. Math. 168 (2012), 27-47, doi:10.1007/ s00605-012-0393-x. [9] R. T. Kozma and J. Szirmai, New lower bound for the optimal ball packing density in hyperbolic 4-space, Discrete Comput. Geom. 53 (2015), 182-198, doi:10.1007/s00454-014-9634-1. [10] T. H. Marshall, Asymptotic volume formulae and hyperbolic ball packing, Ann. Acad. Sci. Fenn. Math. 24 (1999), 31-43, http://www.acadsci.fi/mathematica/Vol24/ marshall.html. [11] E. Molnar, The projective interpretation of the eight 3-dimensional homogeneous geometries, Beitrage Algebra Geom. 38 (1997), 261-288, https://www.emis.de/journals/ BAG/vol.38/no.2/8.html. [12] E. Molnár and J. Szirmai, Top dense hyperbolic ball packings and coverings for complete Coxeter orthoscheme groups, Publ. Inst. Math. (Beograd) 103 (2018), 129-146, doi:10.2298/ pim1817129m. [13] L. Nemeth, On the hyperbolic Pascal pyramid, Beitrage Algebra Geom. 57 (2016), 913-927, doi:10.1007/s13366-016-0293-7. [14] C. Radin, The symmetry of optimally dense packings, in: A. Prekopa and E. Molnar (eds.), Non-Euclidean Geometries, Springer, New York, volume 581 of Mathematics and Its Applications (New York), 2006 pp. 197-207, doi:10.1007/0-387-29555-0_10, papers from the International Conference on Hyperbolic Geometry held in Budapest, July 6- 12, 2002. [15] J. Szirmai, The regular p-gonal prism tilings and their optimal hyperball packings in the hyperbolic 3-space, Acta Math. Hungar. 111 (2006), 65-76, doi:10.1007/s10474-006-0034-8. [16] J. Szirmai, The regular prism tilings and their optimal hyperball packings in the hyperbolic n-space, Publ. Math. Debrecen 69 (2006), 195-207. [17] J. Szirmai, A candidate for the densest packing with equal balls in Thurston geometries, Beitrcige Algebra Geom. 55 (2014), 441-452, doi:10.1007/s13366-013-0158-2. 358 Ars Math. Contemp. 16(2019)203-213 [18] J. Szirmai, Simply transitive geodesic ball packings to S2 x R space groups generated by glide reflections, Ann. Mat. PuraAppl. 193 (2014), 1201-1211, doi:10.1007/s10231-013-0324-z. [19] J. Szirmai, The least dense hyperball covering of regular prism tilings in hyperbolic n-space, Ann. Mat. PuraAppl. 195 (2016), 235-248, doi:10.1007/s10231-014-0460-0. [20] J. Szirmai, The optimal hyperball packings related to the smallest compact arithmetic 5-orbifolds, Kragujevac J. Math. 40 (2016), 260-270, doi:10.5937/kgjmath1602260s. [21] J. Szirmai, Packings with horo- and hyperballs generated by simple frustum orthoschemes, Acta Math. Hungar. 152 (2017), 365-382, doi:10.1007/s10474-017-0728-0. [22] J. Szirmai, Density upper bound for congruent and non-congruent hyperball packings generated by truncated regular simplex tilings, Rend. Circ. Mat. Palermo 67 (2018), 307-322, doi:10. 1007/s12215-017-0316-8. [23] J. Szirmai, Hyperball packings in hyperbolic 3-space, Mat. Vesnik 70 (2018), 211-221, http: //www.vesnik.math.rs/vol/mv18 30 3.pdf. [24] I. Vermes, Ausfullungen der hyperbolischen Ebene durch kongruente Hyperzykelbereiche, Period. Math. Hungar. 10 (1979), 217-229, doi:10.1007/bf02020020. [25] I. Vermes, Über regulare Überdeckungen der Bolyai-Lobatschewskischen Ebene durch kongruente Hyperzykelbereiche, Period. Polytech. Mech. Engrg. 25 (1981), 249-261, https: //pp.bme.hu/me/article/view/58 4 2. ARS MATHEMATICA CONTEMPORANEA ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 16 (2019) 359-375 https://doi.org/10.26493/1855-3974.1525.7f3 (Also available at http://amc-journal.eu) A characterization of graphs with disjoint total dominating sets* * Michael A. Henning * Department of Pure and Applied Mathematics, University of Johannesburg, Auckland Park, 2006 South Africa Iztok Peterin * Faculty of Electrical Engineering and Computer Science, University ofMaribor, Koroska 46, 2000 Maribor, Slovenia Received 8 November 2017, accepted 11 November 2018, published online 27 January 2019 A set S of vertices in a graph G is a total dominating set of G if every vertex is adjacent to a vertex in S. A fundamental problem in total domination theory in graphs is to determine which graphs have two disjoint total dominating sets. In this paper, we solve this problem by providing a constructive characterization of the graphs that have two disjoint total dominating sets. Our characterization gives an entirely new description of graphs with two disjoint total dominating sets and places them in another context, developing them from four base graphs and applies a sequence of operations from seventeen operations that are independent and necessary to produce all such graphs. We show that every graph with two disjoint total dominating sets can be constructed using this method. Keywords: Total domination number, disjoint total dominating sets. Math. Subj. Class.: 05C69 *The authors express their sincere thanks to the referees for their meticulous and thorough reading of the paper, and for their very helpful comments which improved the exposition and clarity of the revised version of the paper. In particular, we thank one of the reviewers for suggesting to us Claim 4.9 and Claim 4.10 which greatly simplified the original proof. t Research supported in part by the South African National Research Foundation and the University of Johannesburg. ^This author is also affiliated with Institute of Mathematics, Physics and Mechanics, Jadranska 19, 1000 Ljubljana, Slovenia. Research supported in part by the Slovenian Research Agency by the projects No. P1-0297 and No. J1-9109. E-mail addresses: mahenning@uj.ac.za (Michael A. Henning), iztok.peterin@um.si (Iztok Peterin) Abstract ©® This work is licensed under https://creativecommons.Org/licenses/by/4.0/ 360 Ars Math. Contemp. 16(2019)203-213 1 Introduction A dominating set of a graph G is a set S of vertices of G such that every vertex not in S has a neighbor in S, where two vertices are neighbors if they are adjacent. A total dominating set of a graph G with no isolated vertex is a set S of vertices such that every vertex in G has a neighbor in S. Domination and its variations in graphs are now well studied. The literature on this subject has been surveyed and detailed in the two books by Haynes, Hedetniemi, and Slater [6, 7]. For a recent book on total domination in graphs we refer the reader to [13]. A survey of total domination in graphs can also be found in [9]. A classical result in domination theory, due to Ore [14] in 1962, is that every graph with no isolated vertex has two disjoint dominating sets. However, it is not the case that every graph with no isolated vertex can be partitioned into a dominating set and a total dominating set. Henning and Southey [11] showed that every connected graph with minimum degree at least two that is not a cycle on five vertices has a disjoint dominating set and a total dominating set. Further, in [12] they present a constructive characterization of connected graphs of order at least 4 that have a disjoint dominating set and a total dominating set. Disjoint dominating and total dominating sets in graphs are studied further, for example, in [10]. A characterization of graphs with disjoint dominating and paired-dominating sets is characterized in [15]. It remains, however, an outstanding problem to determine which graphs have two disjoint total dominating sets. Zelinka [16] in 1989 showed that no minimum degree condition in a graph is sufficient to guarantee that there exist two disjoint total dominating sets in the graph. Heggernes and Telle [8] showed that the decision problem to decide for a given graph G if it has two disjoint total dominating sets is NP-complete, even for bipartite graphs. Sufficient conditions for a graph to have two disjoint total dominating sets were obtained by Delgado, Desormeaux, and Haynes [4], but the authors in [4] were not able to characterize such graphs. Cubic graphs that have two disjoint total dominating sets were recently studied by Desormeaux, Henning and Haynes [5]. In particular, they show that cubic graphs that are 5-chordal or claw-free (we do not define these concepts here) can be partitioned into two total dominating sets. The total domatic number tdom (G) of G is the maximum number of disjoint total dominating sets [3]. This can also be considered as a coloring of the vertices such that every vertex has a neighbor of every color (and has been called the coupon coloring problem [2]). Recent work on the total domatic number can be found, for example, in [1, 5]. The fundamental problem in total domination theory in graphs of determining which graphs have two disjoint total dominating sets can be phrased as follows: Determine which graphs G satisfy tdom(G) > 2. We call a graph a TDP-graph (standing for "total dominating partitionable graph") if its vertex set can be partitioned into two total dominating sets; that is, a graph G is a TDP-graph if and only if tdom(G) > 2. In this paper, we provide a constructive characterization of the graphs that have two disjoint total dominating sets, or, equivalently, a characterization of the TDP-graphs. We describe a procedure to build TDP-graphs in terms of a 2-coloring of the vertices that indicate the role each vertex plays in the sets associated with the two disjoint total dominating sets. We show that the resulting family we construct, starting from four initial base graphs and applying one of seventeen operations to extend graphs in the family to larger graphs, is precisely the class of all TDP-graphs. Our characterization provides a method for creating the TDP-graphs using a finite set of precise operations. The construction places the TDP-graphs in another context, devel- M. A. Henning and I. Peterin: A characterization of graphs with disjoint total dominating sets 361 oping them from four base graphs and applying a sequence of operations from seventeen operations that are independent and necessary to produce a TDP-graph; that is, we show that this method produces precisely the family of TDP-graphs in that every graph generated by this method/algorithm is a TDP-graph and further every TDP-graph can be constructed in this way. We remark that this procedure does not solve the decision problem to decide if a given graph has two disjoint total dominating sets in polynomial time. If one follows the steps in the proof of Section 4, one does indeed obtain an algorithm for this decision problem. However, this algorithm is far from polynomial time complexity. In particular, the first step of this algorithm is to discard some edges in order to obtain so-called sparse TDP-graph. Unfortunately, the proof does not provide those edges and this already spoils the time complexity. 1.1 Notation For notation and graph theory terminology we generally follow [13]. All graphs in this paper are finite and simple, without loops or multiple edges. The order of a graph G is denoted by n(G) = |V(G)|, and the size of G by m(G) = |E(G)|. We denote the degree of a vertex v in the graph G by dG(v). The maximum (minimum) degree among the vertices of G is denoted by A(G) (¿(G), respectively). The open neighborhood of v is NG(v) = {u e V(G) | uv e E(G)}. For a set S C V(G), its open neighborhood is the set NG(S) = |Jves NG(v). For subsets X and Y of vertices of G, we denote the set of edges with one end in X and the other end in Y by [X, Y]. For a set S C V (G), the subgraph induced by S is denoted by G[S]. Further, the subgraph of G obtained from G by deleting all vertices in S and all edges incident with vertices in S is denoted by G - S; that is, G - S = G[V(G) \ S]. If S = {v}, we simply denote G - {v} by G - v. The distance between two vertices u and v in G, denoted dG(u, v), is the minimum length of a (u, v)-path in G. By Wuv we denote the set of all vertices of G which are closer to u than to v; that is, Wuv = {w | dG(w, u) < dG(w, v)}. Symmetrically, Wvu is defined. A block of a graph G is a maximal connected subgraph of G which has no cut-vertex of its own. A block containing exactly one cut-vertex of G is called an end-block. It is well known that any two different blocks of a graph have at most one vertex in common, namely a cut-vertex. Furthermore, a connected graph with at least one cut-vertex has at least two end-blocks. Let X denote the set of cut-vertices of a connected graph G and let Y denote the set of its blocks. The block graph of G is a bipartite graph with partite sets X and Y in which a vertex x e X is adjacent to a vertex y e Y if x is a vertex of the block y. It is well-known that the block graph of any connected graph is a tree. A walk is a finite, alternating sequence of vertices and edges in which each edge of the sequence joins the vertex that precedes it in the sequence to the vertex that follows it in the sequence. A non-backtracking walk is a walk with the additional constraint that no two consecutive edges on the walk are repeated. Let u be a cut-vertex of a graph G. Let Hi and H2 be two vertex disjoint subgraphs of G - u that contain all the components of G - u, where each of Hi and H2 contain at least one component of G - u. We call Hi and H2 the associated subgraphs of G - u. For i € [2], we denote by Hu the subgraph of G induced by V(H) U {u}. Further, the vertex in Hu named u we rename u', and the vertex in Hu named u we rename u" in order to distinguish between u, u' and u''. We use the standard notation [k] = {1,..., k}. 362 Ars Math. Contemp. 16(2019)203-213 2 The graph family G In this section, we construct a graph family G such that every graph in the family has two disjoint total dominating sets. First, we define a 2-coloring of a graph G as a partition S = (SR, SB) of V(G). The color of a vertex v, denoted color(v), is the letter X G {R, B} such that v g SX, where "R" and "B" here stand for red and blue, respectively. Thus, our 2-coloring of G is a coloring of the vertices of G, one color to each vertex, using the colors red and blue. We denote by X the letter X g {R, B} \ {X}, and we call X the color different from X. Thus, if X = R, then X = B while if X = B, then X = R. We denote by (G, S) a graph G with a given 2-coloring S. Our aim is to describe a procedure to build TDP-graphs in terms of 2-colorings. For i G [4], by a 2-colored Gj, we shall mean the graph Gj and its associated 2-coloring shown in Figure 1. Further, we call each 2-colored Gj a 2-colored base graph. XX X__X X _ XX XX_ XX XXX XX X X XX XX (a) Gi (b) G2 (c) G3 (d) G4 Figure 1: The four 2-colored base graphs Gi, G2, G3, G4. Let G be the minimum family of 2-colored graphs that: (i) contains the four 2-colored base graphs; and (ii) is closed under the seventeen operations O1 through to O17 listed below, which extend a 2-colored graph (G', S') to a new 2-colored graph (G, S). In Figures 2-7, the vertices of G' are colored black and the new vertices of G are colored white for illustrative purposes, even though the actual colors of the vertices are indicated by the letters X and X. Operation O1: (G, S) is obtained from (G', S') by adding an edge between two nonadja-cent vertices of the same color. See the upper diagram of Figure 2. Operation O2: (G, S) is obtained from (G', S') by adding an edge between two nonadja-cent vertices of different color. See the lower diagram of Figure 2. 1: O2: X* Xf! G' 1 X* xi X* Xf G' 1 X* xlj Figure 2: The operations O1 and O2. M. A. Henning and I. Peterin: A characterization of graphs with disjoint total dominating sets 363 Operation O3: If u and v are distinct vertices of different color from (G', S'), then (G, S) is obtained from (G', S') by adding a new vertex of any color adjacent to both u and v. See the left diagram in the upper part of Figure 3. Operation O4: If u and v are distinct vertices of the same color from (G', S'), then (G, S) is obtained from (G', S') by adding adjacent vertices x and y and edges ux and vy with color(x) = color(y) = color(u). See the middle diagram in the upper part of Figure 3. Operation O5: If u and v are distinct vertices of different color from (G', S'), then (G, S) is obtained from (G', S') by adding adjacent vertices x and y and edges ux and vy with color(x) = color(u) = color(y). See the right diagram in the upper part of Figure 3. Operation O6: If u and v are distinct vertices of the same color from (G', S'), then (G, S) is obtained from (G', S') by adding a path xyz with color(y) = color(z) = color(x) = color(u) and adding edges ux and vz. See the left diagram in the lower part of Figure 3. Operation O7: If u and v are distinct vertices of the same color from (G', S'), then (G, S) is obtained from (G', S') by adding a path xyzw and edges ux and vw with color(x) = color(w) = color(u) = color(y) = color(z). See the middle diagram in the lower part of Figure 3. 0a: G' X X«1 O4: X*) G' X* ?X 05 ¿X x*1 —0 G' X*- -0 Oa: G' X* X* 'X 'X 'X X O X*] G' X» XX —O-Q X X »8 G' X* X* XX —O-Q XX Figure 3: The operations O3 - O8. Operation O8: If u and v are distinct vertices of different color from (G', S'), then (G, S) is obtained from (G', S') by adding a path xyzw and edges ux and vw with color(x) = color(y) = color(v) = color(z) = color(w). See the right diagram in the lower part of Figure 3. Operation O9: If u and v are adjacent vertices of different color from (G', S'), then (G, S) is obtained from (G', S') by subdividing uv with four consecutive vertices x, y, z, w where x is adjacent to u and color(u) = color(z) = color(w) = color(x) = color(y). See the upper diagram of Figure 4. Operation Oi0: If u and v are adjacent vertices of the same color from (G', S'), then (G, S) is obtained from (G', S') by subdividing uv with four consecutive vertices x, y, z, w where x is adjacent to u and color(u) = color(x) = color(w) = color(y) = color(z). See the lower diagram of Figure 4. Operation O11: If v is a vertex from (G', S'), then (G, S) is obtained from (G', S') by adding an edge xy together with the edges vx and vy where color(x) = color(y) = color(v). See the left diagram of Figure 5. Operation O12: If v is a vertex from (G', S'), then (G, S) is obtained from (G', S') by 364 Ars Math. Contemp. 16(2019)203-213 09: O 10: Figure 4: The operations O9 and O10. adding a path xyz together with the edges vx and vz where color(x) = color(y) = color(z) = color(v). See the middle diagram of Figure 5. Operation O13: If v is a vertex from (G', S'), then (G, S) is obtained from (G', S') by adding a path xyzw together with the edges vx and vw where color(x) = color(w) = color(v) = color(y) = color(z). See the right diagram of Figure 5. Figure 5: The operations O11, O12 and O13. Operation O14: If v is a vertex from (G',S'), then (G, S) is obtained from (G',S') by adding a 3-cycle, xyzx, together with the edge vx where color(x) = color(v) = color(y) = color(z). See the left diagram of Figure 6. Operation O15: If v is a vertex from (G', S') of any color, then (G, S) is obtained from (G', S') by adding a 4-cycle, xyzwx, together with the edge vx where color(x) = color(y) = color(z) = color(w). See the middle diagram of Figure 6, where the notation X/X means that the vertex can have any color. Operation O16: If v is a vertex from (G', S'), then (G, S) is obtained from (G', S') by adding a 5-cycle, xyzwtx, together with the edge vx where color(x) = color(y) = color(t) = color(z) = color(w) = color(v). See the right diagram of Figure 6. Figure 6: The operations O14, O15 and O16. Operation O17: If u is a cut-vertex from (G', S') with associated subgraphs Hf and M. A. Henning and I. Peterin: A characterization of graphs with disjoint total dominating sets 365 and in (u') there exists a vertex of the same color as u and in NH% (u'') there exists a vertex of different color as u, then (G, S) is obtained from Hf and Hf by adding a new vertex v and the edges u'v and vu''. The color of all vertices from Hf remains the same as in G', color(v) = color(u") = color(u') = color(u) and the color of all vertices from Hf is exchanged with respect to their color in G'. See the diagram of Figure 7, where the notation A means that the color of all vertices from the set A in (G', S') is changed in (G, S). Oir: v -0- X X A X Figure 7: The operation O17. We remark that, by definition, all operations O3 to O17 produce new vertices. Further, exactly one new vertex created in each of the operations O14 to O16 has degree 3, and all other new vertices created using operations O3 to O17 have degree 2 in G. In operations O11 to O13, if the selected vertex v from (G', S') is a cut-vertex of G' it is also a cutvertex in G, while if v is not a cut-vertex of G' it becomes a cut-vertex in G. Moreover all operations from O14 to O17 produce new cut vertices. In this sense all operations, except O1 and O2, can be viewed as base operations which build the sparse skeleton of TDP-graphs, while O1 and O2 fill this skeleton with additional edges. This is also the main idea of the proof. First to discard all edges which are there by one of the operations O1 and O2, and then study the resulting vertices of degree two. Lemma 2.1. If (G, S) G G for some 2-coloring S = (SR, SB), then G is a TDP-graph. Further, S = (SR, SB) is a partition of V(G) into two total dominating sets of G. Proof. We proceed by induction on the number, k > 0, of operations O1 through O17 used to construct a 2-colored graph (G, S) G G .If k = 0, then (G, S) is one of the four 2-colored base graphs illustrated in Figure 1, and one can readily observe that G is a TDP-graph and S = (SR, SB) is a partition of V(G) into two total dominating sets of G. This establishes the base case. Let k > 1 and suppose that every 2-colored graph (G', S') g G that can be constructed using fewer than k operations satisfies the desired result. Let (G, S) g G be a 2-colored graph that can be built from one of the 2-colored base graphs by a sequence of k operations O1 -O17. Let Oj be the last operation of that sequence where j G [17], and let (G', S') be the graph obtained from the same 2-colored base graph with the same sequence as that used to construct (G, S) but without applying the last operation Oj. Thus, (G', S') G G can be constructed using fewer than k operations. By the induction hypothesis, the graph G' is a TDP-graph and S' = (Sa, Sb) is a partition of V (G') into two total dominating sets of G'. If j G [2], then S = S' and G is a TDP-graph since no new vertices were added. For 3 < j < 17 it is a simple exercise to check from the color of the new vertices added to (G', S') when forming (G, S) that the operation Oj yields two disjoint total domination sets, namely SR and SB. Thus, G is a TDP-graph, and S = (SR, SB) is a partition of V(G) into two total dominating sets of G. □ 366 Ars Math. Contemp. 16 (2019) 377-401 3 Main result Our main result is to provide a constructive characterization of the graphs that have two disjoint total dominating sets, or, equivalently, a characterization of the TDP-graphs. We prove that the class of all TDP-graphs is precisely the family G constructed in Section 2. A proof of Theorem 3.1 is given in Section 4. Theorem 3.1. A graph G is a TDP-graph if and only if every component of (G, S) is in G for some 2-coloring S. Further, if (G, S) G G, then S = (SR, SB) is a partition of V(G) into two total dominating sets of G. 4 Proof of Theorem 3.1 The sufficiency follows from Lemma 2.1. To prove the necessity, let G be a TDP-graph and let S = (SR, SB) be a partition of V(G) into two total dominating sets of G. We show that (G, S) G G by induction on m = |E(G) |. Since G is a TDP-graph, we note that ¿(G) > 2, G has order n > 4, and m > 4. If m = 4, then necessarily G = C4, and (G, S) is the 2-colored base graph Gi, and so (G, S) g G. This establishes the base case. Let m > 5 and assume that every TDP-graph G' of size less than m where S' = (Sr, Sb) is a partition of V(G') into two total dominating sets satisfies (G', S') G G. Let G be a TDP-graph of order n and size m, and let S = (SR, SB) be a partition of V (G) into two total dominating sets of G. If G is disconnected, we apply the inductive hypothesis to each component of G to produce the desired result. Hence, we may assume that G is connected. Our general strategy in what follows is to reduce the graph G to a TDP-graph G' of size less than m, apply the inductive hypothesis to G' to show that (G', S') G G, and then reconstruct the graph (G, S) from (G', S') by applying one of the operations Ox, x G [17], to show that (G, S) G G. We state this formally, since we will frequently use the following statement. Statement 4.1. If G' is a TDP-graph of size less than m, where S' = (Sr, Sb) is a partition of V(G') into two total dominating sets, and (G, S) can be constructed from (G', S') by applying one of the operations Ox, where x G [17], then (G, S) G G. We define three graphs GR, GB and GRB associated with the graph G and the partition 5 = (SR, SB). Let Gr and GB be the subgraphs of G induced by the sets SR and SB, respectively, and so GR = G[SR] and GB = G[SB]. Let GRB be the (spanning) subgraph of G with V(Grb) = V(G) and E(Grb) = E(G) \ (E(Gr) U E(Gb)). Claim 4.2. If some component of GR, GB or GRB is not a star, then (G, S) G G. Proof. Suppose that there exists a component, C, of GR, GB or GRB which is not a star. If C contains a cycle v1... vkv1, k > 3, then G can be obtained from G' = G — v1v2 by either applying operation Oi in the case when C is a component of Gr or Gb or by applying operation O2 in the case when C is a component of GRB. If C contains no cycle, then C is a tree different from a star. Therefore, there exists a path u1u2u3u4 in C and G can be obtained from G' = G — u2u3 by either applying operation O1 in the case when C is a component of GR or GB or by applying operation O2 in the case when C is a component of Grb. In all cases, since S = (SR, SB) is apartition of V(G) into two total dominating sets of G, the same partition S' = S = (SR, SB) is a partition of V(G') into two total M. A. Henning and I. Peterin: A characterization of graphs with disjoint total dominating sets 367 dominating sets of G'. By the inductive hypothesis, (G', S') G G. We can obtain G from the same 2-colored base graph as G' and the same sequence of operations from O - Oi7 used to construct (G', S') by adding at the end of this sequence the operation O or O2. Hence (G, S) G G. □ By Claim 4.2, we may assume that every component of GR, GB or GRB is a star, for otherwise the desired result follows. We call the resulting graph G a sparse TDP-graph with associated partition S = (SR, SB). We now partition the sets SR and SB in two different ways depending on the role that the vertices in SR and SB, respectively, play in the graphs GR, GB and GRB. First, let SR = Ri U R2 U R3 and SB = Bi U B2 U B3 where Ri = {v G Sr | (v) > 2} R2 = {v G Sr \ Ri | Ng(v) n Ri = 0} R3 = Sr \ (Ri U R2) and Bi = {v G Sb | dgb (v) > 2} B2 = {v G Sb \ Bi | Ng(v) n Bi = 0} B3 = Sb \ (Bi U B2). Next, we define a partition of V(G) = V(GRB) as the union of the two partitions SR = RiB U R2B U R3B and SB = RBi U RB2 U RB3 where RiB = {v G Sr | ¿grb (v) > 2} R2B = {v G SR \ RiB | v has a neighbor in GRB that belongs to RBi} R3B = Sr \ (RiB U R2B) and RBi = {v G Sb | dgrb (v) > 2} RB2 = {v G SB \ RBi | v has a neighbor in GRB that belongs to RiB} RB3 = Sb \ (RBi U RB2). We note that every vertex in R3 has degree 1 in GR, and every vertex in R3B has degree 1 in GRB. Analogously, every vertex in B3 and RB3 has degree 1 in GB and GRB, respectively. In particular, vertices from R3 n R3B and from B3 n RB3 have degree 2 in G. Further, the neighbor of a vertex from R3 in GR belongs to R3, and, analogously, the neighbor of a vertex from B3 in GB belongs to B3. We proceed further with the following series of structural properties of the graph G. Claim 4.3. ¿(G) = 2. Proof. Recall that G is a sparse TDP-graph with associated partition S = (SR, SB). Thus, SR and SB are disjoint total dominating sets of G which form a partition of V(G). Every vertex v g V(G) has at least one neighbor in SR and at least one neighbor in SB. Hence, ¿(G) > 2. Suppose, to the contrary, that ¿(G) > 2. 368 Ars Math. Contemp. 16(2019)203-213 Suppose that RiB = 0 and let v e RiB. Let vi,..., vk, where k > 2, be the neighbors of v in GRB . By Claim 4.2 and the definition of the set RB2, we note that for each i e [k], vi e RB2 and the vertex v is the only neighbor of vi that belongs to the set SR. Further, since da(vi) > 2, the vertex vj has at least two neighbors in SB. By Claim 4.2, every component of the graph GB is a star, implying that no two neighbors of v are adjacent or have a common neighbor in GB. Further, every neighbor of vi in G different from v belongs to the set B2, and has the vertex vi as its only neighbor in GB. Thus, the set B2 contains at least 2k vertices at distance 2 from v in G. For i e [k], let wi denote an arbitrary neighbor of vi in GB, and so wi e B2. Since dG (wi) > 2 and wi has only one neighbor in SB, namely the vertex vi, we note that wi e RBi and therefore wi has at least two neighbors in R2B. By Claim 4.2 and the definition of the set R2B, we note that every neighbor of wi different from vi belongs to the set R2B. Further, each such neighbor of wi has exactly one neighbor that belongs to the set SB, namely the vertex wi, and therefore has at least two neighbors in SR by the minimum degree condition. By Claim 4.2, every component of the graph GR is a star, and therefore two distinct vertices of degree at least 2 in GR belong to different components of GR. This implies that this subset R2B of vertices in SR contains at least 4k vertices. By the minimum degree condition, these vertices in R2B also belong to Ri and each of them has at least two neighbors in R2. Further, analogously as before, no two such vertices are the same, implying that this subset of R2 contains at least 8k - 1 vertices distinct from v, all of which belong to the set RiB, noting that one of these vertices may possibly be the vertex v. By repeating this process for all these vertices we see that we have an infinite process with infinite growth, which is not possible in a finite graph G. Therefore, the set RiB = 0. Analogously, the set RBi = 0. Therefore, R2B and RB2 are also empty. We now consider a vertex v e R3B. By Claim 4.2, every component of the graph GRB is a star, implying that the vertex v has exactly one neighbor in Sb and, by the minimum degree condition, at least two neighbors in SR. Thus, v e Ri and each neighbor of v in SR belong to R2. Further, by Claim 4.2, each such neighbor of v in R2 has degree 1 in GR and, therefore, by the minimum degree condition, has at least two neighbors in SB. Thus, every neighbor of v in R2 belongs to the set RiB, contradicting our earlier observation that the set RiB is an empty set. This completes the proof of Claim 4.3. □ By Claim 4.3, every sparse TDP-graph has minimum degree 2. In particular, ¿(G) = 2. Let D = {v e V(G) | dG(v)=2}. Claim 4.4. If a vertex in D is a cut-vertex of G, then (G, S) e G. Proof. Suppose that a vertex in D is a cut-vertex of G. Suppose firstly that D contains two adjacent vertices, x and y, that are both cut-vertices of G, and let e = xy. Let Cx and Cy be the components of G — e which contain x and y, respectively. Further, let xX be the neighbor of x in Cx and let y' be the neighbor of y in Cy. We have two possibilities with respect to the color of the vertices x, x', y, y'. Either color(x') = color(x) = color(y) = color(y') or color(x') = color(y') = color(x) = color(y). In both cases, let G' be the graph obtained from G — {x, y} by adding the edge x'y', and changing the color of all vertices in V(Cy) \ {y} while retaining the color of all vertices in V(Cx) \ {x}. Let S' = (Sr, Sb) be the resulting partition of V(G'). We note that G' is a TDP-graph, where S' = (Sr, S'B) is a partition of V(G') into two total dominating sets and that x' and y' are cut vertices of G'. If x and x' have the same color in G, then we use Statement 4.1 with the operation Oi7 M. A. Henning and I. Peterin: A characterization of graphs with disjoint total dominating sets 369 and the cut vertex y' to show that (G, S) G G, while if x and x' have different color in G, we use Statement 4.1 with the operation O17 and the cut vertex x'. Thus, we may assume that no two adjacent vertices of D are both cut-vertices of G. Let v be a cut-vertex of G that belongs to D with neighbors u' and u''. Without loss of generality we may assume that color(v) = color(u'') = color(u'). Let Cu and Cu» be the components of G - v containing u' and u'', respectively. Since S = (SR, SB) is a partition of V(G) into two total dominating sets of G, there exists a neighbor of u' in Cu> of the same color as u' and a neighbor of u'' in Cu» whose color is different from that of u''. Let G' be the graph obtained from G - v by identifying the vertices u' and u'' into one new vertex u, and joining u to every neighbor of u' and u''. Further, we assign to u the same color as that of u', while we change the color of all vertices in V(Cu») \ {u''} and retain the color of all vertices in V(Cu) \ {u'}. Let S' = (Sr, Sb) be the resulting partition of V(G'). We note that G' is a TDP-graph, where S' = (SR, Sr) is a partition of V(G') into two total dominating sets. We now use Statement 4.1 with the operation O17 to show that (G, S) G G, where H]1 = Cu, and H2u = Cu». □ By Claim 4.4, we may assume that no vertex in D is a cut-vertex of G, for otherwise the desired result follows. We note that every vertex in D has one neighbor in SR and one neighbor in SB. Further, every component in G[D] is a path or a cycle. Claim 4.5. Let C be a component of G[D]. If C is a cycle or if C is a path of order at least 5 or if C is a path of order 4 and the ends of C do not have a common neighbor, then (G, S) g G. Proof. Suppose that C is a cycle. Since G is a connected TDP-graph, this implies that G = Cn where n = 0 (mod 4). In this case, G can be obtained from the 2-colored base graph G1 by repeated applications of operation O9 (or operation O10). Hence, we may assume that C is a path, for otherwise the desired result follows. Let C be the path x1... xk, where k > 4. Let u be the neighbor of x1 not on C. If k > 5, let v = x5, while if k = 4, let v be the neighbor of x4 not on C. By assumption, u = v. Let X = {x1,x2,x3 ,x4}. Suppose first that color(u) = color(x1), implying that color(x2) = color(x3) = color(x4) = color(v) = color(x1). If u and v are adjacent in G, let G' = G — X. In this case, the graph G' is a TDP-graph and we use Statement 4.1 with the operation O7 to show that (G, S) G G .If u and v are not adjacent in G, let G' be obtained from G — X by adding the edge uv. Once again, the graph G' is a TDP-graph. We use Statement 4.1 with the operation O10 to show that (G, S) g G. Suppose next that color(u) = color(x1), implying that color(x2) = color(v) = color(x3) = color(x4) = color(u). If u and v are adjacent in G, let G' = G — X. In this case, the graph G' is a TDP-graph and we use Statement 4.1 with the operation O8 to show that (G, S) G G .If u and v are not adjacent in G, let G' be obtained from G — X by adding the edge uv. Once again, the graph G' is a TDP-graph. We use Statement 4.1 with the operation O9 to show that (G, S) G G. □ By Claim 4.5, we may assume that every component of G[D] is a path-component of order at most 4, and that the ends of a path-component of G[D] of order 4 have a common neighbor in G. In what follows we adopt the following notation. Let P be a path-component of G[D], and so P = Pk for some k G [4]. Let P be the path x1... xk, and let u and v be the vertices in G that do not belong to P and are adjacent to x1 and xk, 370 Ars Math. Contemp. 16(2019)203-213 respectively. We call u and v the vertices in G - V(P) associated with the path P. By assumption, if k = 4, then u = v. We note that if k =1, then u = v. We define next a good path-component. Definition 4.6. A path-component P of G[D] is a good path-component if P = Pk where k € [3], and both u and v have neighbors of both colors in the graph G- = G - V (P), where u and v are the vertices in G- associated with P. Claim 4.7. If G[D] contains a good path-component, then (G, S) € G. Proof. Suppose that G[D] contains a good path-component, P: x1... xk. By definition, k € [3]. Suppose that k =1. Since P is a good path-component, the graph G' = G - x1 is a TDP-graph. Furthermore, color(u) = color(v) since G is a TDP-graph. We now use Statement 4.1 with the operation O3 to show that (G, S) € G. Suppose that k = 2. Suppose that color(x1) = color(x2). Then, color(u) = color(x1) and either u = v or u = v and color(u) = color(v). In both cases, since P is a good path-component, the graph G' = G - V(P) is a TDP-graph. If u = v, we use Statement 4.1 with the operation O11 to show that (G, S) € G, while if u = v, we use Statement 4.1 with the operation O4 to show that (G, S) € G. Suppose that color(x1) = color(x2). Then, color(u) = color(x1) and color(v) = color(x2). Since P is a good path-component, the graph G' = G - V (P) is a TDP-graph, and we use Statement 4.1 with the operation O5 to show that (G, S) € G. Suppose that k = 3. Without loss of generality we may assume that color(x1) = color(x2) = color(x3), implying that color(u) = color(x1) and either u = v or u = v and color(u) = color(v). Since P is a good path-component, the graph G' = G - V(P) is a TDP-graph. If u = v, we use Statement 4.1 with the operation O12 to show that (G, S) € G, while if u = v, we use Statement 4.1 with the operation O6 to show that (G,S) € G. □ By Claim 4.7, we may assume that G contains no good path-component, for otherwise the desired result follows. We define next an end-block path component of G[D]. Definition 4.8. A path-component P of G[D] with associated vertices u and v is an endblock path component of G[D] if u = v. We are now in a position to present the following property of non-backtracking walks in the graph G. Claim 4.9. Suppose that W: w1w2... wk is a non-backtracking walk in G and no vertex of W belongs to an end-block path component of G[D]. If w2 is not the only neighbor of w1 in G whose color is color(w2), then wi-1 is the only neighbor of Wj in G whose color is color(wj-1) for all i € [k] \ {1}. Proof. Since W is a non-backtracking walk in G, we note that no two consecutive edges on W are equal; that is, wj-1 = wj+1 for all i € [k -1] \{1}. Suppose, to the contrary, that the claim is false. Let i > 2 be the smallest integer such that the vertex w^ has a neighbor different from w^-1 of the same color as w^-1. Claim 4.9.1. i > 3. M. A. Henning and I. Peterin: A characterization of graphs with disjoint total dominating sets 371 Proof. Renaming colors if necessary, we may assume that color(wi) = X. By supposition, at least one neighbor, say v1, of w1 different from w2 has the same color as w2. Suppose firstly that color(w2) = X. By supposition, color(v1) = X. If w2 has a neighbor, z2 say, different from w1, of color X, then either v1 = z2, in which case v1w1w2v1 is a 3-cycle in GX, or v1 = z2, in which case v1w1w2z2 is apath P4 in GX. Both cases produce a contradiction. Suppose secondly that color(w2) = X. By supposition, color(v1) = X. If w2 has a neighbor, z2 say, different from w1, of color X, then v1w1w2z2 is a path P4 in Grb , a contradiction. We deduce, therefore, that w1 is the only neighbor of w2 whose color is color(w1). Hence, i > 3. □ By Claim 4.9.1, we have that i > 3. Renaming colors if necessary, we may assume that color(w£_1) = X .By supposition, the vertex wg has a neighbor, vg+1 say, different from of the same color as w^_1; that is, color(vg+1) = X. Further since G is a TPD-graph, the vertex wg has a neighbor of color X. Claim 4.9.2. dG(w£_1) = 2. Proof. Suppose that dG(w£_1) > 3. Let vg be a neighbor of w^_1 different from wg_2 and wg. Suppose that color(wg_2) = X. By the minimality of i, the vertex wg_2 is the only neighbor of wg_1 whose color is color(wg_2); that is, all neighbors of wg_1 different from wg_2 must have color X. In particular, color(vg) = color(wg) = X. Hence, vgwg_1wgvg+1 is a path P4 in GRB, a contradiction. Hence, color(wg_2) = X. Thus, all neighbors of wg_1 different from wg_2 must have color X. In particular, color(vg) = color(wg) = X .If vg = vg+1, then vgwg_1wgvg is a 3-cycle in GX, a contradiction. If vg = vg+1, then vgwg_1wgvg+1 is a path P4 in GX, a contradiction. □ By Claim 4.9.2, the vertex wg_1 has degree 2 in G; that is, wg_1 G D. By supposition, the vertex w1 has at least two neighbors whose color is color(w2) and at least one vertex whose color is different from color(w2). In particular, the vertex w1 has degree at least 3 in G. Letp > 1 be the largest integer such that dG(wp) > 3 andp < i-2. Possibly, p = i-2. We now consider the path P: wp+1... wg_1 and note that P is a path-component in G[D]. If wp = wg, then P is an end-block path component of G[D], contradicting the supposition that no vertex of W belongs to an end-block path component of G[D]. Hence, wp = wg and the vertices wp and wg associated with the path-component P in G[D] are distinct vertices. We now consider the graph G_ = G - V (P). By our earlier observations, the vertex wg has neighbors of both colors in G_. If p = 1, then the vertex wp has neighbors of both colors in G_. If p > 2, then by the minimality of i the vertex wp once again has neighbors of both colors in G_ . Thus the path P is a good-path component, contradicting our earlier assumption that G contains no good path-component. This completes the proof of Claim 4.9. □ Claim 4.10. If G contains a cycle that is not an end-block of G, then (G, S) G G. Proof. Assume that some cycle C in G is not an end-block in G. Let P be a path-component of G[D] with associated vertices u and v. Suppose firstly that u = v. Thus, P is an end-block path component of G[D] and CP = G[V(P) U {u}] is a cycle in G. Further, CP is an end-block of G with u as its cut-vertex in G. Suppose that dG (u) > 4. We now consider the graph G_ = G - V (P). By our earlier assumptions, no vertex in D is a cut-vertex of G, implying that G_ is a connected graph. 372 Ars Math. Contemp. 16(2019)203-213 Claim 4.10.1. The vertex u has neighbors of both colors in G . Proof. Suppose, to the contrary, that all neighbors of u in G- have the same color. By supposition, there is a cycle C in G- that contains no vertex that belongs to an end-block component of G[D]. Hence there exists a non-backtracking walk W: ... wk in G that starts at the vertex u, proceeds from u to C, goes all the way around C, and then returns to u, without entering any end-block path component of G[D]. We note that k > 3 and that w1 = wk = u. By our supposition that all neighbors of u in G- have the same color, the vertex w2 is not the only neighbor of w1 in G whose color is color(w2). By Claim 4.9, the vertex wk-1 is the only neighbor of wk in G whose color is color(wk-1). This contradicts our supposition that all neighbors of u in G- have the same color. □ By Claim 4.10.1, the vertex u has neighbors of both colors in G-. Since G is a TDP-graph, this implies that the graph G- is a TDP-graph. Hence, we can use Statement 4.1 with the operation O11 or O12 or O13, depending on the length of P, to show that (G, S) G G. We may therefore assume that dG(u) = 3 (and still u = v), for otherwise (G, S) G G, as desired. Thus, the vertex u has degree 1 in G-. Let x be the neighbor of u in G-. By our earlier assumptions, no vertex in D is a cut-vertex of G. In particular, the cutvertex x does not belong to D, and so dG(x) > 3. We now consider the (connected) graph G- = G- - u obtained from G- by deleting the vertex u. Using analogous arguments as in the proof of Claim 4.10.1, the vertex x has neighbors of both colors in G-. Hence, we can use Statement 4.1 with the operation O14 or O15 or O16, depending on the length of P, to show that (G, S) g G. Suppose next that u = v. Using analogous arguments as in the proof of Claim 4.10.1, the vertices u and v each have neighbors of both colors in G-. Thus the path P is a good-path component, contradicting our earlier assumption that G contains no good path-component. This completes the proof of Claim 4.10. □ By Claim 4.10, we may assume that every cycle in G is an end-block of G, for otherwise (G, S) G G as desired. Every block of G that is not an end-block is a copy of K2 consisting of a single edge. By our earlier assumptions, every cycle in G has length 3, 4 or 5. Let T- be the graph obtained from G by deleting all vertices that belong to an end-block path component of G[D]. By our earlier assumptions, the graph T- is a tree. In particular, every vertex of T- is a cut-vertex of G. By our earlier assumptions, no vertex in D is a cut-vertex of G, implying that every vertex of D belongs to an end-block path component of G[D]. Hence, every vertex of D belongs to an end-block of G. Claim 4.11. If two cycles of G intersect, then (G, S) G G. Proof. Suppose that two different cycles C1 and C2 of G intersect. Since every cycle in G is an end-block of G, these two cycles intersect in exactly one common vertex, v say. Claim 4.11.1. If G contains exactly one cut-vertex, then (G, S) is a 2-colored base graph G3. Proof. Suppose that G contains exactly one cut-vertex. Since the cut-vertices of G are precisely the vertices in the tree T-, this implies that V(T-) = {v}. Thus, every block of G is an end-block that contains the vertex u. Let C1 be the cycle vv1v2... vk-1v and let color(v) = X, where k G {3,4, 5}. If k = 3, then color(v1) = color(v2) = X. If k = 4, then color(v2) = X and, renaming v1 and v3, if necessary, we may assume that M. A. Henning and I. Peterin: A characterization of graphs with disjoint total dominating sets 373 color(vi) = X and color(v3) = X. If k = 5, then color(v2) = color(v3) = X and color(vi) = color(v4) = X. Suppose that G contains an end-block, C say, that is a 4-cycle. If C' is an arbitrary endblock different from C, then C' - v is a good path-component of G[D], a contradiction. Hence, no end-block of G is a 4-cycle. Thus, since G is a TDP-graph, at least one end-block is a 3-cycle and at least one endblock is a 5-cycle. Renaming the end-blocks if necessary, we may assume that C1 is a 3-cycle and C2 is a 5-cycle. These two cycles, together with their associated 2-colorings described above, form the 2-colored base graph G3. If G contains at least three blocks and C' is an arbitrary end-block different from C1 and C2, then C' - v is a good path-component of G[D], a contradiction. Hence, G contains exactly two end-blocks, implying that (G, S) is the 2-colored base graph G3. □ By Claim 4.11.1, we may assume that G contains at least two cut-vertices, for otherwise (G, S) g G as desired. As observed earlier, the cut-vertices of G are precisely the vertices in the tree T-. Let x be a neighbor of v in T-. Renaming the cycle C1 and C2 and the vertex x if necessary, we may assume without loss of generality that the vertex v has a neighbor, y say, in C1 such that color(x) = color(y). We now consider the graph G- = G- (V(C2) \{v}). Since G is a TDP-graph, this implies that the graph G- is a TDP-graph. Hence, we can use Statement 4.1 with the operation O11 or O12 or O13, depending on the length of C2, to show that (G, S) g G. □ By Claim 4.11, we may assume that no two cycles of G intersect, for otherwise (G, S) g G as desired. The tree T- therefore contains at least two vertices. Further, every leaf in T-has degree 3 in G and belongs to exactly one end-block of G. Let p1p2... pk be a longest path in T-. Necessarily, p1 and pk are both leaves in T-. Since T- contains no vertex of D, we note that every vertex in T- has degree at least 3 in G. Let C1 and Ck be the end-blocks in G that contain p1 and pk, respectively. Claim 4.12. If k g {2, 3}, then (G, S) g G. Proof. Suppose firstly that k = 2. In this case, G is obtained from the two cycles C1 and C2 by adding the edge p1p2. If C1 is a 4-cycle, then the cycle C1 together with its associated 2-coloring is the 2-colored base graph G1. Starting with this 2-colored base graph G1, we can use Statement 4.1 with the operation O14 or O15 or O16, depending on the length of C2, to show that (G, S) g G. Analogously, if C2 is a 4-cycle, (G, S) g G. Hence, we may assume that neither C1 nor C2 is a 4-cycle. With this assumption, if C1 is a 3-cycle, then C2 is also a 3-cycle noting that G is a TDP-graph. In this case, (G, S) is the 2-colored base graph G2. If C1 is a 5-cycle, then C2 is also a 5-cycle. In this case, (G, S) is the 2-colored base graph G4. Hence if k = 2, then (G, S) g G. Suppose secondly that k = 3. We now consider the (connected) graph G- = G -V (C1). We note that the vertex p2 has degree at least 2 in G-. If the vertex p2 has neighbors of both colors in G-, then G- is a TPD-graph. In this case, we can use Statement 4.1 with the operation O14 or O15 or O16, depending on the length of C1, to show that (G, S) g G. Hence we may assume that all neighbors of p2 in G- have the same color which is different to color(p1) (noting that G is a TPD-graph). This implies that the vertex p2 has neighbors of both colors in the graph G - V (C2), and once again we can use Statement 4.1 with the operation O14 or O15 or O16, depending on the length of C2, to show that (G, S) g G. □ 374 Ars Math. Contemp. 16(2019)203-213 By Claim 4.12, we may assume that k > 4, for otherwise (G, S) e G as desired. We now consider the (connected) graph G- = G - V(Ci). If the vertex p2 has neighbors of both colors in G-, then as in the proof of Claim 4.12 we can use Statement 4.1 with the operation Oi4 or Oi5 or Oi6, depending on the length of Ci, to show that (G, S) e G. Hence we may assume that all neighbors of p2 in G- have the same color. We now consider the walkp2p3 .. .pk. By assumption, p3 is not the only neighbor of p2 in G whose color is color(p3). By Claim 4.9, the vertexpk-2 is the only neighbor of pk-i in G whose color is color(pk-2). This implies that the vertex pk-i has neighbors of both colors in the graph G - V(C2). Hence, G - V(C2) is a TPD-graph and we can use Statement 4.1 with the operation Oi4 or Oi5 or Oi6, depending on the length of C2, to show that (G, S) e G. This completes the proof of Theorem 3.1. □ 5 Closing remarks We remark that although our characterization in Theorem 3.1 solves a long-standing problem in the theory of total domination in graphs which has been open for several decades, it remains a challenging problem to determine in polynomial time if a given graph is a TDP-graph even for some special graph classes. Our method cannot be used to decide if a given graph G is a TDP-graph in polynomial time. The reason for that is that we have no specified vertex partition together with G. Indeed, recognizing this class of graphs is known to be NP-complete (see [8]). However, we nonetheless believe that our constructive proof gives valuable insights into the problem and gives an entirely new description of TDP-graphs, placing them in another context. We close with a short discussion about the independence of operations Oi to Oi7 in the class G. For this purpose, we will construct small graphs in G from our 2-colored base graphs that cannot be built by any other construction in G, thereby showing that operation Oj is independent for each i e [17]. The independence of these seventeen operations used to build graphs in the family G show that none of them are redundant, and all are needed in the construction. • Apply operation O2 on Gi (to obtain the graph K4 - e). • Apply operation O3 on Gi to obtain the house graph; that is, the graph obtained from a 5-cycle by adding an edge. • Apply operation Oi once and operation O2 three times on the house graph to obtain K5. • Apply operation O4 to two nonadjacent vertices of degree 2 on G2. • The independence of operation Ox, where x e {5,6,11,12,13,14,15,16}, can be seen by applying Ox once on Gi. • The independence of operation Ox, where x e {7,10}, can be seen by applying Ox once on adjacent vertices of degree 3 in G2. • The independence of operation Ox, where x e {8,9}, can be seen by applying Ox once on adjacent vertices of degree 3 in G4. • Apply operation Oi7 once on the cut-vertex of G3. Hence, all seventeen operations are independent. Further, our proof of Theorem 3.1 shows that all seventeen operations are necessary to give our characterization of TDP-graphs. M. A. Henning and I. Peterin: A characterization of graphs with disjoint total dominating sets 375 References [1] H. Aram, S. M. Sheikholeslami and L. Volkmann, On the total domatic number of regular graphs, Trans. Comb. 1 (2012), 45-51, doi:10.22108/toc.2012.760. [2] B. Chen, J. H. Kim, M. Tait and J. Verstraete, On coupon colorings of graphs, Discrete Appl. Math 193 (2015), 94-101, doi:10.1016/j.dam.2015.04.026. [3] E. J. Cockayne, R. M. Dawes and S. T. Hedetniemi, Total domination in graphs, Networks 10 (1980), 211-219, doi:10.1002/net.3230100304. [4] P. Delgado, W. J. Desormeaux and T. W. Haynes, Partitioning the vertices of a graph into two total dominating sets, Quaest. Math. 39 (2016), 863-873, doi:10.2989/16073606.2016. 1188862. [5] W. J. Desormeaux, T. W. Haynes and M. A. Henning, Partitioning the vertices of a cubic graph into two total dominating sets, Discrete Appl. Math. 223 (2017), 52-63, doi:10.1016/j.dam. 2017.01.032. [6] T. W. Haynes, S. T. Hedetniemi and P. J. Slater (eds.), Domination in Graphs: Advanced Topics, volume 209 of Monographs and Textbooks in Pure and Applied Mathematics, Marcel Dekker, New York, 1998. [7] T. W. Haynes, S. T. Hedetniemi and P. J. Slater, Fundamentals of Domination in Graphs, volume 208 of Monographs and Textbooks in Pure and Applied Mathematics, Marcel Dekker, New York, 1998. [8] P. Heggernes and J. A. Telle, Partitioning graphs into generalized dominating sets, Nordic J. Comput. 5 (1998), 128-142. [9] M. A. Henning, A survey of selected recent results on total domination in graphs, Discrete Math. 309 (2009), 32-63, doi:10.1016/j.disc.2007.12.044. [10] M. A. Henning, C. Lowenstein, D. Rautenbach and J. Southey, Disjoint dominating and total dominating sets in graphs, Discrete Appl. Math. 158 (2010), 1615-1623, doi:10.1016/j.dam. 2010.06.004. [11] M. A. Henning and J. Southey, A note on graphs with disjoint dominating and total dominating sets, Ars Combin. 89 (2008), 159-162. [12] M. A. Henning and J. Southey, A characterization of graphs with disjoint dominating and total dominating sets, Quaest. Math. 32 (2009), 119-129, doi:10.2989/qm.2009.32.1.10.712. [13] M. A. Henning and A. Yeo, Total Domination in Graphs, Springer Monographs in Mathematics, Springer, New York, 2013, doi:10.1007/978-1-4614-6525-6. [14] O. Ore, Theory of Graphs, volume 38 of American Mathematical Society Colloquium Publications, American Mathematical Society, Providence, Rhode Island, 1962. [15] J. Southey and M. A. Henning, A characterization of graphs with disjoint dominating and paired-dominating sets, J. Comb. Optim. 22 (2011), 217-234, doi:10.1007/ s10878-009-9274-1. [16] B. Zelinka, Total domatic number and degrees of vertices of a graph, Math. Slovaca 39 (1989), 7-11. ARS MATHEMATICA CONTEMPORANEA ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 16 (2019) 377-401 https://doi.org/10.26493/1855-3974.1765.d73 (Also available at http://amc-journal.eu) The Möbius function of PSU(3, 22") Giovanni Zini * Department of Mathematics and Applications, University of Milano-Bicocca, via Cozzi 55, 50125 Milano, Italy Received 25 July 2018, accepted 10 November 2018, published online 29 January 2019 Abstract Let G be the simple group PSU(3,22"), n > 0. For any subgroup H of G, we compute the Möbius function ^L(H, G) of H in the subgroup lattice L of G, and the Möbius function ([H], [G]) of [H] in the poset L of conjugacy classes of subgroups of G. For any prime p, we provide the Euler characteristic of the order complex of the poset of non-trivial p-subgroups of G. Keywords: Unitary groups, Möbius function, subgroup lattice. Math. Subj. Class.: 20G40, 20D30, 05E15, 06A07 1 Introduction The Mobius function ^(H,G) on the subgroups of a finite group G is defined recursively by ^(G, G) = 1 and J2K>H m(K, G) = 0 if H < G. This function was used in 1936 by Hall [12] to enumerate k-tuples of elements of G which generate G, for a given k. The combinatorial and group-theoretic properties of the Mobius function were investigated by many authors; see the paper [14] by Hawkes, Isaacs, and Ozaydin. The Mobius function is defined more generally on a locally finite poset (P, <) by the recursive definition ^(x, x) = 1, ^(x, y) = 0 if x < y, and J2x 0, q = 22", and G = PSU(3, q). Up the conjugation, the maximal subgroups of G are the following. (i) The stabilizer M1(P) = S2 x Cq2_1 of a point P G Hq (Fq2), of order q3(q2 - 1). (ii) The stabilizer M2(P) ^ PSL(2, q) x Cq+1 of a point P G PG(2,q2) \Hq (Fq2), of order q(q2 - 1)(q + 1). (iii) The stabilizer M3 (T) = (Cq+1 x Cq+1) x Sym(3) of a non-degenerate self-polar triangle T = {P, Q, R} C PG(2, q2) \ Hq with respect to U, of order 6(q + 1)2. (iv) The stabilizer M^T) = Cq2-q+1 x C3 of a triangle T = {P, $q2 (P), $2 (P)} C q^ J, V Hq (Fq6 ) \ Hq (Fq2 ), of order 3(q2 - q + 1). For a detailed description of the maximal subgroups of G, both from an algebraic and a geometric point of view, we refer to [11, 21, 22]. 382 Ars Math. Contemp. 16 (2019) 377-401 In our investigation it is useful to know the geometry of the elements of PGU(3, q) on PG(2, Fq), and in particular on Hq(Fq2). This can be obtained as a corollary of Theorem 2.3, and is stated in Lemma 2.2 with the usual terminology of collineations of projective planes; see [16]. In particular, a linear collineation a of PG(2, Fq) is a (P, £)-perspectivity, if a preserves each line through the point P (the center of a), and fixes each point on the line £ (the axis of a). A (P, £)-perspectivity is either an elation or a homology according to P G £ or P / I. Lemma 2.4 was obtained in [21] in a more general form (i.e., for any prime power q). Lemma 2.4. For a nontrivial element a G G = PSU(3, q), q = 22", one of the following cases holds. (A) ord(a) | (q +1) and a is a homology, with center P G PG(2, q2) \ Hq and axis £P which is a chord of Hq (Fq2); (P,£p) is a pole-polar pair with respect to U. (B) 2 { ord(a) and a fixes the vertices Pi,P2,P3 of a non-degenerate triangle T c PG(2, q6). (B1) ord(a) | (q + 1), Pi, P2, P3 G PG(2, q2) \ Hq, and the triangle T is self-polar with respect to U. (B2) ord(a) | (q2 - 1) and ord(a) \ (q + 1); Pi G PG(2, q2) \ Hq and P2, P3 G Hq (Fq2 ). (B3) ord(a) | (q2 - q + 1) andPi,P2,Ps G Hq(Fq6) \ Hq(Fq2). (C) ord(a) = 2; a is an elation with center P G Hq (Fq2) and axis £P which is tangent to Hq at P, such that (P,£p) is a pole-polar pair with respect to U. (D) ord(a) = 4; a fixes a point P G Hq (Fq2) and a line £P which is tangent to Hq at P, such that (P,£p) is a pole-polar pair with respect to U. (E) ord(a) = 2d where d is a nontrivial divisor of q +1; a fixes two points P G Hq (Fq2) and Q G PG(2, q2) \ Hq, the polar line PQ of P, and the polar line of Q which passes through P. For a detailed description of the elements and subgroups of G, both from an algebraic and a geometric point of view, we refer to [11, 21, 22], on which our geometric arguments are based. Throughout the paper, a nontrivial element of G is said to be of type (A), (B), (B1), (B2), (B3), (C), (D), or (E), as given in Lemma 2.4. Also, the polar line to Hq at P G PG(2, q2) is denoted by £P. Note that, under our assumptions, any element of order 3 in G is of type (B2). We will denote a cyclic group of order d by Cd and an elementary abelian group of order d by Ed. The center Z(S2) of S2 is elementary abelian of order q, and any element in S2 \ Z(S2) has order 4; see [11, Section 3]. 3 Determination of ) for any subgroup H of G Let n > 0, q = 22", G = PSU(3, q). This section is devoted to the proof of the following theorem. G. Zini: The Mobius function of PSU(3, 22 ) 383 Theorem 3.1. Let H be a proper subgroup of G. Then H is the intersection of maximal subgroups of G if and only if H is one of the following groups: S X Cq2_i, (Cq+i x Cq+1) X Sym(3), Cq+1 x Cq+1, PSL(2,q) x Cq+1, Eq X Cq2 _ 1, Cq2- 1, Cq q2_q+1 X C3, Cq+1 = Z(M2(P)) for some P, Eq, C3, C2, (Cq+1 X Cq+1) X C2, C2(q+1), (3.1) Sym(3), {1}. Given a type of groups in Equation (3.1), there is just one conjugacy class of subgroups of G of that isomorphism type. The normalizer NG(H) of H in Gfor the groups H in Equation (3.1) are, respectively: H, H, H X Sym(3), PSL(2, q) x H, Cq2 _1 X C2, H, H, H, H, H X C2, Eq X Cq+1, S2 X Cq2 _ 1, H X Cq+1, S2 X Cq+1, G. (3.2) The values ^(H) for the groups H in Equation (3.1) are, respectively: -1, -1, 0, 0, -1, 1, 0, 0, 1, 2(q2 - 1) q3(q + 1) 2 1, 0, q +1, 0. (3.3) The proof of Theorem 3.1 is divided into several propositions. Proposition 3.2. The group G contains exactly one conjugacy class for any group in Equation (3.1). Proof. Case 1: The first four groups in Equation (3.1), i.e., S2 x Cq2_ 1, PSL(2, q) x Cq+1, Cq2_q+1 x C3, and (Cq+1 x Cq+1) x Sym(3), are the maximal subgroups of G, for which there is just one conjugacy class by Theorem 2.3. Case 2: Let a1, a2 G G have order 3, so that they are of type (B2) and a fixes two distinct points Pj, Qj G Hq (Fq2). The group G is 2-transitive on Hq (Fq2), and the pointwise stabilizer of {Pj, Qj} is cyclic of order q2 - 1. Hence, (a1) and (a2) are conjugated in G. Case 3: Let a1, a2 G G have order 2, so that they are of type (C) and aj fixes exactly one point Pj on Hq(Fq2). Up to conjugation P1 = P2, as G is transitive on Hq(Fq2). The involutions fixing P1 in G, together with the identity, form an elementary abelian group Eq, which is normalized by a cyclic group Cq_1; no nontrivial element of Cq_1 commutes 384 Ars Math. Contemp. 16 (2019) 377-401 with any nontrivial element of Eq (see [11, Section 4]). Hence, a1 and a2 are conjugated under an element of Cq_ i. Case 4: Let a1 , a2,p^p2 € G satisfy o(oj) = 3, = 2, and H := (a^P^ = Sym(3). As shown in the previous point, we can assume a1 = a2 up to conjugation. Let P,Q € Hq (Fq2) and R € PG(2, q2)\Hq be the fixed points of «1. Since A a^r1 = a-1, we have that pj fixes R and interchanges P and Q; P is then uniquely determined from the Fq2 -rational point of PQ fixed by P (namely, the intersection between PQ and the axis of P). Since the pointwise stabilizer Cq2_1 of {P, Q} acts transitively on PQ(Fq2) \ Hq, P1 and p2 are conjugated, and the same holds for H1 and H2. Case 5: Any two groups isomorphic to Cq2_1 are conjugated in G, because they are generated by elements of type (B2) and G is 2-transitive on Hq(Fq2). Case 6: Any two groups isomorphic to Eq are conjugated in G, because any such group fixes exactly one point P € Hq (Fq2), G is transitive on Hq (Fq2), and the stabilizer GP = M1 (P) contains just one subgroup Eq. Case 7: Any two groups H1 , H2 = Eq x Cq2_1 are conjugated in G. In fact, their Sylow 2-subgroups Eq coincide up to conjugation, as shown in the previous point. The normalizer NG(Eq) fixes the fixed point P € Hq(Fq2) of Eq, and hence NG(Eq) = M1(P) = S x Cq2_ 1. The complements Cq2_1 are conjugated by Schur-Zassenhaus Theorem; hence, H1 and H2 are conjugated. Case 8: Any two groups isomorphic to C2(q+1) are conjugated in G, because they are generated by elements of type (E) and two elements a1 , a2 of type (E) of the same order are conjugated in G. In fact, aj is uniquely determined by its fixed points Pj € Hq (Fq2) and Qj € ¿p(Fq2) \ Hq; here, ¿p is the polar line of Pj. Up to conjugation P1 = P2, from the transitivity of G on Hq(Fq2). Also, S2 has order q3 and acts on the q2 points of ¿p (Fq2) \ Hq with kernel Eq, hence transitively. We can then assume Q1 = Q2. Case 9: Let ZPi be the center of M2 (Pj), i = 1, 2. As shown in [5, Section 4], ZPi = Cq+1 and ZPi is made by the homologies with center Pj, together with the identity. Since G is transitive on PG(2,q2) \ Hq, we have up to conjugation that M2(P1) = M2(P2) and ZPl = ZP2 . Case 10: Any two groups H1, H2 = Cq+1 x Gq+1 are conjugated in G. In fact, H is the pointwise stabilizer of a self-polar triangle Tj = {Pj, Qj, Rj} c PG(2, q2) \ Hq (see [5, Section 3]), and the stabilizers of T\ and T2 are conjugated by Theorem 2.3. Case 11: Any two groups H1, H2 = (Cq+1 x Cq+1) x C2 are conjugated in G. In fact, their subgroups Cq+1 x Cq+1 coincide up to conjugation as shown above, and fix pointwise a self-polar triangle T = {P, Q, R} c PG(2, q2) \ Hq. Let Pj € Hj have order 2, i = 1, 2. Then pj fixes one vertex of T and interchanges the other two vertexes. Up to conjugation in M3 (T) we have p1 (P) = p2 (P) = P. Then H1 = H2, as they coincide with the stabilizer of P in M3(T). □ Proposition 3.3. The normalizers NG(H) of the groups H in Equation (3.1) are given in Equation (3.2). Proof. Casel: Clearly NG(H) = H for any H from the first four groups of Equation (3.1) as H is maximal in G. G. Zini: The Mobius function of PSU(3, 22 ) 385 Case 2: Let H = Eq x C^^. Then H < M2(P), where P is the unique fixed point of in PG(2, q2) \ Hq. The group H has a unique cyclic subgroup Cq+1 of order q +1; namely, Cq+1 is the center of M2(P) and is made by the homologies with center P; since q is even, H is a split extension Cq+1 x (Eq x Cq-1). Hence, NG(H) < NG(Cq+1) = M2(P). The group H/Cq+1 = Eq x Cq-1 is maximal and hence self-normalizing in M2(p)/Cg+1 = PSL(2, q); thus, NG(Eg x Cq_1) = H and Ng(H) = H. Case 3: Let H = Cq+1 x Cq+1. Then NG(H) < M3(T), where T is the self-polar triangle fixed pointwise by H. Since H is the kernel of M3(T) in its action on T, we have Ng(H) = M3(T) and |Ng(H)| = 6|H|. Case 4: Let H = (Cq+1 x Cq+1) x C2. Then Cq+1 x Cq+1 is normal in NG(H), being the unique subgroup of index 2 in H. Hence NG(H) < M3(T), where T is the self-polar triangle fixed pointwise by H. Also, NG(H) fixes the vertex P of T fixed by H, so that Ng(H) = M3 (T). This implies Ng(H) = H. Case 5: Let H = Cq2_1. Then H is generated by an element a of type (B2) with fixed points P, Q G Hq(Fq2) and R G PG(2, q2) \ Hq. Let P be an involution satisfying P(R) = R, P(P) = Q, and P(Q) = P; then P g Ng(H), because H coincides with the pointwise stabilizer of {P, Q} in G. An explicit description is the following: given Hq with equation (2.3), we can assume up to conjugation that a = diag(aq+1, a, 1) where a is a generator if F*2 (see [11]); then take /0 0 1N P = 10 1 0 | . (3.4) V1 0 0y Since Ng(H) acts on {P, Q} and P G NG(H), the pointwise stabilizer H of {P, Q} has index 2 in Ng(H). This implies Ng(H) = Cg2_1 x G2 and |Ng(H)| = 2|H|. Case 6: Let H = C2(q+1), so that H is generated by an element a of type (E) fixing exactly two points P G (Fq2) and Q G (Fq2) \ . Then NG(H) fixes P and Q. The subgroup of M1(P) commutes with H elementwise, while any 2-element in M1 (P) \ has order 4 and does not fix Q; hence, the Sylow 2-subgroup of NG (H) is . Also, Ng(H) = x Cd, where Cd is a subgroup of Cq2_1 containing the subgroup Gq+1 of H. Let C2 be the subgroup of H of order 2; the quotient group (C2 x Cd)/Cq+1 = C2 x Cacts faithfully as a subgroup of PGL(2, q) on the q +1 points of ^q n . By the classification of subgroups of PGL(2, q) ([7]; see [17, Hauptsatz 8.27]), this implies d =1; that is, Ng(H) = Eq x Cg+1 and |Ng(H)| = f |H|. Case 7: Let H = Cq+1 = Z(Mf(P)). Since H is the center of Mf(P), Mf(P) < Ng(H). Conversely, H is made by homologies with center P, and hence NG (H) fixes P. Thus, Ng(H) = Mf(P) and |Ng(H)| = q(q2 - 1)|H|. Case 8: Let H = Eq. Since Eq has a unique fixed point P on Hq (Fq2) and Eq = Z(M1(P)), we have Ng(H) < M1(P) and M1(P) < Ng(H), so that Ng(H) = M1(P) and |Ng(H)| = q2(q2 - 1)|H|. Case 9: Let H = Sym(3) = (a, P), with o(a) =3 and o(P) = 2. Let P, Q G Hq(Fq2) and R G PG(2, q2)\Hq be the fixed points of a; P fixes R, interchanges P and Q, and fixes another point on ¿R nHq. The group NG(H) acts on {P, Q} and on {A^, , }. 386 Ars Math. Contemp. 16 (2019) 377-401 The pointwise stabilizer Cq2 _ 1 has a subgroup Cq+i which is the center of M2 (P) and fixes PQ pointwise, while any element in Cq2_1 \ Cq+1 acts semiregularly on PQ \ {P, Q}; hence, Cq2_1 nNG(H) = C3(q+1). If an element 7 G NG(H) fixes {P, Q} pointwise, then 7 fixes a point in {A^, Aap, A^}, and hence 7 G {ft, aft, a2 ft}. Therefore, NG(H) = C3(q+1) X C2 = H x Cq+1 and |Ng(H)| = (q + 1)|H|. Case 10: Let H = C3 and a be a generator of H, with fixed points P, Q G Hq (Fq2) and R G PG(2, q2) \ Hq. The normalizer NG(H) fixes R and acts on {P, Q}. There exists an involution ft G G normalizing H and interchanging P and Q (see Equation (3.4)). Then the pointwise stabilizer of {P, Q} has index 2 in NG(H). Also, the pointwise stabilizer of {P, Q} in G is cyclic of order q2 - 1. Then Ng(H) = Cq2_1 x G2 and |Ng(H)| = |H|. Case 11: Let H = C2 and a be a generator of H, with fixed point P G Hq(Fq2). Then Ng(H) fixes P, i.e. Ng(H) < M1(P) = S2 x Cq2_1. Since any involution of M1(P) is in the center of S2, the Sylow 2-subgroup of Ng(H) has order q3. Let ft G Cq2_1. If o(ft) | (q + 1), then ft commutes with any involution of S2. If o(ft) f (q + 1), then ft does not commute with any element of S2. This implies that NG(H) = S2 x Cq+1, and |Ng(H)| = |H |. □ Lemma 3.4. Let a G G be an involution, and hence an elation, with center P and axis ¿P. Then there exist exactly q3/2 self-polar triangles Titj = {Pi, Qi,j,Ri,j}, i = 1,..., q2, j = 1,..., §, such that a stabilizes Ti,j. Also, Pi G £p and P G Qi,jRi,j for any i and j. Proof. The number of involutions in G is (q3 + 1)(q — 1), since for any of the q3 + 1 Fq2 -rational points P of Hq the involutions fixing P form a group Eq. The number of self- polar triangles T c PG(2, q2) \ Hq is [G : M3(T)] = ^{q^^^. For any self-polar triangle T = {A1, A2, A3} c PG(2, q2) \ Hq, the number of involutions in G stabilizing T is 3(q +1). In fact, for any of the 3 vertexes of T there are exactly q +1 involutions a1,..., aq+1 fixing that vertex, say A1, and interchanging A2 and A3; ai is uniquely determined by its center A2A3 n Hq. Then, by double counting the size of {(ft, T) | ft G G, o(ft) = 2, T c PG(2, q2) \ Hq is a self-polar triangle, ft stabilizes T}, q3 a stabilizes exactly ^ self-polar triangles T. For any such T, one vertex Pi of T lies on the axis of a, because a is an elation, and the other two vertexes {Qi,j, Rj,j} of T lie on the polar line ¿Pi of Pi. Since M1(P) is transitive on the q2 points P1,..., Pq2 of ¿P (Fq2) \ {P}, any point Pi is contained in the same number | of self-polar triangles Ti,j stabilized by a. □ q2 1 Lemma 3.5. Let a G G have order 3. Then there are exactly ^-3— self-polar triangles Ti c PG(2, q2) \Hq, i = 1,..., ^r, which are stabilized by a. Also, there are exactly 2(q3_1) triangles 3 Tj = {Pj, $q2 (Pj), ^2 (Pj )} c Hq(Fq6 ) \ Hq(Fq2 ), j = 1, . . . , ^^ which are stabilized by a. G. Zini: The Mobius function of PSU(3, 22 ) 387 Proof. By Proposition 3.2, any two subgroups of G of order 3 are conjugated in G. Also, any element of order 3 is conjugated to its inverse by an involution of G. Hence, any two element of order 3 are conjugated in G. Now the claim follows by double counting the size of {(P, T) I P e G, o(P) = 3, T c PG(2, q2) \ Hq is a self-polar triangle, P stabilizes T}, and {(P,T) | P e G, o(P) = 3, T = {P, $q2(P), (P)} with P e Hq (Fq6) \ Hq (Fq2), p stabilizes T}, using the following facts. The number of elements of order 3 in G is (q +1) • 2. The number of self-polar triangles T c PG(2,q2) \ Hq is [G : M3(T)]. The number of elements of order 3 stabilizing a fixed self-polar triangle T is 2(q+1)2, because any element acting as a 3-cycle on the vertexes of T has order 3 (see [5, Section 3]). The number of triangles T = {P, $q2 (P), ^ (P)} C Hq(Fq6) \ Hq(Fq2) is [G : M4(T)]. The number of elements of order 3 stabilizing a fixed triangle T is 2(q2 - q + 1), because any element in M4(T) \ Cq2-q+1 has order 3 (see [4, Section 4]). □ Lemma 3.6. Let H < G be isomorphic to Sym(3), H = (a) x (P). Then there are exactly q +1 self-polar triangles Ti = {Pi, Qi, Ri} C PG(2, q2) \ Hq, i = 1,... , q +1, which are stabilized by H. Up to relabeling the vertexes, we have that P^ ..., Pq+1 lie on the axis of the elation P, Q1,..., Qq+1 lie on the axis of the elation ap and R1,..., Rq+1 lie on the axis of the elation a2 P. Proof. By Proposition 3.2, any two subgroups K1, K2 < G with Ki = Sym(3) are conjugated, and |NG(Ki)| = 6(q + 1); hence, the number of subgroups of G isomorphic to Sym(3) is [G : NG(Ki)] = te^1^"^. The number of self-polar triangles T is [G : M3(T)] = (q2-q+16)q3(q-1). Then the claim on the number of self-polar triangles follows by double counting the size of {(K, T) | K < G, K = Sym(3), T c PG(2, q2) \ Hq is a self-polar triangle, K stabilizes T}, once we show that, for any self-polar triangle T = {A, B, C}, there are in G exactly (q + 1)2 subgroups isomorphic to Sym(3) which stabilize T. Let K < M3(T), K ^ Sym(3), K = (a, P) with o(a) = 3, o(P) = 2. Let P, Q, R be the fixed points of a, with P e PG(2,q2) \ Hq, Q, R e Hq(Fq2). By Proposition 3.3, Ng(K) = K x Cq+1 where Cq+1 is made by homologies with center P; this implies Ng(k) n M3(T) = K. Hence, there are at least [M3(T) : Sym(3)] = (q + 1)2 distinct groups Sym(3) stabilizing T, namely the conjugates of K through elements of M3(T). On the other side, M3(T) contains exactly (q + 1)2 subgroups K of order 3, with fixed points P e PG(2, q2) \ Hq, Q, R e Hq(Fq2). Any involution P of M3(T) normalizing 388 Ars Math. Contemp. 16 (2019) 377-401 K is uniquely determined by the vertex of T that ft fixes, because ,0(P) = P, ,0(Q) = R, and ^(R) = Q. Thus, K is contained in exactly one subgroup of M3(T) isomorphic to Sym(3). Therefore the number of subgroups isomorphic to Sym(3) which stabilize T is (q + 1)2. Finally, the configuration of the vertexes of Ti,..., Tq+1 on the axes of the involutions of H follows from Lemma 2.4 and the fact that every involution fixes a different vertex of Ti. □ Proposition 3.7. Any group H in Equation (3.1) is the intersection of maximal subgroups of G. Proof. Case 1: The first four groups of Equation (3.1) are exactly the maximal subgroups of G. Case 2: Let H = Eq x Cq2_1. Let P G Hq(Fq2) be the unique point of Hq fixed by Eq; Eq fixes £p pointwise. Also, the fixed points of Cq2_1 are P, Q G Hq (Fq2) and R G PG(2, q2) \ Hq, where R G £p and PQ = £R. Then H < M1(P) n M2(R). Conversely, from M1(P) n M2(R) < M1(P) follows M1(P) n M2(R) = K x Cd with K < S2 and Cd < Cq2_1. From M1(P) n M2(R) < M2(R) follows that K does not contain any element of type (D), so that K < Eq. Thus, M1(P) n M2(R) < H, and H = M1(P) n M2(R). Case 3: Let H = (Cq+1 x Cq+1) x C2. Let T = {P, Q, R} c PG(2, q2) \ Hq be the self-polar triangle fixed pointwise by Cq+1 x Cq+1, and let P be the vertex of T fixed by C2. Then H < M3(T) n M2(P). Conversely, since M3(T) n M2(P) fixes P and acts on { Q, R}, the pointwise stabilizer Cq+1 x Cq+1 of T has index at most 2 in M3 (T) n M2 (P), so that M3(T) n M2(P) < H. Thus, H = M3(T) n M2 (P). Case 4: Let H = Cq+1 x Cq+1. Let T = {P, Q, R} c PG(2, q2) \ Hq be the self-polar triangle fixed pointwise by Cq+1 x Cq+1. Since H is the whole pointwise stabilizer of T in G, we have H = M2(P) n M2(Q) n M2(R). Case 5: Let H = Cq2_1 and let a be a generator of H, with fixed points P, Q G Hq (Fq2) and R G PG(2, q2) \ Hq. The pointwise stabilizer of {P, Q} in G is exactly H; thus, H = M1(P) n M2(Q). Case 6: Let H = C2(q+1) and let a be a generator of H, of type (E), with fixed points P G Hq(Fq2) and Q G £p(Fq2) \ Hq. By Lemma 3.4 there are 2 self-polar triangles stabilized by the involution aq+1 having one vertex in Q and two vertexes on £q; let T = {Q, R1, R2} be one of these triangles. Then H < M1(P) n M2(Q) n M3(T). Conversely, let a G (M1(P) n M2(Q) n M3(T)) \ {1}. If a fixes {R1, R2} pointwise, then from a G M1(P) follows that a is in the kernel Cq+1 < H of the action of M2(Q) on £q. The quotient (M1(P) n M2(Q) n M3(T))/Cq+1 acts on £q as a subgroup of PSL(2, q) fixing P and interchanging R1 and R2. From [17, Hauptsatz 8.27] follows (M1(P) n M2(Q) n M3(T))/Cq+1 = C2, and hence H = M1(P) n M2(Q) n M3(T). Case 7: Let H = Cq+1 = Z(M2(P)). Then H is made by the homologies of G with center P, together with the identity. Thus, H = M1(P1) n M1(P2) n M1(P3), where P1, P2, P3 are distinct point in n Hq. G. Zini: The Mobius function of PSU(3, 22 ) 389 Case 8: Let H = Eq and let P be the unique point of Hq (Fq2) fixed by any element in H. Then H = M2(Pi) n M2(P2) n M2(P3), where Pi, P2, P3 are distinct points in ¿p (Fq2 ) \{P}. Case 9: Let H = C2, a be a generator of H with fixed point P G Hq (Fq2), and Pi, P2,P3 G ¿p(Fq2) \ {P}. Let T = {Pi,Qi,i,Ri,i} be a self-polar triangle stabilized by a. Then H < M2(Pi) n M2(P2) n M2'(P3) n M3(T). Since the elation a is uniquely determined by the image of one point not on its axis ¿P, H < M3(T) implies H = M2(Pi) n M2(P2) n M2(P3) n M3(T). Case 10: Let H = C3. By Lemma 3.5, H stabilizes 2(q23-i) triangles T c Hq(Fq6) \ Hq (Fq2); let Ti and T2 be two of them. Then H < M4(Ti) n ^4(2^2). If H < M4(Tfi) n M4(T2), then there exist a nontrivial a G G stabilizing pointwise both Tfi and T2, a contradiction to Lemma 2.4. Thus, H = M4(Ti) n M4^). Case 11: Let H = Sym(3). By Lemma 3.6, H stabilizes q +1 self-polar triangles Ti,... ,Tq+i, so that H < M3(Ti) n • • • n M3(Tq+i). Suppose by contradiction that H = M3(Ti) n • • • n M3(Tq+i). Then M3(Ti) n • • • n M3(Tq+i) contains a nontrivial element a fixing every triangle Ti pointwise. Since the triangles Tj's do not have vertexes in common, this is a contradiction to Lemma 2.4. Thus, H = M3(Ti) n • • • n M3(Tq+i). Case 12: Let H = {1}. Since G is simple, H is the Frattini subgroup of G. □ Proposition 3.8. If H < G is the intersection of maximal subgroups, then H is one of the groups in Equation (3.1). Proof. We proceed as follows: we take every subgroup K < G in Equation (3.1), starting from the maximal subgroups Mj of G; we consider the intersections H = K n Mj of K with the maximal subgroups of G; here, we assume that K < Mj. We show that H is again one of the groups in Equation (3.1). Case 1: Let K = S2 x Cq2_i = Mi(P) for some P G Hq(Fq2). Let H = K n Mi(Q), Q = P. Then H is the pointwise stabilizer of {P, Q} c Hq(Fq2), which is cyclic of order q2 - 1, i.e. H = Cq2_i. Let H = K n M2(Q). Suppose Q G ¿p. Then H = Eq2 x Cq2_i, where Eq2 is made by the elations with axis PQ and Cq2_i is generated by an element of type (B2) with fixed points Q, P, and another point R G ¿q. Now suppose Q G ¿P. Then H stabilizes ¿q and hence also the point R = ¿P n ¿q. Then H stabilizes QR and hence also the pole A of QR; by reciprocity, A G PQ. Thus, H fixes three collinear point A, P, Q, and hence every point on AP. Then H = Gq+i = Z(M2(R)). Let H = K n M3(T), T = {A, B, G}, with P on a side of T, say P G AB. Then H fixes G and acts on {A, B}. Thus, H is generated by an element of type (E) with fixed points P, G and fixed lines PG, AB; hence, H = C2(q+i). Let H = K n M3(T), T = {A, B, G}, with P out of the sides of T. By reciprocity, no vertex of T lies on ¿P. This implies that no elation acts on T, so that 2 \ |H |; this also implies that no homology in M3(T) fixes P, so that H has no nontrivial elements fixing T pointwise. Thus H < G3. Let H = K n M4(T). By Lagrange's theorem, H < G3. Case 2: Let K = PSL(2, q) x Gq+i = M2(P) for some P G PG(2, q2) \ H, 390 Ars Math. Contemp. 16 (2019) 377-401 Let H = K n M2(Q), Q = P, and R be the pole of PQ. If R e PQ, then H is the pointwise stabilizer of PQ and is made by the elations with center R; thus, H = Eq. If R e PQ, then H is the pointwise stabilizer of T = {P, Q, R}; thus, H = Cq+1 x Cq+1. Let H = K n M3(T) with T = {A, B, C}. If P is a vertex of T, then H = (Cq+1 x Cq+1) x C2. If P is on a side of T but is not a vertex, say P e AB, then H fixes the pole D e AB of C. Then H fixes pointwise T' = {P, C, D} and acts on {A, B}. This implies that H fixes AB pointwise and H = Cq+1 = Z(M2(C)). If P is out of the sides of T, then no nontrivial element of H fixes T pointwise; thus, H < Sym(3). Let H = K n M4(T). By Lagrange's theorem, H < C3. Case 3: Let K = (Cq+1 x Cq+1) x Sym(3) = M3(T) for some self-polar triangle T = {A, B, C}. Let H = K n M3(T') with T' = {A', B', C'} = T. If T and T' have one vertex A = A' in common, then H = C2(q+1) is generated by an element of type (E) fixing A and a point D e BC = B'C'. If A' e AC \ {A, C}, then H stabilizes B'C', because B'C' is the only line containing 4 points of {A, B, C, A', B', C'}. Then H fixes A', A, and C; hence also B. Since H acts on {B', C'}, H cannot be made by nontrivial homologies of center B; thus, H = {1}. Let H = K n M4(T'). By Lagrange's theorem, H < C3. Case 4: Let K = Cq2-q+1 x C3 = M4(T) for some T c Hq(Fq6). Let H = Kn M^T') with T' = T. Since 3 does not divide the order of the pointwise stabilized Cq2_q+1 of T, H contains no nontrivial elements fixing T or T' pointwise. Thus, H < C3. Case 5: Let K = Eq x Cq2-1 and P e Hq(Fq2), Q e tP \ {P} be the fixed points of K. Let H = K n M1(R) with R = P .If R e ¿Q, then H = Cq2_1. If R e then H fixes the pole S of PR; by reciprocity S e PQ, so that H fixes PQ pointwise and also R ePQ. Thus, H = {1}. Let H = K n M2(r) with R = Q. If R e ¿p, then H is the pointwise stabilizer Eq of PQ. If R e ¿P, then H fixes pointwise the self-polar triangle {Q, R, S} where S is the pole of QR. Hence, either H = Cq+1 = Z(M2(Q)) or H = {1} according to P e RS or P e RS, respectively. Let H = K n M3(T) with T = {A, B, C}. If P is on a side of T, say P e BC, then either H = {1} or H = Cq+1 = Z(M2(A)). If P is out of the sides of T, then no nontrivial element of H can fix T pointwise; thus, H < Sym(3). Let H = K n M4(T). By Lagrange's theorem, H < C3. Case 6: Let K = (Cq+1 x Cq+1) x C2 = M3(T) n M2(A), where T = {A, B, C}. Let H = K n M1 (P). If P e BC, then H = C2(q+1) is generated by an element of type (E). If P e BC, then H = {1}. Let H = K n M2(P), P = A. If P e {B, C}, then H is the pointwise stabilizer Cq+1 x Cq+1 of T .If P e AB \ {A, B} or P e AC \ {A, C}, then H = Cq+1 = Z(M2(C)) or H = Cq+1 = Z(M2(b)), respectively. If P e BC \ {B, C}, then H fixes A, P, the pole of AP, and acts on {B, C}; thus, H = Cq+1 = Z(M2(A)). If P is not on the sides of T, then no nontrivial element of H can fix T pointwise; thus, H < C2. Let H = K n M3(T') with T' = {A', B', C'} = T. Since 3 f |H|, H fixes a vertex of T', say A'. If A' = A, then H = C2(q+1). If A' e {B, C}, then H fixes T pointwise and acts on {B', C'}; thus, H = Cq+1 = Z(M2 (A')). If A' e (AB U AC) \ {A, B, C}, then H fixes AB or AC pointwise and acts on {B', C'}; thus, H = {1}. If A' e BC, then H G. Zini: The Mobius function of PSU(3, 22 ) 391 fixes A, A', and the pole D of AA'; as H acts on {B, C}, this implies H = {1}. If A' is not on the sides of T, then no nontrivial element of H fixes T pointwise and H < C2. Let H = K n M4(T'). By Lagrange's theorem, H < C3. Case 7: Let K = Cq+i x Cq+i = M3(T) n M2(A) n M2(B) n M2(C) with T = {A, B, C}. Let H = K n Mi (P) or H = K n M2 (P). If P is not on the sides of T, then H = {1}; if P is on a side of T, say P G BC, then H = Cq+i = Z(M2 (A)). Let H = K n M3(T') with T' = {A', B', C'}. Since K is not divisible by 2 or 3, H = {1} only if H fixes T' pointwise. Up to relabeling, this implies A' = A, B', C' G BC, and H = Cq+i = Z (M2(A)). Let H = K n M4(T'). By Lagrange's theorem, H = {1}. Case 8: Let K = Cq2-1 = (a), with a of type (B2) fixing the points P G PG(2, q2) \ Hq and Q,R G Hq(Fq2). Let H = K n M1(A) or H = K n M2(A). Since the nontrivial elements of H are either of type (B2) or of type (A) with axis QR, we have H = {1} unless A g QR; in this case, H = Cq+i = Z(M2(P)). Let H = K n M3(t) or H = K n M4(T). By Lagrange's theorem, H < C3. Case 9: Let K = C2(q+i) = (a) with a of type (E) fixing the points P G Hq(Fq2) and Q G PG(2, q2) \Hq. Let H = K n Mi(R) or H = K n M2(R). If R G ¿Q, then H = Cq+i = Z(M2(Q)). If R G ^q, then H = {1}. Let H = K n M3(T); recall that H < K .If Q is a vertex of T, then H = Cq+i = Z(M2(Q)). If Q is not a vertex of T, then no homology in K acts on T; hence, H < C2. Let H = K n M4(T). By Lagrange's theorem, H = {1}. Case 10: Let K = Cq+i = Z(M2(P)) for some P G PG(2, q2) \ Hq and a G K \ {1}. Then a fixes no points out of {P} U £p; also, the triangles fixed by a have one vertex in P and two vertexes on £p. Thus, K n Mj = {1} for any maximal subgroup Mj of G not containing K. Case 11: Let K = Eq and a G Eq \ {1}. Recall that K fixes one point P G Hq(Fq2) and the line £p pointwise. Also, a fixes no points out of £p. If a fixes a triangle T = {A,B,C}, then one vertex of T lies on (Fq2), say A, and a is uniquely determined by a(B) = C. Thus, K n Mi(Q) = K n M2(Q) = K n M4(T') = {1} and K n M3(T) < C2. Case 12: Let K g {Sym(3), C3, C2, {1}}. Then every subgroup of K is in Equation (3.1). □ Proposition 3.9. The values ^(H) for the groups in Equation (3.1) are given in Equation (3.3). Proof. Let H be one of the groups in Equation (3.1). By Lemma 2.1 and Proposition 3.8, ^(H) only depends on the subgroups K of G such that H < K and K is in Equation (3.1). Case 1: If H is one of the first four groups in Equation (3.1), then H is maximal in G, and hence ^(H) = -1. Case 2: Let H = Eq x Cq2_i. Let P G Hq(Fq2) and Q G PG(2, q2) \ Hq be the fixed points of H. Then H = Mi(P) n M2(Q) and H is not contained in any other maximal 392 Ars Math. Contemp. 16 (2019) 377-401 subgroup of G. Thus, ^(H) = -{^(G) + )) + ^(M2(Q))} = 1. Case 3: Let H = (Gq+1 x Gq+1) x C2. Let T = {P, Q, R} be the self-polar triangle stabilized by H, with H(P) = P. No point different from P is fixed by H. Also, if a triangle T' = {P', Q'} = T is fixed by H, then P is a vertex of T', say P = P', and {Q', R'} c QR; but Cq+1 x Cq+1 has orbits of length q + 1 > |{Q', R'}|, so that H cannot fix T'. Then H = M2(P) n M3(T) and H is not contained in any other maximal subgroup of G. Thus, ^(H) = 1. Case 4: Let H = Cq+1 x Cq+1 and T = {P, Q,R} be the self-polar triangle fixed pointwise by H. The vertexes of T are the unique fixed points of the elements of type (B1) in H. Also, any triangle T' = T fixed by an element of type (A) in H has two vertexes on a side I of T; but H has orbits of length q + 1 > 2 on ¿, so that H does not fix T'. Then H = M3(T) n M2(P) n M2(Q) n M2(R) and H is not contained in any other maximal subgroup of G. If K is one of the groups M3(T) n M2(P), M3(T) n M2(P), M3(T) n M2(P), then K contains H properly, and ^(K) = 1 as shown in the previous point. The intersection of three groups between M3(T), M2(P), M2(Q), and M2(R) is equal to H. Thus, by direct computation, ^(H) = 0. Case 5: Let H = Cq2-1 with fixed points P G PG(2, q2) \ Hq and Q, R G Hq(Fq2). Then H = Mx (Q) n M- (R) = Mx (Q) n Mx (R) n M2 (P). We already know ^(M1 (Q) n M2(P)) = m(M1(R) n M2(P)) = 1. Moreover, Cq2-1 has no fixed triangles, by Lagrange's theorem, and no other fixed points. Thus, by direct computation, ^(H) = 0. Case 6: Let H = C2(q+1) = (a); a is of type (E), fixes the points P G Hq(Fq2) and Q G PG(2, q2) \ Hq, and fixes the lines and ¿Q. Since a2 is a homology with center Q, the orbits on ¿Q of H coincide with the orbits on ¿Q of the elation aq+1. By Lemma 3.4, the self-polar triangles Ti stabilized by H have a vertex in Q and two vertexes on ¿Q; there are exactly f such triangles T,..., Tq .No other triangle and no other point different from P and Q is fixed by H, so that H = M1(P) n M2(Q) n M3(T1) n • • • n M3(Tq) and H is not contained in any other maximal subgroup of G. 2 If K is the intersection of M2(Q) with one of the groups M1(P), M3(T1),..., M3(Tq), then K = Eq x Cq2-1 or K = (Cq+1 x Gq+1) x C2; hence, K contains H properly and ^(K) = 1 as shown above. The intersection of K with a third maximal subgroup of G containing H coincides with H. Finally, the intersection of any two groups in {M1(P),M3(T1),..., M3(Tq)} coincides with H. Thus, by direct computation, ^(H )=0. 2 Case 7: Let H = Cq+1 = Z(M2(P)). Denote ¿p n Hq = {P1,..., Pq+1} and ¿(Fq2) \ Hq = {Q1,..., Qq2—q} such that, for i = 1,..., ', T = {P, Qi, Q.+q2-q} are the i+ 2 self-polar triangles with a vertex in P. Then q+1 q2—q (q2—q)/2 H = p M1(Pi) n M2(P) n p M2(Qi) n p M3(Ti) i=1 i=1 i=1 and H is not contained in any other maximal subgroup of G. By direct inspection, the intersections K of some (at least two) maximal subgroups of G such that H < K < G are exactly the following. G. Zini: The Mobius function of PSU(3, 22 ) 393 (i) K = Ml (Pi) n Mi(Pj) for some i = j; in this case, K = Cq2-1 and m(K) = 0. (ii) K = Mi (Pi) n M2(P) with i g {1,..., q + 1}; in this case, K = Eq x Cq2-1 and m(K) = 1. These q +1 groups are pairwise distinct. (iii) K = M1(Pi) n M3(Tj) for some i, j; in this case, K = C2(q+1) and m(K) = 0. (iv) K = M2(P) n M2(Qi) for some i; in this case, K = Cq+1 x Cq+1 and m(K) = 0. 2 (v) K = M2(P) n M3(Ti) with i G {1,..., }; in this case, K = (Cq+1 x Cq+1) x q2 q 2 C2 and m(K) = 1. These groups are pairwise distinct. (vi) K = M2(Qi) n Ms(Ti) or K = M2(Q.+q—) n Ms(Ti), with i G {1,..., ^}; i+ 2 2 in this case, K = (Cq+1 x Cq+1) x C2 and m(K) = 0. These q2 — q groups are pairwise distinct. To sum up, the only subgroups K with H < K < G and m(K) =0 are the maximal subgroups, q +1 distinct groups of type Eq x Cq-_1, and 3(q2_q) distinct groups of type (Cq+1 x Cq+1) x C2. Thus, m(H) = 0. Case 8: Let H = Eq. Let P be the point of Hq (Fq-) fixed by H; H fixes ¿P pointwise. We have H = M1 (P) n M2W1) n ■ ■ ■ n M2(Qq-), where Q1,..., Qq- are the Fq--rational points of ¿P \ {P}; H is not contained in any other maximal subgroup of G. The intersections K of at least two maximal subgroups of G such that H < K < G are exactly the q2 groups M1(P) n M2(Qi) = Eq x Cq-_1, with m(K) = 1. Thus, by direct computation, m(H) = 0. Case 9: Let H = Sym(3) = (a,fi) with o(a) = 3 and o(fi) = 2. Let P G PG(2,q2) \Hq and Q, R G Hq be the fixed points of a, and A g QR be the fixed point of fi on Hq, so that fi fixes ¿A = AP. By Lemma 3.6 and its proof, H = M2(P) n M3(T1) n ■ ■ ■ n M3(Tq+1), where Ti has one vertex on ¿A \ {P, A} and the other two vertexes are collinear with A; H is not contained in any other maximal subgroup of G. For any i, j G {1,..., q +1} with i = j, no vertex of Tj is on a side of Ti; hence, no nontrivial element of M3(Ti) n M3(Tj) fixes Ti pointwise. This implies M3(Ti) n M3(Tj) = H. Analogously, no nontrivial element in M3(Ti) n M2(P) fixes Ti pointwise, and this implies M3(Ti) n M2(P) = H. Thus, by direct computation, m(H) = q +1. Case 10: Let H = C3 = (a) with fixed points P G PG(2, q2) \ Hq and Q, R G Hq. By Lemma 3.5, (q2 1)/3 2(q2 _1)/3 H = M1(Q) n M1(R) n M2(P) n f] M3(Ti) n f M4(TO i=1 i=1 and H is not contained in any other maximal subgroup of G. By direct inspection, the intersections K of at least two maximal subgroups of G such that H < K < G are exactly the following. (i) K = M1(Q) n M2(P) or K = M1(R) n M2(P); in this case, K = Eq x Cq2_1 and m(K ) = 1. (ii) K = M1(Q) n M1(R); in this case, K = Cq2_1 and m(K) = 0. 394 Ars Math. Contemp. 16 (2019) 377-401 (iii) There are exactly ^^1 groups K containing H with K = Sym(3), and hence ^(K) = q +1. In fact, any involution P G G satisfying (H, P) = Sym(3) interchanges Q and R and fixes a point of (QR n Hq) \ {P, Q}; conversely, any of the q-1 points A1,..., Aq_1 of (QRnHq) \{P, Q} determines uniquely the involution Pi G G such that P(Aj), P(Q) = R, Pj(R) = Q, and hence (H,Pj) ^ Sym(3). The involutions pj, apj, and a2pj, together with H, generate the same group; thus, there are exactly q_-1 groups Sym(3) containing H. Thus, by direct computation, ^(H) = 2(q3 1). Case 11: Let H = C2 = (a), where a has center P. Let (Fq2) \ {P} = {P1,..., Pq2}. By Lemma 3.4, q2 q2 q/2 H = M1(P) n f] M2(Pj) n f f M3(Tj,j), j=1 j=1j=1 where the triangles Tjjj are described in Lemma 3.4; H is not contained in any other maximal subgroup of G. By direct inspection, the intersections K of at least two maximal subgroups of G such that H < K < G are exactly the following. (i) K = M1(P) n M2(Pj) for i = 1,... ,q2; in this case, K = Eq x Cq2_1 and ^(K) = 0. (ii) K = M2(Pj) n M2(Pj) with i = j; in this case, K = Eq and ^(K) = 0. (iii) K = M1(P) n M3(Tj,j); in this case, K = Eq x C2(q+1) and ^(K) = 0. o 3 (iv) K = M2(Qj) nM3(Tj,j) with i g {1,..., q2} and j G {1,..., §}; these distinct groups are of type (Cq+1 x Cq+1) x C2, so that ^(K) = 1. (v) There are exactly N = q- groups K containing H such that K = Sym(3), and hence ^(K) = q +1. This follows by double counting the size of I = {(H, K) | H, K < G, H = C2, K = Sym(3), H < K}. Arguing as in the proof of Lemma 3.4, |11 = (q3 + 1)(q - 1)N; arguing as in the proof of Lemma 3.6, |11 = q-(q-+61)(q_1) • 3. Hence, N = q-. Thus, by direct computation, ^(H) = - q ('2+1). Case 12: Let H = {1}. Then ^(H) = - E{1} 0, q = 22", G = PSU(3, q). This section is devoted to the proof of the following theorem. Theorem 4.1. Let H be a proper subgroup of G. Then A(H) = 0 if and only H is one of the following groups: Eq X Cq2 —1, (Cq+1 X Cq+1) X C2, Sym(3), C3, S2 x Cq2 —1, PSL(2, q) X Cq+1, (4.1) (Cq+1 X Cq+1) X Sym(3), Cq2—q+1 x C3, C2. For any isomorphism type in Equation (4.1) there is just one conjugacy class of subgroups of G. If H is in the first row of Equation (4.1), then A(H) = -1; if H is in the second row of Equation (4.1), then A(H) = 1. Proof. By Proposition 3.2, for any isomorphism type in Equation (4.1) there is just one conjugacy class of subgroups of G of that type. Hence, we can use the notation [M1], [M2], [M3] and [M4] for the conjugacy classes of M1(P), M2(P), M3(T) and M4(T), respectively. If H = G, then A(H) = 1; if H is one of the groups in the second row of Equation (4.1) and H = C2, then A(H) = -1 as H is maximal in G. Case 1: Firstly, we assume that H is not a subgroup of Sym(3), and that H is not a group of homologies, i.e. H < Cq+1 = Z(M2(Q)) for any point Q. (i) Let H < M4 (T) for some T. From H = C3 follows that some nontrivial element in H fixes T pointwise; hence, H is not contained in any maximal subgroup of G other than M4(T). Thus, inductively, A(H) = -{A(G) + A(M4(T))} = 0. (ii) Let H < M1(P) for some P; we assume in addition that gcd(|H|,q - 1) > 1. Here, the assumption H < Sym(3) reads H G {{1}, C2, C3}. If H contains an element of order 4, then H is not contained in any maximal subgroup of G other than M1 (P). Thus, inductively, A(H) = 0. We can then assume that the 2-elements of H are involutions, so that H — E2r x Cd with 0 < r < 2n and d | (q2 - 1) (see [15, Theorem 11.49]). This implies that H < M1(P) n M2(Q) for some Q G ; the eventual nontrivial elements in H whose order divides q +1 are homologies with center Q. Then we have [H] < [M1], [H] < [M2]; by Lagrange's theorem, [H] < [M4]. From the assumptions gcd(|H|, q - 1) > 1 and H < Sym(3) follows [H] < [M3]. If H = Eq x Cq2 —1, then no proper subgroup of M1(P) or M2 (Q) contains H properly; thus, A(H) = 1. If H = Eq x Cq2 —1, then H < Eq x Cq2 —1 = M1(P) n 396 Ars Math. Contemp. 16 (2019) 377-401 M2(Q) up to conjugation. Thus, inductively, the only classes [K] with [H] < [K] and A(K) = 0 are [K] e {[G], [Mi], [M2], [E, x C,2_1]}. This implies A(H) = 0. (iii) Let H < M2 (Q) for some Q, and assume also H < M1 (P) for any P .As H < C3, we have [H] < [M4]. The group H := H/(H n Z(M2(Q))) acts as a subgroup of PSL(2, q) on ¿Q nH,; we assume in this point that H is one of the following groups (see [17, Hauptsatz 8.27]): PSL(2, 22h) with 0 < h < n; a dihedral group of order 2d where d is a divisor of q - 1 greater than 3; Alt(5). Then, by Lagrange's theorem, [H] < [M3]. Thus, inductively, G and M2(Q) are the only groups K with H < K and A(K) = 0, so that A(H) = 0. Note that, since we are under the assumptions H < M1 (P) for any P, H < Sym(3), and H < C,+1 = Z(M2(Q)), we have that the only subgroups H of PSL(2, q) for which A(H) still has not been computed are the cyclic or dihedral groups of order d or 2d (respectively), where d is a nontrivial divisor of q +1. (iv) Let H < M3(T) for some T, and assume also H < Mi (P) for any P .As H < C3, we have [H] < [M4]. Here, the assumption H < Sym(3) means that some nontrivial element of H fixes T pointwise. Hence, the assumption H < C,+ 1 = Z(M2(Q)) for any vertex Q of T, together with H < M1(P), implies that H contains some element of type (B1). Write H = L x K, with K < Sym(3) and L < C,+ 1 x C,+ 1. If K = C3 or K = Sym(3), then [H] < [M2]; thus, inductively, G and M3(T) are the only groups K with H < K and A(K) = 0, so that A(H) = 0. If K = C2 and L = C,+ 1 x C,+1, then H < M2(Q) for some vertex Q of T. Since H := H/(H n Z(M2(Q))) is dihedral of order 2(q + 1), [17, Haptsatz 8.27] implies the non-existence of groups K with H < K < M2(Q) (except for q = 4 and K = Alt(5); in this case, A(K) =0 by the previous point). Thus, A(H) = -{A(G) + A(M2(Q)) + A(M3(T))} = 1. If K = C2 and L < C,+ 1 x C,+ 1, then again H < M2(Q) with Q vertex of T. The group H is dihedral of order 2d, where d | (q +1); d > 1 because L contains elements of type (B1). By the previous point and [17, Hauptsatz 8.27], the only groups K with H < K < M2(Q) are such that K is dihedral of order dividing q +1. Thus, inductively, A(H) = 0. If K = {1}, then H e M2(Q) for any vertex Q of T. The group H < PSL(2, q) on the line £q n H, is cyclic of order d | (q +1); d > 1 because H has elements of type (B1). By [17, Hauptsatz 8.27], the groups K with H < K < M2(Q) are such that either K is cyclic of order dividing q + 1, or we have already proved that A(K) = 0. Thus, inductively, A(K) = 0. (v) Let H < M2(Q) for some Q. Let H = {1} be the induced subgroup of PSL(2, q) acting on Iq n H,. If H is cyclic or dihedral of order d or 2d (respectively) with d | (q + 1), then H < M3(T) for some T. Hence, A(H) = 0, as already computed in the previous point in the case K = {1} if H is cyclic, or in the case K = C2 if H is dihedral. (vi) Under the assumptions that H < Sym(3) and H is not a group of homologies, the only remaining case is H < M1(P) for some P with gcd(|H|, q — 1) = 1. In this case H = E2r x Cd, where is cyclic of order d | (q +1) and made by homologies, whose axis passes through P and whose center Q lies on £P. We have r > 0, because H < Z(M2(Q)). G. Zini: The Mobius function of PSU(3, 22 ) 397 If r =1, then H is cyclic of order 2d generated by an element of type (E). By Lemma 3.4, H < M3(T), where T has a vertex in Q and two vertexes on ¿Q. Hence, [H] < [Mi], [H] < [M2], [H] < [M3], and [H] < [M4]. Let K be such that H < K < G and K is not of the same type of H, i.e. K is not cyclic of order 2d' with d' | (q +1). As shown in the previous points, A(K) = 0 if and only if [K] e {[G], [Mi], [M2], [M3], [E, x C,2_i], [(C,+ i x C,+ i) x C2]}. Thus, inductively, A(H) = 0. Case 2: Let H < Cq+i = Z(M2(Q)) for some Q and K be a subgroup of G properly containing H. As shown above, A(K) =0 if and only if [K] e {[G], [Mi], [M2], [M3], [E, x C,2_i], [(C,+ i x C,+ i) x C2]}. Thus A(Z(M2(Q))) = 0 and, inductively, A(H) = 0. Case 3: Let H = Sym(3) = (a) x (ft) with o(a) = 3 and o(ft) = 2. Let P e PG(2,q2) \ H, and Q, R e H, (F,2) be the fixed point of a, so that ft fixes P and interchanges Q and R. This implies [H] < [M2]. By Lemma 3.6, [H] < [M3]. From the computations above and Lagrange's theorem, no class [K] with K < G other than [G], [M2] and [M3] satisfies [H] < [K] and A(H) = 0. Thus, A(H) = 1. Case 4: Let H = C3. By Lagrange's theorem and Proposition 3.2, H < K < G and A(K) = 0 if and only if [K] e {[G], [Mi], [M2], [M3], [M4], [E, x C,2_i], [Sym(3)]}. Thus, A(H) = 1. Case 5: Let H = C2. By Lagrange's theorem and Proposition 3.2, H < K < G and A(K) = 0 if and only if [K] e {[G], [Mi], [M2], [M3], [E, x C,2_i], [(C,+i x C,+ i) x C2], [Sym(3)]}. Thus, A(H) = -1. Case 6: Let H = {1}. Collecting all the classes [K] with A(K) = 0, we have by direct computation A(H) =0. □ 5 Determination of x(A (Lp \ {1})) for any prime p Let n > 0, q = 22", G = PSU(3, q). If p is a prime number, we denote by Lp the poset of p-subgroups of G ordered by inclusion, by Lp \ {1} its subposet of proper p-subgroups of G, and by A(Lp \ {1}) the order complex of Lp \ {1}. In this section we determine the Euler characteristic x(A(Lp \ {1})) of A(Lp \ {1}) for any prime p, using Equation (2.1) and Lemma 2.2. The results are stated in Theorem 5.1 and in Table 2. Theorem 5.1. For any prime number p one of the following cases holds: (i) p { |G| and x(A(Lp \ {1})) = 0; (ii) p = 2 and x(A(L2 \ {1})) = q3 + 1; 6 o 5 4,r>3 o 2 (iii) p | (q + 1) and x(A(Lp \ {1})) = - " _2? _,3+2, _3? ; 398 Ars Math. Contemp. 16 (2019) 377-401 (iv) p | (q - 1) andx(A(Lp \ {1})) = -; ~ 6,54- (v) p | (q2 - q +1) and x(A(Lp \ {1})) = - q -q . Proof. Since |G| = q3(q + 1)2(q - 1)(q2 - q +1), q is even, and 3 | (q - 1), the cases p f |G|, p = 2, p | (q + 1), p | (q - 1), andp | (q2 - q + 1) are exhaustive and pairwise incompatible. We denote by Sp a Sylow p-subgroup of G. Case 1: Letp f |G|. Then A(LP \ {1}) = 0, and hence x(A(Lp \ {1})) = x(0) = 0. Case 2: Let p = 2. The group G has q3 + 1 Sylow 2-subgroups, and any two of them intersect trivially; see [15, Theorem 11.133]. Any nontrivial element a of S2 fixes exactly one point P on (Fq2) which is the same for any a G S2; S2 is uniquely determined among the Sylow 2-subgroups of G by P. Hence, Equation (2.1) reads x(A(L2 \{1})) = -(q3 + 1) E ^({1},H), H£L2\{1}, h(P)=p where P is a given point of (Fq2). By Lemma 2.2, we only consider those 2-groups in M1 (P) which are elementary abelian. Then we consider all nontrivial subgroups H of an elementary abelian 2-group of order q. For any such group H = E2r of order 2r, with 1 < r < 2n, we have ({1}, H) = (-1)r • 2(2) by Lemma 2.2. Thus, X(A(L2 \ {1})) = -(q3 + 1) £(-1)r 2(2) f2") r=1 V r J 2 where the Gaussian coefficient (2r ) 2 counts the subgroups of of order 2r. Using the property f2n\ f2n - A r(2" - 1' +2 V r / 2 Vr - 1 / 2 we obtain 2 2 Vr 1 / 2 /2 S("1)r 2(2,C") 2 =|(-Dr (T-1)+2(2)+r (2n - = E'(-1)r+' 2(f) (2" - 1)=+ £ (-1)r 2('f) (2" - ^ =(-U<2>(2n-^ + (-r(-:^=2 Thus, x(A(L2 \{1})) = q3 + 1. Case 3: Letp | (q + 1). Then Sp < Cq+1 x Cq+1, and hence Sp = Cps x Cps, where ps | (q + 1) andps+1 f (q + 1). Let H be a subgroup of Sp. By Lemma 2.2, ({1},H) = 0 only if H is elementary abelian of order p or p2; in this cases, ({1}, Cp) = -1 and ({1}, Cp x Cp) = r. Now we count the number of elementary abelian subgroups of order p or p2 in G. G. Zini: The Mobius function of PSU(3, 22 ) 399 (i) A subgroup Ep2 of G of type Cp x Cp is uniquely determined by the maximal subgroup M3(T) such that Ep2 is the Sylow p-subgroup of M3(T). Hence, G contains exactly [G : NG(M3(T))] = q3(q2-q+1)(q-1) elementary abelian subgroups of order p2. (ii) A subgroup Cp made by homologies is uniquely determined by its center P G PG(2, q2) \ Hq of homology, because the group of homologies with center P is cyclic. Hence, G contains exactly | PG(2, q2) \ Hq | = q2(q2 - q +1) cyclic subgroups of order p made by homologies. (iii) A subgroup Cp which is not made by homologies is made by elements of type (B1), and fixes pointwise a unique self-polar triangle T. The Sylow p-subgroup Cp x Cp of M3(T) contains exactly 3 subgroups Cp made by homologies, namely the groups of homologies with center one of the vertexes of T. Since Cp x Cp contains p +1 subgroups Cp altogether, Cp x Cp contains exactly p - 2 subgroups Cp not made by homologies. Thus, the number of subgroups Cp of G not made by homologies is (p - 2) • [G : Ng(M3(T))] = q3(q2-q+16(q-1)(p-2). Thus, by direct computation, X(A(Lp \{1})) q3(q2 - q +1)(q - 1)(p - 2) - • r + 6 q2 (q'2 - q +1)+ "V - q + !)(, - Dtp - 2) q6 - 2q5 - q4 + 2q3 - 3q2 3 Case 4: Let p | (q - 1). By Lemma 2.4, Sp is a subgroup of the cyclic group Cq 2 _ 1 fixing two points P, Q on Hq(Fq2); then a proper p-subgroup H of G satisfies ({1}) = 0 if and only if H has order p; in this case, ({1},H) = -1. Also, by Lemma 2.4, any two Sylow p-subgroups of G have trivial intersection. Then the number of subgroups Cp of G is equal to the number (q +1) of couples of points in Hq(Fq2); equivalently, this number is equal to [G : NG(Cq2)], where |NG(Cq2-1 )| = 2(q2 - 1) by Proposition 3.3. Thus, 63 x(A(Lp \{1})) = -. Case 5: Let p | (q2 - q + 1). Then Sp < Cq2_q+1, and hence a proper p-subgroup H of G satisfies ({1}, H) =0 if and only if H has order p; in this case, ({1},H) = -1. The number of subgroups Cp of G is equal to the number of subgroups Cq2_q+1, and hence to the number [G : NG(M^T))] = q3(q+1,)2(q_1) of maximal subgroups of type M4(if) in g. Thus, x(A(Lp \ {1})) = - q3(q+1^2(q_1) = - q6+q5_ q4_q3. □ References [1] M. Bianchi, A. Gillio Berta Mauri and L. Verardi, On Hawkes-Isaacs-Ozaydin's conjecture, Istit. Lombardo Accad. Sci. Lett. Rend. A 124 (1990), 99-117. [2] K. S. Brown, Euler characteristics of groups: the p-fractional part, Invent. Math. 29 (1975), 1-5, doi:10.1007/bf01405170. 400 Ars Math. Contemp. 16 (2019) 377-401 [3] V. Colombo and A. Lucchini, On subgroups with non-zero Möbius numbers in the alternating and symmetric groups, J. Algebra324 (2010), 2464-2474, doi:10.1016/j.jalgebra.2010.07.040. [4] A. Cossidente, G. Korchmäros and F. Torres, Curves of large genus covered by the Hermitian curve, Comm. Algebra 28 (2000), 4707-4728, doi:10.1080/00927870008827115. [5] F. Dalla Volta, M. Montanucci and G. Zini, On the classification problem for the genera of quotients of the Hermitian curve, 2018, arXiv:1805.09118 [math.AG] . [6] E. Damian and A. Lucchini, The probabilistic zeta function of finite simple groups, J. Algebra 313 (2007), 957-971, doi:10.1016/j.jalgebra.2007.02.055. [7] L. E. Dickson, Linear Groups with an Exposition of the Galois Field Theory, B. G. Teubner, Leipzig, 1901. [8] M. Downs, The Mobius function of PSL2(q), with application to the maximal normal subgroups of the modular group, J. London Math. Soc. 43 (1991), 61-75, doi:10.1112/jlms/s2-43. 1.61. [9] M. Downs and G. A. Jones, Mobius inversion in Suzuki groups and enumeration of regular objects, in: J. Siran and R. Jajcay (eds.), Symmetries in Graphs, Maps, and Polytopes, Springer, Cham, volume 159 of Springer Proceedings in Mathematics & Statistics, pp. 97127, 2016, doi:10.1007/978-3-319-30451-9_5, papers from the 5th SIGMAP Workshop held in West Malvern, July 7-11, 2014. [10] D. H. Dung and A. Lucchini, Rationality of the probabilistic zeta functions of finitely generated profinite groups, J. Group Theory 17 (2014), 317-335, doi:10.1515/jgt-2013-0037. [11] A. Garcia, H. Stichtenoth and C.-P. Xing, On subfields of the Hermitian function field, Com-positioMath. 120 (2000), 137-170, doi:10.1023/a:1001736016924. [12] P. Hall, The Eulerian functions of a group, Q. J. Math. (Oxford Series) 7 (1936), 134-151, doi:10.1093/qmath/os-7.1.134. [13] R. W. Hartley, Determination of the ternary collineation groups whose coefficients lie in the GF(2n), Ann. Math. 27 (1925), 140-158, doi:10.2307/1967970. [14] T. Hawkes, I. M. Isaacs and M. Ozaydin, On the Mobius function of a finite group, Rocky Mountain J. Math. 19 (1989), 1003-1034, doi:10.1216/rmj-1989-19-4-1003. [15] J. W. P. Hirschfeld, G. Korchmiros and F. Torres, Algebraic Curves over a Finite Field, Princeton Series in Applied Mathematics, Princeton University Press, Princeton, NJ, 2008. [16] D. R. Hughes and F. C. Piper, Projective Planes, volume 6 of Graduate Texts in Mathematics, Springer-Verlag, Berlin, 1973. [17] B. Huppert, Endliche Gruppen I, volume 134 of Die Grundlehren der Mathematischen Wissenschaften, Springer-Verlag, Berlin, 1967, doi:10.1007/978-3-642-64981-3. [18] A. Lucchini, On the subgroups with non-trivial Mobius number, J. Group Theory 13 (2010), 589-600, doi:10.1515/jgt.2010.009. [19] A. Mann, Positively finitely generated groups, Forum Math. 8 (1996), 429-459, doi:10.1515/ form.1996.8.429. [20] A. Mann, A probabilistic zeta function for arithmetic groups, Internat. J. Algebra Comput. 15 (2005), 1053-1059, doi:10.1142/s0218196705002633. [21] M. Montanucci and G. Zini, Some Ree and Suzuki curves are not Galois covered by the Her-mitian curve, Finite Fields Appl. 48 (2017), 175-195, doi:10.1016/j.ffa.2017.07.007. [22] M. Montanucci and G. Zini, Quotients of the Hermitian curve from subgroups of PGU(3, q) without fixed points or triangles, 2018, arXiv:1804.03398 [math.AG] . G. Zini: The Mobius function of PSU(3, 22 ) 401 [23] H. Pahlings, On the Mobius function of a finite group, Arch. Math. (Basel) 60 (1993), 7-14, doi:10.1007/bf01194232. [24] E. Pierro, The Mobius function of the small Ree groups, Australas. J. Combin. 66 (2016), 142-176, https://ajc.maths.uq.edu.au/pdf/66/ajc_v66_p142.pdf. [25] D. Quillen, Homotopy properties of the poset of nontrivial p-subgroups of a group, Adv. Math. 28 (1978), 101-128, doi:10.1016/0001-8708(78)90058-0. [26] J. Shareshian, On the Mobius number of the subgroup lattice of the symmetric group, J. Combin. Theory Ser. A 78 (1997), 236-267, doi:10.1006/jcta.1997.2762. [27] J. W. Shareshian, Combinatorial Properties of Subgroup Lattices of Finite Groups, Ph.D. thesis, Rutgers, The State University of New Jersey, New Brunswick, 1996, https://search. proquest.com/docview/30428 047 7. [28] R. P. Stanley, Enumerative Combinatorics, Volume 1, volume 49 of Cambridge Studies in Advanced Mathematics, Cambridge University Press, Cambridge, 2nd edition, 2012. /^creative ^commor ARS MATHEMATICA CONTEMPORANEA ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 16 (2019) 403-410 https://doi.org/10.26493/1855-3974.1749.84e (Also available at http://amc-journal.eu) Regular self-dual and self-Petrie-dual maps of arbitrary valency* Jay Fraser, Olivia Jeans The Open University, Milton Keynes, U.K. Jozef Siran The Open University, Milton Keynes, U.K. and Slovak University of Technology, Bratislava, Slovakia Received 13 July 2018, accepted 18 December 2018, published online 30 January 2019 Abstract The existence of a regular, self-dual and self-Petrie-dual map of any given even valency has been proved by D. Archdeacon, M. Conder and J. Siran (2014). In this paper we extend this result to any odd valency > 5. This is done using algebraic number theory and maps defined on the groups PSL(2,p) in the case of odd prime valency > 5 and valency 9, and using coverings for the remaining odd valencies. Keywords: Regular map, automorphism group, self-dual map, self-Petrie-dual map. Math. Subj. Class.: 05C25, 05C10 1 Introduction In this paper we consider regular maps (that is, cellular embeddings of graphs on closed surfaces) with the highest 'level of symmetry', which are, in addition, invariant under the operators of duality and Petrie duality. Regular maps have been addressed in a number of papers and we refer here to the latest survey [11] for a large number of details; here we just sum up the essentials needed for our purposes. *The third author thanks the Banff International Research Station (BIRS) for supporting his participation in the stimulating workshop 'Symmetries of Surfaces, Maps and Dessins' (September 2017) at which the statement of the problem addressed in this paper crystallised and attracted the attention of a number of colleagues, notably M. Conder who produced important initial examples. The same author also acknowledges support from the APVV Research Grants 15-0220 and 17-0428, and from the VEGA Research Grants 1/0026/16 and 1/0142/17. E-mail addresses: jay.fraser@open.ac.uk (Jay Fraser), olivia.jeans@open.ac.uk (Olivia Jeans), , jozef.siran@open.ac.uk (Jozef Siran) ©® This work is licensed under https://creativecommons.org/licenses/by/4.0/ 404 Ars Math. Contemp. 16(2019)203-213 From an algebraic point of view, a regular map M can be identified with a finite group G with three distinguished involutory generators x,y,z and relators (yz)k, (zx)£ and (xy)2 so that x and y commute; we will formally write M = (G; x, y, z) to encapsulate the situation. The pair (k, £) is the type of M, and we will assume throughout that k, £ > 3; the type is hyperbolic if 1/k + 1/£ < 1/2. Geometrically and topologically, elements of G may be identified with flags (which correspond to mutually incident vertex-edge-face triples) and left cosets of the subgroups (x, y), (y, z) and (z, x) represent edges, vertices and faces of the embedded graph, with incidence given by non-empty intersection of cosets. Moreover, left multiplication by elements of G on the cosets induce map automorphisms of M and, in fact, G is isomorphic to the (full) automorphism group Aut(M) of M. Conjugates of x, y and z, respectively, induce automorphisms that locally act on M as reflections along some edge, in some edge, and in an axis of some corner of M. Similarly, conjugates of r = yz and s = zx represent rotations about vertices and face centres of the map; in particular, every vertex has valency k and every face is bounded by a closed walk of length The map M is orientable (meaning that its underlying surface is orientable) if and only if G+ = (r, s) is a subgroup of G of index two, and non-orientable otherwise. Thus, in the non-orientable case, the entire group G can be generated by the two rotations r and s only, and the involutions x, y, z are then expressible in terms of r and s; in such a situation we also write M = (G; r, s). Every automorphism of a map, regarded as a permutation of flags that preserves incidence along and across edges and within corners, is completely determined by its action on a single flag. If the automorphism group is transitive (and hence regular) on flags, one may identify the group with the flag set and arrive at the description outlined above. But even then a map may still exhibit 'external symmetries' induced by invariance under the operators of duality and Petrie-duality. The two operators are well known; informally, duality interchanges the roles of vertices and faces, and the Petrie dual of a map is formed by re-embedding its underlying graph so that the new faces are the left-right ('zig-zag') closed walks in the original map. A map is self-dual or self-Petrie-dual if it is isomorphic to its dual or Petrie dual, respectively. In the case of a regular map M = (G; x, y, z) as above, it is also well known (cf. [11]) that M is self-dual if and only if the group G admits an automorphism interchanging x with y and fixing z, and M is self-Petrie-dual if G has an automorphism interchanging x with xy and fixing y and z. In [1], regular maps that are both self-dual and self-Petrie-dual have been said to have trinity symmetry. The natural question regarding the existence of regular maps with trinity symmetry for any valency was raised more than four decades ago. In [15] it was suggested that the map M = (G; x, y, z) for the group G = (x, y, z; x2, y2, z2, (xy)2, (yz)2n, (zx)2n, (xyz)2n, (xzyzxyz)2) is a regular map with trinity symmetry, of valency 2n for every n > 1. This was eventually proved in [1] in a much more general form, including also invariance under the so-called hole operators that represent additional levels of 'external symmetries' not discussed here. However, the question remained almost completely open for odd-valent regular maps with trinity symmetry, as pointed out by the third author at the 2017 BIRS Workshop 'Symmetries of Surfaces, Maps and Dessins' [4, Part 4.7]. Note that such a map must necessarily be non-orientable because of self-Petrie-duality with Petrie walks of odd length. There is no such map of valency 3 since the only regular map of type (3,3) is the 2-skeleton of a tetrahedron. At the time of publication of the report [4] the only two sets of known examples of regular maps with trinity symmetry of odd valency k > 5 were those discovered computationally by M. Conder for 5 < k < 19 and the ones resulting from J. Fraser et al.: Regular self-dual and self-Petrie-dual maps of arbitrary valency 405 the work of G. Jones [7]. The method of Jones actually has potential to produce examples for infinitely many odd values of k but in [7] explicit examples have been given only for k = 15 (found also in [1] by a different method) and k = 455. Here we completely settle the problem by showing that for every odd k > 5 there exists a regular, self-dual and self-Petrie-dual map of valency k. Our strategy is to establish this result first for every prime k > 5 and for k = 9 by algebraic methods motivated by those used in [8], and applied to more detailed results of [6] on regular maps defined on linear fractional groups. We then extend this to non-prime odd values of k > 5 by an analogue of a covering tool from [1]. The paper is organised accordingly: in Sections 2 and 3 we review results on regular self-dual and self-Petrie-dual maps on linear fractional groups and develop the algebraic methods needed for our purposes, and in Section 4 we prove our general result and make a few concluding remarks. 2 Regular maps on linear fractional groups Classification of all orientably-regular maps with orientation-preserving automorphism group isomorphic to PSL(2, q) or PGL(2, q) follows from [9] and can be found in a somewhat more explicit form in [10]; the latter was re-interpreted and extended to regular maps (orientable or not) in [5]. Since we will be interested only in the special case of odd valency and face length, we just reproduce the corresponding part of the classification result here (the cases when one of the entries in the type of the map is even are more involved and we refer to [8] for details). Proposition 2.1. Let (k, t) = (5,5) be a hyperbolic pair with both entries odd and let p be an odd prime dividing neither k nor t. Let e = e(k, t) be the smallest positive integer j such that 2n | (pj — e„) for each n G {k, t} and some e„ G {+1, -1}, and let £n be a primitive 2n-th root of unity in GF(pe) if e„ = 1 or in GF(p2e) if e„ = —1. Further, let D = £2 + £-2 + el + e-2 = 0 and let k ~ Sfc R = ± £k 0 .0 C1 and S = ±(£k - C1) +e-%-1 -D i (Ù + £,-1)£k be elements of PSL(2,pe) if ek = 1 and of PSL(2,p2e) otherwise. Then, (a) the group Gk/ = (R, S} is isomorphic to PSL(2,pe), with R of order k and S of order £; (c) M = (Gk,e; R, S) is a regular map of type (k, £), which is non-orientable if and only if —D is a square in GF(pe). We note that if pe = ±1 (mod 10), the group PSL(2,pe) contains (up to conjugacy) two exceptional pairs R, S as above for (k, £) = (5, 5) with the property that (R, S} = A5; this case (omitted from [8, Theorem 2.2]) is addressed in [6]. However, this situation does not apply in what follows. Necessary and sufficient conditions for self-duality and self-Petrie-duality of the maps M = (Gk/; R, S) from Proposition 2.1 were established in [6]. As they are also quite complex we present here only a simple sufficient condition appearing as Corollary 4.3 in [6] which (in terms and notation of Proposition 2.1) can be re-stated as follows. Proposition 2.2. Let k > 5 be odd, and let p > 5 be a prime not dividing k. Further, let £ = k and let £ = = ^ be a primitive 2k-th root of unity in GF(pe) or in GF(p2e) 1 406 Ars Math. Contemp. 16 (2019) 377-401 for e = e(M) such that 3(£2 + £-2) + 2 = 0. Then, M = (GM; R, S) is a (non-orientable) self-dual and self-Petrie-dual regular map of valency k, with automorphism group isomorphic to PSL(2,pe). The condition 3(£2 +£-2)+2 = 0 is equivalent to 3(£+£-1)2 = 4 and for its fulfilment it is necessary that 3 be a square in GF(pe), p > 5. For e = 1, this holds if and only if p = ±1 (mod 12), and it is always the case if e > 2. But we can say more. Namely, the element Z = Z2 in Proposition 2.2 is a primitive k-th root of unity in F = GF(pe) or F = GF(p2e), and the condition 3(Z + Z-1) + 2 = 0 represents a quadratic equation in the prime field Fp of F; it also says that Z + Z-1 € Fp. The last fact is equivalent to (Z + Z-1)p = Z + Z-1, which reduces to (Zp-1 - 1)(Zp+1 - 1) = 0 in F. It follows that either Z € Fp and p = 1 (mod 2k), or Z lies in a quadratic extension of Fp and p = -1 (mod 2k), and in both cases we have e =1 (recall that k is assumed to be odd). The bulk of Proposition 2.2 may now be restated in a form more suitable for our future use. Corollary 2.3. Let k > 5 be odd. Assume that there exists a prime p > 5 such that p = ±1 (mod 2k) and p = ±1 (mod 12), and a primitive k-th root of unity Z in a finite field of order p or p2 with the property that 3(Z + Z-1) +2 = 0. Then, there exists a non-orientable self-dual and self-Petrie-dual regular map ofvalency k with automorphism group PSL(2,p). 3 Algebraic preliminaries For any k > 3, let a be a primitive complex k-th root of unity; its minimal polynomial is the k-th cyclotomic polynomial. Let h = a + a-1 and let K = Q(h) be the field obtained by adjoining h to the rationals. It is known [13, Proposition 2.16] that the ring O of algebraic integers of K is Z(h). We will focus on the algebraic integer g = 3h + 2 € O. Observe that g = 0, for otherwise a would be a root of a quadratic polynomial over Z, contrary to k > 3. Recall that the norm N(y) of an element y € O is defined as the product f]t at(y), where at denotes the injective homomorphism O ^ C into the field of complex numbers, uniquely determined by at (a) = at, and t ranges over all integers between 1 and (k -1)/2 that are relatively prime to k. It is well known that N(y) is an integer for any y € O, which is a consequence of the invariance of N(y) under the endomorphisms at. For the norm of our element g € O we thus have N (g) = f] t(3at(h) + 2), the product being taken over all t between 1 and (k - 1)/2, coprime to k. The y(k)/2 images at(h) appearing in this product are precisely the roots of the minimal polynomial ^(x) of degree y(k)/2 for h = a + a-1, see e.g. [8]. So, if ^(x) = f]t(x - 5 and k is a prime, then the norm N(g) is not equal to ±1, which means that g is then not a unit of the ring O. Indeed, let k > 5 be a prime, so that r = y(k)/2 = (k - 1)/2. By [12] we then also have ar-1 = 1, and the congruence (3.2) becomes N(g) = 2(k-1)/2 - 3 • 2(k-3)/2 = -2(fc-3)/2 (mod 9). It is easy to check that 2j = ±1 (mod 9) for a positive integer j if and only if j isamultiple of 3. This means that if k is prime, the norm N(g) can be congruent to ±1 (mod 9) only if (k - 3)/2 is amultiple of 3, giving a contradiction if k > 5. Further, from (3.1) with the help of ar = 1 and a0 = ±1 [12] it follows that if k > 5 is a prime, then N(g) is divisible neither by 2 nor by 3. We thus have: Lemma 3.1. If k > 5 is a prime, then N(g) = ±1; in particular, the non-zero element g GO is not a unit of the ring O. Moreover, for every prime factor p of N(g) one has p > 5. □ Consider now the field K' = Q(a), an extension of K of degree two. Let O' be the ring of algebraic integers of K'; it is well known [13, Theorem 2.6] that O' = Z(a), and, of course, [O' : O] = 2. The (integral) norm N'(z) of any z G O' is now the product at(z) taken over all injective homomorphism at: O' ^ C given by at(a) = a1 for t between 1 and k - 1 coprime to k, and again one has N'(z) G Z. The two norms, N on O and N' on O', are related by N'(y) = (N(y))2 for each y gO. We will keep assuming that k > 5 is an odd prime, and we let p > 5 be an arbitrary prime divisor of N(g), which exists by Lemma 3.1. We continue by considering the ideal (g,p) of O' = Z(a) generated by the elements g and p. Lemma 3.2. If k > 5 is a prime and ifp > 5 is a prime divisor of N(g), the ideal (g,p) is proper in the ring O'. Proof. Suppose that (g,p) = O', which means that 1 = Ag + Bp for some A, B G O'. Clearly A = 0, for otherwise 1 = N'(B)N'(p) = N'(B)pk-1 and so N'(B) would not be an integer. Now, 1 = N'(1) = N'(Ag + Bp) = f]a(Ag + Bp), where the product is being taken over all the y(k) = k - 1 embeddings a: O' ^ C. Expansion of this product gives N'(Ag + Bp) = N'(A)N'(g) + cp for some c G O'. Thus, cp G Z and so either c G Z or c = ±1/p. As p is a divisor of N'(g) = (N(g))2 and N' (A) is a non-zero integer, in either case it follows that N'(Ag + Bp) = 1, a contradiction. □ By Lemma 3.2, the ideal (g,p) is contained in some maximal ideal J = Jp of the ring O'. Since O' is a Dedekind domain, the ideal J has finite index in O' and so O'/J is a finite field F of characteristic p, that is, F = GF(pm) for some m > 1. Recalling our assumption of primality of k we show that the (multiplicative) order of the element a = a + J in the field F = O'/J is equal to k. Indeed, suppose this is not the case. Then, because of primality of k, the order of a in F would have to be one, meaning that a =1 in F. But then, since the element g = g + J is equal to zero in F, we would have 0 = g = 3(a + a -1) + 2 = 8 in F, a contradiction as p is odd. Observe also that k = p since no element in F has multiplicative order p. This way we have constructed a finite field F of characteristic p containing a primitive k-throot a of unity such that 3(a+a -1)+2 = 0. We now invoke the analysis immediately preceding Corollary 2.3 in Section 2, which fully applies to our situation. As the result we conclude that F is the prime field Fp if and only if a G Fp for p = 1 (mod 2k); otherwise 408 Ars Math. Contemp. 16(2019)203-213 F is a quadratic extension of Fp for p = —1 (mod 2k). In both cases we have p = ±1 (mod 12) because 3 has to be a square in Fp. Summing up, we have proved: Proposition 3.3. Let k > 5 be an odd prime and let a be a primitive complex k-th root of unity. Further, let g = 3(a + a-1) + 2 and let N(g) be the norm of g in the ring Z(a). Then, N(g) £ {0, ±1}, every prime divisor p of N(g) satisfies p > 5, and p = ±1 (mod 2k) and p = ±1 (mod 12), and for every such p there is a finite field F of order p or p2 containing a primitive k-th root a of 1 such that g = 3(a + a -1 ) + 2 = 0 in F. □ 4 The main result To obtain a restricted version of our main result for prime valencies at least five we just need to put the pieces together. Indeed, taking Z = a in Proposition 3.3 and combining it with Proposition 2.2 and Corollary 2.3 immediately gives: Theorem 4.1. For every odd prime k > 5 there exists a prime p = ±1 (mod 2k) and p = ±1 (mod 12) such that PSL(2,p) is the automorphism group of a (non-orientable) regular, self-dual and self-Petrie-dual map of valency k. □ We know that there is no 3-valent regular map with trinity symmetry, but there is one of valency 32 that can be constructed by the machinery of Section 2 as follows. The element 2 is a primitive 9-th root of unity mod 73, and so is Z = 24 and its multiplicative inverse Z-1 = 25, with Z and Z-1 satisfying the condition 3(Z + Z-1) + 2 = 0 (mod 73). By Proposition 2.2 the group PSL(2,73) carries a self-dual and self-Petrie-dual regular map of valency 9. Based on Theorem 4.1 and the above remark we are now in position to prove a full version of our main result. As alluded to in the Introduction (Section 1), this will be done with the help of coverings, and more specifically using a non-orientable analogue of Theorem 2.1 of [1]. We state it here in a restricted version sufficient for our purpose. Theorem 4.2. If there is a non-orientable regular map of odd valency d > 5 with trinity symmetry and with automorphism group G, then for any odd integer n > 3 there is a non-orientable regular map of degree nd with trinity symmetry and automorphism group isomorphic to (Z„)1+IGI/4 x G. Sketch of a proof. As indicated, this result was proved in [1, Theorem 2.1] for orientable maps (and, in this category, in a much more general setting that included also external symmetries induced by hole operators). The parts of the proof in [1] that refer to regularity, self-duality and self-Petrie-duality apply almost word-by-word to the non-orientable case and we thus give only a sketch of the arguments here. We will assume familiarity with the theory of lifts of maps by corner voltage assignments as explained e.g. in [1, 2, 3]; a corner of a regular map M = (G; x, y, z) is any 2-subset of the form {g, gz} for g £ G. Now let M = (G; x, y, z) be a regular map as in the statement. For odd n > 3 let IGI /2 H = Zn be the space of all |G|/2-tuples with entries from Zn and let E be the set of unit vectors (those with exactly one non-zero coordinate, equal to 1) in H. Define a corner voltage assignment a on flags of M - that is, on the elements of G - in the group H by assigning the |G|/2 two-element subsets {e, —e} for e £ E to the |G|/2 corners {g, gz} for g £ G in an arbitrary one-to-one fashion. By arguments in the proof of Theorem 2.1 in [1] that do not depend on orientability, the lift of the map M of type J. Fraser et al.: Regular self-dual and self-Petrie-dual maps of arbitrary valency 409 (d, d) by the voltage assignment a has n 1+|G|/4 components, each isomorphic to a regular map Ma = (Ga; xa, ya, zCT) of type (nd, nd) for the group Ga = (Zn)1+|G|/4 x G and suitable involutory generators xa,ya, za of Ga. Moreover, by the reasoning in the same proof (again applying also to non-orientable maps), trinity symmetry of M implies trinity symmetry of M. Note that both M and Mare non-orientable as their Petrie walks (of length d and nd) have odd length. □ Collecting our findings we arrive at the main result of this paper as a consequence of Theorem 4.1 and the remark following it, both in combination with Theorem 4.2. Theorem 4.3. For every odd d > 5 there exists a regular, self-dual and self-Petrie-dual map of valency d. □ A few remarks are in order. The reader may have observed that if the conclusion of Proposition 3.3 in Section 3 was valid for all odd k > 5 (and not just for prime k > 5), we would have a proof of our main result that would be independent on coverings and the resulting regular maps with trinity symmetry would have automorphism group isomorphic to PSL(2,p) for suitable primes depending on k. Research in this direction is currently being undertaken by the first two authors of this paper. Here we include a table of the first few values of N(g) for odd k between 5 and 29, with $(n) standing for the prime factorisation of n; observe that all the primes p in the prime factorization of |N(g) | satisfy p = ±1 (mod 2k) and p = ±1 (mod 12): k N (g) *(|N (g)|) 5 -11 prime 7 -13 prime 9 -73 prime 11 +263 prime 13 -131 prime 15 -239 prime 17 -4079 prime 19 + 15503 37 x 419 21 +5209 prime 23 -4093 prime 25 +56149 prime 27 -16417 prime 29 +3161869 59 x 53591 As noted earlier, existence of the regular maps for the first eight entries in this table was discovered by M. Conder, who also found such maps of valency 7 and 17 for the Janko simple groups J2 and J3. We conclude by noting that a strategy for proving Theorem 4.3 was also outlined by S. Wilson [14] by reducing the problem to a number-theoretic question related to Cheby-shev polynomials over finite fields. References [1] D. Archdeacon, M. Conder and J. Siran, Trinity symmetry and kaleidoscopic regular maps, Trans. Amer. Math Soc. 366 (2014), 4491-4512, doi:10.1090/s0002-9947-2013-06079-5. 410 Ars Math. Contemp. 16(2019)203-213 [2] D. Archdeacon, P. Gvozdjak and J. Siran, Constructing and forbidding automorphisms in lifted maps, Math. Slovaca 47 (1997), 113-129. [3] D. Archdeacon, R. B. Richter, J. Siran and M. Skoviera, Branched coverings of maps and lifts of map homomorphisms, Australas. J. Combin. 9 (1994), 109-121, http://ajc.maths. uq.edu.au/pdf/9/ocr-ajc-v9-p10 9.pdf. [4] M. Conder, N. Boston, G. Gonzaiez-Diez, G. Jones and T. Tucker, Report on the BIRS Workshop 'Symmetries of Surfaces, Maps and Dessins', September 2017, http://www.birs. ca/workshops/2017/17w5162/report17w5162.pdf. [5] M. Conder, P. Potocnik and J. Siran, Regular hypermaps over projective linear groups, J. Aust. Math. Soc. 85 (2008), 155-175, doi:10.1017/s1446788708000827. [6] G. Erskine, K. Hrinakova and O. Jeans, Self-dual, self-Petrie-dual and Moebius regular maps on linear fractional groups, 2018, arXiv:1807.11307 [math.CO]. [7] G. A. Jones, Combinatorial categories and permutation groups, Ars Math. Contemp. 10 (2016), 237-254, doi:10.26493/1855-3974.545.fd5. [8] G. A. Jones, M. Macaj and J. Siran, Nonorientable regular maps over linear fractional groups, ArsMath. Contemp. 6 (2013), 25-35, doi:10.26493/1855-3974.251.044. [9] A. M. Macbeath, Generators of the linear fractional groups, in: W. J. LeVeque and E. G. Straus (eds.), Number Theory, American Mathematical Society, Providence, Rhode Island, volume 12 of Proceedings of Symposia in Pure Mathematics, 1969 pp. 14-32, proceedings of the Seventy-Third Annual Meeting of the American Mathematical Society held at Houston, Texas, January 24-28, 1967. [10] C.-H. Sah, Groups related to compact Riemann surfaces, Acta Math. 123 (1969), 13-42, doi: 10.1007/bf02392383. [11] J. Siran, How symmetric can maps on surfaces be?, in: S. R. Blackburn, S. Gerke and M. Wildon (eds.), Surveys in Combinatorics 2013, Cambridge University Press, Cambridge, volume 409 of London Mathematical Society Lecture Note Series, 2013 pp. 161-238, doi: 10.1017/cbo9781139506748.006, papers from the 24th British Combinatorial Conference held in Egham, July 2013. [12] D. Surowski and P. McCombs, Homogeneous polynomials and the minimal polynomial of cos(2n/n), Missouri J. Math. Sci. 15 (2003), 4-14, http://cs.ucmo.edu/~mjms/ 20 03.1/Surow.pdf. [13] L. C. Washington, Introduction to Cyclotomic Fields, volume 83 of Graduate Texts in Mathematics, Springer-Verlag, New York, 1982, doi:10.1007/978-1-4684-0133-2. [14] S. E. Wilson, personal communication, September 2017. [15] S. E. Wilson, New Techniques for the Construction of Regular Maps, Ph.D. thesis, University of Washington, Seattle, Washington, 1976, https://search.proquest.com/docview/ 302844349. /^creative ^commor ARS MATHEMATICA CONTEMPORANEA ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 16 (2019) 411-417 https://doi.org/10.26493/1855-3974.1704.34c (Also available at http://amc-journal.eu) A generalization of the parallelogram law to higher dimensions Alessandro Fonda * Dipartimento di Matematica e Geoscienze, Universita di Trieste, P.le Europa 1,1-34127 Trieste, Italy Received 24 May 2018, accepted 9 July 2018, published online 8 February 2019 Abstract We propose a generalization of the parallelogram identity in any dimension N > 2, establishing the ratio of the quadratic mean of the diagonals to the quadratic mean of the faces of a parallelotope. The proof makes use of simple properties of the exterior product of vectors. Keywords: Parallelogram law, parallelotope. Math. Subj. Class.: 51M04 1 Introduction and statement of the result The well known parallelogram law states: For any parallelogram, the sum of the squares of the lengths of its two diagonals is equal to the sum of the squares of the lengths of its four sides. Figure 1: The two diagonals of a parallelogram. *I would probably never have written this paper without the support of my son Marcello. I warmly thank him, in particular, for helping me finding the formula for the three-dimensional case. E-mail address: a.fonda@units.it (Alessandro Fonda) ©® This work is licensed under https://creativecommons.org/licenses/by/4.0/ 412 Ars Math. Contemp. 16(2019)203-213 Equivalently: given two vectors a and b, one has ||a + b||2 + ||a - b||2 = 2(||a||2 + ||bM2). This identity holds in any inner product space, but, since the two vectors belong to the same plane, we can see it as being of a two-dimensional nature. The aim of this paper is to provide a generalization to higher dimensions. The parallelogram law has a natural geometric interpretation, involving the areas of the squares constructed on the sides and on the diagonals of the parallelogram. In particular, when ||a + b|| = ||a - b||, it reduces to the Pythagorean theorem. In this paper, however, we will look at the parallelogram law from a rather unusual point of view: writing it as ||a + b||2 + ||a - b||2 =2 ||a||2 + ||b|2 + ||a||2 + ||b||2 2 4 and taking the square roots, we can state it in the following equivalent form. For any parallelogram, the ratio of the quadratic mean of the lengths of its diagonals to the quadratic mean of the lengths of its sides is equal to %/2. Now, instead of a parallelogram, we will consider an N-dimensional parallelotope, and our goal will be to prove that the same type of proposition holds in this general case. Indeed, our result can be stated as follows. Theorem 1.1. For any N-dimensional parallelotope, the ratio of the quadratic mean of the (N — 1)-dimensional measures of its diagonals to the quadratic mean of the (N — 1)-dimensional measures of its faces is equal to %/2. For N = 2, the 1-dimensional measure is the length, and we recover the parallelogram law. In the general case, we first need to specify what a diagonal should be, and indeed this will be clarified in the following sections. For example, if N = 3, the diagonals of a parallelepiped are precisely the parallelograms obtained joining the opposite edges of the parallelepiped (see Figure 2 below), so that the 2-dimensional measures of the diagonals are the areas of these parallelograms. Notice that our definition of a diagonal is not the same as the one given in [1, 2], where a different generalization of the parallelogram law has been proposed; in the three-dimensional case, e.g., their diagonals are triangles. We believe that our definition is somewhat more natural, since here the diagonals share the same geometrical shape of the faces. We provide the proof of our main theorem in Section 3. However, for the reader's convenience, we thought it useful to first explain its proof in detail in the more familiar three-dimensional case. This is what we are going to do next. 2 The three-dimensional case To start with, let us consider a three-dimensional parallelepiped P, and see how to extend the parallelogram law to this case. Instead of the lengths of the four sides of the parallelogram, we would like to take the areas of the six faces of the parallelepiped. On the other hand, the lengths of the two diagonals of the parallelogram should naturally be replaced by the areas of the six diagonals of the parallelepiped, i.e., the six parallelograms obtained joining the opposite edges of the parallelepiped. In this case, Theorem 1.1 can be rephrased as follows. A. Fonda: A generalization of the parallelogram law to higher dimensions 413 For any three-dimensional parallelepiped, the sum of the squares of the areas of its six diagonals is equal to twice the sum of the squares of the areas of its six faces. Figure 2: One of the six diagonals of a parallelepiped. In order to prove this statement, assume the parallelepiped to be generated by the following three vectors: a =(ai,a2,as), b = (61,62,63), c = (c1,c2,c3). By this we mean that P is the set of points obtained as linear combinations of these three vectors, with coefficients in the interval [0,1]: P = {aa + ¡3b + 7c : a, ¡, 7 G [0, 1]}. The six faces of P are defined as Ff = {aa + ¡b + Y c G P: a = 0}, Fi = {aa + ¡b + Y c G P: a = 1}, F2f = {aa + ¡b + Y c G P: ¡ = 0}, F2 = {aa + ¡b + Y c G P: ¡ = 1}, F3f = {aa + ¡b + Yc G P: Y = 0}, F+ = {aa + ¡b + Yc G P: Y = 1}. Ff is generated by b and c, Ff is generated by a and c, Ff is generated by a and b, while F+ is congruent to Ff, for each k = 1, 2,3. 414 Ars Math. Contemp. 16(2019)203-213 The six diagonals of P are defined as V1 D1 ,2 = {aa + ftb + y c G P : : a = ft}, 2 D1 ,2 = {aa + ftb + y c G P : : a + ft = 1}, V1 D1 ,3 = {aa + ftb + y c G P : : a = y} 2 D1 ,3 = {aa + ftb + y c G P : : a + y = 1}, D1,3 = {aa + ftb + y c GP : ft = y}, d2,3 = {aa + ftb + yc GP : ft + Y = 1}. So, D 2 is generated by a + b and c, 3 is generated by a + c and b, 3 is generated by b + c and a, while T>22 is congruent to the set generated by a — b and c, T>23 is congruent to the set generated by a — c and b, 3 is congruent to the set generated by b — c and a. Our proposition is thus translated into the following identity: ||(a + b) x c||2 + ||(a — b) x c||2 + ||(a + c) x b||2 + ||(a — c) x b||2 + ||(b + c) x a||2 + ||(b — c) x a||2 = 4(||b x c||2 + ||a x c||2 + ||a x b||2). Here, we have used the vector product, so that, e.g., ||a x b||2 b2 b3 = (0263 — b2a3)2 + (036 1 — 63a 1 )2 + (a 162 — b ia2)2. In order to prove the above identity, we just notice that, by the parallelogram law, ||(a + b) x c||2 + ||(a — b) x c||2 = = ||(a x c) + (b x c)||2 + ||(a x c) — (b x c)||2 = 2(||a x c||2 + ||b x c||2), and similarly ||(a + c) x b||2 + ||(a — c) x b||2 = 2(||a x b||2 + ||c x b||2), ||(b + c) x a||2 + ||(b — c) x a||2 = 2(||b x a||2 + ||c x a||2). Summing up the three formulas, our identity is proved. 2 2 a2 0,3 + a3 a + 01 02 b2 63 63 61 61 62 A. Fonda: A generalization of the parallelogram law to higher dimensions 415 Remark 2.1. There surely are several ways to extend the parallelogram law to higher dimensions. Just to mention one of these, in the three-dimensional case we have ||a + b + c||2 + ||a + b - c||2 + ||a - b + c||2 + ||a - b - c||2 = 4(||a||2 + ||b|2 + ||c||2). We acknowledge the referee for pointing out this identity. It is proved directly (by the use of the classical parallelogram law) and can be easily extended to any dimension. 3 Proof of the main theorem We now provide a proof for the general N-dimensional case. Let P be the parallelotope generated by the vectors a1,..., aN, i.e., P = {Ck ak : cfc G [0,1], for k = 1,...,n| . Its 2N faces are defined by F- = | Ckak g P : Cn = 0 j , F+ = j Ckak G P : c„ = 1 j , with n = 1,..., N. Each F— is generated by the vectors a1,..., an,..., aN, where, as usual, an means that an is missing, while F+ is a translation of F—, for every n = 1,..., N. Concerning the diagonals, they are defined as Dj = | Ck ak G P : Ci = Cj j , D2,j = j ^ Ck ak G P : C + Cj = 1 j , with indices i < j varying from 1 to N. There are N(N - 1) of them. Hence, we have that D j is generated by ai + aj and a 1,..., ai,..., aj,..., aN, while D2 j is a translation of the set generated by ai - aj and ai,..., ai,..., aj,..., aN. In order to compute the ( N -1) -dimensional measures of the faces and the diagonals of our parallelotope, we make use of the following proposition involving the exterior product of vectors in RN. (See, e.g., [3] for the definition and the main properties of the exterior product.) Proposition 3.1. The M-dimensional measure of a parallelotope generated by M vectors v1,..., vM in RN, with 1 < M < N, is given by ||v1 A • • • A vM ||. Proof. If v 1,..., vM are linearly dependent, the M-dimensional measure of the parallelotope generated by v 1,..., vM is equal to zero, hence coincides with ||v 1 A •••A vM ||. 416 Ars Math. Contemp. 16(2019)203-213 Assume now that the vectors vi,..., vM are linearly independent, and let V be the subspace generated by them. Choose an orthonormal basis e1,..., eM of V, and write vi = viiei +-----+ vim eM, Then, so that VM = VM iei +-----+ VMM eM. (vii • vi A • • • A vM = det IIVi A • • • A vmI ViM ei A • • • A eM, \vm i ••• VMM j ( Vii • • • ViM det \VM i ••• VMM/ which is indeed the M-dimensional measure of the parallelotope generated by the vectors vi,..., vm. □ Hence, the (N - 1)-dimensional measures of the faces are given by ||ai A • • • A an A • • • A aN||, while the (N - 1)-dimensional measures of the diagonals Dj are equal to ||(ai + aj) A Ak=ij ak y, and those of the diagonals Dj are equal to ||(ai- aj) a a k=i,j ak y. Choosing any couple i < j, by the parallelogram law we have that ||(ai + aj) A A k=i,j ad2 + ||(ai - aj) A A k=i,j ak|2 = = ||ai A • • • A aj A • • • A aN ||2 + ||ai A • • • A a A • • • A aN ||2j. We now want to take the sum of all these equalities, with i < j varying form 1 to N. We claim that, for any n = 1,..., N, when performing such a sum, in the right hand side, the term 2||ai A • • • A a^ A • • • A aN||2 will appear N - 1 times. Indeed, this term may appear with j = n, while i varies from 1 to n - 1 , or with i = n, while j varies from n +1 to N, and there are exactly N - 1 of such possibilities. Hence, summing all the equalities, we have that E (||(a + aj) A Ak=i,j ak ||2 + ||(a - aj) A Ak=i,j ak ||2) = N = (N - 1) E2||ai A • • • A an A • • • A aN||2. i p > y and side lengths a > b > c; (ii) T' denotes a spherical isosceles triangle with internal angles (S, S, e), S = e, and side lengths (d,d,e), as illustrated in Figure 1. Figure 1: A spherical scalene triangle, T, and a spherical isosceles triangle, T'. Taking into account the area of the prototiles T and T', we have a + ft + y > n and 25 + e > n. As a > ft > y, we also have a > n. In [6] it was established that any f-tiling by T and T' has necessarily vertices of valency four. We begin by pointing out that any f-tiling by T and T', in which the shortest side of T is equal to the longest side of T', has at least two cells congruent to T and T', respectively, such that they are in adjacent positions and in one and only one of the situations illustrated in Figure 2. Our aim in this paper is to classify f-tilings in the first case of adjacency (Figure 2-Case I). Next section contains the main results of this paper. In Subsection 2.1 we describe six families of spherical f-tilings and one single f-tiling that we may obtain in this case of adjacency. The combinatorial structure of these f-tilings and the classification of the group of symmetries and also the transitivity classes of isogonality and isohedrality are presented in Subsection 2.2. The proof of the main result consists in a long and exhaustive methodology and it is presented in Section 3. C. P. Avelino and A. F. Santos: S2 coverings by isosceles and scalene triangles ... 421 J3 I.1 I.2 II Case I: & > e Case II: & < e Figure 2: Distinct cases of adjacency. 2 Main result 2.1 f-tilings in the adjacency case I Theorem 2.1. Let T and T' be a spherical scalene triangle and a spherical isosceles triangle, respectively, such that they are in one of the adjacent positions illustrated in Figure 2-Case I. Then, from this we obtain six families of spherical f-tilings and one isolated f-tiling, Gk (k > 4), Gk (k > 4), H, D (k > 3), F (k > 4), that satisfy, respectively: I (k > 3), Jf (k > 4), Sk n ■^min 2 (i) a + S = n, S + fi + e = n, kY = n, e = ek (S), S G ek (S) = 2 arccot ^2 cos ^ csc 2S — cot S^ and •/1 + 8 cos f — 1 2), k > 3, where Smk in = arccos 4 (ii) a + S = n, a + fi + e = n, S + fi + y = n, kY = n, S = Sk, k > 4, where Sf=arccot tan 2k (2—sec2 2k )); (iii) a + S = n, a + fi + e = n, S + fi + y = n, 2fi + y + e = n, kY = n, S = Sk, k > 4; (iv) a + S = n, a + y + Y = n, 3fi + e = n, 5y = n, where fi = fi0 = 4 arcta^ yÇ+4V5—2^22+6^5; (v) a + S = n, 2fi + y + e = n, kY = n, a = a1(fi), fi G (firkin, fiO), k > 4, where / n ni n \ \ af (fi) = arccos ( — cos — sec — cos (fi +--) ) k k 2k 2k fimin = maX { p arccos Q sec 2k) — 2k ^ and n lk = (k — 1)n ; fimax 2k ; 422 Ars Math. Contemp. 16(2019)203-213 (vi) a + S = n, 2fi + e = n, kj = n, a = a|(fi), fi G (fim|n, 2 ), k > 3> where a|(fi) = arccos cos ^ cosfij and o2 k I n \/cos2 I +8 - cos | 1 fi^n = maW k, arccos -^-1 ^ ; (vii) a + e = n, fi + 2S = n, k7 = n, a = a| (fi), fi G (|, fi31x), k > 4, where fi n (fi ) = arccos ( 2 sin2--cos — and „, ,/1 + 8 cos | - 1 fimix = 2arcsin^- 1 4 For each family of f-tilings we present the distinct classes of congruent vertices in Figure 3 (including the respective number of vertices in each tiling). Dk 2k 2k Gk 2k 2k 2k Gk 3k y y P P k H 4k P E P P 2k y Py 2k Jk 2k 2k Figure 3: Distinct classes of congruent vertices. 3 a k k k k k k Particularizing suitable values for the parameters involved in each case, the corresponding 3D representations of these families of f-tilings are given in Figures 4-10. C. P. Avelino and A. F. Santos: S2 coverings by isosceles and scalene triangles ... 423 Figure 4: f-tilings in the adjacency case I; the family. Figure 5: f-tilings in the adjacency case I; the Qk family. Figure 6: f-tilings in the adjacency case I; the Gk family. 424 Ars Math. Contemp. 16(2019)203-213 Figure 7: f-tilings in the adjacency case I; the isolated f-tiling. (m) F Figure 8: f-tilings in the adjacency case I; the Fk family. (n)15 0o)Xi (p) I5 Figure 9: f-tilings in the adjacency case I; the Ik family. C. P. Avelino and A. F. Santos: S2 coverings by isosceles and scalene triangles ... 425 (q )Jâ Figure 10: f-tilings in the adjacency case I; the Jk family. (r )J$ (s) JS 2.2 Symmetry groups and combinatorial structure In this subsection we present the group of symmetries of each spherical f-tiling mentioned in Theorem 2.1. The number of transitivity classes of tiles and vertices of each tiling is indicated in Table 1. Any symmetry of Dk, k > 3, fixes the north pole N = (0,0,1) (and consequently the south pole S = -N) or maps N into S (and consequently S into N). The symmetries that fix N are generated, for instance, by the rotation Rfn (of an angle tt around the z axis) k k and the reflection pyz (on the coordinate plane y o z) giving rise to a subgroup of ) isomorphic to Dk, the dihedral group of order 2k. Now, the map $ = R| o pxy = pxy o R| is a symmetry of Dk that changes N and S. One has 4>2k-i o pyz = pyz o ^ and ^ has order 2k. It follows that ^ and pyz generate G(Dk), and so it is isomorphic to D2k. Moreover, Dk is 2-tile-transitive and 3-vertex-transitive with respect to this group. The analysis considered to the combinatorial structure of Dk also applies to the family of f-tilings Gk, k > 4. And so G(Gk) = D2k. Gk is 3-isohedral and 4-isogonal. Concerning the family of f-tilings Gk, k > 4, we have that G(Gk) = Dk, since in this case there is no symmetry sending the north pole into the south pole. Moreover, Gk has 6 transitivity classes of tiles, and so it is 6-isohedral. The vertices of Gk form 8 transitivity classes. Regarding the symmetry group of H, the symmetries that fix N are generated by the rotation Rzfn and the reflection pyz on the plane x = 0. On the other hand, 5 ^ = Rzn ◦ p _ ◦ pxy 5 is also a symmetry of H that sends N into S. Thus, we conclude that G(H) is isomorphic to Dio, the dihedral group of order 20. H is 4-tile-transitive and 5-vertex-transitive. Any symmetry of I^, k > 3, fixes N or maps N into S. The symmetries that fix N are generated, for instance, by the rotation Rzfn of order k and the reflection pyz, giving rise k to a subgroup S of G(I^) isomorphic to Dk. To obtain the symmetries that send N into 426 Ars Math. Contemp. 16 (2019) 445-463 S it is enough to compose each element of S with pxy. Since pxy commutes with RZ and k pyz, we may conclude that G (Ik) is isomorphic to C2 x Dk. Ik has 2 transitivity classes of tiles with respect to the group of symmetries and 3 transitivity classes of vertices. Similarly to previous cases, we have G(F|) = G( ) = D2k. is 3-isohedral and 4-isogonal and is 2-isohedral and 3-isogonal. The combinatorial structure of the class of spherical f-tilings described in the previous subsection, including the symmetry groups, is summarized in Table 1. Our notation is as follows: • |V | is the number of distinct classes of congruent vertices; • Ni and N2 are, respectively, the number of triangles congruent to T and T', respectively; • G(t) is the symmetry group of each tiling t and the indices of isohedrality and isogonality for the symmetry group are denoted, respectively, by #isoh. and #isog. 3 Proof of Theorem 2.1 In the case of adjacency I, any f-tiling by T and T' has at least two cells congruent to T and T', respectively, such that they are in adjacent positions and in one and only one of the situations illustrated in Figure 2. After certain initial assumptions are made, it is usually possible to deduce sequentially the nature and orientation of most of the other tiles. Eventually, either a complete tiling or an impossible configuration proving that the hypothetical tiling fails to exist is reached. In the diagrams that follow, the order in which these deductions can be made is indicated by the numbering of the tiles. For j > 2, the location of tiling j can be deduced directly from the configurations of tiles (1,2,... ,j - 1) and from the hypothesis that the configuration is part of a complete f-tiling, except where otherwise indicated. Observe that we have S > n. Also, as d = c and using spherical trigonometric formulas, we get cos y + cos a cos 6 e -—-— = cot S cot —. (3.1) sin a sin p 2 Proof of Theorem 2.1. We consider separately the subcases illustrated in Figure 2-Case I. Case I.1: With the labeling of Figure 11(a), at vertex vi we must have a + S < n or a + S = n. Case I.1.1: Suppose firstly that a + S < n. If a < S, we must have a + S + ke = n, with k > 1. Due to the existence of vertices of valency four, it follows that S = 2, and consequently, by Equation (3.1), cos y + cos a cos 6 = 0. Nevertheless, this is not possible, since cos y > cos 6 > cos a > 0. Therefore, a > S. It follows that a>p>S>e>Y and a + S + kY = n, with k > 1; see Figure 11(b). Note that 6\ = y, otherwise at vertex v2 we get a + 6 = n = y + e, which is an impossibility. Now, we have 02 = y, 82 = S or 02 = e. Case I.1.1.1: If 02 = y, we obtain the configuration illustrated in Figure 12(a). Due to the edge lengths, at vertex v3 we must have d3 + 6 + p < n, with p > e, which implies d3 = e. At vertex v4 we reach a contradiction, as a + S + p > n, for all p G {a, 6, S,e}. Table 1: Combinatorial structure of the dihedral f-tilings of S2 by scalene triangles T and isosceles triangles T' performed by the shortest side of T and the longest side of T' in the case of adjacency I. f-tiling a /3 7 5 e M ATi n2 G{t) #isoh. #isog. X>£, k > 3 7T — Ô 7t — S — e 7T fc V mm' 2 / £k(ô) 3 4A; 4k D2k 2 3 gk, k > 4 7T — Ô (*-!)* s k 7T fc Sk 2<5 k 4 8k 4k D2k 3 4 gk, k > 4 7T — Ô (fc-i)W s k 7T fc Sk 2(5 k 5 8k 4k Dk 6 8 U 3tt 5 /3° 7T 5 2it 5 7T - 3/3° 4 60 20 Dw 4 5 k> 4 (oik oik \ \rmin' rmax/ 7T fc 7T — a (fc-l)* 2/3 3 8k 4A; D2k 3 4 k > 3 (o2k tt\ ^mim 2 / 7T fc 7T — a 7T -2/3 3 4k 2k C2 x £)fc 2 3 Jp, k > 4 ( — «3fc ) V k ' ' max/ 7T fc 7T-/3 2 7T — a 3 4k 4k D2k 2 3 428 Ars Math. Contemp. 16(2019)203-213 Figure 11: Local configurations. Figure 12: Local configurations. Case I.1.1.2: If 02 = S (Figure 12(b)), we reach an impossibility at vertex v4, since S + S + p > n, for all p G {a, /, S, e}. Note that d3 cannot be 7 (tile 11), as it implies a sum of alternate angles at vertex v3 including the angles /, pi and p2, with pi g {a, /} and p2 G {a, /, S, e}, which is not possible due to the dimensions of the involved angles. Case I.1.1.3: Finally we consider 02 = e (Figure 13(a)). At vertex v3 we must have S + / + = n, k > k. Nevertheless, an incompatibility between sides at this vertex cannot be avoided. Case I.1.2: Suppose now that a + S = n (consequently / + 7 > S > |). If a = S = |, we also get 7 = f, which is not possible. On the other hand, if S > | > a (> / > 7), we obtain cot S < 0, thereby making Equation (3.1) infeasible. Thus, a > | > S. With the C. P. Avelino and A. F. Santos: S2 coverings by isosceles and scalene triangles ... 429 Figure 13: Local configurations. labeling of Figure 13(b), we have 01 = 6, = e, = $ or 0i = a. Case I.1.2.1: If 01 = 6, we get the configuration illustrated in Figure 14(a). Note that, at vertex v2, it is not possible to have 6 + 6 + ky = n, with k > 1, and 6 + 6 + $ + y > n. At vertex v3 we must have a + $ + ke = n, with k > 1. Nevertheless, at this vertex we 430 Ars Math. Contemp. 16(2019)203-213 reach a contradiction, since (S + S + P) + (a + P + e) > (S + S + e) + (a + P + 7) > 2n. Case I.1.2.2: If ^ = e, we obtain the configuration of Figure 14(b). Note that if 02 = 7, we would get the angles (S, e, 7, P,...) in one of the sum of alternate angles at vertex v2; but (S + e + y + P) + (a + S) = (S + S + e) + (a + p + 7) > 2n, which is not possible; at tile 11, it is easy to observe that 03 = a, 7, S; on the other hand, 03 cannot be e, otherwise, at vertex V3, we get S + S + p = n, but (a + S) + (S + S + P) + (e + S + p + e +----) > 2(S + S + e) + (a + P + 7) > 3n, which is a contradiction; a similar reasoning applies to the choice of and the fact that k = 1 in the sum S + P + ke = n, at vertex v2. We denote the continuous family of f-tilings illustrated in Figure 14(b) by Df, where a + S = n, S + P + e = n and k7 = n, with k > 3. As 0 3, with S G (Skkin, t^) , where , Vl + Scos f — 1 n Smin = arccot —-^- > 3 is obtained when e = S. The graph of this function for Sf in < S < | is outlined in Figure 15, for different values of k. 3D representations of D3, D4 and D| are given in Figures 4(a)-4(c). Case I.1.2.3: Consider = P (Figure 16(a)). At vertex v1 we cannot have a + P = n = e + 7, as a>S>e and P > 7. Thus, a> | >S>P>7>e and a + P + ke = n, k > 1. It is easy to observe that k = 1, as k > 1 lead to a vertex with a sum of alternate angles including the angles S, S and p, with p G {a, P, S, e}, which is not possible due to the dimensions of the involved angles. The last configuration extends to the one illustrated in Figure 16(b). At vertex v2 we have necessarily one of the following situations: (i) S + P + P = n; (ii) S + P + 7 = n. Note that S + P + ke = n, k> 1 lead to a vertex with a sum of alternate angles including the angles S, S and p, with p g {a, P, S, e}. (i) If S + P + P = n, we obtain the configuration illustrated in Figure 17(a). Note that, at vertex v3, we cannot have a + 7 + 7 + kp = n, with p G {7, e} and k > 1, otherwise we get (a + 7 + 7 + kp) + (a + S) + (S + P + P) > (a+P + 7) +(a + P+7) + (S + S + e) > 3n, which is not possible. C. P. Avelino and A. F. Santos: S2 coverings by isosceles and scalene triangles ... 431 Figure 15: e = ek (J), with S^in < S < f, and for k = 3,4,5,..., to. P 8 Y 4 a 3 5 5 Y a 1 5 01= P P * a Y V1 (a) 10 e 4 3 Y a S S Y Y a S S 1 6i p 7 a v, \ p p ea a Y S S e 6 a 8 Y 9 e S S p (b) Figure 16: Local configurations. v At vertex v4 we must have k7 = n, with k > 4. As S = 27 and n < S + S + e = 47 + e, we conclude that k = 4, which is not possible as S < f. (ii) If S + fi + y = n, the last configuration gives rise to the one illustrated in Figure 17(b), where 02 can be e or S. According to the selection for 02, we obtain the planar representations illustrated in Figures 18(a) and 18(b), respectively. In the first case we have a + S = n, a + fi + e = n, S + fi + 7 = n, kY = n, with k > 4, and 1 n ( 2 n ) " — tan - I 2 — sec2 2 S=Sk=arcco^1tan2k (2 - sec2 2k )) 432 Ars Math. Contemp. 16(2019)203-213 (a) (b) Figure 17: Local configurations. Note that by Equation (3.1) we have cos k + cos S cos(S + k) cos S sin (S + 2k) sin(S + k) = cos (S + 2k 2 n n \ c n cos — cos 0 +--+ cos 0 cos — =0 k V + 2k J + 2k 2 cos 0 cos3 —-— sin 0 cos — sin — = 0 2k k 2k n 1 n 2 n -<=>■ cot 0 = tan---tan — sec2 —. 2k 2 2k 2k We denote this family of f-tilings by Gk, k > 4. 3D representations of Gk, k = 4, 5, 6, are presented in Figures 5(d) - 5(f). In the second case we have a + 0 = n, a + 0 + e = n, 0 + 0 + 7 = n, 2,0 + 7 + e = n, kY = n, with k > 4, and 0 = 0k; we denote this family of f-tilings by Gk. 3D representations, for k = 4, 5,6, are presented in Figures 6(g) -6(i). Case I.1.2.4: If = a (Figure 19(a)), we must have 0 < 0, otherwise there is no way to satisfy the angle-folding relation around vertex v1. Then, a> 2 > 0 > 0 > y and 0 > e. Now, we have #2 = 0, #2 = Y or #2 = e. Note that #2 cannot be 0, as 0 + 0 + e + p > n, for all p G {0, y}. n i-a < ri s' 0 1 Si. I £-5 Co s' Oo a s a. a £ (a)Qk, k > 4 (b) Qk,k> 4 Figure 18: Planar representations. 434 Ars Math. Contemp. 16(2019)203-213 Figure 19: Local configurations. Case I.1.2.4.1: If O2 = P, we get the configuration illustrated in Figure 19(b), where a + 2y = n and, at vertex vi, 3P + ke = n, k > 1. As k > 1 implies the existence of a vertex with a sum of alternate angles containing S + S + P, and (3P + ke) + (2S + P) + (a + S) > (a + P + y) + 2(2S + e) > 3n, we conclude that k = 1. Now, O3 G {e, 7}. If O3 = e (Figure 20(a)), at vertex v2 we reach a contradiction, as for p G {P, 7}, we get S + P + e + p > S + P + e + 7 > 2S + e > n. On the other hand, if O3 = 7, the last configuration extends to the one illustrated in Figure 20(b). If O4 = e (Figure 21(a)), at vertex v3 we must have S + 2P = n, as S + 2P + p > n, for all p G {a, P, 7, S, e} (note that a + P + e = 3P + e = n, implying 7 > e; consequently a > 2 > S > P > 7 > e). As k7 = n, 47 = S + 27 < a + 27 = n and 67 = 3S > n, we that b — ^ Tr\int1w with tV»A rAmainino /^rrnHitirrnc wit* retain rv — _ , , _ _ 5 ' P 10 ' conclude that k = 5. Jointly with the remaining conditions, we obtain a = 31, P = , 7 = n, S = 2n and e = 10. Nevertheless, under these conditions, Equation (3.1) is impossible. On the other hand, if O4 = S, we obtain the planar representation illustrated in Figure 21(b). We have ^3 + 4V5 - 2^22 + 6V5, 3n „ „ a = —, P = 4 arctan 5 ' H n 2n 7 = —, S =—, and e = n — 3P. 55 We denote this f-tiling by H, whose 3D representation is presented in Figure 7(j). Case I.1.2.4.2: If O2 = 7, we obtain the configuration illustrated in Figure 22(a). Note that, at vertex v1, all the alternate angle sums containing P+P+7+p, with p g {a, P, 7, S}, exceed n, and so P + P + 7 + ke = n, with k = 1 (k > 1 implies the existence of a vertex with alternate sum S + S + P = n and e > P). C. P. Avelino and A. F. Santos: S2 coverings by isosceles and scalene triangles ... 435 Figure 20: Local configurations. Now, 03 must be P or y. In the first case (Figure 22(b)), we observe that at vertex v3 we must have S+S+P = n, implying at vertex v4 the existence of an alternate angle sum containing a + P + 7 > n, which is an impossibility. On the other hand, if 63 = 7, the last configuration extends to the one illustrated in Figure 23. We denote this family of f-tilings by , where a + S = n, 2P + 7 + e = n and k7 = n, with k > 4. As 7 = k < P < S, P + y > S, using Equation (3.1) we get cos k + cos a cos P — cos a sin (P + 2k) sin P cos (P + 2k) n ^^ cos — cos k n n / n \ -<=>■ cos a = — cos —+ sec — cos P +-- k + 2k VP + 2k7 n / n \ n cos — cos P +—- + cos a cos —- = 0 k V 2k / 2k n n ^ i n ^ k Therefore, / n ni n \ \ a = ai (P) = arccos ( — cos — sec —- cos ( P +—- ) ) , k > 4, y V k 2k V 2k// " (a) (b) Planar representation of 7-L. Figure 21: Local configurations. C. P. Avelino and A. F. Santos: S2 coverings by isosceles and scalene triangles ... 437 Figure 23: Planar representation of Fk. 438 Ars Math. Contemp. 16(2019)203-213 with ft € (ft1 n,ftmax) , where n\k i n (1 n\ n ftiift = ma« —, arccos - sec —-- ftm 1 n ' k, V 2 2k J 2k and ft, 1 k max (k - 1)7 2F~ are obtained, respectively, when e = y or e = 5 and a = 5. Note that if e = 5, we get n n ( n — cos — sec — cos ft +-- k 2k Vft + 2k cos (2ft + k n ( 2 / „ n \ \ n (n n cos 2k (2 cos2 (ft + 2k) - 0 = - cos k cos (ft + 2k cos +1. \ = - cos k + Vcos2 k + 8cos22k VP + 2k/1 4 cos ^ 2k cos (ft + *) = - cos n + (2c°f 2k + 1) V^ 2k J 4 cos 2k / n \ 1 n cos ft +--= — sec —. Vft + 2k/ 2 2k The graph of a — ak(ft), for ftmkn < ft < ftmax, is outlined in Figure 24, for different values of k. Note that the condition e < 5 is equivalent to a < 2ft + k. Figure 24: a = ak (ft), with ftmkin < ft < ftmL, and for and for k = 4,5, 6,..., to. 3D representations of and are given in Figures 8(k) - 8(m). Case I.1.2.4.3: If 02 = e (Figure 19(a)), at vertex v1 we must have (i) ft + ft + ke = n, k > 1, (ii) ft + ft + ft + ke = n, k > 1 or (iii) ft + ft + y + ke = n, k > 1. C. P. Avelino and A. F. Santos: S2 coverings by isosceles and scalene triangles ... 439 Note that in all these cases k must be one, otherwise we reach a vertex with alternate sum S + S + ft = n and other vertex surrounded in cyclic order by (a, e, ft,...), which is not possible. In case (i), ft + ft + e = n, we obtain the planar representation of Figure 25. We denote Figure 25: Planar representation of Ik. this family of f-tilings by Ig, where a + S = n, 2ft + e = n and kY = n, with k > 3. Using Equation (3.1), we get a = ag (ft) = arccos cos ^ cos ftj , k > 3, with n ^cos2 n + 8 - cos n ma^< —, arccos —-k- k I ^ 4 k I 8 — c0s k I r, n k < ft < 2 , where the lower and upper bounds are obtained, respectively, when e = y or e = S and a = S. The graph of this function is outlined in Figure 26, for different values of k. Note that the condition e < S is equivalent to a < 2ft. 3D representations of 1$, for k = 3,4,5, are illustrated in Figures 9(n) -9(p). In case (ii), ft + ft + ft + e = n, using similar arguments applied before, the local configuration extends to the f-tiling H, obtained in Case 1.1.2.4.1. In the last case, by symmetry we obtain the families of f-tilings and Gk, k > 4, of Cases I.1.2.4.2 and I.1.2.3(ii), respectively. Case I.2: With the labeling of Figure 27(a), at vertex v\ we must have ft + S: or ft + S < n. Case I.2.1: Suppose firstly that ft + S = n. As S = ft = | implies y = f, we have S = ft. If S > ft, by Equation (3.1), we conclude that a > |, preventing a feasible assignment for and In turn, if S < ft, we obtain a vertex (v2) surrounded by four angles S. As 2S < ft + S = n, we would have 2S + p < n, with p G {a, ft, y, S, e}, which is not possible. n 440 Ars Math. Contemp. 16(2019)203-213 Figure 27: Local configurations. Case 1.2.2: Suppose now that ft + 5 < n. As in Case I.2.1, if 5 > f, we obtain a > n and no assignment for 61 and 02 is possible. Thus, 5 < f and, as any tiling has necessarily vertices of valency four, we have a > |. Now, observing Figure 27(a), we have 01 G {5, e, ft}. Case I.2.2.1: If 61 = 5, we obtain the configuration illustrated in Figure 27(b). Vertex v3 must have valency three, but in this case we get a + ft + 5 = n = 5 + e + 7, implying e > a, which is not possible. Case I.2.2.2: If 61 = e, the last configuration extends uniquely to the one illustrated in Figure 28. Note that at vertex v4, d2 must be ft and the vertex must have valency three C. P. Avelino and A. F. Santos: S2 coverings by isosceles and scalene triangles ... 441 Figure 28: Planar representation of J. and kY = n, with k > 4. Using Equation (3.1) we get cos n + cos a cos / / k — sin — (1 — cos a) 2 sin 4 2 cos — + cos a ^2 cos2 — — 1 J =2^1 — cos2 — ) (1 — cos a) 2 — n cos a = 2 sin2--cos —. 2 k Therefore, with = ak(—) = arccos ( 2 sin2 — — cos — ) , k > 4 — < — < 2arcsin k •y/1 + 8 cos n — 1 4 where the lower and upper bounds are obtained, respectively, when — = 7 and e = S. The graph of this function is outlined in Figure 29, for different values of k. 3D representations of J, for k = 4,5,6, are illustrated in Figures 10(q) - 10(s). Case I.2.2.3: Finally, if 01 = —, at vertex v3 (see Figure 27(a)) we have a + — < n. a + — = n = e + 7 implies e > a > f > S, which is a contradiction. As any tiling has necessarily vertices of valency four, we conclude that a + — + ke = n, k > 1, and a + S = n at vertex v2, as illustrated in Figure 30, configuration coincident with the one presented in Figure 16(b), which leads to the families of f-tilings Gk and Gk (Case I.1). □ a 442 Ars Math. Contemp. 16(2019)203-213 a Figure 29: a = af (£), with n < £ < ^fL, and for k = 4, 5, 6,..., to. References [1] A. M. R. Azevedo Breda, A class of tilings of S2, Geom. Dedicata 44 (1992), 241-253, doi: 10.1007/bf00181393. [2] A. Breda, R. Dawson and P. Ribeiro, Spherical f -tilings by two noncongruent classes of isosceles triangles - II, Acta Math. Sin. (English Series) 30 (2014), 1435-1464, doi:10.1007/ s10114-014-3302-5. [3] R. J. M. Dawson, Tilings of the sphere with isosceles triangles, Discrete Comput. Geom. 30 (2003), 467-487, doi:10.1007/s00454-003-2846-4. [4] R. J. M. Dawson and B. Doyle, Tilings of the sphere with right triangles I: The asymptotically right families, Electron. J. Combin. 13 (2006), #R48, http://www.combinatorics. org/ojs/index.php/eljc/article/view/v13i1r4 8. C. P. Avelino and A. F. Santos: S2 coverings by isosceles and scalene triangles ... 443 [5] R. J. M. Dawson and B. Doyle, Tilings of the sphere with right triangles II: The (1,3,2), (0,2 ,n) subfamily, Electron. J. Combin. 13 (2006), #R49, http://www. combinatorics.org/ojs/index.php/eljc/article/view/v13i1r49. [6] A. M. d'Azevedo Breda and A. F. Santos, Dihedral f-tilings of the sphere by spherical triangles and equiangular well-centered quadrangles, Beiträge Algebra Geom. 45 (2004), 447-461, https://www.emis.de/journals/BAG/vol.45/no.2/8.html. [7] A. M. R. d'Azevedo Breda and P. dos Santos Ribeiro, Spherical f-tilings by two non congruent classes of isosceles triangles - I, Math.. Commun. 17 (2012), 127-149, https://hrcak. srce.hr/82991. [8] S. A. Robertson, Isometric folding of Riemannian manifolds, Proc. Roy. Soc. Edinburgh Sect. A 79 (1978), 275-284, doi:10.1017/s0308210500019788. [9] Y. Ueno and Y. Agaoka, Classification of tilings of the 2-dimensional sphere by congruent triangles, Hiroshima Math. J. 32 (2002), 463-540, http://projecteuclid.org/euclid. hmj/1151007492. /^creative ^commor ARS MATHEMATICA CONTEMPORANEA ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 16 (2019) 445-463 https://doi.org/10.26493/1855-3974.1679.ad3 (Also available at http://amc-journal.eu) Ascending runs in permutations and valued Dyck paths* Marilena Barnabei Flavio Bonetti, Niccolo Castronuovo , Matteo Silimbani Dipartimento di Matematica, Universitä di Bologna, Bologna, 40126, Italy Received 18 April 2018, accepted 2 October 2018, published online 11 February 2019 Abstract We define a bijection between permutations and valued Dyck paths, namely, Dyck paths whose odd vertices are labelled with an integer that does not exceed their height. This map allows us to characterize the set of permutations avoiding the pattern 132 as the preimage of the set of Dyck paths with minimal labeling. Moreover, exploiting this bijection we associate to the set of n-permutations a polynomial that generalizes at the same time Eulerian polynomials, Motzkin numbers, super-Catalan numbers, little Schroder numbers, and other combinatorial sequences. Lastly, we determine the Hankel transform of the sequence of such polynomials. Keywords: Permutation, Dyck path, pattern avoidance, Hankel transform. Math. Subj. Class.: 05A05, 05A15, 05A19 1 Introduction Many bijections are present in the literature between the symmetric group Sn and the set of Dyck paths of semilength n with some kind of labeling on their steps (see e.g. [3, 8, 18]). In this paper, inspired by [3], we define a bijection r between permutations and valued Dyck paths, namely, Dyck paths whose odd vertices are labelled with an integer that does not exceed their height. More precisely, we write a permutation n as the juxtaposition of ascending runs, and associate to every integer i from 1 to n a pair of consecutive steps in the path according *This work was partially supported by the University of Bologna, funds for selected research topics. t Corresponding author. E-mail addresses: marilena.barnabei@unibo.it (Marilena Barnabei), flavio.bonetti@unibo.it (Flavio Bonetti), niccolo.castronuovo2@unibo.it (Niccolo Castronuovo), matteo.silimbani4@unibo.it (Matteo Silimbani) ©® This work is licensed under https://creativecommons.org/licenses/by/4.0/ 446 Ars Math. Contemp. 16 (2019) 445-463 to the fact that i is the unique element of an ascending run (a head-tail) in n or the initial (head), final (tail) or middle element (boarder) of an ascending run of length greater or equal to two. Every pair of consecutive steps is labelled with an integer that depends on the respective position of the ascending runs in n. Observe that a similar construction was described in [11] in terms of peaks, valleys, double descents and double rises of the permutation. Given a permutation n = n1n2... nn, it turns out that for i = 1, n the entry n is (i) a head if and only if it is a valley; (ii) a tail if an only if it is a peak; (iii) a head-tail if and only if it is double descent; (iv) a boarder if and only if it is a double rise. However, n1 and nn may play different roles in the two environments, and this fact leads to different results. The present construction seems to shed new light on combinatorial properties of permutations. In particular the results of Section 5 seem to be difficult to obtain with the construction in [11]. The map r allows us to characterize the set of permutations avoiding the pattern 132 (213, resp.) as the preimage of the set of Dyck paths with minimal (maximal, respectively) labeling. In these particular cases it is possible to translate the ascending runs of the permutation directly in terms of tunnels of the Dyck path. As a consequence we get a bijection between the permutations avoiding 132 and those avoiding 213 that is new, up to our knowledge. If a permutation avoids 132 its ascending runs are the blocks of a non-crossing partition. Hence our map provides also a bijection between Dyck paths and non-crossing partitions, that turns out to be the same as the bijection introduced in [24]. In Section 5 we consider monomials in the variables H, S, B associated with each permutation according to the number of heads, head-tails and boarders. In this way we construct a polynomial Fn(H,S,B) as the sum of such monomials over all the permutations of length n. These polynomials generalize at the same time Eulerian numbers, factorials and many other sequences. We exploit the results of the previous sections to deduce a recurrence relation for these polynomials and a functional equation for their generating function. We also determine the Hankel transform of the sequence (Fn)n>0, hence obtaining both new and known results about the Hankel transform of various specializations of these polynomials. Finally, we consider the sequence of polynomials Fn(H,S,B), defined as the sum of the monomials that correspond to permutations avoiding 132. These polynomials specialize in many well-known sequences related to Catalan and Motzkin numbers. 2 The bijection A Dyck path of semilength n is a lattice path contained in N x N, starting in (0,0), ending in (2n, 0), consisting of unitary north-east steps of the form (1,1) and of unitary south-east steps of the form (1, -1) and lying above the x-axis. The north-east steps are called up steps (denoted by U) and the south-east steps are called down steps (denoted by D). As usual, a Dyck path can be identified with a word w = SiS2... S2n of length 2n in the alphabet {U, D} with the constraint that the number of occurrences of the letter U is equal to the number of occurrences of the letter D and, for every i, the number of M. Barnabei at al.: Ascending runs in permutations and valued Dyck paths 447 occurrences of U in the subword S1S2... Sj is not smaller than the number of occurrences of D. The word w is called a Dyck word. In the following we will not distinguish between a Dyck path and the corresponding word. We denote by Dn the set of Dyck path of semilength n. Given a Dyck path d e Dn, decompose it into 2-step subpaths d = d1d2...dn. The subpaths dj will be called dimers and the decomposition d = d1... dn will be called the dimer decomposition of d. For every i = 1,..., n, let kj be the y-coordinate of the middle point of the dimer dj. We associate to d the n-tuple m(d) = (m1, m2,..., mn), where mj = t1. We will call the integer mj the height of the dimer dj, and the n-tuple m(d) the height list of d. Example 2.1. Consider the Dyck path d = UU|UU|DD|UD|DD in Figure 1. Then Figure 1: The Dyck path d = UU|UU|DD|UD|DD. m(d) = (0, 1,1,1, 0). Let n = n1n2... nn be a permutation in Sn written in one-line notation. An ascending run in n is a maximal increasing subsequence of n. For example, the ascending runs of 346512 are w1 = 346, w2 =5 and w3 = 12. Write n as n = w1w2 . .. wk, where the wj's are the ascending runs in n. Let hj and tj be the first and the last element of wj. Note that hj and tj can coincide. We call hj and tj the head and the tail of wj. Clearly tj > hj+1 for 1 < i < k — 1. Now we associate to every permutation of length n a Dyck path d of semilength n defined as follows. For i = 1,..., n, (i) if i is both a head and a tail, set dj = UD; (ii) if i is a head but not a tail, set dj = UU; (iii) if i is a tail but not a head, set dj = DD; (iv) if i is neither a head nor a tail, set dj = DU. Then d = d1d2 ... dn. Obviously the correspondence y: n ^ d is far from being injective. For example, both the permutations 3124 and 1243 in S4 correspond to the Dyck path UUDUUDDD. In order to get a bijection, we associate to the permutation n a valued Dyck path, namely a pair (d, l), where d is the Dyck path defined above and l = (11,12,..., 1n) is the sequence of non-negative integers given by 1j = |{j I hj < i < tj, tj precedes i in n}|. 448 Ars Math. Contemp. 16(2019)203-213 Example 2.2. Consider the permutation n = 1254367. The ascending runs of n are wi = 125, w2 =4 and w3 = 367. The heads and the tails of n are h1 = 1, h2 = 4, h3 = 3, t1 = 5, t2 = 4, and t3 = 7. The Dyck path associated with n is d = UU|DU|UU|UD|DD|DU|DD (in Figure 2). and the list l associated with the permu- Figure 2: The Dyck path d = UU|DU|UU|UD|DD|DU|DD. tation n is (0,0,1,1,0,0,0). We denote by r(n) the valued Dyck path associated with the permutation n. The next proposition describes the connection between the list l associated with n and the height list m(d). Proposition 2.3. Let n be a permutation in Sn. Set r(n) = (d, l), with l = (11,..., 1n). Let m(d) = (m1,..., mn) be the height list of d. Then, for all 1 < i < n, k < mj. Proof. Let i be an integer such that 1 < i < n. If d = d1d2... dn is the dimer decomposition of d, the integer m; can be written as mj = |{j | dj = UU, 0 < j < i}| - |{j | dj = DD, 0 < j < i}| - e where {0 if the first step of d; is an up step; 1 if the first step of d; is a down step. We notice that, denoting by hj and tj the j-th head and tail of n, respectively, the integer |{j | dj = UU, 0 < j < i}| is the number of heads hj such that hj < i, while |{j | dj = DD, 0 < j < i}| is the number of tails tj such that tj < i. Hence m; = |{j | hj k2 > k1. A similar argument can be used for the general case. Example 2.5. Consider the path d = UU| UD | UU| DD |DU|DD | UU| DD (see Figure 4). Then, m(d) = (0,1,1,1,0,0,0,0). In order to construct A(d, (0,0,0,1,0,0,0,0)), we apply the procedure P iteratively, starting with the triple (d, (1, 2, 3,4, 5, 6, 7, 8), (0, 0,0,1,0, 0, 0,0)). We represent the triple (d, A, l) as a Dyck path with the tags written below the path, while each integer k is placed close to the respective dimer dj. A dashed line is drawn for every height m.j. The white dots represent the vertices involved in the application of P. Figure 4: The Dyck path d = UU|UD|UU|DD|DU|DD|UU|DD. At the first application of P we have i = 4, d4 = DD, j = 1, k = 0, A1 = 1 and A4 = 4. The last ascending run of the permutation n is w1 = 14 and we get the new triple (see Figure 5): (UDUUDUDDUUDD, (2, 3, 5,6,7,8), (0,0,0,0,0,0)). Figure 5: Output of the first application of P. M. Barnabei at al.: Ascending runs in permutations and valued Dyck paths 451 At the second application of P, i = 1, d1 = UD, and Ai = 2, hence the permutation n ends now by w2w1 = 214. The output is now the triple (see Figure 6): (UUDUDDUUDD, (3, 5, 6, 7,8), (0,0,0,0,0)). Figure 6: Output of the second application of P. At the third step, i = 3, d3 = DD, j = 1, k = 1, j1 = 2, A1 = 3, A2 = 5, A3 = 6, so the permutation n ends now by w3w2 w1 = 356214 and we get the new triple (see Figure 7): (UUDD, (7, 8), (0,0)). Figure 7: Output of the third application of P. At this step we have i = 2, d2 = DD, j = 1, k = 0, Ai = 7, A2 = 8. Since the application of P produces now the empty triple, the permutation A(d, l) is n = 78356214. The following result assures that the maps r and A are inverse of each other. The proof is based on an alternative description of the map r. Although this description is more complicated than the previous one, it is the most suitable for that purpose. Theorem 2.6. Let n be a permutation of length n. Then A(r(n)) = n. Moreover, let (d, l) be an element of DLn. Then r(A(d,/)) = (d,l). 452 Ars Math. Contemp. 16(2019)203-213 Proof. The map r can be described as the result of the iteration of the following procedure Q. The procedure Q takes as input a triple (d, A, l) and an increasing sequence of numbers w where, as usual, [d, A] is a tagged Dyck path of semilength r, (d, l) G DLr and the elements of w are different from the elements of A. Q produces a triple (d', A', l') with the same properties, with d' a Dyck path of greater semilength. Set A = (Ai,..., Ar), l = (li,..., lr), w = xi... xk, and let d = di... dr, be the dimer decomposition of d. Hence, Ai is the tag of dj. Then (I) The new list of tags A' is the union of A with the elements of w. (II) For i = 1,..., k define a new dimer df as follows. Then the path d' is ej1 ei2 ... eik+r, written in increasing order of the corresponding tags. Roughly speaking, the new path is obtained by interlacing the new dimers with the dimers of d, following the increasing order of the tags in A'. (III) Set m(d') = (mi, m^,..., mr+k). The sequence l' is (l',..., l'r+k), where lj = lti if i is an index corresponding to a symbol in A, and l' = mj if i is an index corresponding to a symbol in w. For every permutation n G Sn, let n = wi^ ... wk be the decomposition of n into ascending runs. The pair r(n) is obtained by applying k times the procedure Q, starting from the empty triple, and using the increasing sequence wi at the i-th application of Q, 1 < i < k. It is easily seen that the procedures P and Q are inverse of each other. □ As a consequence of the preceding theorem we have that the map r is a bijection between the set of permutations of length n and the set DLn. Hence 3 Properties of the map r Given a permutation a G Sn, one can partition the set {1, 2,..., n} into intervals Ax,..., At so that a(Aj) = Aj for every i. The restrictions of a to the intervals in the finest of these decompositions are called connected components of a. A permutation a with a single connected component is called connected. The right connected components of a = axa2... an are the connected components of the reverse R(a) = anan-1... ax UD if i = 1 = k UU if i = 1 < k DU if 1 < i < k DD if 1 < i = k. Tag the dimer di with the symbol xj. Set {ei, e2,. .., efc+r} = {di,.. ., dr} U {di,. .., dk}. | VLn | = n!. M. Barnabei at al.: Ascending runs in permutations and valued Dyck paths 453 of a. A permutation is said to be right connected if R(a) is connected. As an example, the right connected components of the permutation 45132 are 45 and 132 while the permutation 2314 is right connected. The function r maps right connected permutations to irreducible Dyck paths. We recall that a return of a Dyck path d is a down step whose ending point lies on the x-axis. An irreducible Dyck path is a Dyck path whose only return is its last step. Every Dyck path d can be uniquely written as d = pip2...pfc, where each pi is an irreducible Dyck path. Proposition 3.1. Let n be a permutation in Sn and let n = m1m2 ... uk be the decomposition of n into right connected components. Let r(n) = (d, /). Then d decomposes into irreducible components dk ... d1, where di is the path corresponding to the normalization of ui. Proof. The assertion follows immediately from the definition of the map r. □ Example 3.2. Consider the same pair (d, /) G DL8 as in Example 2.5 and the corresponding permutation n = 78356214. We have that the right-connected components of n are 78 and 356214. The Dyck path corresponding to the permutation 356214 is UUUDUUDDDUDD, the Dyck path corresponding to the normalization of 78, i.e., to the permutation 12, is UUDD, and these are precisely the irreducible components of the Dyck path d. Denote by RC(n) the reverse-complement of the permutation n, namely, if n = nin ... n„, then RC(n) = (n + 1 - n„)(n +1 - n„_i)... (n +1 - ni). The following assertion relates the images of the permutations n and RC(n) under the map r. Proposition 3.3. Let n a permutation and let r(n) = (d,/). Then r(RC(n)) = (d', /') where d' is the path obtained from d by reflecting the path d along a vertical line, and /' = m„+i_i - /„+i_i, 1 < i < n. Proof. Let w1... wk be the decomposition of n G Sn into ascending runs with wi = xi,1... xi ii. For all i, set yijj = n +1 - xijli+1_j. Then the decomposition into ascending runs of RC(n) is w ... wi with Wi = yi,1... yi,li. The assertion follows now immediately from the definition of the map r. □ Example 3.4. Consider the permutation n = 78356214 of Example 2.5. Hence RC(n) = 58734612. We have r(n) = (d, /), where d = UUUDUUDDDUDDUUDD and / = (0,0,0,1,0,0,0,0). The height list of d is m(d) = (0,1,1,1,0,0,0,0). Then r(RC(n)) = (d',/') with d' = UUDDUUDUUUDDUDDD and /' = (0,0,0,0,0,1,1,0). Now we define a map $: Sn ^ Sn. Let n G Sn and w1... wk its decomposition into ascending runs. Given two consecutive ascending runs wi and wi+1, we say that they are 454 Ars Math. Contemp. 16(2019)203-213 contigue if wi+1wi is an increasing sequence of integers or, equivalently, if the tail of wi+1 is smaller than the head of wj. Then we consider the decomposition of n = B1... Bh where the B/s are maximal sequences of contigue ascending runs. We define the image of n under the map $ as follows: $(n) = Bh ...Bi. For example, if n = 5623147, then B1 = 5623, B2 = 147 and $(n) = 1475623. Note that $ is an involution, namely, $2 is the identity over Sn. Theorem 3.5. Let n G Sn. Then r(n) = (d,/) ifandonlyif r($(n)) = (d, m(d) - /). Proof. Let r(n) = (d,/) and r($(n)) = (d',/'). Since permutation $(n) has the same heads and tails as n, d = d'. Moreover the definition of the map $ implies immediately that /' = m(d) - /. □ It follows from Proposition 3.3 and Theorem 3.5 that $ o RC = RC o$. 4 Pattern avoiding permutations Let n G Sn and t g Sm. We say that n = n1... nn contains the pattern t = t1 ... Tm if there exists an index subsequence 1 < i1 < i2 < ... < im < n such that nij < nik iff Tj < Tk for 1 < j, k < m. Otherwise, n avoids the pattern t. The set of permutations of length n that avoid the pattern t is denoted by S„(t). In this section we study the behavior of the map r when restricted to some subsets of pattern-avoiding permutations. 4.1 Permutations avoiding 132 The following proposition shows that the set Sn(132) corresponds to a particular subset of DLn. Proposition 4.1. Let n G Sn and let r(n) = (d, /). Then n G S„(132) ifandonlyif / = (0,..., 0). Proof. Set / = (/1,..., /„). We recall that /i = |{j I hj < i < tj, tj precedes i in n}|. Suppose that there exists an index i such that /i > 0. Then there are at least a head hj and a tail tj with hj < i < tj such that tj precedes i in n. As a consequence, hj tj i is an occurrence of 132 in n. This suffices to conclude the proof, since both the cardinalities of Sn(132) and Dn are given by the n-th Catalan number (see [21] and [23], respectively). □ Many bijections between 132-avoiding permutations and Dyck paths are present in the literature (see [12, Chapter 4] for an exhaustive description). The preceding proposition implies that the map r, when restricted to the set Sn(132), provides yet another one bijection between this set and Dn, whose inverse has an easy description in terms of multitunnels. M. Barnabei at al.: Ascending runs in permutations and valued Dyck paths 455 Given a Dyck path d, a multitunnel in d is a maximal horizontal segment between two lattice points of d lying always below d (see [9]). A multitunnel can consist of a single point. For our purpose we will be interested in odd multitunnels, namely, multitunnels whose points have odd y-coordinate. For example, the three odd multitunnels of the path in Figure 8 are the dashed segments (one of them reduces to a point). Figure 8: A Dyck path with three odd multitunnels (denoted with dashed segments). Proposition 4.2. Let d be a Dyck path and n be the corresponding permutation in Sn (132), namely n = A(d, (0,..., 0)). Consider the tagged Dyck path [d, (1,..., n)]. Every ascending run of n is given by the tags of the points of d lying on the same odd multitunnel. Moreover, the sequence of the heads of n is a decreasing sequence. Proof. At the first application of the procedure P the first chosen dimer is the dimer containing the first return of d, and the removed tags correspond to the dimers at height 0 in the leftmost irreducible component of d, whose middle points are precisely the points of the leftmost and lowest odd multitunnel. The same argument can be used for the following steps. □ Example 4.3. Consider the Dyck path d in Figure 9. The three multitunnels of d contain the points whose tags are {1,4, 6}, {2,3}, {5}, and the corresponding permutation in S6(132) is 523146. We recall that a descent of a permutation n is an index i, 1 < i < n - 1, such that n > ni+1. If n = wi... wk is the decomposition of n into ascending runs, a descent of n occurs at the end of each ascending run, except the last one: Hence, the descents of n are given by the positions of the first k - 1 tails. Since it is well known (see e.g. [4]) that the number of permutations in Sn(132) with h descents is the Narayana number 2 3 4 5 6 Figure 9: A Dyck path with three multitunnels. 456 Ars Math. Contemp. 16 (2019) 445-463 we get that the Dyck paths of semilength n with h odd multitunnels are counted by the Narayana number N(n, h). 4.2 Non-crossing partitions The set of 132-avoiding permutations of length n corresponds bijectively to the set of non-crossing partitions of {1, 2,..., n}. Such partitions were introduced by Kreweras in [15] and extensively studied by many authors in recent years (see [1, 17, 19, 22], to name but a few). A partition of the set {1, 2,..., n} is said to be non-crossing if, whenever four elements a,b,c,d G {1,..., n} with a < b < c < d are such that a, c are in the same block and b, d are in the same block, then the two blocks coincide. We denote by NC(n) the set of non-crossing partitions of {1,..., n}. As usual (see e.g. [19]) we represent non-crossing partitions graphically by plotting n points on the real line labelled with 1, 2,..., n and joining points corresponding to successive elements of the same block by arcs. Since we consider a non-crossing partition, the arcs of this diagram do not intersect in points different from 1,2,... ,n. For example, the non-crossing partition whose blocks are {1,5}, {2, 3}, {4}, {6,7,8} is graphically represented in Figure 10. Figure 10: The non-crossing partition with blocks {1,5}, {2, 3}, {4}, {6,7,8}. Many bijections between Sn(132) and NC(n) are available in the literature (see e.g. [19, 24]). The following proposition provides another bijection between these two sets. Proposition 4.4. The permutation n G Sn avoids 132 if and only if (a) the heads of n are in decreasing order and (b) the partition of n given by the ascending runs of n is a non-crossing partition. Proof. Proposition 4.2 implies immediately that if the permutation n avoids 132 conditions (a) and (b) are fulfilled. Conversely, let n be a permutation containing an occurrence of 132. Let nk be this occurrence. Without loss of generality, suppose that n is the head of an ascending run. If nj is in the same ascending run, nk is surely in a different ascending run whose head we denote by h. If h > n.j, condition (a) is not satisfied. If h is smaller than n, the quadruple h, nj, nk, nj does not satisfy condition (b). If nj and nk are in different ascending runs, denote by h the head of the ascending run containing nk. If h > n.j, condition (a) is not satisfied. If h < nj, the triple h, nj, nk is an occurrence of 132 with h and nj in the same ascending run. This completes the proof. □ The result of the previous proposition induces a bijection between non-crossing partitions and Dyck paths. The same bijection can be found in [24, Proposition 2.1]. M. Barnabei at al.: Ascending runs in permutations and valued Dyck paths 457 4.3 Permutations avoiding 213 We now turn our attention to the pattern 213. We recall that, since RC(132) = 213, we have n G Sn(132) whenever RC(n) G Sn(213). Hence, Proposition 3.3 implies immediately the following results: Proposition 4.5. Let n G Sn and let r(n) = (d, l). Then n G Sn(213) if and only if l = m(d). Proposition 4.6. Let d be a Dyck path and n be the corresponding permutation in Sn (213), namely, n = A(d, m(d)). Consider the tagged Dyck path [d, (1,..., n)]. Every ascending run of n is given by the tags of the points of d which lie on the same odd multitunnel. The sequence of the tails of n is a decreasing sequence. The preceding results imply that the map when restricted to Sn(132), becomes a bijection onto Sn(213) that can be described as follows. Proposition 4.7. Consider a permutation n G Sn(132) whose decomposition into ascending runs is n = w\... wk. The corresponding permutation $(n) in Sn(213) is the permutation with the same ascending runs rearranged so that the tails are in decreasing order For example, if n = 56 23147 then $(n) = 147 56 23. To the best of our knowledge, this map is new. Let n G Sn. A left-to-right (LR) minimum of n is an element n of n such that n < nj for all j < i. Similarly, a right-to-left (RL) maximum is an element n such that nj < n for all j > i. The next proposition describes the behavior of the map $ with respect to the statistics "number of LR minima", "number of RL maxima", and "number of descents". Proposition 4.8. Let n be a permutation in Sn(132). Then the permutations n and $(n) have the same number of descents. Moreover, the number of LR minima of n equals the number ofRL maxima of $(n). Proof. Since n G Sn(132), the heads of its ascending runs are in decreasing order, hence they are precisely the LR minima of n. Similarly, the tails of $(n) are its RL maxima. Finally, we recall that a permutation with k ascending runs has k — 1 descents. The proof now follows immediately by Proposition 4.7. □ 5 Polynomials associated with permutations and their Hankel transform Now we associate with a permutation n G Sn the monomial 6(n) = H\sIHTnlBIBn' (tails are not considered because they are always in bijection with heads). Note that if Y (n) = Y (a ), namely, n and a correspond to the same Dyck path, then 6(n) = 0(a). Set Fn(H, S, B) = ^ 0(n)= ^ ah,s,b,nHhSsBb, nES„ h,s,b>0 where ah,Sjb,n is the number of permutations of Sn with h proper heads, s head-tails, and b boarders. Note that ahs^n = 0 when 2h + s + b = n. 458 Ars Math. Contemp. 16(2019)203-213 We want to study the generating function F (H, S, B, X ) — ^ F„Xn = ^ ah,sA„F hS sBb Xn. %>0 h,s,b,n> 0 We recall that every permutation in Sn can be obtained from a permutation in Sn-1 by adding the symbol n in any position. Table 1 shows how each insertion of the element n between the entries a and b into a permutation n G Sn-1 modifies the number of proper heads, proper tails, head-tails and boarders (in this table, e denotes the empty word). Table 1: The insertion of n between two symbols a and b of a G S n— 1. a b becomes a n b h t h t ht h b h t h ht h h t h ht ht h t ht b b b t h b t b t ht t h b t h t ht b t ht e h e ht h e ht e ht ht t e b t e ht e h t e We have the following mutually exclusive options: (i) n is placed immediately after a tail. In this case, the number of boarders increases by one. (ii) n is placed immediately before a tail. In this case, the number of head-tail increases by one. (iii) n is placed immediately before a boarder. In this case, the number of boarders decreases by one while the number of heads and tails increases by one. (iv) n is placed immediately after a head-tail. In this case, the number of head-tails decreases by one while the number of heads and tails increases by one. (v) n is placed at the first position. In this case, the number of head-tail increases by one. As a consequence we have ah,s,b,n — hah,s,b—1,n—1 + h ah,s — 1,b,n— 1 + bah—1,s,b+1,n—1 + s ah—1,s + 1,b,n —1 + ah,s —1,b,n—1, with the obvious boundary conditions. This recurrence relation shows that the polynomials Fn(H, S, B) satisfy (5.1) Fn (HB + HS) ^ + H^^1 + dFn—1 )+ S • Fn—1 dH dB dS Vn > 1, M. Barnabei at al.: Ascending runs in permutations and valued Dyck paths 459 with F0 = 1 . As a consequence we get the following functional equation for the generating function F (H, S, B, X): F = 1 + X 0 is given by Hm(m+1)/2 • ^(il)2 i=0 'm> 0 Proof. To prove the result we use the Gessel-Viennot lemma (see e.g. [2, p. 217]). Consider in the lattice plane the two sets of points {A0, A1,..., Am} and {B0, B1,..., Bm} with A = (—2i, 0) and Bj = (2j, 0). For every permutation p of the set {0,1,..., m} consider a set p0, p1,..., pm of m + 1 valued Dyck paths such that p starts at A and ends at Bp(i). Each valued Dyck path with initial point A and ending point Bj corresponds to a permutation in Si+j, by the results of Section 2. As we noticed above, for any Dyck path d, all the permutations a such that 7(a) = d share the same monomial 0(a). For this reason, this monomial will be denoted by 0(d). Associate with the (m + 1)-tuple p0,p1,... ,pm, where p = (dj, 1(i)), the monomial n™0 0(dj). This monomial will be called the weight of the (m + 1)-tuple. Consider the set of points = (0,2k), with 0 < k < m. Notice that every path do, d1,..., dm contains exactly a point . There are only two possibilities: (i) there are at least two paths among d0,..., dm that intersect in one of the points Ck, 0 < k < m - 1; (ii) p is the identity permutation and d = U2iD2i, i configuration the trivial (m + 1)-tuple. 0,..., m. We will call this bn = det Hn a n 460 Ars Math. Contemp. 16(2019)203-213 We define a weight-preserving involution over the set of non trivial (m + 1)-tuples of valued Dyck paths. This involution changes the sign of the corresponding permutation of {0,1,..., m}. Given a (m + 1)-tuplep0,p1,... ,pm, withp^ = (di, 1(i)), find the greatest value of k such that there exist at least two paths intersecting at Ck, 0 < k < m - 1. Take the two paths di and dj that intersect in Ck with minimal indices. Then associate with the (m + 1)-tuplepo,p1,... ,pm anew (m + 1)-tuple q0, q1,... ,qm as follows: (i) if s = i,j, qs = ps; (ii) qi goes from Ai to Ck along pi and along pj from Ck to Bp(j). Similarly, qj goes from Aj to Ck along pj and along pi from Ck to Bp(i). The tags of the new paths are defined accordingly. By the construction of the map r and its inverse A, we have that E °(d) = Fn(H,S,B), (d,l)eVLn hence, the polynomial associated to the valued Dyck paths from Ai to Bj is precisely Fi+j. As a consequence, by the Gessel-Viennot lemma, the determinant of the m-th Hankel matrix of the sequence (Fn(H, S, B))n>0 is equal to the product of the monomials corresponding to non-intersecting valued Dyck paths, precisely, valued Dyck paths starting at Ai and ending at Bi, of the form U2iD2i, for all 0 < i < m. Note that there are ((i)!)2 such valued Dyck paths, each of which has monomial Hi. This completes the proof. □ Here we mention some specializations of the polynomials Fn. The preceding theorem allows us to compute the Hankel transform of all the following sequences, specializing the variable H accordingly. The first one of these Hankel transforms was previously obtained (see [6]). The other three are new, to the best of our knowledge. 1. Recalling that 2h + b + s = n, am,n • ^ ^ ah,s,n-2h-s,n h+s=m h,s>0 s+2h0 is given by { h m(m+1)/2\ V / m>0 Proof. The proof is similar to the previous one, keeping in mind that permutations avoiding the pattern 132 correspond bijectively to valued Dyck paths where the sequence l is identically zero. □ Also in this case suitable specializations yield well-known results. 1. Specializing B = 1 and H = S = t the polynomials Fn turns out to be the Narayana polynomials (see e.g. [16]). 2. If B = t and H = S =1, Fn(t) is the generating function of the set of n-permutations that avoid the pattern 132 where the variable t takes into account the occurrences of the consecutive pattern 123. An explicit formula for the generating function J2n>0 can be found in [5]. In particular, when t = 0, Fn is the n-th Motzkin number. Theorem 5.2 implies that this sequence is among the many sequences whose Hankel transform is the constant sequence (1)n>0. 3. When H = B = 2, S =1, (Fn) is the sequence of super-Catalan numbers or little Schroeder numbers (sequence A001003 in [20]). These numbers are known to count Motzkin paths of length n — 1 where every up step has two colors and every horizontal step has three colors. It is easy to find a bijection between this set and the set of Dyck path of semilength n where the diods UU and DU have two colors. 4. If H = t and B = S =1, where t is a positive integer, Fn turns out to be the number of lattice paths from (0,0) to (2n, 0) composed by steps of the form U = (1,1), D = (1, —1) and L = (3,1), where the L steps have t — 1 colors. In fact it is possible 462 Ars Math. Contemp. 16(2019)203-213 to find a bijection between this last set and the set of Dyck paths of semilength n where diods UU have t colors. To define such a bijection consider a Dyck path of semilength n where each diod UU has t colors. Replace each diod UU labelled with the color k, 1 < k < t - 1 with an L step with the same color and replace the corresponding diod DD with a step D. If a diod UU is labelled with the color t, leave it and the corresponding DD unchanged. Leave also the diods UD and DU unchanged. This is the required bijection. Note that this last case reduces to sequence A052709 in [20] when t = 2 and to sequence A129147 when t = 3. Theorem 5.2, applied to the particular cases above, shows that the Hankel transform of all the previous sequences is given by specializing H accordingly. References [1] M. Aigner, Catalan and other numbers: a recurrent theme, in: H. Crapo andD. Senato (eds.), Algebraic Combinatorics and Computer Science: A tribute to Gian-Carlo Rota, Springer-Verlag Italia, Milan, pp. 347-390, 2001, doi:10.1007/978-88-470-2107-5_15. [2] M. Aigner, A Course in Enumeration, volume 238 of Graduate Texts in Mathematics, Springer, Berlin, 2007, doi:10.1007/978-3-540-39035-0. [3] J.-C. Aval, A. Boussicault and S. Dasse-Hartaut, Dyck tableaux, Theoret. Comput. Sci. 502 (2013), 195-209, doi:10.1016/j.tcs.2011.11.038. [4] M. Barnabei, F. Bonetti and M. Silimbani, The descent statistic on 123-avoiding permutations, Sém. Lothar. Combin. 63 (2010), Article B63a (8 pages), https://www.mat.univie. ac.at/-slc/wpapers/s6 3barnbosi.html. [5] M. Barnabei, F. Bonetti and M. Silimbani, The joint distribution of consecutive patterns and descents in permutations avoiding 3-1-2, European J. Combin. 31 (2010), 1360-1371, doi: 10.1016/j.ejc.2009.11.011. [6] P. Barry, Eulerian polynomials as moments, via exponential Riordan arrays, J. Integer Seq. 14 (2011), Article 11.9.5 (14 pages), https://cs.uwaterloo.ca/journals/JIS/ VOL14/Barry7/barry172.html. [7] M. Bona, Combinatorics of Permutations, Discrete Mathematics and Its Applications, Chapman & Hall/CRC, Boca Raton, Florida, 2004, doi:10.1201/9780203494370, with a foreword by Richard Stanley. [8] R. Cori, Indecomposable permutations, hypermaps and labeled Dyck paths, J. Comb. Theory Ser.A 116 (2009), 1326-1343, doi:10.1016/j.jcta.2009.02.008. [9] S. Elizalde and E. Deutsch, A simple and unusual bijection for Dyck paths and its consequences, Ann. Comb. 7 (2003), 281-297, doi:10.1007/s00026-003-0186-y. [10] S. Elizalde and M. Noy, Consecutive patterns in permutations, Adv. Appl. Math. 30 (2003), 110-125, doi:10.1016/s0196-8858(02)00527-4. [11] J. Francon and G. Viennot, Permutations selon leurs pics, creux, doubles montees et double descentes, nombres d'Euler et nombres de Genocchi, Discrete Math. 28 (1979), 21-35, doi: 10.1016/0012-365x(79)90182-1. M. Barnabei at al.: Ascending runs in permutations and valued Dyck paths 463 [12] S. Kitaev, Patterns in Permutations and Words, Monographs in Theoretical Computer Science, Springer, Heidelberg, 2011, doi:10.1007/978-3-642-17333-2, with a foreword by Jeffrey B. Remmel. [13] C. Krattenthaler, Advanced determinant calculus, Sem. Lothar. Combin. 42 (1999), Article B42q (67 pages), https://www.mat.univie.ac.at/ ~slc/wpapers/s42kratt. html. [14] C. Krattenthaler, Advanced determinant calculus: a complement, Linear Algebra Appl. 411 (2005), 68-166, doi:10.1016/j.laa.2005.06.042. [15] G. Kreweras, Sur les partitions non croisees d'un cycle, Discrete Math. 1 (1972), 333-350, doi:10.1016/0012-365x(72)90041-6. [16] M. D. Petkovic, P. Barry and P. Rajkovic, Closed-form expression for Hankel determinants of the Narayana polynomials, Czechoslovak Math. J. 62 (2012), 39-57, doi:10.1007/ s10587-012-0015-8. [17] H. Prodinger, A correspondence between ordered trees and noncrossing partitions, Discrete Math. 46 (1983), 205-206, doi:10.1016/0012-365x(83)90255-8. [18] A. Randrianarivony, Correspondances entre les differents types de bijections entre le groupe symetrique et les chemins de Motzkin values, Sem. Lothar. Combin. 35 (1995), Article B35h (12 pages), https://www.mat.univie.ac.at/~slc/wpapers/ s35arthur.html. [19] R. Simion, Combinatorial statistics on non-crossing partitions, J. Comb. Theory Ser. A 66 (1994), 270-301, doi:10.1016/0097-3165(94)90066-3. [20] N. J. A. Sloane (ed.), The On-Line Encyclopedia of Integer Sequences, published electronically at https://oeis.org. [21] R. P. Stanley, Enumerative Combinatorics, Volume I, The Wadsworth & Brooks/Cole Mathematics Series, Wadsworth & Brooks/Cole Advanced Books & Software, Monterey, California, 1986, doi:10.1007/978-1-4615-9763-6. [22] R. P. Stanley, Parking functions and noncrossing partitions, Electron. J. Combin. 4 (1997), #R20 (14 pages), https://www.combinatorics.org/ojs/index.php/eljc/ article/view/v4i2r2 0. [23] R. P. Stanley, Enumerative Combinatorics, Volume 2, volume 62 of Cambridge Studies in Advanced Mathematics, Cambridge University Press, Cambridge, 1999, doi:10.1017/ cbo9780511609589. [24] C. Stump, More bijective Catalan combinatorics on permutations and on signed permutations, J. Comb. 4 (2013), 419-447, doi:10.4310/joc.2013.v4.n4.a3. ARS MATHEMATICA CONTEMPORANEA ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 16 (2019) 465-472 https://doi.org/10.26493/1855-3974.1699.74e (Also available at http://amc-journal.eu) Some extensions of optimal stopping with financial applications Mihael Perman * Faculty of Mathematics and Physics, University of Ljubljana, Jadranska 19, SI-1000 Ljubljana, Slovenia and University of Primorska, Faculty of Mathematics, Natural Sciences and Information Technologies, Glagoljaska 8, SI-6000 Koper, Slovenia Ana Zalokar t University ofPrimorska, Faculty ofMathematics, Natural Sciences and Information Technologies, Glagoljaska 8, SI-6000 Koper, Slovenia and University of Primorska, Andrej Marusic Institute, Muzejski trg 2, SI-6000 Koper, Slovenia Received 15 May 2018, accepted 19 June 2018, published online 22 February 2019 Finite horizon optimal stopping problems for Markov chains are a well researched topic. Frequently they are phrased in terms of cost or return because many financial models are based on Markov chains. In this paper we will apply optimal stopping to certain random walks on binary trees motivated by insurance considerations. The results are direct extensions of known results but the implications for insurance are of interest. Keywords: Optimal stopping for Markov chains, equity-linked life insurance with guarantees. Math. Subj. Class.: 60G40, 91B30 1 Introduction Modern insurance regulation requires companies to apply market valuation to assets and liabilities. The value of assets can be determined directly from market prices, or through appropriate approximations using fair value methodology. For insurance liabilities, however, there is no regulated market to determine their value. The particular case that we *This work is supported in part by the Slovenian Research Agency (research program P1-0285). ^This work is supported in part by the Slovenian Research Agency (research program P1-0285 and Young Researchers Grant). E-mail addresses: mihael.perman@fmf.uni-lj.si (Mihael Perman), ana.zalokar@iam.upr.si (Ana Zalokar) Abstract ©® This work is licensed under https://creativecommons.Org/licenses/by/4.0/ 466 Ars Math. Contemp. 16 (2019) 445-463 will be considering here are equity-linked life policies with guarantees. The policyholder invests her premium in an underlying fund managed by the insurance company. A typical example are long term pension saving products. In recent years there has been a tendency to attach guarantees such as a minimum return or a minimum death benefit guarantee to these investments which gives rise to new liabilities. In many cases guarantees can be interpreted as contingent claims on the underlying fund, for example guarantees in equity-linked products or complementary health policies with equalization schemes, see [10]. Nonnenmacher was one of the first authors to interpret guarantees as put options on the value on the underlying fund, [8] and [7]. Once a stochastic model for the dynamics of the fund value is formulated, the liabilities arising from guarantees can be valued using the methods to value derivative securities. Paper [6] considers equity-linked products as contingent claims on the value of the underlying asset but introduces mortality as an independent additional source of randomness. The assumption of independence is often made, see [5] for some implications. With this addition the model is no longer complete and the paper considers optimal hedging strategies that minimize the expected cost for the insurer. In this paper we will present some extensions of optimal stopping rules motivated by financial questions in insurance. The proofs follow the steps of classical proofs but the formulation of the problems is slightly different. These results will then be applied to investigate relative merits of different ways an insurance company can hedge its liabilities. The models are simplified versions of reality but can shed some light on what strategies may lead to best results. 2 Variations of optimal stopping rules The classical finite horizon optimal stopping problem for a general finite length inhomoge-neous Markov chain X0, X1,..., XN and general state space is to minimize the expression E v-1 g(X„) + £ c(Xj) j=1 (2.1) where v runs over all stopping times with respect to the filtration of the Markov chain, and g and c are given functions. For the sake of simplicity it will be assumed that g and c are bounded. For Markov chains it is enough to solve the problem assuming that X0 = x for x in the state space. Denote the value function vN by vN (x) = inf E {v:P (v 0 : Vj (Xj) = g(Xj)} . (2.4) M. Perman and A. Zalokar: Some extensions of optimal stopping with financial applications 467 See [9] for proofs. The above stopping problem has many possible extensions and generalizations. For the financial application in this paper we will minimize the expression E v — 1 gv (Xi,...,Xv ) + £ Cj (Xi,...,Xj ) j=i (2.5) for all stopping times v < N for given functions c1,... ,cN and gi,...,gN. The dynamic programming equations in this more general setup are Vn (xo,..., Xn ) := gN (xo,..., Xn ) (2.6) Vn(xo, ...,Xn) := min{ g„ (xo,...,x„), (2.7) cn (x0, . . . , Xn) + E [Vn+1 (x0, . . . , Xn, Xn+1) IXn = Xn] } The optimal time is given by VN = inf{j > 0 : Vj(Xo,...,Xj) = gj(Xo,...,Xj)} . (2.8) For the sake of completness we give the proof of this more general theorem. Define n— 1 Zn = £ Cj (Xo, . . . , Xj ) + Vn(Xo, ..., Xn) j=o (2.9) for j =0,1,... ,N. With this definition we have Theorem 2.2. The process (Zn)0< n £ Cj (Xo,...,Xj ) + Vn(Xo,...,Xn) j=o = Zn. □ Theorem 2.3. For the time vN defined in (2.6) the expression (2.5) attains its minimum which equals E(Vo (Xo)). Proof. By Theorem 2.2 E \ZV] > E [Zo] = E [Vo(Xo)] for all stopping times v. By definition we have E [Vo(Xo)] < E [Zv] < E v—1 £cj(Xo,..., Xj) + gv(Xo,..., Xv) j=o (2.10) (2.11) 468 Ars Math. Contemp. 16(2019)203-213 Replacing v by vN we have E [ZvNA(n+i)|Fre] = 1(vn < n)ZvN + 1(vn > n + 1)E [Z„+i|F„] : 1(VN < n)ZvN + 1(vn > n + 1) cj(Xo,... ,Xj) + E [V„+i(Xo,..., X„+i|Xo,..., X„] j=i = 1(vn < n)ZvN + 1(vn > n +1) = 1(vn < n)ZvN + 1(vn > n + 1)Z„ Zvn An. n-1 E cj (Xo,...,Xj)+ Vn(Xo,...,Xn) j=i It follows that E Vo(Xo)] = E [Zvnai] = ■ ■ ■ = E [Zvnan]. (2.12) By (2.10)-(2.12) the minimum E [Vo(Xo)] of (2.5) is attained at v = vN. □ 3 Application to insurance Assume that the net premium of the m policyholders is invested in an equity-linked fund whose price follows the dynamics of the Cox-Ross-Rubinstein model, see [4]. Denote the prices by So, Si,..., SN. At time j = 0 the total investment of the policyholders is mSo. In the next time instant the price of the fund is multiplied by u or d with probabilities p and q = 1-p respectively with the usual assumptions d < 1 < 1+r < u. Many guarantees can be interpreted as contingent claims on the underlying fund. The minimum yield guarantee, to give the simplest example, stipulates that the payment to the policyholder at time N will be equal to at least G = (1 + r)N So (3.1) for some interest rate agreed to in the contract, which we assume to be constant throughout the lifetime of policies. Other types of guarantees can be included as well. If at the expiration the price of the fund reduced by possible fees exceeds G the policyholder gets the bigger of the two sums. If at time j = 0 the insurer buys m put options on the fund price with strike price k = (1 + r)NSo and expiration N that completely offsets the financial risk due to fund price fluctuations. But such a strategy does not take mortality into account. The strategy we will investigate will be a combination of charging fees towards the fund and at an optimal time buy options that at least partially offset financial risks. Paper [2] considers fund linked products with guarantees and an optimal fee structure which means that the insurance company charges a fee towards the underlying fund in an optimal way so that the expected discounted loss for the company is zero. In this paper we will consider a mixed approach. The company will set aside a portion of the fund value as a reserve possibly subject to some conditions. At any time the company can decide to switch to hedging future liabilities with derivatives based on the fund value and the number of surviving policyholders. The fees accumulated will partially offset the cost of the options. We will derive the optimal time to switch which will minimize the expected loss for the company. M. Perman and A. Zalokar: Some extensions of optimal stopping with financial applications 469 Assume that the m policyholders are of the same age x. Denote the number of surviving policyholders at times j = 0,1,...,N by a0, a1,..., aN. We will assume that mortality is independent of the movement of the fund value. For the sake of simplicity we will consider contracts with no guaranteed minimum death benefit. Note that the sequence a0,... ,aN is an inhomogeneous Markov chain due to ageing with P(aj+1 = i - k\«j = i) = (£) qk+jPX+j for k = 0,1,..., i in the usual actuarial notation. For mortality simulation we use [1]. We will apply the theory developed in Section 2 to the Markov chain (Sj ,«j)0 aesn i= 1 * Research partially supported by the project UID/MAT/00212/2013. t Correspondent author. E-mail addresses: hcruz@ubi.pt (Henrique F. da Cruz), ilda@ubi.pt (Ilda Inacio), rserodio@ubi.pt (Rogerio Serodio) ©® This work is licensed under https://creativecommons.org/licenses/by/4.0/ 474 Ars Math. Contemp. 16 (2019) 445-463 where sgn is the sign function. The determinant is undoubtedly one of the most well-known functions in mathematics with applications in many areas. The permanent function is also a well-studied function, since it has many applications in combinatorics, but while the determinant can be easily computed, no efficient algorithm for computing the permanent is known. This difficulty leads to the idea of trying to compute it by using determinants. This idea dates back to 1913 in a work of Polya [6], and it has been under intensive investigation since then. Polya observed that the permanent of a 2 by 2 matrix A is equal to the determinant of the related matrix B = a ii a 12 a2i a22 aii —ai2 a21 a22 However, Szego [8] proved that if n > 3, then there is no way to generalize this formula, i.e., there is no uniform way of changing the signs of the entries of a matrix A e Mn (C) in order to obtain a matrix B satisfying det(B) = per(A). (1.1) Szego's result didn't put an end to this question. In fact, the possibility that the permanent can be converted into the determinant by affixing ± signs is a research topic that remains active until today (see [1, 2] or [5] for recent works on this subject). In 1969, Gibson [3] proved that the linear space of lower Hessenberg matrices is a convertible subspace. That is, it is possible to change in a uniform way the signs of the entries of a matrix A in this subspace in order to obtain a matrix B satisfying (1.1). More recently, C. Fonseca presented a new class of convertible subspaces. These subspaces are constructed using simple graphs as follows: Definition 1.1 ([2]). Given a simple graph G with n vertices, numbered by the integers in {1,..., n}, a G-lower Hessenberg matrix A = [aj] is an n-square matrix such that aj = 0 whenever i < j and {i,j} is not an edge of G. If, in addition, aj = 0 whenever i > j or {i, j} is an edge of G, then we say that A is a full G-lower Hessenberg matrix. Obviously, two numberings of the vertices of a graph are the same if the sets of edges are equal. C. Fonseca [2] proved that if G is a generalized double star (the tree resulting from joining the central vertices of two stars by a path) whose vertices are numbered in a natural way (consecutive integers from left to right), the linear space of these G-lower Hessenberg matrices is a convertible subspace. Let G be a simple graph with n vertices numbered with 1,..., n. We say that G is well-numbered if the linear space of all G-lower Hessenberg matrices that arise from this numbering of the vertices of G is convertible. As we will see in the third section, not all graphs admit a well-numbering of its vertices. The characterization of the connected graphs for which such a numbering exist is our first main result. Theorem 1.2. A connected graph G admits a well numbering of its vertices if and only if G is a caterpillar. H. F. da Cruz et al.: Convertible subspaces that arise from different numberings . 475 Recall that a caterpillar is a tree in which all vertices are within distance 1 of a central path. The interior vertices of the path are called nodes. Every caterpillar results from a sequence of stars (R1, R2,..., Rt), such that the central vertex of R is linked to the central vertex of Rj_i, i = 2,..., t, by a single edge. If a caterpillar results from a sequence of stars with an equal number r of vertices, then we will denote this type of caterpillars by Ct[r], where t is the number of the stars involved. So, Ct[1] is a path with t vertices, and C1 [r] is a star with r vertices. Example 1.3. The caterpillar C3 [4] is shown in Figure 1(a). The caterpillar C4 [2] is shown in Figure 1(b). (a) C3[4] (b) C4[2] Figure 1: Two examples of caterpillars. Theorem 1.2 states that the vertices of a caterpillar G can be numbered in a way such that the subspace of all G-lower Hessenberg matrices arising from that numbering is convertible. A natural question is to know if all numberings of the vertices of a caterpillar produce a convertible subspace. The answer is negative, and a simple example can be provided with a path. Let G be a path with n vertices. If the vertices of G are numbered in a natural way (consecutive integers from left to right), then from Definition 1.1, we obtain the linear space of classical lower Hessenberg matrices, which Gibson [3] proved to be a convertible subspace. However, if we enumerate the vertices of G in a different way, the subspace of all G-lower Hessenberg matrices arising from that numbering of the vertices of G may no longer be convertible. Example 1.4. Consider the path of length four numbered as in Figure 2. 14 2 3 Figure 2: A numbered path on 4 vertices. The subspace of the C4[1]-lower Hessenberg matrices with maximal dimension constructed from this numbered path is the subspace {/a11 0 0 «21 «22 «23 °31 032 033 \041 «42 043 which is not convertible as we will see in the next section. Thus, it is pertinent to ask how many different convertible subspaces, with maximal dimension, arise from different numberings of the vertices of a caterpillar. We restrict our study to caterpillars of the form Ct [r]. The answer is given in the next theorem which is our second main result: «14 «24 0 «44 € C, ij = 1,..., 4 « 476 Ars Math. Contemp. 16(2019)473-486 Theorem 1.5. Let r be a fixed integer, and G = Ct[r]. Assume that G has at least three vertices. The number of different convertible subspaces, with maximal dimension, that arise from the different numberings of the vertices of G is the (t + 1)th term of the sequence '0, if n = 0; 1, if n = 1; jan-1 + an-2, if n > 2. Example 1.6. In this example, we apply Theorem 1.5 to some caterpillars. Below each representation of the caterpillar (in Figures 3, 4 and 5), we give the number of convertible subspaces of G-lower Hessenberg matrices, with maximal dimension, that arise from different numberings of the vertices of that caterpillar. As we are going to see some of the sequences are well known. 1. For a path with three, four and five vertices see Figure 3. (a) 3 (b) 5 (c) 8 Figure 3: The number of convertible subspaces arising from Ct [1] for t = 3,4, 5. In general, the number of convertible subspaces arising from Ct[1], t > 3 is the (t + 1)th term of the OEIS [7] sequence a0 0 0 04 5, the sequence of the Fibonacci numbers. 2. If G = Ct [2], then for t = 2, 3,4 see Figure 4. (a) 5 (b) 12 (c) 29 Figure 4: The number of convertible subspaces arising from Ct [2] for t = 2, 3,4. In general, the number of convertible subspaces arising from Ct[2], t > 2 is the (t + 1)th term of the OEIS sequence a000129, the sequence of the Pell numbers, also known as lambda numbers. 3. If G = Ct [3], then for t = 1, 2,3,4 see Figure 5. (a) 3 (b) 10 (c) 33 (d) 109 Figure 5: The number of convertible subspaces arising from Ct[3] for t = 1, 2,3,4. H. F. da Cruz et al.: Convertible subspaces that arise from different numberings . 477 In general, the number of convertible subspaces arising from Ct[3], t > 1, is the (t + 1)th term of the OEIS sequence a006190. This paper is organized as follows. In the next section, we present a simple criterium to decide when a subspace of G-lower Hessenberg matrices with maximum dimension is convertible. As we are going to see the convertibility of such subspace can be decided from the convertibility of a matrix of zeros and ones. In the third section, we prove our first main result, and describe how vertices numbering should be in order G be well-numbered. The characterization of such numberings allows proving Theorem 1.5. 2 Preliminary results An n-square (0,1)-matrix is a square matrix whose entries are just zeros and ones. Similarly, for an n-square (-1,1)-matrix. Let S = [sjj ] be an n-square (0,1)-matrix. For each i e {1,..., n} let n n ri = E Si,k, and c = ^ sfcji. k=1 k=1 The sequence R = (r1,... ,rn) is the row-sum sequence of S and the sequence C = (c1,..., cn) is the column-sum sequence of S. Definition 2.1. Two matrices A and B are permutation equivalent, if there exist permutation matrices P and Q of suitable sizes such that B = PAQ. An n-square (0,1)-matrix S defines a coordinate subspace Mn(S) = {S*X : X e Mn(C)}, where * denotes the Hadamard product. We say that Mn(S) is convertible if there exists an n-square (-1,1)-matrix C, such that det(C*X) = per(X), for all X e Mn(S). Let Tn = [ti,j] be an n-square (0,1)-matrix such that ti,j =0 if and only if i < j + 1. The coordinate subspace Mn (Tn) is the subspace of the lower Hessenberg matrices. Gibson [3] proved that if C = [ci j] is the n-square (-1,1)-matrix such that cijj = —1 if and only if j = i +1, then det(C*X) = per(X), for all X e Mn(Tn). Another important result due to Gibson states the maximum number of nonzero entries in a convertible matrix. 478 Ars Math. Contemp. 16 (2019) 445-463 Theorem 2.2 ([4]). Let A = [aj] be an n-square (0,1)-matrix such that per(A) > 0, and the permanent of A can be converted into a determinant by affixing ± signs to the elements of A. Then A has at most Q„ = i (n2 + 3n — 2) positive entries, with equality if and only if A is permutation equivalent to Tn. Observe that the row- and column-sum sequences of Tn are, respectively, R =(2, 3,..., n — 1, n, n) and C = (n,n,n — 1,,..., 3, 2). So, Theorem 2.2 gives a simple criterium to decide when an n-square (0,1)-matrix S, with Qn nonzero entries satisfying per(S) > 0 is convertible. Proposition 2.3. Let S be an n-square (0,1)-matrix with Qn nonzero entries satisfying per(S) > 0. Then S is convertible if and only if S is permutation equivalent to a (0,1)-matrix whose row-sum sequence is R = (2,3,..., n — 1, n, n), and the column-sum sequence is C = (n, n, n — 1,. .., 3, 2). Proof. The Hessenberg matrix Tn has row- and column-sum sequences R = (2, 3, ..., n — 1, n, n) and C = (n, n, n — 1,..., 3,2), respectively. By hypothesis, and by transitivity, S is permutation equivalent to Tn. Hence, by Theorem 2.2, S is convertible. If S is convertible, then S is permutation equivalent to Tn, and Tn has row-sum sequence R = (2, 3,..., n — 1, n, n), and column-sum sequence C = (n, n, n — 1, ..., 3, 2). □ Example 2.4. Consider the following matrices Si 110 0 0 110 10 11111 11111 11111 and S2 0 10 0 110 0 1110 1111 1111 Then, Si is not convertible because the row sum sequence of (2,3, 5, 5,5), but S2 is convertible because we can reorder the rows and the columns S2 in order to obtain a matrix whose row-sum sequence and column-sum sequence are (2,3,4, 5, 5) and (5,5,4,3, 2), respectively. The next result states that the convertibility of a coordinate subspace Mn(S) can be decided by the convertibility of S. Proposition 2.5. Let S be an n-square (0,1)-matrix with Q„ nonzero entries, and per(S) > 0. Then, Mn(S) is a convertible subspace if and only if S is convertible. Proof. If Mn(S) is a convertible subspace, then S is convertible. Assume that S is convertible. Then, there exists an n-square ( — 1,1)-matrix C such that det(C*S) = per(S). H. F. da Cruz et al.: Convertible subspaces that arise from different numberings . 479 Let S'n be the set of permutations a e Sn such that "=1 sio^) = 0. Since per(S) > 0, S'n = 0. We have n det(C*S)= ^ sgn(a)JJcia(i)sia(i) oes; i=i nn = ^ sgn(a^ cio(i) ![ sio(i), oes; i=i i=i where we conclude that sgn(a) n=1 cio(i) = 1 for all a e S'n. For any matrix A e Mn(S), we have n det(C*A) = ^2 sgn(a) cio(i) aio(i) oes; i=i nn = ^2 sgn(a) cio(i) J} aio(i) oes; i=i i=i n = yi n«io(i) oes;i=i = per(A), hence, A is convertible. Since A is arbitrary, we conclude that Mn(S) is a convertible subspace. □ Let A = [aij] be an n-square matrix. We denote by A(i; j) the (n - 1)-square submatrix obtained from A after removing the ith row and the j,th column. Generalizing, A(ii;..., ik; ji,..., jk) denotes the square submatrix of A after removing the rows ii,... ,ik and the columns ji;..., jk. Gibson proved the following result. Lemma 2.6 ([3]). Let S = [sij-] be a convertible matrix. If srs = 1, then S(r; s) is also convertible. A subspace version of this Lemma is as follows. Proposition 2.7. If Mn(S) is a convertible subspace, and sij = 1, then Mn-i(S(i; j)) is also a convertible subspace. Proof. It follows easy from Lemma 2.6, and Proposition 2.5. □ Corollary 2.8. If Mn(S) is a convertible subspace and sil,jl,..., sifc,jfc are k nonzero elements of S, then Mn-k(S(ii;..., ik; ji;..., jk)) is also a convertible subspace. Proof. Trivial by induction. □ 480 Ars Math. Contemp. 16 (2019) 445-463 3 Proofs of the main results We start this section with a result that comes easily from Proposition 2.5. Proposition 3.1. A connected graph G is well-numbered if and only if the correspondent full G-lower Hessenberg matrix of 0's and 1 's is convertible. Let Ln be the anti-identity matrix of order n. This matrix has in position (i, j) the element 1, if i + j = n +1, and 0 otherwise. Let A be an n-square matrix. We denote by Aat the matrix Aai := LnAtLn, where A1 is the transpose of A. The matrix Aai is the anti-transpose of A. Remark 3.2. Let A = [«j ] be an n-square matrix, and let Aat = [«a^t]. Then 1. aj = an-j+i,n-i+i, for all i, j = 1,..., n; 2. (Aat)at = A. The next result allows simplifying some of the proofs. Lemma 3.3. Let G be a graph with n vertices. If G is well-numbered, then G is also well-numbered replacing vertex i by vertex n — i +1, for all i = 1,..., n. Proof. Let G be a well-numbered graph with n vertices, and let S be the correspondent full G-lower Hessenberg matrix of 0's and 1's. Since G is well-numbered, by Proposition 2.3, S is permutation equivalent to a matrix whose row sum sequence is R = (2, 3,..., n — 1, n, n), and the column sum sequence is C = (n, n, n — 1,..., 3,2). By definition Sat is also permutation equivalent to a matrix whose row and column sum sequences are equal to R and C respectively, and for all i, j G {1,..., n} such that i > j, saj = 1. Consider the new enumeration of the vertices of G where the vertex i is replaced by n — i + 1 , for all i = 1,..., n, and let S' = [s^] be the correspondent full G-lower Hessenberg matrix of 0's and 1's. Let i, j G {1,... ,n} such that i < j, and i is adjacent to j in the initial enumeration of the vertices of G. Since n — j + 1 j we conclude, by Theorem 2.2, that S has exact nonzero entries, n — 1 of them above the main diagonal. By Definition 1.1 we conclude that G is a connected graph with n vertices and n — 1 edges, that is G is a tree. However, not all trees can be well-numbered. Proof of Theorem 1.2. By Proposition 2.5 we only have to consider (0,1)-matrices. Suppose G is a caterpillar with numbering as shown in Figure 6. We will prove by induction on the number of nodes that such numbering produces a convertible full G-lower Hessenberg matrix. If we have only one node (see Figure 7) the correspondent full G-lower Hessenberg H. F. da Cruz et al.: Convertible subspaces that arise from different numberings . 481 + ¿2 E fc-i E ¿i +1 •i - 1 ¿1 + 1 ¿1 + ¿2 - 1 Figure 6: Numbering of the caterpillar G. n- 1 1 n - 1 Figure 7: Special case with only one node. matrix is Li 1 0 0 . .0 0 1 1 1 0 . .0 0 1 1 1 1. .0 0 1 1 1 1. .1 0 1 1 1 1. .1 1 1 1 1 1. .1 1 1 This matrix is convertible by Proposition 2.3. Let's suppose that the enumeration is valid for caterpillars with k — 1 nodes, and that A is the correspondent full G-lower Hessenberg matrix. For a caterpillar with k nodes (see Figure 8) the correspondent full G-lower Hessenberg matrix is 2 n 2 n A 0 S = 0 ... 0 1 1 Lk where 1 is a matrix whose entries are all 1's, the line above Lk corresponds to the edge between the last two nodes, and Lk is the full G-lower Hessenberg matrix arising from the last node and has structure as L1. By induction hypothesis A is convertible. Thus, by Proposition 2.3, A is permutation equivalent to a matrix with row- and column-sum sequence ^2, 3,..., Xi—1 1 . It is straightforward to see that S is permutation equivalent to a matrix with row- and column-sum sequence ^2,3,..., Xi=1 2i=1 . Hence, there exists at least one enumeration for the caterpillars that produces a convertible full G-lower Hessenberg matrix. 482 Ars Math. Contemp. 16 (2019) 445-463 k-2 E U + 1 h ti + Î2 t1 - 1 ti + 1 + Î2 - 1 k-1 E t-i + 1 1 Figure 8: A caterpillar with k nodes. 2 We will prove by contradiction. Every tree that is not a caterpillar has at least one node connected with three other nodes. Therefore every tree which is not a caterpillar contains the graph in Figure 9 as vi V2 V3 V4 V5 V6 (I V7 Figure 9: The subgraph of a tree which is not a caterpillar. an induced subgraph. Let G be this graph and S be the full G-lower Hessenberg matrix of zeros and ones arising from an enumeration of the vertices of G. By Corollary 2.8, it is enough to prove that G cannot be well enumerated, that is, for every numbering of the vertices of G the rows or the columns of the correspondent full G-lower Hessenberg matrix of zeros and ones cannot be reordered to obtain (2, 3,4,5, 6, 7, 7). By Proposition 3.3, we only have to consider the numberings where v3 € {1, 2,3,4}. If v3 = 1, then no row of S sums two. If v3 = 2, then the first row of S is the only one that the sum equals two. Thus, the vertex numbered with 1 must be a terminal and the second row of S sums 5. To be convertible, the third row of S is the only one whose sum equals three. So, we have the subgraph in Figure 10. Therefore, no row of S has four ones. V3 2 3 *1 Figure 10: The subgraph in case of v3 = 2. If v3 = 3, then to have row-sums equal to two and three, and two column-sums equal to seven, vertices numbered with 1 and 2 must be adjacent. Similarly, to have two row-sums equal to seven vertices numbered with 6 and 7 are adjacent. Thus, no row has four ones. If v3 = 4, then vertices numbered with 1 and 2 cannot be simultaneously adjacent to v3 (otherwise, no row of S has two ones). The vertices numbered with 1 and 2 must be adjacent otherwise S doesn't have two column-sums equal to seven. By Lemma 3.3, vertices numbered with 6 and 7 must also be adjacent. Hence, if a row sums to four then no column can sum to four, and vice-versa. □ H. F. da Cruz et al.: Convertible subspaces that arise from different numberings . 483 Definition 3.4. Let T be a tree, and let R be a star with central vertex x. We say that R is a pendant star of T if: 1. R is an induced subgraph of T; 2. If we remove all the vertices of R, then we obtain a tree denoted by T/R; 3. x is adjacent to a single vertex of T/R. Remark 3.5. Note that every caterpillar with at least one edge has exactly two pendant stars. For proving Theorem 1.5, some lemmas are needed: Lemma 3.6. Let G = Ct[r] with n = tr vertices. If G is well-numbered, then the vertices numbered with 1, 2,..., r — 1, must be in the same pendant star, and the vertices numbered with n, n — 1,..., n — r + 1 must be in the other pendant star. Proof. We only need to prove that the vertices of G numbered with 1, 2,..., r — 1, must be in the same pendant star, because by Lemma 3.3 we conclude that n, n — 1,...,n — r + 1 must be in the other pendant star. If G is well-numbered, then the correspondent full G-lower Hessenberg matrix S of 0's and 1's is convertible. Therefore S is permutation equivalent to a matrix whose row-sum sequence is R = (2, 3,..., n —1, n, n), and column-sum sequence is C = (n, n, n — 1,..., 3,2). An ¿th column of S has n 1's if and only if the vertices numbered with 1,..., i — 1 are adjacent to the vertex numbered with i. Since G = Ct[r], the maximum degree of a vertex in G is r +1, and then the two columns of S with n 1's must be in the first r + 2 columns. Taking into account that caterpillars are sequences of stars connected by central vertices, we start showing that the vertices numbered with 1,..., r — 1 must be one of these stars, that is, the induced subgraph of G = Ct [r] that is the one of the stars involved in the construction of G. After that, we prove that this star is a pendant one. Assume that the vertices numbered with 1,..., r — 1 are not in the same star. Denote by R the star containing 1, and let j be the least integer less that r not in R. Denote by R' the star containing j. Several cases are needed to consider. Case 1: If 1,..., j — 1, j are pendant vertices, then having in mind the previous discussion, there are no two columns of S with n 1's, which is a contradiction. Case 2: If l g {1,..., j — 1} is the central vertex, and j is a pendant vertex, then the £th column of S has n 1's. If 1 < i < l — 1, then the ith row sums i + 1, the Ith row sums at least l + (r — 1) — (l — 1) + 1 = r +1, and the ith row, l +1 < i < j — 1, sums i. Since j is a pendant vertex of R', we conclude that no row of S sums j, which is a contradiction. Case 3: If the vertices 1,..., j — 1 are pendant vertices, and j is the central vertex of R', then ith row sums to i + 1, for all 1 < i < j — 1, and the jth row sums j + (r — 1) + 1 or j + (r — 1) + 2. Since the only row that can sum j + 1 is the row j + 1, the vertex j + 1 must be a pendant one of R'. Hence, S does not have two columns with n 1's, which is a contradiction. Case 4: If l g {1,..., j — 1} is the central vertex of R, and j is the central vertex of R', then the ith row of S, 1 < i < l —1, sums i + 1, the lth row sums at least l+(r — 1) — (l—1) + 1 = r +1, and the ith row of S, l +1 < i < j — 1, sums i. Since j is a central vertex, no row of S sums j, which is a contradiction. 484 Ars Math. Contemp. 16 (2019) 445-463 We have proved that the vertices of G numbered with 1,..., r - 1 must be in the same star R. Now we will prove that R is pendant. Suppose that this is not the case. Let i, 1 < i < r - 1 be the central vertex of R. Then the ¿th row of S, 1 < i < i -1, sums i + 1, the i111 row sums i +(r -1) - (i -1) + 2 = r + 2, because R is not pendant, and the ith row, i +1 < i < j - 1, sums i. Since the ith row sums r + 2, the (r + 1)th row must sum r +1 and the rth row must sum r. Then the vertices r and r + 1 must be pendant vertices of R, which is a impossible. If 1,..., r -1 are pendant vertices of R, the central vertex of this star must be numbered with r, r + 1 or r + 2, otherwise there are no two columns of S with n 1's. • For r, since R is not pendant, there are no row of S with r +1 1's. • For r +1, the vertex r must be adjacent to r +1, otherwise there are no two columns of S with n 1's. Then r is the central vertex of another star. Then, the rth row of S sums at least r + (r - 1) + 1 = 2r, the (r + 1)th row sums at least r + 2. Then S does not have a row with r + 1 1's. • Finally, for r + 2, by a similar procedure, we conclude that there is no row of S with r + 1 1's. □ Lemma 3.7. Let G = Ct[r]. If G is well-numbered, then the vertices of one of the pendant stars R are numbered with 1 up to r +1. If r + 1 is a vertex of R, then r + 1 is central, and r is adjacent to r + 1. If r is a vertex of R, then the central vertex can be any i, 1 < i < r. Proof. In the previous Lemma, we proved that 1,..., r - 1 must lay all in a pendant star. We only have to prove that the remaining vertex must be numbered with r or r + 1. We have to consider two cases: Case 1: If the pendant vertices of R are numbered with 1,..., r -1, then the central vertex can only be numbered with r or r +1. Otherwise, S does not have two columns with n 1's. By the same reason, if r + 1 is central, then r must be adjacent. Case 2: If the central vertex of R is i, 1 < i < r - 1, then there remains a pendant vertex. Suppose that this pendant vertex is j > r + 1. In this case, the row r sums at least r + 1, and no row sums r. Hence, R is numbered with 1,..., r. If r is a vertex of R, and i, 1 < i < r, is the central vertex, then the correspondent full G-lower Hessenberg matrix of 0's and 1' s satisfies the condition of Proposition 2.3. □ Corollary 3.8. Let G = Ct[r]. If G is well-numbered, then the vertices of one of the pendant stars R are numbered with n = tr down to n - 1 - r. If n - 1 - r is a vertex of R, then n - r - 1 is central and n - r is adjacent to n - 1 - r. If n - r is a vertex of R, then the central vertex can be any i, n - r < i < n. Proof. It follows directly from Lemmas 3.3 and 3.7. □ We are now in condition to prove our second main result: Proof of Theorem 1.5. The proof is by induction on t, the number of stars in a caterpillar. If t = 1, then r > 3. By Lemma 3.7, the central vertex of G can be numbered with any i € {1,..., r}. So, the number of different convertible subspaces is a2 = r. If t = 2, then G has n = 2r, r > 2, vertices. By Lemma 3.7, each star has r different ways to be well numbered by consecutive numbers. Therefore, this gives r2 different H. F. da Cruz et al.: Convertible subspaces that arise from different numberings . 485 well numberings for G with each star having consecutive numbers. Besides these, by the same Lemma, it is possible to interchange vertices r and r + 1, giving another convertible subspace. So the total number of different convertible subspaces is a3 = r2 + 1. Let t > 2, and assume that the theorem holds for all j < t. Let G = Ct+1[r]. By hypothesis there are at+1 convertible subspaces that arise from the different numberings of the caterpillar Ct[r]. The caterpillar G is obtained from Ct[r] by augmenting with a star with r vertices. By induction hypothesis and Corollary 3.8, there are rai+1 convertible subspaces that arise from a numbering of G, where the vertices of the new pendant star are numbered consecutively with tr + 1,..., (t + 1)r. There are also convertible subspaces that arise from a numbering of G, where the central vertex of new pendant star is numbered with tr. By induction hypothesis, this number is at. Then the total number of convertible subspaces that arise from the different numberings of the vertices of G is rai+1 + at = ai+2. □ As we already saw, the number of well numberings of the vertices of a path with t vertices is the (t + 1)th Fibonacci number. In Table 1, we present all well-numbered paths of lengths 3, 4, and 5. Table 1: All well-numbered paths with 3, 4, and 5 vertices. n = 3 1 2 3 2 1 3 132 n=4 12 3 4 12 4 3 2 13 4 2 14 3 13 2 4 n=5 1 2 3 4 5 2 3 4 5 1 3 2 4 5 1 2 4 3 5 2 4 3 5 1 3 2 5 4 1 2 3 5 4 2 3 5 4 References [1] M. P. Coelho and M. A. Duffner, Subspaces where an immanant is convertible into its conjugate, Linear Multilinear Algebra 48 (2001), 383-408, doi:10.1080/03081080108818681. [2] C. M. da Fonseca, An identity between the determinant and the permanent of Hessenberg-type matrices, Czechoslovak Math. J. 61 (2011), 917-921, doi:10.1007/s10587-011-0059-1. [3] P. M. Gibson, An identity between permanents and determinants, Amer. Math. Monthly 76 (1969), 270-271, doi:10.2307/2316368. [4] P. M. Gibson, Conversion of the permanent into the determinant, Proc. Amer. Math. Soc. 27 (1971), 471-476, doi:10.2307/2036477. [5] A. Guterman, G. Dolinar and B. Kuzma, P6lya convertibility problem for symmetric matrices, Math. Notes 92 (2012), 624-635, doi:10.1134/s0001434612110053. 486 Ars Math. Contemp. 16(2019)473-486 [6] G. Pölya, Aufgabe 424, Arch. Math. Phys. Ser. 3 20 (1913), 271. [7] N. J. A. Sloane (ed.), The On-Line Encyclopedia of Integer Sequences, published electronically at https://oeis.org. [8] G. Szego, Losung zu Aufgabe 424, Arch. Math. Phys. Ser. 3 21 (1913), 291-292. ARS MATHEMATICA CONTEMPORANEA ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 16 (2019) 487-525 https://doi.org/10.26493/1855-3974.1330.916 (Also available at http://amc-journal.eu) Linear separation of connected dominating sets in graphs* * Nina Chiarellif, Martin Milanic * University of Primorska, UP FAMNIT, Glagoljaska 8, SI-6000 Koper, Slovenia University of Primorska, UP IAM, Muzejski trg 2, SI-6000 Koper, Slovenia Received 21 February 2017, accepted 12 November 2018, published online 15 March 2019 A connected dominating set in a graph is a dominating set of vertices that induces a connected subgraph. Following analogous studies in the literature related to independent sets, dominating sets, and total dominating sets, we study in this paper the class of graphs in which the connected dominating sets can be separated from the other vertex subsets by a linear weight function. More precisely, we say that a graph is connected-domishold if it admits non-negative real weights associated to its vertices such that a set of vertices is a connected dominating set if and only if the sum of the corresponding weights exceeds a certain threshold. We characterize the graphs in this non-hereditary class in terms of a property of the set of minimal cutsets of the graph. We give several characterizations for the hereditary case, that is, when each connected induced subgraph is required to be connected-domishold. The characterization by forbidden induced subgraphs implies that the class properly generalizes two well known classes of chordal graphs, the block graphs and the trivially perfect graphs. Finally, we study certain algorithmic aspects of connected-domishold graphs. Building on connections with minimal cutsets and properties of the derived hypergraphs and Boolean functions, we show that our approach leads to new polynomially solvable cases of the weighted connected dominating set problem. Keywords: Connected dominating set, connected domination, connected-domishold graph, forbidden induced subgraph characterization, split graph, chordal graph, minimal cutset, minimal separator, 1-Sperner hypergraph, threshold hypergraph, threshold Boolean function, polynomial-time algorithm. *The authors are grateful to the anonymous reviewers for the many insightful remarks, to Endre Boros, Andreas Brandstadt, Yves Crama, Vladimir Gurvich, Pinar Heggernes, Haiko Miiller, and Vito Vitrih for helpful discussions, and to Dieter Kratsch and Haiko Miiller for providing them with a copy of paper [43]. The work for this paper was partly done in the framework of a bilateral project between Argentina and Slovenia, financed by the Slovenian Research Agency (BI-AR/15-17-009) and MINCYT-MHEST (SLO/14/09). Part of this work appeared as an extended abstract in [17]. ^This work is supported in part by the Slovenian Research Agency (research project J1-7051). ^This work is supported in part by the Slovenian Research Agency (research core funding No. I0-0035 and P1-0285, and projects N1-0032, J1-7051, and J1-9110). Abstract ©® This work is licensed under https://creativecommons.Org/licenses/by/4.0/ 488 Ars Math. Contemp. 16 (2019) 445-463 Math. Subj. Class.: 05C69, 05C75, 05C65, 05C85 1 Introduction 1.1 Background Threshold concepts have been a subject of investigation for various discrete structures, including graphs [18,20,48], Boolean functions [19,22,29,32,53,55], and hypergraphs [34, 58]. A common theme of these studies is a quest for necessary and sufficient conditions for the property that a given combinatorial structure defined over some finite ground set U admits non-negative real weights associated to elements of U such that a subset of U satisfies a certain property, say n, if and only if the sum of the corresponding weights exceeds a certain threshold. A more general framework has also been proposed, where the requirement is that a subset of U satisfies property n if and only if the sum of the corresponding weights belongs to a set T of thresholds given by a membership oracle [50]. Having the set U equipped with weights as above can have useful algorithmic implications. Consider for example the optimization problem of finding a subset of U with property n that has either maximum or minimum cost (according to a given linear cost function on the elements of the ground set). It was shown in [50] that if the weights as above are known and integer, then the problem can be solved by a dynamic programming approach in time O(\U|M) and with M calls of the membership oracle, where M is a given upper bound for T. The pseudo-polynomial running time should be expected, since the problem is very general and captures also the well-known knapsack problem [41]. Note, however, that the problem admits a much simpler, polynomial-time solution in the special case when the costs are unit and if we assume the monotone framework, where a set satisfies property n as soon as its total weight exceeds a certain threshold. Under these assumptions, a minimum-sized subset of U satisfying property n can be found by a simple greedy algorithm starting with the empty set and adding the elements in order of non-increasing weight until the threshold is exceeded. Many interesting graph classes can be defined within the above framework, including threshold graphs [20,42,48], domishold graphs [1], total domishold graphs [16,18], equi-stable graphs [54], and equidominating graphs [54]. In general, the properties of the resulting graph classes depend both on the choice of property n and on the constraints imposed on the structure of the set T of thresholds. For example, if U is the vertex set of a graph, property n denotes the property of being an independent (stable) set in a graph, and T is restricted to be an interval unbounded from below, we obtain the class of threshold graphs, which is a very well understood class of graphs, admitting many characterizations and linear-time algorithms for recognition and various optimization problems (see, e.g., [48]). If n denotes the property of being a dominating set and T is an interval unbounded from above, we obtain the class of domishold graphs, which enjoys similar properties as the class of threshold graphs. On the other hand, if n is the property of being a maximal stable set and T is restricted to consist of a single number, we obtain the class of equistable graphs, for which the recognition complexity is open (see, e.g., [47]), no structural characterization is known, and several NP-hard optimization problems remain intractable [50]. Notions and results from the theory of Boolean functions [22] and hypergraphs [2] can E-mail addresses: nina.chiarelli@famnit.upr.si (Nina Chiarelli), martin.milanic@upr.si (Martin Milanic) N. Chiarelli andM. Milanic: Linear separation of connected dominating sets in graphs 489 be useful for the study of graph classes defined within the above framework. For instance, the characterization of hereditarily total domishold graphs in terms of forbidden induced subgraphs given in [18] is based on the facts that every threshold Boolean function is 2-asummable [19] and that every dually Sperner hypergraph is threshold [16].1 Moreover, the fact that threshold Boolean functions are closed under dualization and (when given by their complete DNF) can be recognized in polynomial time [55] leads to efficient algorithms for recognizing total domishold graphs and for finding a minimum total dominating set in a given total domishold graph [16]. The relationship also goes the other way around. For instance, total domishold graphs can be used to characterize threshold hypergraphs and threshold Boolean functions [18]. 1.2 Aims and motivation The aim of this paper is to further explore and exploit this fruitful interplay between threshold concepts in graphs, hypergraphs, and Boolean functions. We do this by studying the class of connected-domishold graphs, a new class of graphs that can be defined in the above framework, as follows. A connected dominating set (CD set for short) in a connected graph G is a set S of vertices of G that is dominating, that is, every vertex of G is either in S or has a neighbor in S, and connected, that is, the subgraph of G induced by S is connected. The ground set U is the vertex set of a connected graph G = (V, E), property n is the property of being a connected dominating set in G, and T is any interval unbounded from above. Our motivations for studying the notion of connected domination in the above threshold framework are twofold. First, connected domination is one of the most basic of the many variants of domination, with applications in modeling wireless networks, see, e.g., [6,11, 12,26,27,31,35,36,60-62,66]. The connected dominating set problem is the problem of finding a minimum connected dominating set in a given connected graph. This problem is NP-hard (and hard to approximate) for general graphs and remains intractable even under significant restrictions, for instance, for the class of split graphs (see Section 6.2). On the other hand, as outlined above, the problem is polynomially solvable in the class of connected-domishold graphs equipped with weights as in the definition. This motivates the study of connected-domishold graphs. In particular, identification of subclasses of connected-domishold graphs might lead to new classes of graphs where the connected dominating set problem (or its weighted version) is polynomially solvable. Second, despite the increasingly large variety of graph domination concepts studied in the literature (see, e.g., [35,36]), so far a relatively small number of "threshold-like" graph classes was studied with respect to notions of domination: the classes of domishold and equidominating graphs (corresponding to the usual domination), the class of equistable graphs (corresponding to independent domination), and the class of total domishold graphs (corresponding to total domination). These graph classes differ significantly with respect to their structural and algorithmic properties. For instance, while the class of domishold graphs is a highly structured hereditary subclass of cographs, the classes of equistable and of total domishold graphs are not contained in any nontrivial hereditary class of graphs and are not structurally understood.2 In particular, the class of total domishold graphs is as rich in its combinatorial structure as the class of threshold hypergraphs [18], for which (despite 1In [16,18], the hereditarily total domishold graphs were named hereditary total domishold graphs. We prefer to adopt the grammatically correct term "hereditarily total domishold". 2A class of graphs is said to be hereditary if it is closed under vertex deletion. 490 Ars Math. Contemp. 16(2019)473-486 being recognizable in polynomial time via linear programming [22,55]) the existence of a "purely combinatorial" polynomial-time recognition algorithm is an open problem [22]. These results, differences, and challenges provide further motivation for the study of structural and algorithmic properties of connected-domishold graphs. 1.3 The definition Since a disconnected graph G does not have any connected dominating sets, we restrict our attention to connected graphs in the following definition. Definition 1.1. A connected graph G = (V, E) is said to be connected-domishold (CD for short) if there exists a pair (w, t) where w: V ^ R+ is a weight function and t G R+ is a threshold such that for every subset S C V, w(S) :— ^xes w(x) > t if and only if S is a connected dominating set in G. Such a pair (w, t) will be referred to as a connected-domishold (CD) structure of G. We emphasize that the class of connected-domishold graphs is not the intersection of the classes of connected and domishold graphs. In fact, the two classes are incomparable: the 4-vertex cycle is connected and domishold [1] but not connected-domishold, see Example 1.3 below; the 4-vertex path is connected-domishold but not domishold. The hyphen in the name is meant to indicate this fact. Example 1.2. The complete graph of order n is connected-domishold. Indeed, any nonempty subset S C V(Kn) is a connected dominating set of Kn, and the pair (w, 1) where w(x) — 1 for all x G V(Kn) is a CD structure of Kn. Example 1.3. The 4-cycle C4 is not connected-domishold. Denoting its vertices by vi, v2, v3, v4 in a cyclic order, we see that a subset S C V(C4) is CD if and only if it contains an edge. Therefore, if (w,t) is a CD structure of C4, then w(v¿) + w(vi+1) > t for all i G {1,2, 3,4} (indices modulo 4), which implies w(V(C4)) > 2t. On the other hand, w(v1) + w(v3) < t and w(v2) + w(v4) < t, implying w(V(C4)) < 2t. 1.4 Overview of results Our results can be divided into four interrelated parts and can be summarized as follows: 1) Characterizations in terms of derived hypergraphs (resp., derived Boolean functions); a necessary and a sufficient condition. In a previous work [18, Proposition 4.1 and Theorem 4.5], total domishold graphs were characterized in terms of thresholdness of a derived hypergraph and a derived Boolean function. We give similar characterizations of connected-domishold graphs (Proposition 3.4). The characterizations lead to a necessary and a sufficient condition for a graph to be connected-domishold, respectively, expressed in terms of properties of the derived hypergraph (equivalently: of the derived Boolean function; Corollary 3.5). 2) The case of split graphs. A characterization of threshold hypergraphs. While the classes of connected-domishold and total domishold graphs are in general incomparable, we show that they coincide within the class of connected split graphs (Theorem 4.3). Building on this equivalence, we characterize threshold hypergraphs in terms of the connected-domisholdness property of a derived split graph (Theorem 4.4). N. Chiarelli andM. Milanic: Linear separation of connected dominating sets in graphs 491 We also give examples of connected split graphs showing that neither of the two conditions for a graph to be connected-domishold mentioned above (one necessary and one sufficient) characterizes this property. 3) The hereditary case. We observe that, contrary to the classes of threshold and domishold graphs, the class of connected-domishold graphs is not hereditary. This motivates the study of so-called hereditarily connected-domishold graphs, defined as graphs every connected induced subgraph of which is connected-domishold. As our main result (Theorem 5.4), we give several characterizations of the class of hereditarily connected-domishold graphs. The characterizations in terms of forbidden induced subgraphs implies that the class of hereditarily connected-domishold graphs is a subclass of the class of chordal graphs properly containing two well known classes of chordal graphs, the class of block graphs and the class of trivially perfect graphs. 4) Algorithmic aspects via vertex separators. Finally, we build on all these results, together with some known results from the literature on connected dominating sets and minimal vertex separators in graphs, to study certain algorithmic aspects of the class of connected-domishold graphs and their hereditary variant. We identify a sufficient condition, capturing a large number of known graph classes, under which the CD property can be recognized efficiently (Theorem 6.1). We also show that the same condition, when applied to classes of connected-domishold graphs, results in classes of graphs for which the weighted connected dominating set problem (which is NP-hard even on split graphs) is polynomial-time solvable (Theorem 6.5). This includes the classes of hereditarily connected-domishold graphs and F2-free split graphs (see Figure 1), leading to new polynomially solvable cases of the problem. Structure of the paper. In Section 2, we state the necessary definitions and preliminary results on graphs, hypergraphs, and Boolean functions. In Section 3, we give characterizations of connected-domishold graphs in terms of thresholdness of derived hypergraphs and Boolean functions. Connected-domishold split graphs are studied in Section 4, where their relation to threshold hypergraphs is also observed. The main result of the paper, Theorem 5.4, is stated in Section 5, where some of its consequences are also derived. Section 6 discusses some algorithmic aspects of connected-domishold graphs. Our proof of Theorem 5.4 relies on a technical lemma, which is proved in Section 7. 2 Preliminaries 2.1 Graphs All graphs in this paper will be finite, simple and undirected. The (open) neighborhood of a vertex v is the set of vertices in a graph G adjacent to v, denoted by NG(v) (or simply Figure 1: Graph F2. 492 Ars Math. Contemp. 16(2019)473-486 N(v) if the graph is clear from the context); the closed neighborhood of v is denoted by NG[v] and defined as NG(v) U {v}. The degree of a vertex v in a graph G is the cardinality of its neighborhood. The complete graph, the path and the cycle of order n are denoted by Kn, Pn and Cn, respectively. A clique in a graph is a subset of pairwise adjacent vertices, and an independent (or stable) set is a subset of pairwise non-adjacent vertices. A universal vertex in a graph G is a vertex adjacent to all other vertices. For a set S of vertices in a graph G, we denote by G[S] the subgraph of G induced by S. For a set F of graphs, we say that a graph is F-free if it does not contain any induced subgraph isomorphic to a member of F. Given a graph G, a vertex v g V(G), and a set U C V(G) \ {v}, we say that v dominates U if v is adjacent to every vertex in U. The main notion that will provide the link between threshold Boolean functions and hypergraphs is that of cutsets in graphs. A cutset in a graph G is a set S C V(G) such that G - S is disconnected. A cutset is minimal if it does not contain any other cutset. For a pair of disjoint vertex sets A and B in a graph G such that no vertex in A has a neighbor in B, an A, B-separator is a set of vertices S C V(G) \ (A U B) such that A and B are in different components of G - S. An A, B-separator is said to be minimal if it does not contain any other A, B-separator. When sets A and B are singletons, say A = {u} and B = {v}, we will refer to a (minimal) A, B-separator simply as a (minimal) u, v-separator. A minimal vertex separator in G is a minimal u, v-separator for some non-adjacent vertex pair u, v. Note that every minimal cutset of G is a minimal vertex separator, but not vice versa. The minimal cutsets are exactly the minimal u, v-separators that do not contain any other x, y-separator. The connection between the CD graphs and the derived hypergraphs and Boolean functions will be developed in Section 3 using the following characterization of CD sets due to Kante et al. [38]. Proposition 2.1 (Kante et al. [38]). In every connected graph G that is not complete, a subset D C V (G) is a CD set if and only if D n S = 0 for every minimal cutset S in G. In other words, unless a connected graph G is complete, its CD sets are exactly the transversals of the cutset hypergraph of G (see Section 2.3 and Definition 3.2 for definitions of these notions). A graph G is chordal if it does not contain any induced cycle of order at least 4, and split if it has a split partition, that is, a partition of its vertex set into a clique and an independent set. One of our proofs (the proof of Theorem 5.4) will rely on the following property of chordal graphs. Lemma 2.2 (Kumar and Veni Madhavan [45]). If S is a minimal cutset of a chordal graph G, then each connected component of G — S has a vertex that is adjacent to all the vertices of S. For graph theoretic notions not defined above, see, e.g., [65]. 2.2 Boolean functions Let n be a positive integer. Given two vectors x, y g {0,1}n, we write x < y if xi < yi for all i g [n] := {1,..., n}. A Boolean function f: {0,1}n ^ {0,1} is positive (or: monotone) if f (x) < f (y) holds for every two vectors x, y g {0,1}n such that x < y. A literal of f is either a variable, xj, or the negation of a variable, denoted by xj. An elementary conjunction is an expression of the form C = (/\ieA xj) A (f\jeB xj) where N. Chiarelli andM. Milanic: Linear separation of connected dominating sets in graphs 493 A n B = 0. An implicant of a Boolean function f is an elementary conjunction C such that f (x) = 1 for all x G {0,1}" for which C takes value 1 (we also say that C implies f). An implicant is said to be prime if it is not implied by any other implicant. If f is positive, then none of the variables appearing in any of its prime implicants appears negated. Every n-variable positive Boolean function f can be expressed with its complete DNF (disjunctive normal form), defined as the disjunction of all prime implicants of f. A positive Boolean function f is said to be threshold if there exist non-negative real weights w = (wi,...,w„) and a non-negative real number t such that for every x G {0,1}", f (x) =0 if and only if J2"=i WjXj < t. Such a pair (w, t) is called a separating structure of f. Every threshold Boolean function admits an integral separating structure (see [22, Theorem 9.5]). A positive Boolean function f (x1,..., xn) is threshold if and only if its dual function f d(x) = f (x) is threshold [22]; moreover, if (w1,..., wn, t) is an integral separating structure of f, then (w1,..., wn, ^"=1 w® -1 - 1) is a separating structure of fd. Threshold Boolean functions have been characterized in [19] and [29], as follows. A false point of f is an input vector x G {0,1}" such that f (x) = 0; a true point is defined analogously. For k > 2, a positive Boolean function f: {0,1}" ^ {0,1} is said to be k-summable if, for some r G {2,..., k}, there exist r (not necessarily distinct) false points of f, say, x1, x2,..., xr, and r (not necessarily distinct) true points of f, say y1, y2,..., yr, such that J2r=1 x® = J2r=1 y® (note that the sums are in Z" and not in Z", the n-dimensional vector space over GF(2)). Function f is said to be k-asummable if it is not k-summable, and it is asummable if it is k-asummable for all k > 2. Theorem 2.3 (Chow [19], Elgot [29], see also [22, Theorem 9.14]). A positive Boolean function f is threshold if and only if it is asummable. The problem of determining whether a positive Boolean function given by its complete DNF is threshold is solvable in polynomial time, using dualization and linear programming (see [55] and [22, Theorem 9.16]). The algorithm tests if a polynomially sized derived linear program has a feasible solution, and in case of a yes instance, the solution found yields a separating structure of the given function. Using, e.g., Karmarkar's interior point method for linear programming [39], one can assure that a rational solution is found. This results in a rational separating structure, which can be easily turned into an integral one. We summarize this result as follows. Theorem 2.4. There exists a polynomial-time algorithm for recognizing threshold Boolean functions given by the complete DNF. In case of a yes instance, the algorithm also computes an integral separating structure of the given function. Remark 2.5. The existence of a "purely combinatorial" polynomial-time recognition algorithm for threshold Boolean functions (that is, one not relying on solving an auxiliary linear program) is an open problem [22]. A similar approach as the one outlined above shows that every connected-domishold graph has an integral CD structure; we will often use this fact in the paper. For further background on Boolean functions, we refer to the comprehensive monograph by Crama and Hammer [22]. 494 Ars Math. Contemp. 16(2019)473-486 2.3 Hypergraphs A hypergraph is a pair H = (V, E) where V is a finite set of vertices and E is a set of subsets of V, called hyperedges [2]. When the vertex set or the hyperedge set of H will not be explicitly given, we will refer to them by V(H) and E(H), respectively. A transversal (or: hitting set) of H is a set S C V such that S n e = 0 for all e G E. A hypergraph H = (V, E) is threshold if there exist a weight function w: V ^ R+ and a threshold t G R+ such that for all subsets X C V, it holds that w(X) < t if and only if X contains no hyperedge of H [34]. Such a pair (w, t) is said to be a separating structure of H. To every hypergraph H = (V, E), we can naturally associate a positive Boolean function fH: {0,1}V ^ {0,1}, defined by the positive DNF expression fH(x) = V A xu eeE nee for all x G {0,1}V. Conversely, to every positive Boolean function f: {0,1}n ^ {0,1} given by a positive DNF ^ = Vj=i AieCj x«, we can associate a hypergraph H(^) = (V, E) as follows: V = [n] and E = {C1,..., Cm}. It follows directly from the definitions that the thresholdness of hypergraphs and of Boolean functions are related as follows. Proposition 2.6. A hypergraph H = (V, E) is threshold if and only if the positive Boolean function f— is threshold. A positive Boolean function given by a positive DNF ^ = V m=i A eCj Xi is threshold if and only if the hypergraph H(^) is threshold. Applying Theorem 2.3 to the language of hypergraphs gives the following characterization of threshold hypergraphs. For k > 2, a hypergraph H = (V, E) is said to be k-summable if, for some r G {2,..., k}, there exist r (not necessarily distinct) subsets Ai,..., Ar of V such that each A« contains a hyperedge of H, and r (not necessarily distinct) subsets B1,..., Br of V such that each B« does not contain a hyperedge of H and such that for every vertex v G V, we have: |{i : v G Ai}| = |{i : v G B«}|. (2.1) We say that a hypergraph H is k-asummable if it is not k-summable and it is asummable if it is k-asummable for all k > 2. Corollary 2.7. A hypergraph H is threshold if and only if it is asummable. A hypergraph H = (V, E) is said to be Sperner (or: a clutter) if no hyperedge of H contains another hyperedge, that is, if for every two distinct hyperedges e and f of H, it holds that min{|e \ f |, |f \ e|} > 1. Chiarelli and Milanic defined in [16,18] the notion of dually Sperner hypergraphs as the hypergraphs such that the inequality min{|e \ f |, |f \ e|} < 1 holds for every pair of distinct hyperedges e and f of H. It was proved in [16,18] that dually Sperner hypergraphs are threshold; they were applied in the characterizations of total domishold graphs and their hereditary variant. Boros et al. introduced in [8] the following restriction of dually Sperner hypergraphs. Definition 2.8 (Boros et al. [8]). A hypergraph H = (V, E) is said to be 1-Sperner if for every two distinct hyperedges e and f of H, it holds that min{|e \ f |, |f \ e|} = 1. N. Chiarelli andM. Milanic: Linear separation of connected dominating sets in graphs 495 Note that a hypergraph is 1-Sperner if and only if it is both Sperner and dually Sperner. In particular, for Sperner hypergraphs the notions of dually Sperner and 1-Sperner hyper-graphs coincide. Since a hypergraph H is threshold if and only if the Sperner hypergraph obtained from H by keeping only its inclusion-wise minimal hyperedges is threshold, the fact that dually Sperner hypergraphs are threshold is equivalent to the following fact, proved constructively by Boros et al. in [8] using a composition result for 1-Sperner hypergraphs developed therein. Theorem 2.9 (Chiarelli and Milanic [18], Boros et al. [8]). Every 1-Sperner hypergraph is threshold. 3 Connected-domishold graphs via hypergraphs and Boolean functions In a previous work [18, Proposition 4.1 and Theorem 4.5], total domishold graphs were characterized in terms of thresholdness of a derived hypergraph and a derived Boolean function. In this section we give similar characterizations of connected-domishold graphs. We first recall some relevant definitions and a result from [18]. A total dominating set in a graph G is a set S C V(G) such that every vertex of G has a neighbor in S. Note that only graphs without isolated vertices have total dominating sets. A graph G = (V, E) is said to be total domishold (TD for short) if there exists a pair (w, t) where w: V ^ R+ is a weight function and t G R+ is a threshold such that for every subset S C V, w(S) := J2xes w(x) > t if and only if S is a total dominating set in G. A pair (w, t) as above will be referred to as a total domishold (TD) structure of G. The neighborhood hypergraph of a graph G is the hypergraph denoted by N(G) and defined as follows: the vertex set of N(G) is V(G) and the hyperedge set consists precisely of the minimal neighborhoods in G, that is, of the inclusion-wise minimal sets in the family of neighborhoods {N(v) : v G V(G)}.3 Note that a set S C V(G) is a total dominating set in G if and only if it is a transversal of N(G). Proposition 3.1 (Chiarelli and Milanic [18]). For a graph G = (V, E), the following are equivalent: 1. G is total domishold. 2. Its neighborhood hypergraph N(G) is threshold. The constructions of the derived hypergraph and the derived Boolean function used in our characterizations of connected-domishold graphs in terms of their thresholdness are specified by Definitions 3.2 and 3.3. Definition 3.2. Given a graph G, the cutset hypergraph of G is the hypergraph C(G) with vertex set V(G) whose hyperedges are precisely the minimal cutsets in G. Given a finite non-empty set V, we denote by {0,1}V the set of all binary vectors with coordinates indexed by V. Given a graph G = (V, E) and a binary vector x G {0,1}V, its support set is the set denoted by S(x) and defined by S(x) = {v G V : xv = 1}. In 3In [18], the neighborhood hypergraph of G was named reduced neighborhood hypergraph (of G) and denoted by RN(G). We changed the terminology in analogy with the term "cutset hypergraph", which will be introduced shortly. 496 Ars Math. Contemp. 16 (2019) 445-463 the following definition, we associate a Boolean function to a given n-vertex graph G. In order to avoid fixing a bijection between its vertex set and the set [n], we will consider the corresponding Boolean function as being defined on the set {0,1}V, where V = V(G). Accordingly, a separating structure of such a Boolean function can be seen as a pair (w, t) where w: V ^ R+ and t e R+ such that for every x e {0,1}V, we have f (x) =0 if and only if Eves(x) w(v) < t. Definition 3.3. Given a graph G = (V, E), its cutset function is the positive Boolean function fg': {0,1}V ^ {0,1} that takes value 1 precisely on vectors x e {0,1}V whose support set contains some minimal cutset of G. The announced characterizations of connected-domishold graphs in terms of their cutset hypergraphs and cutset functions are given in the following proposition. The proof is based on two ingredients: the characterization of the connected dominating sets of a given connected (non-complete) graph given by Proposition 2.1 and the fact that threshold Boolean functions are closed under dualization. Proposition 3.4. For a connected graph G = (V, E), the following are equivalent: 1. G is connected-domishold. 2. Its cutset hypergraph C(G) is threshold. 3. Its cutset function fg' is threshold. Moreover, if G is not a complete graph and (w, t) is an integral separating structure of fg' or of C(G), then (w, w(V) — t) is a CD structure of G. Proof. We consider two cases, depending on whether G is a complete graph or not. Case 1: G is complete. In this case all the three statements hold. Recall that every complete graph is CD (see Example 1.2). Since complete graphs have no cutsets, the set of hyperedges of the cutset hypergraph C(G) is empty. Hence the hypergraph C(G) is threshold. The absence of (minimal) cutsets also implies that the cutset function f cut is constantly equal to 0 and hence threshold. Case 2: G is not complete. First we will show the equivalence between statements 1 and 3. Since a positive Boolean function f is threshold if and only if its dual function f d(x) = f (x) is threshold, it suffices to argue that G is connected-domishold if and only if (f g')d is threshold. We claim that for every x G {0,1}V, we have (fcgt)d(x) = 1 if and only if S(x), the support set of x, is a connected dominating set of G. Let x e {0,1}V and let S be the support set of x. By definition, (f g')d( x) = 1 if and only if f¿"'(x) = 0, which is the case if and only if V \ S does not contain any minimal cutset of G. This is in turn equivalent to the condition that S is a transversal of the cutset hypergraph of G, and, by Proposition 2.1, to the condition that S is a connected dominating set of G. Therefore, (fg')d(x) = 1 if and only if S is a connected dominating set of G, as claimed. Now, if G is connected-domishold, then it has an integral connected-domishold structure, say (w, t), and (w, t — 1) is a separating structure of the dual function (fQ"')d, which N. Chiarelli andM. Milanic: Linear separation of connected dominating sets in graphs 497 implies that ( fG')d is threshold. Conversely, if the dual function is threshold, with an integral separating structure (w, t), then (w, t +1) is a connected-domishold structure of G. This establishes the equivalence between statements 1 and 3. Next, we show the equivalence between statements 2 and 3. Note that the complete DNF of f(f, the cutset function of G, is given by the expression \JSeC(G) Aues x«. It now follows directly from the definitions of threshold Boolean functions and threshold hypergraphs that function f q'(x) is threshold if and only if cutset hypergraph C(G) is threshold. Finally, if (w, t) is an integral separating structure of f£f, then (w, w(V) - t - 1) is a separating structure of ( fCU')d and hence (w, w(V) -1) is a connected-domishold structure of G. □ Recall that every 1-Sperner hypergraph is threshold (Theorem 2.9) and every threshold hypergraph is asummable (Corollary 2.7). Thus, in particular, every threshold hypergraph is 2-asummable. Applying these relations to the specific case of the minimal cutset hyper-graphs, Proposition 3.4 leads to the following. Corollary 3.5. For every connected graph G, the following holds: 1. If the cutset hypergraph C (G) is 1-Sperner, then G is connected-domishold. 2. If G is connected-domishold, then its cutset hypergraph C(G) is 2-asummable. We will show in Section 4.1 that neither of the two statements in Corollary 3.5 can be reversed. On the other hand, in Section 5 we will prove that all the three properties become equivalent in the hereditary setting. 4 Connected-domishold split graphs The following examples show that for general connected graphs, the CD and TD properties are incomparable: • The path P6 is connected-domishold (it has a unique minimal connected dominating set, formed by its internal vertices) but it is not total domishold (see, e.g., [18]). • The graph in Figure 2 is TD but not CD. vi V2 V3 V4 V8 V7 Vq V5 Figure 2: A TD graph that is not CD. The graph is total domishold: it has a unique minimal total dominating set, namely jvi, v4, v5, v8}. On the other hand, the graph is not connected-domishold. This can be shown by observing that its cutset hypergraph is not 2-asummable and applying Corollary 3.5. To see that the cutset hypergraph of G is 2-summable, note that condition (2.1) is satisfied if we take k = r = 2 and A1 = {v2, v7}, A2 = {v3, v6}, Bi = {v2, v3}, and B2 = {v6, v7}. 498 Ars Math. Contemp. 16(2019)473-486 Interestingly, we will show in Section 5 that if the CD and TD properties are required also for all connected induced subgraphs, then the corresponding graph classes become comparable (see Corollary 5.9). In the rest of this section, we will prove that the two properties coincide in the class of connected split graphs and examine some consequences of this result. Recall that a graph is split if and only if its vertex set has a partition into a clique and an independent set. Foldes and Hammer characterized split graphs as exactly the graphs that are {2K2, C4, C5}-free [30]. In particular, this implies that a split graph can be disconnected only if it has an isolated vertex. Lemma 4.1. Let G be a connected graph and let G' be the graph obtained from G by adding to it a universal vertex. Then, G is connected-domishold if and only if G' is connected-domishold. Proof. Let V(G') = V(G) U {u}, where u is the added vertex. Suppose that G is connected-domishold and let (w, t) be a CD structure of G. Since the set of connected dominating sets of G' consists of all connected dominating sets of G together with all subsets of V(G') containing u, we can obtain a CD structure, say (w',t'), of G' by setting w'(x) = w(x) for all x G V(G), w'(u) = t, and t' = t. Therefore, G' is connected-domishold. Conversely, if (w',t') is a CD structure of G', then (w,t) where t = t' and w is the restriction of w' to V(G) is a CD structure of G. This is because a set X C V(G) is a connected dominating set of G if and only if it is a connected dominating set of G'. Therefore, if G' is connected-domishold then so is G. □ Recall that given a connected graph G, we denote by C(G) (resp., N(G)) its cutset (resp., neighborhood) hypergraph. Lemma 4.2. Let G be a connected split graph without universal vertices. Then C (G) = N (G). Proof. Fix a split partition of V(G), say V(G) = K U I where K is a clique, I is an independent set, and K n I = 0. Clearly, the hypergraphs C(G) and N(G) have the same vertex set. We show that the hyperedge sets are also the same in two steps. First, we show that E(C(G)) C E(N(G)), that is, that every minimal cutset is a minimal neighborhood. To this end, it suffices to show that every minimal cutset S in G is a neighborhood, that is, a set of the form S = N(v) for some v G V(G). This is indeed enough, because if a minimal cutset S in G satisfies S = N(v) for some v G V(G), but N(v) properly contains some other neighborhood, say N(u), then the fact that N(u) is a cutset in G (for instance, it is a u, v-separator) would imply that S is not a minimal cutset. Let S be a minimal cutset in G. Then, S is a minimal u, v-separator for some non-adjacent vertex pair u, v; in particular, S C V(G) \ {u, v}. We claim that N(u) C S or N(v) C S. Suppose that this is not the case. Then, there exist a neighbor of u, say u', such that u' G S, and a neighbor of v, say v', such that v' G S. Since {u, v, u', v'} C V(G) \ S and u and v are in different components of G - S, vertices u' and v' are distinct and non-adjacent. Thus, at least one of u' and v', say u', is in I. This implies that u G K and therefore v G I, which implies that v' G K and hence (u, v', v) is a u, v-path in G — S, a contradiction. This shows that N(u) C S or N(v) C S, as claimed. Since each of N(u) and N(v) is a u, v-separator, the fact that S is a minimal u, v-separator implies that S G {N(u), N(v)}. This completes the proof of the inclusion E(C(G)) C E(N(G)). N. Chiarelli andM. Milanic: Linear separation of connected dominating sets in graphs 499 It remains to show that E(N(G)) C E(C(G)). Let S be a minimal neighborhood in G. Then S = N(v) for some v G V(G). Since v is not universal, the set V(G) \ N[v] is non-empty. Therefore S is a v, w-separator for any w G V(G) \ N[v]; in particular, S is a cutset in G. Suppose for a contradiction that S is not a minimal cutset in G. Then S properly contains some minimal cutset, say S', in G. By the first part of the proof, S' is of the form S' = N(z) for some z G V(G). However, since N(z) is a neighborhood properly contained in S = N(v), this contradicts the fact that S is a minimal neighborhood. □ Theorem 4.3. A connected split graph is connected-domishold if and only if it is total domishold. Proof. If G is complete, then G is both connected-domishold and total domishold. So we may assume that G is not complete. More generally, we show next that we may assume that G does not have any universal vertices. Suppose that G has a universal vertex, say u, and let G' = G - u. By [18, Proposition 3.3], G is TD if and only if G' is TD. If G' is not connected, then {u} is the only minimal connected dominating set of G and hence G is connected-domishold in this case. Furthermore, G is also total domishold: since G' is a disconnected 2K2-free graph, G' has an isolated vertex. Therefore, by [18], G' is TD, and hence so is G. If G' is connected, then by Lemma 4.1, G is CD if and only if G' is CD. Therefore, the problem of verifying whether the CD and the TD properties are equivalent for G reduces to the same problem for G'. An iterative application of the above argument eventually reduces the graph to either a graph where both properties hold or to a connected graph without universal vertices. Now, let G be a connected split graph without universal vertices. By Proposition 3.4, G is connected-domishold if and only if its cutset hypergraph C(G) is threshold. By Proposition 3.1, G is total domishold if and only if its neighborhood hypergraph N(G) is threshold. Therefore, to prove the theorem it suffices to show that C(G) = N(G). But this was established in Lemma 4.2. □ Theorem 4.3 implies another relation between connected-domishold (split) graphs and threshold hypergraphs, one that in a sense reverses the one stated in Proposition 3.4. Given a hypergraph H = (V, E), the split-incidence graph of H (see, e.g., [38]) is the split graph G such that V(G) = V U E, V is a clique, E is an independent set, and v G V is adjacent to e G E if and only if v G e. Theorem 4.4. Let H = (V, E) be a hypergraph with 0 G E. Then H is threshold if and only if its split-incidence graph is connected-domishold. Proof. Since 0 G E, the split-incidence graph of H is connected. It was shown in [18] that a hypergraph is threshold if and only if its split-incidence graph is total domishold. The statement of the theorem now follows from Theorem 4.3. □ It might be worth pointing out that in view of Remark 2.5 and Theorem 4.4, it is an open problem of whether there is a "purely combinatorial" polynomial-time algorithm for recognizing connected-domishold split graphs. Further issues regarding the recognition problem of CD graphs will be discussed in Section 6.1. 500 Ars Math. Contemp. 16(2019)473-486 4.1 Examples related to Corollary 3.5 We now show that neither of the two statements in Corollary 3.5 can be reversed. First we exhibit an infinite family of CD split graphs whose cutset hypergraphs are not 1-Sperner. Example 4.5. Let n > 4 and let G = K* be the graph obtained from the complete graph Kn by gluing a triangle on every edge. Formally, V(G) = jwi,..., un} U [vij : 1 < i < j < n} and E(G) = [uiuj : 1 < i < j < n} U {uivjk : 1 < j 1, where the graphs F1, F2, and a general member of the family {Hi} are depicted in Figure 3. F1 F2 H (i > 1) Figure 3: Graphs F1, F2, and Hi. The proof of Lemma 5.3 is postponed to Section 7. Theorem 5.4. For every graph G, the following are equivalent: 1. G is hereditarily connected-domishold. 2. The cutset hypergraph of every connected induced subgraph of G is 1-Sperner. 3. The cutset hypergraph of every connected induced subgraph of G is threshold. 4. The cutset hypergraph of every connected induced subgraph of G is 2-asummable. 5. G is an {F1,F2, H1,H2,.. .}-free chordal graph. 502 Ars Math. Contemp. 16(2019)473-486 Proof. The equivalence between items 1 and 3 follows from Proposition 3.4. The implications 2 ^ 1 ^ 4 follow from Corollary 3.5. For the implication 4 ^ 5, we only need to verify that the cutset hypergraph of none of the graphs in the set F := {Ck : k > 4} U {F^ F2} U {H : i > 1} is 2-asummable. Let F € F. Suppose first that F is a cycle Ck for some k > 4, let u1, u2, u3, u4 be four consecutive vertices on the cycle. Let A1 = {m1,m3}, A2 = {w2,w4}, B1 = {u1,u2} and B2 = {m3,m4}. Then, A1 and A2 are minimal cutsets of F and thus hyperedges of the hypergraph C(F), while B1 and B2 do not contain any minimal cutset of F and are consequently independent sets in the hypergraph C(F). Since the sets A1, A2, B1 and B2 satisfy condition (2.1), this implies that the hypergraph C(F) is 2-summable. If F € {F^ F2} U {Hi : i > 1}, then let a and b be the two vertices of degree 2 in F, let N(a) = {a1,a2}, N(b) = {b1,b2}, let A1 = N(a), A2 = N(b), B1 = {a1,b1} and B2 = {a2, b2}. The rest of the proof is the same as above. It remains to show the implication 5 ^ 2. Suppose that the implication fails and let G be a minimal counterexample. That is, G is an {F1, F2, H1, H2,.. .}-free chordal graph such that its cutset hypergraph is not 1-Sperner, but the cutset hypergraph of every {F^ F2, H1, H2,.. .}-free chordal graph with fewer vertices than G is 1-Sperner. Since C(G) is not 1-Sperner, G has two minimal cutsets, say S and S', such that min{|S \ S'|, |S' \ S|} > 2. The minimality of G implies that the empty set is not a minimal cutset, hence G is connected. Furthermore, the minimality ensures that S and S' are disjoint sets (otherwise one can remove S n S' from G and have a smaller counterexample). Thus, min{|S|, |S'|} > 2. The minimality also ensures that |S| = |S'| = 2. Indeed, removing a third vertex z, if present, from S does not affect the minimal cutset status of S. Since every minimal cutset in a chordal graph is a clique [25], removing a third vertex z, if present, from S will also not affect the minimal cutset status of S' since the entire S (which is a clique) is present in one component of G - S'. The minimality also ensures that if there are no edges between S and S', then every minimal S, S'-separator T is of size one. Indeed, if this is not the case, then |T| > 2 since G is connected. Let X be a component of G - S containing S' and let Y be any other component of G - S. The fact that T separates S from S' implies that T contains all vertices in N(S) n V(X), which is a non-empty set due to the minimality of S. Since T is a minimal cutset in a chordal graph, it is a clique; in particular, it is fully contained in X. However, this implies that the sets S' and T are minimal cutsets in the graph G - V (Y) such that min{|S' \ T |, |T \ S' |} > 2, contrary to the minimality of G. Let X, Y be two distinct components of G - S and X', Y' two distinct components of G - S'. By Lemma 2.2, there exist vertices x € X and y € Y such that each of x and y dominates S and x' € X' and y' € Y' such that each of x' and y' dominates S'. Let D1 be the subgraph of G induced by S U {x, y} and let D2 be the subgraph of G induced by S' U {x', y'}. The definitions of D1 and D2 and Lemma 2.2 imply that D1 and D2 are two induced diamonds in G satisfying the hypotheses of the Diamond Lemma (Lemma 5.3). Consequently, G has an induced subgraph isomorphic to F1, F2, or Hi for some i > 1, a contradiction. This completes the proof of the theorem. □ Remark 5.5. The cutset hypergraph of a disconnected graph H is equal to (V(H), {0}) and is clearly 1-Sperner (and therefore also threshold and 2-asummable). It follows that conditions from items 2-4 in Theorem 5.4 are equivalent to the analogous conditions in which the respective properties are imposed on cutset hypergraphs of all induced subgraphs of G (and not only of connected ones). N. Chiarelli andM. Milanic: Linear separation of connected dominating sets in graphs 503 In the rest of this section, we examine some of the consequences of the forbidden induced subgraph characterization of hereditarily CD graphs given by Theorem 5.4. The kite (also known as the co-fork or the co-chair) is the graph depicted in Figure 4. The equivalence between items 1 and 5 in Theorem 5.4 implies that the class of hereditarily CD graphs is a proper generalization of the class of kite-free chordal graphs. Corollary 5.6. Every kite-free chordal graph is hereditarily CD. Corollary 5.6 further implies that the class of hereditarily CD graphs generalizes two well known classes of chordal graphs, the class of block graphs and the class of trivially perfect graphs. A graph is said to be a block graph if every block (maximal connected subgraph without cut vertices) of it is complete. The block graphs are well known to coincide with the diamond-free chordal graphs. A graph G is said to be trivially perfect [33] if for every induced subgraph H of G, it holds a(H) = |K(H)|, where a(H) denotes the independence number of H (that is, the maximum size of an independent set in H) and K(H) denotes the set of all maximal cliques of H. Trivially perfect graphs coincide with the so-called quasi-threshold graphs [67], and are exactly the {P4, C4}-free graphs [33]. Corollary 5.7. Every block graph is hereditarily CD. Every trivially perfect graph is hereditarily CD. Another class of graphs contained in the class of hereditarily CD graphs is the class of graphs defined similarly as the hereditarily CD graphs but with respect to total dominating sets. These so-called hereditarily total domishold graphs (abbreviated hereditarily TD graphs) were studied in [18], where characterizations analogous to those given by Theorem 5.4 were obtained, including the following characterization in terms of forbidden induced subgraphs. Theorem 5.8 (Chiarelli and Milanic [18]). For every graph G, the following are equivalent: 1. G is hereditarily total domishold. 2. No induced subgraph of G is isomorphic to a graph in Figure 5. Theorems 5.4 and 5.8 imply the following. Corollary 5.9. Every hereditarily TD graph is hereditarily CD. Proof. It suffices to verify that each of the forbidden induced subgraphs for the class of hereditarily connected-domishold graphs contains one of the graphs from Figure 5 as induced subgraph. A cycle Ck with k > 4 contains (or is equal to) one of C4,C5,C6,P6. The graphs F and F2 are contained in both sets of forbidden induced subgraphs. Finally, each graph of the form H where i > 1 contains 2K3 as induced subgraph. □ Figure 4: The kite. 504 Ars Math. Contemp. 16(2019)473-486 <0> <®> AA Fo 2 k, F, A I>— O— XI 2. Observe that for all i > 2 the graph H contains an induced subgraph isomorphic to 2D, the union of two diamonds (see Figure 3 and Figure 4). In O(|V(G)8|) time, we can enumerate all induced subgraphs F of G isomorphic to 2D. For each such subgraph F we have to verify whether it can be extended to an induced subgraph of the form Hj, for some i > 2. We do this as follows. Let D1 and D2 be the connected components (diamonds) of F. Furthermore, let u1, u2 be the two vertices of degree 2 in D1 and similarly let v1, v2 be the two vertices of degree 2 in D2. Now we can verify that F is not contained in any induced subgraph of G isomorphic to Hj (for some i > 2) by checking for each pair uj, v j, with i, j G {1, 2}, that uj and v j belong to different components of G - (NG_Mi[V(Di) \ {uj}] U NG-Vj [V(D2) \ {vj}]). This can be done in polynomial time and consequently the recognition of hereditarily CD graphs is a polynomially solvable problem. The second part of the theorem follows from Theorem 6.1, since every hereditarily CD graph is chordal and chordal graphs are a subclass of Gp for the polynomial p(n) = n [59]. □ It might seem conceivable that a similar approach as the one used in Theorem 6.1 could be used to develop an efficient algorithm for recognizing connected-domishold graphs in classes of graphs with only polynomially many minimal connected dominating sets. However, it is not known whether there exists an output-polynomial-time algorithm for the problem of enumerating minimal connected dominating sets. In fact, as shown by Kante et al. [38], even when restricted to split graphs, this problem is equivalent to the well-known Trans-Enum problem in hypergraphs, the problem of enumerating the inclusion-minimal transversals of a given hypergraph. The Trans-Enum problem has been intensively studied but it is still open whether there exists an output-polynomial-time algorithm for the problem (see, e.g., the survey [28]). 6.2 The weighted connected dominating set problem The Weighted Connected Dominating Set (WCDS) problem takes as input a connected graph G together with a cost function c: V (G) ^ R+, and the task is to compute a connected dominating set of minimum total cost, where the cost of a set S C V (G) is defined, as usual, as c(S) = J2veS c(v). The WCDS problem has been studied extensively due to its many applications in networking (see, e.g., [6,26,66]). The problem is NP-hard not only for general graphs [36] but also for split graphs [46], chordal bipartite graphs [52], circle graphs [40], and cocomparability graphs [14]. Polynomial-time algorithms for the problem were developed for interval graphs [15] and more generally for trapezoid graphs [64] and circular-arc graphs [15, 37], as well as for distance-hereditary graphs [68]. In this section, we will identify further graph classes where the WCDS problem is polynomially solvable, including the class of F2-free split graphs (see Figure 1). This result 508 Ars Math. Contemp. 16(2019)473-486 is interesting in view of the fact that for split graphs, the WCDS problem is not only NP-hard but also hard to approximate, even in the unweighted case. This can be seen as follows: Let H = (V, E) be a Sperner hypergraph with 0, V E and let G be its split-incidence graph. Then G is a connected split graph without universal vertices, hence C(G) = N(G) by Lemma 4.2. It can be seen that the hyperedge set of N(G) is exactly E, and therefore Proposition 2.1 implies that the problem of finding a minimum connected dominating set in G is equivalent to the Hitting Set problem in hypergraphs, the problem of finding a minimum transversal of a given hypergraph. This latter problem is known to be equivalent to the well-known Set Cover problem and hence inapproximable in polynomial time to within a factor of (1 - e) log |V|, for any e > 0, unless P = NP [24]. It follows that the WCDS problem is hard to approximate to within a factor of (1 - e) log | V(G) | in the class of split graphs. We will show that the WCDS problem is polynomially solvable in the class of hereditarily CD graphs; the result for F2-free split graphs will then follow. Our approach is based on connections with vertex separators and Boolean functions. First, we recall the following known results about: (i) the relation between the numbers of prime implicants of a threshold Boolean function and its dual, and (ii) the complexity of dualizing threshold Boolean functions. These results were proved in the more general context of regular Boolean functions (as well as for other generalizations, see, e.g., [7]). Theorem 6.3. Let f be an n-variable threshold Boolean function having exactly q prime implicants. Then: 1. (Bertolazzi and Sassano [5], Crama [21], see also [22, Theorem 8.29]) The dual function fd has at most N prime implicants, where N is the total number of variables in the complete DNF of f. 2. (Crama and Hammer [22, Theorem 8.28] and Peled and Simeone [56]) There is an algorithm running in time O(n2q) that, given the complete DNF of f, computes the complete DNF of the dual function fd. The algorithm by Crama and Hammer [22] is already presented as having time complexity O(n2q), while the one by Peled and Simeone [56] is claimed to run in time O(nq). However, since fd can have O(nq) prime implicants, the total size of the output is of the order O(n2q). The time complexity O(nq) of the algorithm by Peled and Simeone relies on the assumption that the algorithm outputs the prime implicants of the dual function one by one, each time overwriting the previous prime implicant (with a constant number of operations per implicant on average). The relation between the numbers of prime implicants of a threshold Boolean function and its dual given by Theorem 6.3 implies that classes of connected-domishold graphs with only polynomially many minimal cutsets are exactly the same as the classes of connected-domishold graphs with only polynomially many minimal connected dominating sets. More precisely: Lemma 6.4. Let G = (V, E) be an n-vertex connected-domishold graph that is not complete. Let vc (resp. vs) denote the number of minimal connected dominating sets (resp. of minimal cutsets) of G. Then vs < (n — 2)vc and vc < (n — 2)vs. Proof. By Proposition 3.4, the cutset function fg" is threshold. Function fg" is an n-variable function with exactly vs prime implicants in its complete DNF. Recall from the N. Chiarelli andM. Milanic: Linear separation of connected dominating sets in graphs 509 proof of Proposition 3.4 that the dual function (fg")d takes value 1 precisely on the vectors x g {0,1}V whose support is a connected dominating set of G. Therefore, the prime im-plicants of (ff)d are in bijective correspondence with the minimal connected dominating sets of G and the number of prime implicants of (fG')d is exactly vc. Since every minimal cutset of G has at most n — 2 vertices, Theorem 6.3 implies that vc < (n — 2)vs, as claimed. Conversely, since f£f = ((fG')d)d, the inequality vs < (n — 2)vc can be proved by a similar approach, provided we show that every minimal connected dominating set of G has at most n — 2 vertices. But this is true since if D is a connected dominating set of G with at least n — 1 vertices, with V(G) \ {u} C D for some u g V(G), then a smaller connected dominating set D' of G could be obtained by fixing an arbitrary spanning tree T of G[D] and deleting from D an arbitrary leaf v of T such that NG(u) = {v}. (Note that since G is connected but not complete, it has at least three vertices, hence T has at least two leaves.) This completes the proof. □ We now have everything ready to derive the main result of this section. Recall that for a polynomial p, we denote by Gp the class of graphs with at most p( | V(G) |) minimal vertex separators. Theorem 6.5. For every nonzero polynomial p, the set of minimal connected dominating sets of an n-vertex connected-domishold graph from Gp has size at most O(n • p(n)) and can be computed in time O(n • p(n) • (n2 + p(n))). In particular, the WCDS problem is solvable in polynomial time in the class of connected-domishold graphs from Gp. Proof. Let p and G be as in the statement of the theorem and let CD(G) be the set of minimal connected dominating sets of G. If G is complete, then CD(G) = {{v} : v G V(G)} and thus |CD(G)| = n = O(n • p(n)) (since the polynomial is nonzero). Otherwise, we can apply Lemma 6.4 to derive |CD(G) | < (n — 2) • p(n). A polynomial-time algorithm to solve the WCDS problem for a given connected-domishold graph G G Gp with respect to a cost function c: V(G) ^ R+ can be obtained as follows. First, we may assume that G is not complete, since otherwise we can return a set {v} where v is a vertex minimizing c(v). We use a similar approach as in the proof of Theorem 6.1. Using the algorithm of Berry et al. [3], we compute in time O(n3p(n)) the set E of all minimal vertex separators of G. We can assume that each minimal vertex separator has its elements listed according to some fixed order of V(G) (otherwise, we can sort them in time O(n • p(n)) using, e.g., bucket sort). The cutset hypergraph, C(G), is then computed by comparing each pair of sets in E and discarding the non-minimal ones; this can be done in time O(n • (p(n))2). The cutset hypergraph directly corresponds to the complete DNF of the cutset function fGcut. The next step is to compute the complete DNF of the dual function (fG')d. By Theorem 6.3, this can be done in time O(n2 • p(n)). Since each term of the DNF is a prime implicant of (fG')d and the prime implicants of (fG')d are in bijective correspondence with the minimal connected dominating sets of G, we can read off from the DNF all the minimal connected dominating sets of G. The claimed time complexity follows. Once the list of all minimal connected dominating sets is available, a polynomial-time algorithm for the WCDS problem on (G, c) follows immediately. □ 510 Ars Math. Contemp. 16(2019)473-486 In the case of chordal graphs, we can improve the running time by using one of the known linear-time algorithms for listing the minimal vertex separators of a given chordal graph due to Kumar and Veni Madhavan [45], Chandran and Grandoni [13], and Berry and Pogorelcnik [4]. Theorem 6.6. Every n-vertex connected-domishold chordal graph has at most O(n2) minimal connected dominating sets, which can be enumerated in time O(n3). In particular, the WCDS problem is solvable in time O(n3) in the class of connected-domishold chordal graphs. Proof. Let G be an n-vertex connected-domishold chordal graph. The theorem clearly holds for complete graphs, so we may assume that G is not complete. Since G is chordal, it has at most n minimal vertex separators [59]; consequently, G has at most n minimal cutsets. Since G is connected-domishold, it has at most n(n - 2) minimal connected dominating sets, by Lemma 6.4. The minimal connected dominating sets of G can be enumerated as follows. First, we compute all the O(n) minimal vertex separators of G in time O(n + m) (where m = |E(G) |) using one of the known algorithms for this problem on chordal graphs [4,13, 45]. Assuming again that each minimal vertex separator has its elements listed according to some fixed order of V(G), we then eliminate those that are not minimal cutsets in time O(n3), by directly comparing each of the O(n2) pairs for inclusion. The list of O(n) minimal cutsets of G yields its cutset function, fms. The list of minimal connected dominating sets of G can be obtained in time O(n3) by dualizing fm using one of the algorithms given by Theorem 6.3. The WCDS problem can now be solved in time O(n3) by evaluating the cost of each of the O(n2) minimal connected dominating sets and outputting one of minimum cost. □ From Theorem 6.6 we derive two new polynomially solvable cases of the WCDS problem. Recall that the graphs F1, F2, and a general member of the family {H®} are depicted in Figure 3. Corollary 6.7. The WCDS problem is solvable in time O(n3) in the class of {F1, F2, H1, H2,...} -free chordal graphs and in particular in the class of F2-free split graphs. Proof. By Theorem 5.4, every {F1, F2, H1, H2,.. .}-free chordal graphs is (hereditarily) CD so Theorem 6.6 applies. The statement for F2-free split graphs follows from Corollary 5.10. □ We conclude this section with two remarks, one related to Theorem 6.6 and one related to Theorems 6.1 and 6.5. Remark 6.8. The bound O (n2) given by Theorem 6.6 on the number of minimal connected dominating sets in an n-vertex connected-domishold chordal graph is sharp. There exist n-vertex connected-domishold chordal graphs with ©(n2) minimal connected dominating sets. For instance, let S" be the split graph with V(S") = K UI where K = {u1,...,U"} is a clique, I = {v1,..., v"} is an independent set, K n I — 0, and for each i g [n], vertex u® is adjacent to all vertices of I except v®. Since every vertex in I has a unique non-neighbor in K, we infer that S" is F2-free. Therefore, by Corollary 5.10 graph S" is a (hereditarily) connected-domishold graph. Note that every set of the form {u®, uj} where 1 < i < j < n is a minimal connected dominating set of S". It follows that S" has at least (") = ©(| V(S") |2) minimal connected dominating sets. N. Chiarelli andM. Milanic: Linear separation of connected dominating sets in graphs 511 Remark 6.9. Theorems 6.1 and 6.5 motivate the question of whether there is a polynomial p such that every connected CD graph G has at most p( \V (G) \) minimal vertex separators. As shown by the following family of graphs, this is not the case. For n > 2, let Gn be the graph obtained from the disjoint union of n copies of the P4, say (xi, ai, hi, yi) for i = 1,..., n, by identifying all vertices xi into a single vertex x, all vertices yi into a single vertex y, and for each vertex z other than x or y, adding a new vertex z' and making it adjacent only to z. It is not difficult to see that Gn has exactly two minimal CD sets, namely {a1,..., an} U {h1,..., hn} U {v} for v e {x, y}. A CD structure of Gn is given by (w,t) where t = 4n +1, w(x) = w(y) = 1, w(ai) = w(hi) = 2 for all i e {1,... ,n} and w(z) = 0 for all other vertices z. Therefore, Gn is CD. However, Gn has 4n + 2 vertices and 2n minimal x, y-separators, namely all sets of the form {c1,... ,cn} where ci e {ai, hi} for all i. 7 Proof of Lemma 5.3 (Diamond Lemma) In the proof of the Diamond Lemma, we use the following notation. We write u ~ v (resp. u ^ v) to denote the fact that two vertices u and v are adjacent (resp. non-adjacent). Given two vertex sets A and B in a graph G, we denote by e(A, B) the number of edges with one endpoint in A and one endpoint in B. A pattern is a triple (V, E, F) where G = (V, E) is a graph and F is a subset of non-adjacent vertex pairs of G. We say that a graph G' realizes a pattern (V, E, F) if V(G') = V and E Ç E(G') Ç E U F. (a) t c c c Figure 7: Two patterns (V, E, F) used in the proofs. Graphs (V, E) are depicted with solid lines. Possible additional edges (elements of F) are depicted with dotted lines. We start with a lemma. Lemma 7.1. Let G be a connected chordal graph and let H be an induced subgraph of G that realizes the pattern in Figure 7(a). Moreover, suppose that: (1) vertices t1 and t[ are in different components of G — {c1, ci}, and (2) the component of G — {c1, ci1} containing {c2,c'2,t'2} has a vertex dominating {c1,c'1}. Then G contains F1 or F2 as an induced subgraph. Proof. By contradiction. Suppose that G and H satisfy the assumptions of the lemma, but G is {F1, F2}-free. We first show that none of the dotted edges can be present in H. We infer that c1 ^ c2 and c1 ^ c'2, for otherwise an induced F1 or F2 arises on the vertex set V(H) \ {t1}, depending on whether one or both edges are present. Next, t1 ^ t'2, since otherwise a 4-cycle arises on the vertex set {t1, c1, c'2, t'2} (if t1 ^ c'2) or an induced F1 512 Ars Math. Contemp. 16(2019)473-486 arises on the vertex set V(H) \{c2} (otherwise). Finally, we infer that t1 ^ c2 and t1 ^ c'2, for otherwise an induced F1 or F2 arises on the vertex set V(H) \ {t1}, depending whether one or both edges are present. Let K be the component of G — {c1,c'1} such that VJ, = {c2, c'2, t'2} C V(K), and let w g V(K) be a vertex dominating {c,^} that is closest to V2 in K. The preceding paragraph implies that w G V2'. We will now show that w ^ v for any v G V2'. Suppose for a contradiction that w ~ v for some v G V2. Note that w G {t1,t'1} since there are no edges between the sets {t1,11} and V2. Furthermore, property (1) implies that there exists some t G {t1,t'1} such that w ^ t. Suppose that w ~ t2. Then w ~ c2, since otherwise a 4-cycle arises on the vertex set {w, c1,c2,t2}. But now the vertex set {t2, c2, w, c1,c[,t} induces a copy of F1 in G. Therefore w ^ t2, and an induced F1 or F2 arises on the vertex set V2 U {w, c, c1}, depending on whether w is adjacent to one or both vertices in {c2,c!2}. This contradiction shows that w has no neighbor in V2'. Let P = (w = w1,... ,wk) with wk G V2, be a shortest w, V2'-path in K. Note that k > 3 and the choice of P implies that for all i G {1,... ,k — 2} vertex wi is not adjacent to any vertex in V2'. In order to avoid an induced cycle of length at least 4 within V(P) U V2 U {c1}, we infer that vertex c must be adjacent to all the internal vertices of P (that is, to w2,..., wk-1). Next we infer that wk-1 ~ t2, since otherwise the vertex set V2 U {c1,wk-1,wk-2} induces a copy of F1 or F2 (depending on the number of edges between wk-1 and {c2, c2}). Moreover, to avoid an induced 4-cycle on the vertex set {t2, wk-1, c, c2}, we infer that wk-1 ~ c2. But now an induced F1 arises on the vertex set {t2, c2,c1, wk-1, wk-2,wk-3} (where if k = 3 we define w0 = c1). This last contradiction completes the proof of Lemma 7.1. □ Let us now recall Lemma 5.3. Lemma 5.3 (Diamond Lemma). Let G be a connected chordal graph. Suppose that G contains two induced diamonds D1 = (V1, E1) and D2 = (V2,E2) such that: (i) C1 n C2 = 0. (ii) If no vertex in C1 is adjacent to a vertex in C2, then there exists a C1,C2-separator in G of size one. (iii) For each j G {1, 2} the tips (i.e., tj ,tj) of Dj belong to different components of G — Cj. (iv) For j G {1,2} every component of G — Cj has a vertex that dominates Cj. Then G has an induced subgraph isomorphic to F1,F2, or Hi for some i > 1, where the graphs F1, F2, and a general member of the family {Hi} are depicted in Figure 3. Proof. We will prove the Diamond Lemma by contradiction through a series of claims. Let G be a connected chordal graph and let D1 and D2 be two induced diamonds with properties (i)-(iv) in G. Suppose for a contradiction that G is {F1,F2,H1, H2,... }-free. Claim 1. For each j G {1,2}, there exists some t G Tj such that N[t] n C3-j = 0 (that is, each diamond has a tip that is not adjacent to any center of the other diamond). Proof. Suppose that each tip of Dj is adjacent to at least one vertex in C3-j. Then Tj belongs to one component of G — Cj, contradicting property (iii). □ N. Chiarelli andM. Milanic: Linear separation of connected dominating sets in graphs 513 Claim 2. If there exists some t G Tl n T2, then Tl n T2 = {t} and Tj n = 0 for j G{1,2}. Proof. Follows immediately from Claim 1 and property (iii). □ Claim 3. |Vi n V21 < 1. Proof. First note that we have |T1 n V2| < 1, since otherwise Tl = T2, contradicting property (iii). Observe also that by property (i) we have C1 n V2 C C1 n T2, implying that |Ci n V2I < 1. Consequently |V1 n V21 < 2. Now suppose for a contradiction that | V1 n V21 = 2. By property (i) and Claim 2 we may assume without loss of generality that c1 = t2 and ti = c2. To avoid an induced 4-cycle on the set T1 U T2 we infer that t1 ^ t2. Furthermore, property (iii) implies that c1 ^ t2 and c2 ^ t1. But now the set V1 U V2 induces a copy of Fi (if c'L ^ c2) or a copy of F2 (otherwise). □ Claim 4. If V1 n V2 = {v} then v G T1 n T2. Proof. Suppose for a contradiction that V1 n V2 = {v}, and v G T1 n T2. Property (i) implies that v G Tj n C*3_j for some j G {1, 2}, say v — c1 — t2. Claim 1 implies (without loss of generality) that t'L ^ c2 and t'L ^ c2. Property (iii) implies that c'L ^ t2. Note that t'L ^ t2, for otherwise a 4-cycle arises on the vertex set {t'L, c1, c2, t2}. Now the subgraph of G induced by Vl U V2 realizes the pattern depicted in Figure 7(a) and we apply Lemma 7.1 to derive a contradiction. □ Claim 5. Vl n V2 = 0. Proof. Suppose for a contradiction that Vl n V2 = 0. Claim 3 implies that Vl n V2 = {v} and by Claim 4, v G Tl n T2. Without loss of generality we may assume that tL = t2. Claim 1 implies that there is no edge between ti and C2 and between t2 and Cl. Furthermore, we must have ti ^ t2 since otherwise G contains an induced 4-cycle on the vertex set {ti, cL, c2, t2} (if cL ~ c2) or an induced 5-cycle on the vertex set {t'L, cL, tL, c2, t2} (otherwise). It remains to analyze the edges between and C2. Clearly, e(CL, C2) G {0,1,..., 4}. Notice that implies an induced on the set Vl U V2; implies an induced on the vertex set (Vl U V2) \ {t'L}; implies an induced Fi on the vertex set (Vl U V2) \ {tL}; implies an induced F2 on the vertex set (Vl U V2) \ {tL}. e(Ci ,C2) Consequently e(CL, C2) = 2, and without loss of generality, to avoid an induced 4-cycle, we may assume that cL ~ c2 and cL ~ c2. But now an induced F2 arises on the vertex set (Vi u V2) \{ti}. □ In the rest of the proof of the Diamond Lemma we consider the edges between V1 and V2 . By Claim 1 and property (iii) we may assume without loss of generality the following. Assumption 1. e({t'L}, V2) = e({t2}, Vl) = 0. 514 Ars Math. Contemp. 16(2019)473-486 Therefore, it remains to consider only the (non-)edges between {ti} and C2, between {t2} and C1, between C1 and C2, and between {t1} and {t2}. Claim 6. e(C1,C2) < 1. Proof. Clearly, e(C1,C2) < 4. Note that if e(C1,C2) G {3,4}, then the vertex set (V1 U V2) \ {t1 ,t2} induces either a copy of or a copy of F2. Furthermore, if e(C1, C2) = 2, then, to avoid an induced 4-cycle, we may assume without loss of generality that c1 ~ c2 and c1 ~ c2. Now the subgraph of G induced by (V1 U V2) \ {t2} realizes the pattern depicted in Figure 7(a) and we apply Lemma 7.1 to derive a contradiction. □ By Claim 6 we may assume without loss of generality the following. Assumption 2. c1 ^ c2, c1 ^ c'2, and c1 ^ c22. Claim 7. e({tj}, C3_j) < 1 for j G {1, 2}. Proof. Suppose for a contradiction that e(tj, C3-j) = 2. To avoid an induced H1 on the vertex set (V1 U V2) \ {t3_j}, we must have an edge between C1 and C2. By Claim 6 and Assumption 2, we have c1 ~ c2, but now an induced F1 arises on the vertex set Vj U C3_j. □ Claim 8. We may assume without loss of generality that tj ^ c'3_j for j G {1, 2}. Proof. Let j G {1,2}. By Claim 7, we have that either tj ^ c3_j or tj ^ c33_j. If both edges are missing, then there is nothing to show. Suppose now that e(tj, C3-j) = 1. To see that we may assume that tj ~ c3-j, note that this can be achieved by swapping c3-j and c3_j (if necessary) when c1 ^ c2, while if c1 ~ c2, then tj ~ c3_j, since otherwise the vertex set {tj, c1, c2, c3_j} induces a 4-cycle in G. □ Claim 8 yields the following. Assumption 3. t1 ^ c2 and t2 ^ c1. Claim 9. t1 * t2. Proof. Suppose for a contradiction that 11 ~ t2. First we will show that ci ~ t2 or c2 ~ t1. Suppose for a contradiction that c1 ^ t2, and c2 ^ t1. Then an induced H2 arises on the set V1 U V2 (if c1 ^ c2) or an induced 4-cycle on the vertex set {c1, t1, t2, c2} (otherwise). Without loss of generality we may assume that c1 ~ t2. By Assumption 3 we have t2 ^ c1, and to avoid an induced H1 on the vertex set (V1 U V2) \ {¿1}, we must have an edge between t1 and C2 or c1 ~ c2. If t1 ~ c2, then the vertex set C1 U C2 U {t1, t2} induces a copy of or F2 (depending on whether c1 ~ c2 or not). Consequently t1 ^ c2. Therefore the only edge we can have is c1 ~ c2, but now an induced arises on the vertex set C1 U C2 U{t1,t2}. □ Claim 10. t1 ^ c2 and t2 ^ c1. N. Chiarelli andM. Milanic: Linear separation of connected dominating sets in graphs 515 Proof. By symmetry, it suffices to show that ci ^ t2. Suppose for a contradiction that ci ~ t2. Claim 9 implies that t1 ^ t2. Recall that by Assumption 1 we have t2 ^ ti. Furthermore e({t1}, C2) = 0, since otherwise t1 ~ c2 (by Assumption 3) and either the vertex set {t1, c1, t2, c2} induces a 4-cycle (if c1 ^ c2) or the vertex set C1 U C2 U {t1, t2} induces an (otherwise). Let K be the component of G - C1 such that V2 C V(K). By property (iv) there exists a vertex in V(K) that dominates C1. Let w G V(K) be a vertex that dominates C1 and is closest to V2 in K. Clearly, w G V2. Property (iii) implies that there exists some t G T1 such that w = t and w ^ t. Note that c1 ^ c2, since otherwise the subgraph of G induced by C1 U C2 U {w, t, t2} realizes the pattern depicted in Figure 7(a) and we apply Lemma7.1 to derive a contradiction. Furthermore, w ^ t2, since otherwise t2 and t2 would belong to the same component of G - C2, contradicting property (iii). Next, we have that w ^ c2, since otherwise either the vertex set {w, c1, t2, c2} induces a 4-cycle (if w ^ t2) or the vertex set C1 U {t, w, t2,c2} induces an F1 (otherwise). By symmetry, w ^ c2. Consequently, w ^ t2, for otherwise a copy of H1 arises on the vertex set C1 U V2 U {w}. Let P = (w = w1,..., wk) with wk G V2 be a shortest w, V2-path in K. Note that k > 3 and that the choice of P implies that for all i G {1,..., k — 2} vertex w4 is not adjacent to any vertex in V2. Furthermore, wk-1 ^ t2, since otherwise t2 and t2 would belong to the same component of G — C2, contradicting property (iii). In order to avoid an induced cycle of length at least 4 within V(P) U V2 U {c1}, we infer that vertex c1 must be adjacent to all the internal vertices of P (that is, w2,..., wk-1). If wk-1 ^ t2, then wk G C2, which yields an induced 4-cycle on the vertex set {c1, t2, wk, wk-1}. Therefore, wk-1 ~ t2. But now either an induced H1 arises on the vertex set V2 U {wk-1, wk-2, c1} (if e({wk-1}, C2) = 0) or an induced F1 or F2 arises on the vertex set V2 U {wk-1, c1} (otherwise). □ Assumptions 1-3 and Claims 7, 9, and 10 imply the following. Claim 11. The only possible edge between V1 and V2 is the edge c1c2. Let H be the subgraph of G induced by V1 U V2. By Claim 11, H realizes the pattern in Figure 7(b). Let K-1 be the component of G — C1 containing V2 and let U-1 be the set of vertices in K-1 that dominate C1. By property (iv), set U is non-empty. Let u be a vertex in U-1 that is closest in K-1 to C2. Graph K-2 and vertex u-2 are defined analogously. By property (iii) we may assume without loss of generality the following. Assumption 4. t1 G V(K2-1) andt2 G V(K-2). Claim 12. {u"1,u"2}n{t/1,t2} = 0 and e({u-1,u-2}, {t1,t2}) =0. Proof. Since u-1 G V(K2-1) and t1 G V(K2-1), the definition of K2-1 implies that u-1 = t1 and u-1 ^ t1. By symmetry, we also have u-2 = t2 and u-2 ^ t2. We next show that u-1 = t2 and u-1 ^ t2 (and then the remaining inequality u-2 = t1 and non-adjacency u-2 ^ t1 will follow by symmetry). First note that u-1 = t2 since u-1 dominates C1 and e({t2},C1) =0 by Assumption 1. Suppose for a contradiction that u-1 ~ t2. This implies that u-1 ^ t2, since otherwise t2 and t2 would belong to the same component of G — C2, contradicting property (iii). But now, either an induced H2 arises on the vertex set V2 U C1U {u-1, t1} (if e({u-1}, C2) = 0), or an induced H1 arises 516 Ars Math. Contemp. 16 (2019) 445-463 either on the vertex set C1 U C2 U {u 1, ti, t2} (if e({u 1}, C2) = 1) or on the vertex set Ci U C2 U {u-1, t1, t2} (otherwise). □ Claim 13. Vertices u-1 and u-2 are distinct and non-adjacent, and at least one of the sets N(u-1) n V2, N(u-2) n V1 is empty. Proof. First we prove that u-1 ^ c2 or u-1 ^ c2. Suppose for a contradiction that e({u-1}, C2) = 2. Then either an induced F1 arises on the vertex set C1 U C2 U {u-1, t2} (if c1 ~ c2) or an induced H1 arises on the vertex set C1 U C2 U {u-1, t1, t2} (otherwise). Therefore, u-1 ^ c2 or u-1 ^ d2, as claimed. Since u-2 dominates C2 but u-1 does not, we infer that u-1 = u-2. Next we prove that u-1 ^ u-2. Suppose for a contradiction that u-1 ~ u-2. We claim that u-1 ~ c2 or u-2 ~ c1. Suppose to the contrary that u-1 ^ c2 and u-2 ^ c1. Then c1 ^ c2, since otherwise an induced 4-cycle arises on the vertex set {c1, c2, u-2, u-1}. Furthermore, u-1 ~ c2 or u-2 ~ c1, since otherwise an induced H2 arises on the vertex set C1 U C2 U {t1,u-1,u-2,t2}. If only one of the edges u-1c2 and u-2c1 is present, say u-1c2, then an induced H1 arises on the vertex set C1 U C2 U {t1,u-1,u-2}. If both edges u-1c2 and u-2c1 are present, then an induced arises on the vertex set C1 U C2 U {u-1, u-2}. Both cases lead to a contradiction, thus u-1 ~ c2 or u-2 ~ c1, as claimed. We may assume without loss of generality that u-1 ~ c2. Now we must have c1 ^ c2 and c1 ^ u-2, since otherwise an induced F1 or F2 arises on the vertex set C1 U C2 U{u-1,u-2}, depending on whether one or both edges are present. But now an induced H1 arises on the vertex set C1 U C2 U {t1, u-1, u-2}, a contradiction. To complete the proof, we consider the two cases depending on whether c1 is adjacent to c2 or not. Suppose first that c1 ~ c2. Then u-1 ^ c2, for otherwise u-1 ^ c2 and G contains an induced 4-cycle on the vertex set {u-1, c2, c2, c1}. By symmetry, we also have u-2 ^ c1. If u-1 ~ c2 and u-2 ~ c1, then an induced F1 arises on the vertex set C1 U C2 U{u-1,u-2}. It follows that H contains at most one of the edges u-1c2 and u-2c1. By symmetry, we may assume without loss of generality that u-1 ^ c2. We infer that u-1 ^ t2, since otherwise G contains an induced C4 on the vertex set {u-1, c1, c2, t2}. It follows that the set N(u-1) n V2 is empty. Finally, suppose that c1 ^ c2. Then either e({u-1}, C2) =0 or e({u-2}, C1) = 0, for otherwise G contains an induced 4-cycle on the vertex set {u-1, x, u-2, y} where x G N(u-1) n C2 and y G N(u-2) n C1. By symmetry, we may assume without loss of generality that e({u-1}, C2) =0. We infer that u-1 ^ t2, since otherwise G contains an induced H2 on the vertex set C1 U V2 U {u-1, t1}. It follows that the set N(u-1) n V2 is empty. □ By Claim 13 we may assume without loss of generality the following. Assumption 5. e({u-1}, V2) = 0. Claim 14. c1 ^ c2. Proof. Suppose for a contradiction that c1 ~ c2 and consider K-1, u-1, K-2, and u-2. Clearly, u-1 G C1 U C2 U {t2}. Moreover, by Claim 12 we have we have u-1 = t1 and u-1 ^ t1. Also, by symmetry, u-2 G C1 U C2 U {t1}, u-2 = t2 and u-2 ^ t2. Furthermore, by Assumption 5 we have N(u-1) n V2 = 0. Let P-1 = (u-1 = u1,u2,...,uk), with uk G V2' = C2 U {t2} be a shortest u-1, V2'-path in K-1, and similarly, let P-2 = (u-2 = v1, v2,..., v^), with v£ G V1' = N. Chiarelli andM. Milanic: Linear separation of connected dominating sets in graphs 517 Cl U {u-1, ¿1} be a shortest u-2, V/-path in V(K—2). The fact that N(u-1) n V2 = 0 implies that k > 3. Furthermore, Claims 11 and 13 imply that u-2 G V1 U {u-1}. Therefore, I > 2. Since u-1 ^ c2, we infer that vertex c1 must be adjacent to all the internal vertices of P-1, for otherwise G would contain an induced cycle of length at least 4. Consequently, the definition of u-1 implies that uj ^ c1 for all j G {2,..., k — 1}. Suppose that uk-1 ~ c2. To avoid an induced 4-cycle on the vertex set {c1, c2, c2, uk-1}, we infer that uk-1 ~ c2. We must have k = 3 since if k > 4, then the vertex set C2 U {c1, uk-1, uk-2, uk-3} induces a copy of F1. But now, since c1 ^ u2, an induced copy of F1 arises on the vertex set C1 U C2 U {u1, u2}, a contradiction. Therefore, uk-1 ^ c2. Suppose that uk-1 ~ ¿2. To avoid an induced 4-cycle on the vertex set {c1, c2, t2, uk-1}, we must have uk-1 ~ c2. But now, the vertex set V2' U{uk-1, uk-2, c1} induces a copy of F1, a contradiction. Therefore, uk-1 ^ ¿2. Consequently, uk = c2. Suppose that u-2 ~ c1. If in addition u-2 ^ uk-1, then also u-2 ^ uk-2 (since otherwise the vertex set {uk-2, uk-1, c2, u-2} would induce a 4-cycle), but now, the vertex set {uk-2, uk-1, c1, c2, c2, u-2} induces a copy of F1, a contradiction. Therefore, u-2 ~ uk-1. Let uj be the neighbor of u-2 on P-1 minimizing i. Since u1 ^ u-2, we have i > 2. Moreover, since u-2 ~ uk-1, we have i < k — 1. But now, the vertex set C2 U {uj-1, c1, uj, u-2} induces either a copy of F1 (if uj ^ c2) or of F2 (otherwise), a contradiction. Therefore, u-2 ^ c1. Note that N (u-2) n V1 = 0, for otherwise if there is a vertex x G N (u- -2) n V1, then x = c1 and G contains an induced 4-cycle on the vertex set {u-2, c2, c1, x}, a contradiction. Since N (u-2) n V1 = 0, we can now apply symmetric arguments as for P-1 to deduce that I > 3, vertex c2 is adjacent to all the internal vertices of P-2, and v£ = c1. Suppose first that V(P-1) n V(P-2) = 0. To avoid an induced 4-cycle on the vertex set {uk-2, c2, c1, v£-2}, we infer that uk-2 ^ v£-2. Suppose that uk-1 ^ v£-1. Then also uk-1 ^ v£—2 (since otherwise we would have an induced 4-cycle on the vertex set {uk-1, v£—2, v£— 1, c1}) and by a symmetric argument also uk-2 ^ v£-1. But now, we have an induced F1 on the vertex set {uk-2, c1, uk-1, c2, v£-1, v£-2}. Thus, uk-1 ~ v£-1. Moreover, we have either uk-2 ~ v£-1 or v£-2 ~ uk-1, since otherwise an induced F2 arises on the vertex set {c^ v£-1, v£-2, c2, uk-1, uk-2}. Withoutloss of generality, assume that uk-2 ~ v£— 1. But now, setting v0 = c2 if I = 3, either an induced 4-cycle arises on the vertex set {uk-2, v£-1, v£-2, v£-3} (if uk-2 ~ v£-3) or an induced copy of arises on the vertex set {uk-2, c1, v£-1, v£-2, c2, v£-3} (otherwise). This contradiction shows that V(P-1) n V(P-2) = 0. Since v£ = c1 and due to the minimality of P-2, we have N(c1) n V(P-2) = {v£-1}. On the other hand, since c1 dominates P-1, we have N(c1) n V(P-1) = V(P-1). Therefore 0 = V(P-2) n V(P-1) = V(P-2) n (n(c1 ) n V(P-1)) = (N(c1) n V(P-2)) n V(P-1) = {v£—1} n V(P-1) ç {v£-1}, which yields V(P-1 ) n V(P-2) = {v£-1}. A symmetric argument implies that V(P-1) n V(P-2) = {uk-1}; in particular, v£-1 = uk-1. To avoid an induced 4-cycle on the vertex set {uk-2, c1, c2, v£-2}, we infer that uk-2 ^ v£-2. But now, an induced copy of F1 arises on the vertex set {uk-3, uk-2, c1, uk-1, c2, v£-2} (where if k = 3 we define u0 = c1). This contradiction completes the proof of Claim 14. □ 518 Ars Math. Contemp. 16(2019)473-486 By Claim 5, we have Vl n V2 = 0. By Assumptions 1 and 2 and Claims 9, 10, and 14 we have e(VL, V2) = 0. However, since G is connected, there exists a path connecting the two diamonds and D2. In particular, we will again consider K-1, u-1, K_2, and u_2, and analyze the possible interrelations between two particular paths to produce a forbidden induced subgraph. Recall that by Assumption 4 we have ti i V(K2-1) and ¿2 i V(K_ 2). Furthermore, since e(V1, V2) = 0, we have u-1 i V2 and u_2 i Vl. Recall also that Claim 13 implies that u-1 = u_2, u-1 ^ u_2. Let P-1 = (u-1 = uL, u2,..., uk), with uk i C2, be a shortest u-1, C2-path in K-1, and let P_2 = (u_2 = vL, v2,..., v^), with v^ i Cl, be a shortest u_2, CL-path in K_2. We may assume that uk = c2 and v^ = cL. The fact that N(u-1) n V2 = 0 implies that k > 3 and since u_2 i Cl, we have i > 2. Claim 15. i > 3. Proof. Suppose that i = 2. Then, u_2 ~ cL. Moreover, we have that u_2 ^ c'L since otherwise u_2 would be a vertex in U_1 closer in K_1 to C2 than u_1, which is impossible due to the definition of u-1. We first show that u_2 = uk-1. Suppose that u_2 = uk-1. Then uk-1 ~ cL and uk_L ~ c2. Hence, in order to avoid an induced cycle of length at least 4 within V(P-1) U {cL}, we infer that vertex cL must be adjacent to all the internal vertices of P-1. By Assumption 4, vertex t2 has no neighbors in the set V(K_2); in particular, t2 has no neighbors in the set V(P-1) U Cl. Therefore, G contains an induced on the vertex set C2 U {i2,c1,ufc_1,ufc_2,ufc_3} (where if k = 3 we define u0 = c'L), a contradiction. Suppose that uj^ ~ cL. In particular, uj^ = t2. To avoid an induced 4-cycle on the vertex set {cL, uk_L, c2, u_2}, we infer that uk_L ~ u_2. Moreover, uk_L ~ t2 since otherwise the vertex set C2 U{t2, u_2, uk-1, cL} induces a copy of either Fl (if uj^ ^ c2) or F2 (otherwise). But now u-2 and t2 are in the same component of G - C2, contradicting the fact that u_2 i V(K_2) and t2 i V(K_2). This contradiction implies that uj^ ^ cL. Let j i {1,..., k} be the maximum index such that cL ~ uj. Then j < k — 2. To avoid a long induced cycle, we infer that cL ~ uj> for all j' i {1,..., j}. Let i i {1,..., k} be the minimum index such that u_2 ~ uj. Note that i > 1 since uL = u-1 ^ u_2. To avoid a long induced cycle, we infer that i < j and that u_2 ~ uj/ for all i' i {i,..., k}. Note that if i < j, then (u-1 = uL, u2,..., uj, u_2, uk = c2) is a u-1, V2'-path in K_1 strictly shorter than P-1, contradicting the minimality of P-1. Therefore, i = j. But now, the vertex set {uj_L, uj, uj+1, uj+2, u-2, cL} induces a copy of Fl. This contradiction implies that i > 3. □ Claim 16. uk_L = vL and v^_i = uL. Proof. Suppose for a contradiction that uj^ = vL. Recall that vL = u_2. By the minimality of P-1, we have c2 ^ uj and c2 ^ uj for every j i {1,..., k — 2}. Furthermore, since uL = u-1 ^ u_2 = uk_L, we have k > 4. Since u_2 and t2 are in different components of G — C2, we infer that t2 ^ uj for all j i {1,..., k — 2}. If cL ~ u3, then we obtain an induced copy of Hj for some i > 1 on the vertex set C2 U {t2,vi = uk_1,uk_2, . . . ,uj,Uj_l,Uj_2,Cl}, where j i {3,..., k} is the maximum index such that cl ~ uj. (Note that j < k — 2 since cl ^ c2 = uk and cl = v^ ^ vL = uk_L by Claim 15.) N. Chiarelli andM. Milanic: Linear separation of connected dominating sets in graphs 519 Therefore, ci ^ u3, and to avoid a long induced cycle, also ci ^ uj for j > 4. A similar argument shows that ci ^ uj for j > 3. If c1 ^ u2 and ci ^ u2, then we obtain an induced copy of some Hi on the vertex set V(P-1) U C1 U C2 U {ti, t2}. If c1 ~ u2 and ci ^ u2 (or vice-versa), then an induced copy of some Hi arises on the vertex set V(P-1) U C1 U C2 U {t2}, and if c1 ~ u2 and ci ~ u2, then an induced copy of some Hi arises on the vertex set (V(P-1) \ {u1}) U C1 U C2 U {ti, t2}. This contradiction shows that uk-1 = v1. Similar arguments as above imply that 1 = u 1. □ Property (ii) in the statement of the Diamond Lemma implies the following. Claim 17. V(P-1) n V(P—2) = 0. We are now ready to complete the proof of the Diamond Lemma. Let r G {1,..., k} be the minimum index such that ur G V(P—2). Note that r < k, since uk G C2 and C2 n V(P—2) = 0. Let s G {1,..., be the index such that ur = vs. If r =1, then u1 = v£— 1, contradicting Claim 16. Therefore, r > 2. Similarly, if s = 1, then v1 = uk-1, again contradicting Claim 16. Therefore, s > 2. Consider the path Q = (u1,..., ur = vs, vs—1,..., v1). Let D and D' be the subgraphs of G induced by {ti, c1, ci, u1} and {t2, c2, c2, v1}, respectively. Notice that D and D' are diamonds. We will refer to tips u1 and v1 as the roots of D and D', respectively. Then, Q is a path connecting the two roots. Moreover, by Assumption 4 we have ti G V(K—1) and V(Q) C V(K—1), we infer that ti has no neighbors on Q. Similarly, t2 has no neighbors on Q. We may also assume that Q is an induced path; otherwise, we replace Q with a shortest u1, v1-path in G[V(Q)]. To complete the proof, we will show that G is not {F^ F2, H1, H2,... }-free. We say that an induced subgraph H of G is a weakly induced Hn if H has a spanning subgraph Hn with n > 1 consisting of two diamonds and a path connecting them such that, assuming notation from Figure 8, the following holds: (i) each of the two diamonds is induced in G, (ii) there are no edges in G connecting a vertex from one diamond with a vertex from another diamond, except perhaps edges incident with their roots (if n = 1 ) or the unique edge on the path connecting the two roots (if n = 2), (iii) the path connecting the two diamonds is induced in G, and (iv) vertices x1 and z1 do not have any neighbors on the path. Z1 X3 z3 Figure 8: A weakly induced Hn. Note, in particular, that for n G {1,2} every weakly induced Hn is isomorphic to Hn. 520 Ars Math. Contemp. 16(2019)473-486 The above considerations show that the subgraph of G induced by V(D) U V(D') U V(Q) contains a weakly induced Hn. Choose one such induced subgraph, say H, with minimum value of n, and let F be the corresponding spanning subgraph of H isomorphic to Hn. To complete the proof, we will now show that either H equals F or G contains an induced F or F2. Suppose that this is not the case. The only possible edges that can be present in H but not in F are those connecting one of the vertices x2, x3, z2, z3 with one of the vertices in the set {y2,..., yn-1}. Let us first show that for each i e {2,..., n - 1}, at most one of x2 and x3 is adjacent to yj. Suppose that x2 ~ yj and x3 ~ y4 for some i e {2,..., n - 1}. Then y4 ~ z2 or yi ~ z3, since otherwise the subgraph of G induced by {x1, x2, x3, y»,..., yn, z1, z2, z3} would be a weakly induced Hn-i+1, contradicting the minimality of H. If y» ~ z2 and y» ~ z3, then the vertex set {x1,x2,x3,yi,z1 , z2,z3} induces an H1 in G. We may thus assume that y» is adjacent only to one of z2, z3, say to z3. If i = n - 1, then the vertex set {x1, x2, x3, yn-1, yn, z2, z3} induces an H1 in G. If i < n - 2, then the fact that G is chordal implies that z3 ~ yj for all j e {i,..., n}, and the vertex set {x1, x2, x3, y», yi+1, yi+2, z3} induces an H1 in G. This contradiction shows that for each i e {2,..., n - 1}, at most one of x2 and x3 is adjacent to y». Next, we argue that at least one of x2 and x3 is not adjacent to any vertex y» with i e {2,..., n - 1}. Indeed, if x2 ~ yr and x3 ~ ys, with 2 < r < s < n - 1 (say), then r < s and the fact that G is chordal implies that x3 ~ yj for all j e {2,..., s}, contradicting the fact that at most one of x2 and x3 is adjacent to yr. Therefore, we may assume without loss of generality that x2 has no neighbors in the set {y2,..., yn-1}. Similarly, we may assume that z2 has no neighbors in the set {y2,..., yn-1}. Let r e {1,..., n - 1} be the maximum index such that x3 ~ yr. Similarly, let s e {2,..., n} be the minimum index such that z3 ~ ys. If r =1 and s = n, then H = F and we are done. Thus, we may assume without loss of generality that r > 2. In particular, this implies that x3 ~ y2 (since G is chordal). If y2 ^ z3, then the subgraph of G induced by {x2, x3, y1,..., yn, z1, z2, z3} is a weakly induced Hn-1, contradicting the minimality of n. Therefore, y2 ~ z3, or, equivalently, s = 2. A similar argument shows that r = n -1. Now, if n = 3, then the vertex set {x2, x3, y1, y2, y3, z2, z3} induces an H1 in G, and if n > 4, then the vertex set {x2, x3, y1, y2, y3, z3} induces an F in G. This contradiction completes the proof of the Diamond Lemma. □ References [1] C. Benzaken and P. L. Hammer, Linear separation of dominating sets in graphs, Ann. Discrete Math. 3 (1978), 1-10, doi:10.1016/s0167-5060(08)70492-8. [2] C. Berge, Hypergraphs, volume 45 of North-Holland Mathematical Library, North-Holland, Amsterdam, 1989. [3] A. Berry, J.-P. Bordat and O. Cogis, Generating all the minimal separators of a graph, Internat. J. Found. Comput. Sci. 11 (2000), 397-403, doi:10.1142/s0129054100000211. [4] A. Berry and R. Pogorelcnik, A simple algorithm to generate the minimal separators and the maximal cliques of a chordal graph, Inform. Process. Lett. 111 (2011), 508-511, doi:10.1016/ j.ipl.2011.02.013. N. Chiarelli andM. Milanic: Linear separation of connected dominating sets in graphs 521 [5] P. Bertolazzi and A. Sassano, An O(mn) algorithm for regular set-covering problems, Theoret. Comput. Sci. 54 (1987), 237-247, doi:10.1016/0304-3975(87)90131-9. [6] J. Blum, M. Ding, A. Thaeler and X. Cheng, Connected dominating set in sensor networks and MANETs, in: D.-Z. Du and P. M. Pardalos (eds.), Handbook of Combinatorial Optimization, Supplement Volume B, Springer, New York, pp. 329-369, 2005, doi:10.1007/0-387-23830-1_8. [7] E. Boros, Dualization of Aligned Boolean Functions, RUTCOR Research Report 9-94, Rutgers Center for Operations Research, 1994, http://rutcor.rutgers.edu/pub/rrr/ reports94/0 9.ps. [8] E. Boros, V. Gurvich and M. Milanic, Decomposing 1-Sperner hypergraphs, 2018, arXiv:1510.02438 [math.CO]. [9] V. Bouchitte and I. Todinca, Treewidth and minimum fill-in: grouping the minimal separators, S1AMJ. Comput. 31 (2001), 212-232, doi:10.1137/s0097539799359683. [10] A. Brandstadt, V. B. Le and J. P. Spinrad, Graph Classes: A Survey, SIAM Monographs on Discrete Mathematics and Applications, SIAM, Philadelphia, Pennsylvania, 1999, doi: 10.1137/1.9780898719796. [11] S. Butenko, S. Kahruman-Anderoglu and O. Ursulenko, On connected domination in unit ball graphs, Optim. Lett. 5 (2011), 195-205, doi:10.1007/s11590-010-0211-0. [12] L. S. Chandran, A. Das, D. Rajendraprasad and N. M. Varma, Rainbow connection number and connected dominating sets, J. Graph Theory 71 (2012), 206-218, doi:10.1002/jgt.20643. [13] L. S. Chandran and F. Grandoni, A linear time algorithm to list the minimal separators of chordal graphs, Discrete Math. 306 (2006), 351-358, doi:10.1016/j.disc.2005.12.010. [14] M.-S. Chang, Weighted domination of cocomparability graphs, Discrete Appl. Math. 80 (1997), 135-148, doi:10.1016/s0166-218x(97)80001-7. [15] M.-S. Chang, Efficient algorithms for the domination problems on interval and circular-arc graphs, S1AMJ. Comput. 27 (1998), 1671-1694, doi:10.1137/s0097539792238431. [16] N. Chiarelli and M. Milanic, Linear separation of total dominating sets in graphs, in: K. Jansen and R. Reischuk (eds.), Graph-Theoretic Concepts in Computer Science, Springer, Heidelberg, volume 8165 of Lecture Notes in Computer Science, pp. 165-176, 2013, doi:10.1007/ 978-3-642-45043-3_15, revised papers from the 39th International Workshop (WG 2013) held in Lubeck, June 19 - 21, 2013. [17] N. Chiarelli and M. Milanic, Linear separation of connected dominating sets in graphs (extended abstract), in: International Symposium on Artificial Intelligence and Mathematics (1SA1M 2014), 2014, held in Fort Lauderdale, Florida, USA, January 6-8, 2014, https://www.cs.uic.edu/pub/Isaim2014/WebPreferences/ ISAIM2 014_Boolean_Chiarelli_Milanic.pdf. [18] N. Chiarelli and M. Milanic, Total domishold graphs: a generalization of threshold graphs, with connections to threshold hypergraphs, Discrete Appl. Math. 179 (2014), 1-12, doi:10.1016/j. dam.2014.09.001. [19] C. K. Chow, Boolean functions realizable with single threshold devices, Proc. 1RE 49 (1961), 370-371, doi:10.1109/jrproc.1961.287827. [20] V. Chvatal and P. L. Hammer, Aggregation of inequalities in integer programming, in: P. L. Hammer, E. L. Johnson, B. H. Korte and G. L. Nemhauser (eds.), Studies in 1nteger Programming, North-Holland, Amsterdam, volume 1 of Annals of Discrete Mathematics, 1977 pp. 145-162, doi:10.1016/s0167-5060(08)70731-3, proceedings of the Workshop on Integer Programming held in Bonn, September 8- 12, 1975. 522 ArsMa'h. Con'emp. 16(2019)487-525 [21] Y. Crama, Dualization of regular Boolean functions, Discrete Appl. Ma'h. 16 (1987), 79-85, doi:10.1016/0166-218x(87)90056-4. [22] Y. Crama and P. L. Hammer, Boolean Functions: Theory, Algorithms, and Applications, volume 142 of Encyclopedia of Mathematics and i's Applications, Cambridge University Press, Cambridge, 2011, doi:10.1017/cbo9780511852008. [23] H. N. de Ridder et al., Information System on Graph Classes and their Inclusions (ISGCI), 2001-2014, http://www.graphclasses.org/ (accessed on 30 August 2016). [24] I. Dinur and D. Steurer, Analytical approach to parallel repetition, in: D. Shmoys (ed.), STOC'14: Proceedings of'he 2014 ACM Symposium on Theory of Computing, ACM Press, New York, pp. 624-633, 2014, held in New York, May 31 - June 3, 2014. [25] G. A. Dirac, On rigid circuit graphs, Abh. Ma'h. Sem. Univ. Hamburg 25 (1961), 71-76, doi: 10.1007/bf02992776. [26] D.-Z. Du and P.-J. Wan, Connected Dominating Se': Theory and Applications, volume 77 of Springer Optimization and I's Applications, Springer, New York, 2013, doi:10.1007/ 978-1-4614-5242-3. [27] W. Duckworth and B. Mans, Connected domination of regular graphs, Discrete Ma'h. 309 (2009), 2305-2322, doi:10.1016/j.disc.2008.05.029. [28] T. Eiter, K. Makino and G. Gottlob, Computational aspects of monotone dualization: a brief survey, Discrete Appl. Ma'h. 156 (2008), 2035-2049, doi:10.1016/j.dam.2007.04.017. [29] C. C. Elgot, Truth functions realizable by single threshold organs, in: Switching Circuit Theory and Logical Design, IEEE Computer Society, 1961 pp. 225-245, doi:10.1109/focs.1961.39, papers from the 1st Annual Symposium held in Chicago, Illinois, USA, October 9 - 14, 1960. [30] S. Foldes and P. L. Hammer, Split graphs, in: F. Hoffman, R. C. Mullin, K. B. Reid and R. G. Stanton (eds.), Proceedings of'he Eighth Southeastern Conference on Combinatorics, Graph Theory and Computing, Utilitas Mathematica Publishing, Winnipeg, Manitoba, 1977 pp. 311315, held at Louisiana State University, Baton Rouge, Louisiana, February 28 - March 3, 1977. [31] F. V. Fomin, F. Grandoni and D. Kratsch, Solving connected dominating set faster than 2n, Algori'hmica 52 (2008), 153-166, doi:10.1007/s00453-007-9145-z. [32] I. J. Gabelman, The Functional Behavior of Majority (Threshold) Elements, Ph.D. thesis, Department of Electrical Engineering, Syracuse University, New York, 1961. [33] M. C. Golumbic, Trivially perfect graphs, Discrete Math. 24 (1978), 105-107, doi:10.1016/ 0012-365x(78)90178-4. [34] M. C. Golumbic, Algorithmic Graph Theory and Perfect Graphs, volume 57 of Annals of Discrete Mathematics, Elsevier, Amsterdam, 2nd edition, 2004, doi:10.1016/c2013-0-10739-8. [35] T. W. Haynes, S. T. Hedetniemi and P. J. Slater (eds.), Domination in Graphs: Advanced Topics, volume 209 of Monographs and Textbooks in Pure and Applied Mathematics, Marcel Dekker, New York, 1998. [36] T. W. Haynes, S. T. Hedetniemi and P. J. Slater, Fundamentals of Domination in Graphs, volume 208 of Monographs and Textbooks in Pure and Applied Mathematics, Marcel Dekker, New York, 1998. [37] R.-W. Hung and M.-S. Chang, A simple linear algorithm for the connected domination problem in circular-arc graphs, Discuss. Math. Graph Theory 24 (2004), 137-145, doi:10.7151/dmgt. 1220. [38] M. M. Kante, V. Limouzy, A. Mary and L. Nourine, On the enumeration of minimal dominating sets and related notions, SIAM J. Discrete Math. 28 (2014), 1916-1929, doi:10.1137/ 120862612. N. Chiarelli andM. Milanic: Linear separation of connected dominating sets in graphs 523 [39] N. Karmarkar, A new polynomial-time algorithm for linear programming, Combinatorica 4 (1984), 373-395, doi:10.1007/bf02579150. [40] J. M. Keil, The complexity of domination problems in circle graphs, Discrete Appl. Math. 42 (1993), 51-63, doi:10.1016/0166-218x(93)90178-q. [41] H. Kellerer, U. Pferschy and D. Pisinger, Knapsack Problems, Springer-Verlag, Berlin, 2004, doi:10.1007/978-3-540-24777-7. [42] C. J. Klivans, Threshold graphs, shifted complexes, and graphical complexes, Discrete Math. 307 (2007), 2591-2597, doi:10.1016/j.disc.2006.11.018. [43] T. Kloks, H. Bodlaender, H. Müller and D. Kratsch, Computing treewidth and minimum fill-in: all you need are the minimal separators, in: T. Lengauer (ed.), Algorithms - ESA '93, Springer, Berlin, volume 726 of Lecture Notes in Computer Science, 1993 pp. 260-271, doi: 10.1007/3-540-57273-2_61, proceedings of the First Annual European Symposium held in Bad Honnef, September 30 - October 2, 1993. [44] T. Kloks and D. Kratsch, Listing all minimal separators of a graph, SIAM J. Comput. 27 (1998), 605-613, doi:10.1137/s009753979427087x. [45] P. S. Kumar and C. E. Veni Madhavan, Minimal vertex separators of chordal graphs, Discrete Appl. Math. 89 (1998), 155-168, doi:10.1016/s0166-218x(98)00123-1. [46] R. Laskar and J. Pfaff, Domination and Irredundance in Split Graphs, Technical Report 430, Department of Mathematical Sciences, Clemson University, Clemson, South Carolina, 1983. [47] V. E. Levit, M. Milanic and D. Tankus, On the recognition of k-equistable graphs, in: M. C. Golumbic, M. Stern, A. Levy and G. Morgenstern (eds.), Graph-Theoretic Concepts in Computer Science, Springer, Heidelberg, volume 7551 of Lecture Notes in Computer Science, pp. 286-296, 2012, doi:10.1007/978-3-642-34611-8_29, revised selected papers from the 38th International Workshop (WG 2012) held in Jerusalem, June 26 - 28, 2012. [48] N. V. R. Mahadev and U.N. Peled, Threshold Graphs and Related Topics, volume 56 of Annals of Discrete Mathematics, North-Holland, Amsterdam, 1995. [49] D. Michalak, Hereditarily dominated graphs, Discrete Math. 307 (2007), 952-957, doi:10. 1016/j.disc.2005.11.044. [50] M. Milanic, J. Orlin and G. Rudolf, Complexity results for equistable graphs and related classes, Ann. Oper. Res. 188 (2011), 359-370, doi:10.1007/s10479-010-0720-3. [51] P. Montealegre and I. Todinca, On distance-d independent set and other problems in graphs with "few" minimal separators, in: P. Heggernes (ed.), Graph-Theoretic Concepts in Computer Science, Springer, Berlin, volume 9941 of Lecture Notes in Computer Science, pp. 183-194, 2016, doi:10.1007/978-3-662-53536-3_16, revised selected papers from the 42nd International Workshop (WG 2016) held at Bogazici University, Istanbul, June 22 - 24, 2016. [52] H. Muller and A. Brandstadt, The NP-completeness of steiner tree and dominating set for chordal bipartite graphs, Theoret. Comput. Sci. 53 (1987), 257-265, doi:10.1016/ 0304-3975(87)90067-3. [53] S. Muroga, Threshold Logic and its Applications, Wiley-Interscience (John Wiley & Sons), New York-London-Sydney, 1971. [54] C. Payan, A class of threshold and domishold graphs: equistable and equidominating graphs, Discrete Math. 29 (1980), 47-52, doi:10.1016/0012-365x(90)90286-q. [55] U. N. Peled and B. Simeone, Polynomial-time algorithms for regular set-covering and threshold synthesis, Discrete Appl. Math. 12 (1985), 57-69, doi:10.1016/0166-218x(85)90040-x. 524 Ars Math. Contemp. 16(2019)473-486 [56] U. N. Peled and B. Simeone, An O(nm)-time algorithm for computing the dual of a regular Boolean function, Discrete Appl. Math. 49 (1994), 309-323, doi:10.1016/0166-218x(94) 90215-1. [57] N. Przulj, D. G. Corneil and E. Kohler, Hereditary dominating pair graphs, Discrete Appl. Math. 134 (2004), 239-261, doi:10.1016/s0166-218x(03)00304-4. [58] J. Reiterman, V. Rodl, E. Sinajova and M. Tuma, Threshold hypergraphs, Discrete Math. 54 (1985), 193-200, doi:10.1016/0012-365x(85)90080-9. [59] D. J. Rose, R. E. Tarjan and G. S. Lueker, Algorithmic aspects of vertex elimination on graphs, SIAMJ. Comput. 5 (1976), 266-283, doi:10.1137/0205021. [60] O. Schaudt, A note on connected dominating sets of distance-hereditary graphs, Discrete Appl. Math. 160 (2012), 1394-1398, doi:10.1016/j.dam.2012.02.003. [61] O. Schaudt, On graphs for which the connected domination number is at most the total domination number, Discrete Appl. Math. 160 (2012), 1281-1284, doi:10.1016/j.dam.2011.12.025. [62] O. Schaudt and R. Schrader, The complexity of connected dominating sets and total dominating sets with specified induced subgraphs, Inform. Process. Lett. 112 (2012), 953-957, doi:10. 1016/j.ipl.2012.09.002. [63] H. Shen and W. Liang, Efficient enumeration of all minimal separators in a graph, Theoret. Comput. Sci. 180 (1997), 169-180, doi:10.1016/s0304-3975(97)83809-1. [64] Y.-T. Tsai, Y.-L. Lin and F. R. Hsu, Efficient algorithms for the minimum connected domination on trapezoid graphs, Inform. Sci. 177 (2007), 2405-2417, doi:10.1016/j.ins.2007.02.001. [65] D. B. West, Introduction to Graph Theory, Prentice Hall, Upper Saddle River, New Jersey, 2nd edition, 2001. [66] J. Wu and H. Li, A dominating-set-based routing scheme in ad hoc wireless networks, Telecom-mun. Syst. 18 (2001), 13-36, doi:10.1023/a:1016783217662. [67] J.-H. Yan, J.-J. Chen and G. J. Chang, Quasi-threshold graphs, Discrete Appl. Math. 69 (1996), 247-255, doi:10.1016/0166-218x(96)00094-7. [68] H.-G. Yeh and G. J. Chang, Weighted connected domination and Steiner trees in distance-hereditary graphs, Discrete Appl. Math. 87 (1998), 245-253, doi:10.1016/s0166-218x(98) 00060-2. N. Chiarelli andM. Milanic: Linear separation of connected dominating sets in graphs 525 Appendix A A non-connected-domishold split graph whose cutset hypergraph is 2-asummable Based on an example due to Gabelman [32], Crama and Hammer proposed in the proof of [22, Theorem 9.15] an example of a 9-variable 2-asummable positive Boolean function f that is not threshold. From this function we can derive a split graph G = (V, E) on 71 vertices, as follows. Let V = K UI where K = {v^ ..., v9} is a clique and I = V (G) — K is an independent set. To define the edges between K and I, we first associate a nonnegative integer weight to each vertex, as follows: w(v1) = 14, w(v2) = 18, w(v3) = 24, w(v4) = 26, w(v5) = 27, w(v6) = 30, w(v7) = 31, w(vs) = 36, w(v9) = 37, and w(v) =0 for all v e I. Let S be the set of all subsets S of K such that w(S) > 82 and let S1 = {v1,v6,v9}, S2 = {v2, v5, v8}, and S3 = {v3,v4, v7}. (Note that w(Sj) = 81 for all i e [3].) Let H be the hypergraph with vertex set K and hyperedge set given by the inclusion-wise minimal sets in S U {S1, S2, S3}. It can be verified that H has precisely 62 hyperedges (including S1, S2, and S3).4 The edges of G between vertices of I and K are defined so that set of the neighborhoods of the 62 vertices of I is exactly the set of hyperedges of H. To show that G is not CD, it suffices, by Proposition 3.4, to show that the cutset hypergraph is not threshold. In the proof of Theorem 9.15 in [22] it is shown that the function f is not threshold, by showing that f is 3-summable. This corresponds to the fact that the cutset hypergraph of G is 3-summable, as can be observed by noticing that condition (2.1) is satisfied for k = r = 3 and for the sets A = Sj for all i e [3] and B1 = {v1, v7, v8}, B2 = {v2, v4, v9}, and B3 = {v3, v5, v6}. On the other hand, the fact that f is 2-asummable implies that the cutset hypergraph of G is 2-asummable. 4The following is the list of sets (omitting commas and brackets) of indices of the elements of the 62 inclusion-wise minimal hyperedges of H: 169, 179, 189, 258, 259, 268, 269, 278, 279, 289, 347, 348, 349, 357, 358, 359, 367, 368, 369, 378, 379, 389, 456, 457, 458, 459, 467, 468, 469, 478, 479, 489, 567, 568, 569, 578, 579, 589, 678, 679, 689, 789, 1234, 1235, 1236, 1237, 1238, 1239, 1245, 1246, 1247, 1248, 1249, 1256, 1257, 1267, 1345, 1346, 1356, 2345, 2346, 2356. ARS MATHEMATICA CONTEMPORANEA ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 16 (2019) 527-547 https://doi.org/10.26493/1855-3974.1475.3d3 (Also available at http://amc-journal.eu) Smooth skew morphisms of dihedral groups* Na-Er Wang , Kan Hu Department of Mathematics, Zhejiang Ocean University, Zhoushan, Zhejiang 316022, P.R. China and Key Laboratory of Oceanographic Big Data Mining & Application of Zhejiang Province, Zhoushan, Zhejiang 316022, P.R. China Kai Yuan School of Mathematics, Capital Normal University, Beijing 100037, P.R. China Jun-Yang Zhang School of Mathematical Sciences, Chongqing Normal University, Chongqing 401331, P.R. China Received 4 September 2017, accepted 17 January 2019, published online 28 March 2019 A skew morphism

n(a)(b) for all a, b G A. In the case where n(^(a)) = n(a), for all a G A, the skew morphism is smooth. The concept of smooth skew morphism is a generalization of that of ¿-balanced skew morphism. The aim of this paper is to develop a general theory of smooth skew morphisms. As an application we classify smooth skew morphisms of dihedral groups. Keywords: Cayley map, skew morphism, smooth subgroup. Math. Subj. Class.: 05E18, 20B25, 05C10 * The authors are grateful to the anonymous referees for their helpful comments and suggestions which have improved the content and presentation of the paper. This research was supported by the following grants: Zhejiang Provincial Natural Science Foundation of China (No. LY16A010010, LQ17A010003); National Natural Science Foundation of China (No. 11801507, 11671276); Teacher Professional Development Program of Zhe-jiang Provincial Education Department (No. FX2017029); Basic Research and Frontier Exploration Project of Chongqing (No. cstc2018jcyjAX0010); Science and Technology Research Program of Chongqing Municipal Education Commission (No. KJQN201800512); Natural Science Foundation of Fujian (No. 2016J01027). E-mail addresses: wangnaer@zjou.edu.cn (Na-Er Wang), hukan@zjou.edu.cn (Kan Hu), pktide@163.com (Kai Yuan), jyzhang@cqnu.edu.cn (Jun-Yang Zhang) Abstract ©® This work is licensed under https://creativecommons.Org/licenses/by/4.0/ 528 Ars Math. Contemp. 16 (2019) 445-463 1 Introduction Throughout the paper all groups considered are finite, unless stated otherwise. A skew morphism p of a finite group A is a bijection on the underlying set of A fixing the identity element of A and for which there exists an integer-valued function n: A ^ Z such that p(ab) = p(a)pn(a)(b), for all a, b e A. Note that n is not uniquely determined by p, however, as a permutation if p has order n, then n can be viewed as a function n: A ^ Zn. In this sense the function n is uniquely determined by p, and it will be called the power function of p. Jajcay and SirM introduced the concept of skew morphism as an algebraic tool to investigate regular Cayley maps [10]. Conder, Jajcay and Tucker have shown in [5] that skew morphisms are also closely related to group factorisations with a cyclic complement. Thus the study of skew morphisms is important for both combinatorics and algebra. Let X be a generating set of a group A such that 1 e X and X = X -1, let P be a cyclic permutation of X. A Cayley map M = CM(A, X, P) is a 2-cell embedding of the Cayley graph Cay(A, X) into an orientable closed surface such that the local cyclic orientation of the arcs (g, x) emanating from any vertex g induced by the orientation of the supporting surface agrees with the prescribed cyclic permutation P of X .An automorphism of M is an automorphism of the underlying Cayley graph which extends to an orientation-preserving self-homeomorphism of the supporting surface. It is well known that the automorphism group Aut(M) of M acts semi-regularly on the arcs of M .In the case where this action is transitive, and hence regular, the map M is called a regular Cayley map. The left regular representation of A induces a subgroup of map automorphisms which acts transitively on the vertices of M. It follows that M is regular if and only if M admits an automorphism which fixes a vertex, say the identity vertex 1, and maps the arc (1, x) to (1, P(x)). It is a nontrivial result proved by Jajcay and SirM that a Cayley map CM(A, X, P) is regular if and only if there is a skew morphism p of A such that the restriction p \X of p to X is equal to P [10, Theorem 1]. A skew morphism of A will be called a Cayley skew morphism if it has an inverse-closed generating orbit. Thus the study of regular Cayley maps of a group A is equivalent to the study of Cayley skew morphisms of A. Among the variety of problems considered with regard to skew morphisms the most important seems to be the classification of regular Cayley maps for given families of groups. This problem is completely settled for cyclic groups [6], and only partial results are known for other abelian groups [4, 5, 23]. For dihedral groups Dn of order 2n, if n is odd this problem was solved in [14], whereas if n is even only partial classification is at hand [11,12, 17,21,24,25]. For other non-abelian groups the interested reader is referred to [18,20,21]. Although skew morphisms are usually investigated along with regular Cayley maps, they also deserve to be studied independently in a purely algebraic setting. Let G = AC be a group factorisation, where A and C are subgroups of G with A n C = 1. If C = (c) is cyclic, then the commuting rule ca = p(a)cn(a), for all a e A, determines a skew morphism p of A with the associated power function n. Conversely, each skew morphism p of A determines a group factorisation LA(p) with LA n (p) = 1, where LA denotes the left regular representation of A [5, Proposition 3.1]. Thus, there is a correspondence between skew morphisms and group factorisations with cyclic complements. Let p be a skew morphism of a group A. A subgroup N of A is p-invariant if p(N) = N. Note that the restriction of p to N is a skew morphism of N, so it is important to study p-invariant subgroups. The first important p-invariant subgroup is Fix p, the subgroup consisting of fixed points of p [10]. Later, Zhang discovered in [25] N.-E. Wang et al.: Smooth skew morphisms of dihedral groups 529 another important (-invariant subgroup, called the core of ( and denoted by Core (. This is a normal subgroup of A, so ( induces a skew morphism ( of the quotient group A := A/ Core ( in a natural way. As a consequence, we obtain a new (-invariant subgroup Smooth ( = {a G A | a G Fix (a} by means of coverings of skew morphisms; see Section 3. Section 4 is devoted to a study of the extremal case where Smooth ( = A. In this case the skew morphism (is termed smooth. We prove that a skew morphism ( of A is smooth if and only if n(((a)) = n(a) for all a G A. It follows that the power function of a smooth skew morphism takes constant value on orbits of (, so smooth skew morphisms may be viewed as a generalization of ¿-balanced Cayley skew morphisms studied in [4]. Note that for abelian groups smooth skew morphisms are identical with the coset-preserving skew morphisms studied by Bachraty and Jajcay in [1]. We establish in Theorems 4.5 and 4.9 an unexpected relationship between smooth skew morphisms and kernel-preserving skew morphisms. Note that a skew morphism ( of A is kernel-preserving if its kernel Ker (is a (-invariant subgroup of A. Kovics and Kwon [13] have recently announced a complete classification of regular Cayley maps of dihedral groups. Thus, to complete the classification of skew morphisms of dihedral groups, it remains to determine the non-Cayley skew morphisms. As shown in [8], every non-Cayley skew morphism of dihedral groups is smooth. Our last aim of this paper is to employ the newly-developed theory to give a classification of smooth skew morphisms of the dihedral groups, see Section 5. 2 Preliminaries In this section we summarize some basic results concerning skew morphisms which will be used throughout the paper. Let ( be a skew morphism of a group A, let n be the power function of (, and let n be the order of (. As already mentioned above, the sets Ker ( = {a G A | n(a) = 1}, Fix( = {a G A | ((a) = a} and n Core ( = (®(Ker () i=i form subgroups of A. Note that, for any two elements a, b G A, n(a) = n(b) if and only if ab-1 G Ker (. Thus, the index | A : Ker is equal to the number of distinct values of the power function. This number is called the skew type of (, and it is strictly less than n if ( is not trivial. Clearly, ( is an automorphism of A if and only if it has skew type 1. If ( is not an automorphism, then it will be termed proper. On the other hand, Core ( is the largest (-invariant subgroup contained in Ker (, and in particular, it is normal in A [25]. Lemma 2.1 ([10]). Let ( be a skew morphism of a group A, let n be the power function of and let n be the order of Then, for any a, b G A, (k(ab) = efc(a)eff(a'fc)(b) and n(ab) = a(b,n(a)) (mod n), k where k is an arbitrary positive integer and a(a, k) = n((i-1 (a)). i= 1 530 Ars Math. Contemp. 16 (2019) 445-463 Lemma 2.2 ([7]). Let p be a skew morphism of a group A, let n be the power function of p. Then for any automorphism y of A, — = y-1pY is a skew morphism of A with power function = nY. Moreover, Ker — = y-1 (Ker p) and Core — = y-1 (Core p). Proof. Since y is an automorphism of A, for any a,b e A, we have —(ab) = Y-1PY(ab) = Y-1p(Y (a)Y (b)) = y-1 (p(Y(a))pn7(a)(Y(b))) = Y-1PY(a)Y-1pn7(a)Y(b) = —(a)—nY(a) (b). Thus, — is a skew morphism of A with power function = nY. Since | —| = |p|, we have a e Ker — ^^ (a) = 1 (mod |) ^^ nY(a) = 1 (mod |p|) ^^ a e Y-1(Ker p). Therefore, Ker — = y- 1 (Ker p). Similarly, Core — = y-1 (Core p). □ Lemma 2.3 ([1, 5]). Let p be a skew morphism of a group A, let n be the power function of p, and let n be the order of p. Then for any positive integer k, ^ = pk is a skew morphism of A if and only if the congruences kx = a(a, k) (mod n) (2.1) are solvable for all a e A. Moreover, if ^ is a skew morphism of A, then it has order m = n/ gcd(n, k) and for each a e A, nM(a) is the solution of the equation (2.1) in Zm. Lemma 2.4 ([5]). Let p be a skew morphism of a group A. If A is nontrivial, then |p| < |A| and | Ker p| > 1. Lemma 2.5 ([9]). Let p be a skew morphism of a group A, and let Oa denote the orbit of p containing the element a e A. Then for each a e A, Oa-i = O-1, where O-1 = {g-1 | g e Oa}. The following result was partially obtained for Cayley skew morphisms in [4]. Lemma 2.6 ([7]). Let p be a skew morphism of a group A, and let n the power function of p, and let n be the order of p. Then for any a e A, a(a, m) = 0 (mod m), where m = |Oa| is length of the orbit Oa containing a. Moreover, a(a, n) = 0 (mod n). Proof. By Lemma 2.1, we have 1 = pm(aa-1) = pm(a)pff(a'm)(a-1) = apff(a'm) (a-1), so pCT(a'm)(a-1) = a-1. By Lemma 2.5, m = |Oa-i |. Thus, a(a, m) = 0 (mod m). Since m divides n, we obtain a(a, n) = y^ n(p® 1(a)) = —a(a, m) = 0 (mod n), m i=i as required. □ N.-E. Wang et al.: Smooth skew morphisms of dihedral groups 531 Lemma 2.7 ([7]). Let < be a skew morphism of a group A. Then for any a,b G A, |Oab| divides lcm(|Oa|, |Ob|). Proof. Denote c = |Oa|, d = |Ob| and i = lcm(|Oa|, |Ob|). Then i = cp = dq for some positive integers p, q. By Lemma 2.1, we have 3. (5.1) Moreover, for positive integers u and k, t(u, k) and p(u, k) are functions defined by k k t(u, k) = ^ uk-1 and p(u, k) = ^(-u)k-1. (5.2) ¿=1 ¿=1 If k is even, we use A(u, k) to denote the function defined by k/2 A(u,k) = ^ u2(i-1). (5.3) ¿=1 The following result on normal subgroups of Dn is well known. Lemma 5.1 ([16, Section 1.6, Exercise 8]). Let K be a proper normal subgroup of Dn, n > 3. (a) if n is odd then K = (a"), where u divides n, 538 Ars Math. Contemp. 16 (2019) 445-463 (b) if n is even, then either K = {a?, b), K = {a?,ab) or K = (au), where u divides n. Lemma 5.2 ([5]). Let p be a skew morphism of Dn, n > 3, then Ker p = {a). Lemma 5.3. Let p be a smooth skew morphism of Dn, n > 3. If n is odd, then p is an automorphism of A, whereas if n is even and p is not an automorphism of Dn, then Ker p = {a2), Ker p = {a2,ab) or Ker p = {a2,b). Moreover, the involutory automorphism of Dn taking a ^ a-1,b ^ ab transposes the smooth skew morphisms of Dn with kernels {a?,b) and {a2,ab). Proof. Assume that p is not an automorphism of Dn, then 1 < Ker p < Dn. Since p is smooth, by Theorem 4.9(a), the power function n: Dn ^ Zf| is a group homomorphism with Ker n = Ker p. It follows that Ker p is a proper normal subgroup of A. Since Z*^ is abelian, D'n < Ker p, where D'n is the derived subgroup of Dn. If n is odd then D'n = {a), which is a maximal subgroup of Dn. By Lemma 5.2 Ker p = {a), so Ker p = Dn, and hence p is automorphism of Dn, a contradiction. On the other hand, if n is even, then D'n = {a2), so {a2) < Ker p. By Lemma 5.1, one of the following three cases may happen: Ker p < {a), Ker p = {a2,b), or Ker p = {a2,ab). For the first case, by Lemma 5.2, we have Ker p = {a), so Ker p = {a2). Finally, by Theorem 4.9(d), the automorphism of Dn taking a ^ a-1,b ^ ab transposes the smooth skew morphisms of Dn with kernels {a2, b) and {a2, ab). □ The following result classifies smooth skew morphisms of the dihedral groups Dn with Ker p = {a2) for even integers n > 4. Theorem 5.4. Let Dn = {a, b) be the dihedral group of order 2n, where n > 4 is an even number. Then every smooth skew morphism p of Dn with Ker p = {a2) is defined by ' p(a2i) = a2iu, U(a2i) = 1, p(a2i+!) = a2iu+2r+\ I n(a2i+1) = e, and (5.4) p(a2ib) = a2iu+2sb, | n(a2ib) = f, ' Kp(a2i+lb) = a2iu+2r+2sT (u,e)+1b (n(a2i+1b) = ef, where r, s, u, e, f are nonnegative integers satisfying the following conditions (a) r,s £ Zn/2 and u G Z*n/2, (b) the order of p is the smallest positive integer k such that rr (u, k) = 0 (mod n/2) and st(u, k) = 0 (mod n/2), (c) e, f £ Z*k generate the Klein four group, (d) ue-1 = 1 (mod n/2) and uf= 1 (mod n/2), (e) rT(u, e — 1) = u — 2r — 1 (mod n/2) and st(u, f — 1) = 0 (mod n/2), (f) rT(u, f — 1) + st(u, e — 1) = u — 2r — 1 (mod n/2). Proof. First suppose that p is a smooth skew morphism of Dn with Ker p = {a2). Then by Theorem 4.9(b), the induced skew morphism p on Dn/ Ker p is the identity permutation, so there exist integers r,s G Zn/2 such that 2s i p(a) = a1+2r and p(b) = a2s b. N.-E. Wang et al.: Smooth skew morphisms of dihedral groups 539 Since ^ is kernel-preserving, the restriction of ^ to Ker ^ = (a2} is an automorphism, so ^>(a2) = a2" where u G Z^/2. Assume that n(a) = e (mod k) and n(b) = f (mod k), where k = |<^|. From the above identities we derive the following formulae by induction: (a) = a1+2rT ("j) and (b) = a2sT ("j)b, where j is a positive integer and t(u, j) = Xj=1 ui-1. Since Dn = (a, b}, by Lemma 2.8, the order k = |y>| is equal to lcm(|Oa|, |Ob|), the least common multiple of the lengths of the orbits containing a and b. That is, k is the smallest positive integer such that (a) = a and (b) = b. Using the above formulae we then deduce that k is the smallest positive integer such that tt(u, k) = 0 (mod n/2) and st(u, k) = 0 (mod n/2). Now we determine the skew morphism and the associated power function. By the assumption we have ^(a2i) = (a2")4 = a2i", ^(a2ib) = ^(a2i)^(b) = a2i"+2sb. Similarly, we have ^(a2i+1) = ^(a2ia) = ^(a2i)^(a) = a1+2r+2i", ^(a2i+1 b) = ^(a2i)^(a)^e(b) = a2i"+1+2r+2sT ("'e). Since n: Dn ^ Zk is a group homomorphism, we have e2 = n(a)2 = n(a2) = 1 (mod k) and f2 = n(b)2 = n(b2) = 1 (mod k), so e2 = 1 (mod k) and f2 = 1 (mod k). Hence, n(a2i) = 1, n(a2i+1) = e, n(a2ib) = f, n(a2i+1b) = ef. In particular, since |Dn : Ker =4, (e, f} < Zk is the Klein four group. Therefore ^ and n have the claimed form (5.4). Moreover, we have a1+2r+2"e = ^(a)^e(a2) = ^(a)^n(a)(a2) = ^(aa2) = ^(a2a) = ^(a2)^(a) = a1+2r+2", and so ue-1 = 1 (mod n/2). Similarly, since (a2) = ^(b)^n(6)(a2) = ^(ba2) = ^(a-2b) = ^(a-2)^(b), we have a2s-2"f b = a2sba2"f = (a2) = ^(a-2)^(b) = a2s-2"b. Thus, uf-1 = 1 (mod n/2). Furthermore, since a2" = ^(a2) = ^(a)^n(a)(a) = ^(a)^e(a) = a2+2r+2rT ("'e), we get t(1+ t(u, e)) = u - 1 (mod n/2). (5.5) 540 Ars Math. Contemp. 16 (2019) 445-463 Similarly, 1 = y(b2) = y(b)yn(b)(b) = y(b)yf (b) = a2sba2sr ^ = a2s-2sr we obtain st(u, f ) = s (mod n/2). (5.6) Employing induction it is easy to deduce that yj(a-1) = a1-2"3+2rr("j), where j is an arbitrary positive integer. Then y(a)ye(b) = y(ab) = y(ba-1) = y(b)yf (a-1). Upon substitution we get a1+2r+2sr ("'e)b = y(a)ye (b) = y(b)yf (a-1) = a2sba1-2"f+2rr ) = a2s-1+2uf -2rr(«,/)b Hence, rT(u, f) + st(u, e) = s + uf — r — 1 (mod n/2). Since uf = u (mod n/2), the congruence is reduced to rT(u, f ) + st(u, e) = s + u — r — 1 (mod n/2). (5.7) Recall that ue-1 = 1 (mod n/2) and uf-1 = 1 (mod n/2), so t(u, e) = t(u, e — 1) + 1 (mod n/2), t(u,f) = t(u,f — 1) + 1 (mod n/2). Upon substitution the congruences (5.5), (5.6) and (5.7) are reduced to the numerical conditions in (e) and (f). Conversely, for a quintuple (r, s, u, e, f ) of nonnegative integers satisfying the stated numerical conditions, we verify that y given by (5.4) is a smooth skew morphism of Dn with Ker y = (a2) and the function n is the associated power function. It is evident that y is a bijection on Dn and y(1) = 1. It remains to verify the identity y(xy) = y(x)yn(x)(y) for all x, y G Dn. By Lemma 2.8, it suffices to verify this for x, y G Oa U Ob, where Oa and Ob are the generating orbits of y of the form Oa = (a, a1+2rr("'1), a1+2rr("'2),. .., a1+2rr("'i),. ..), Ob = (b, a2sr("'1)b, a2sr("'2)b,. .., a2sr("j)b,. ..). It follows that one of the following four cases may happen: (i) x, y G Oa; (ii) x, y G O6; (iii) x G Oa, y G Ob or (iv) x G O6, y G Oa. N.-E. Wang et al.: Smooth skew morphisms of dihedral groups 541 We shall demonstrate the verification for the first case, and leave other cases to the reader. If x, y € Oa, then x = a1+2rr(u,i) and y = a1+2rr("'j) for some i, j. We have p(x)p(y) = p(a2r(r ("'i)+T ("j))+2) = a2ru(r ("'i)+T (uj))+2" and p(x)pn(x)(y) = p(a1+2rr ("'i) )pe(a1+2rr ("j)) = a2r(r ("■i+1)+T (uj+e))+2. By the numerical conditions (d) and (e), we have r(r(u, i + 1) + t(u, j + e)) + 1 - (ru(r(u, i) + t(u, j)) + u) = r ^(t(u, i +1) — ut(u, i)) + (t(u, j + e) — ut(u, j))^ +1 — u = 1 + (t (u, j + e) — ueT (u, j ))j +1 — u = r(2 + t(u, e — 1)) + 1 — u (e) = 0 (mod n/2). Therefore, p(xy) = p(x)pn(x)(y). Finally, from the choices of the parameters it is easily seen that distinct quintuples (r, s, u, e, f) give rise to different skew morphisms of Dn, as required. □ Remark 5.5. In Theorem 5.4, consider the particular case where u = 1. By Condition (b) we have (gcd(r, n/2), gcd(s, n/2)) The numerical conditions are reduced to V(e + 1) = 0 (mod n/2), s(f — 1) = 0 (mod n/2), ,r(f + 1) + s(e — 1) = 0 (mod n/2), where r, s € Zn/2 and (e, f} < Z^ is the Klein four group. If n = 8m, where m > 3 is an odd number, then it can be easily verified that the quintuple (r, s,u, e, f) = (m + 4, m, 1,4m — 1, 2m — 1) fulfills the numerical conditions. Therefore, we obtain an infinite family of skew morphisms of D8m of order 4m with Ker p = (a2}. This example was first discovered by Zhang and Du in [26, Example 1.4]. Example 5.6. By computations using the Magma system we found that the smallest n for which there is a smooth skew morphism p of Dn with Ker p = (a2} is the number 24. In this case, all such skew morphisms have order 12, and the corresponding quintuples (r, s, u, e, f) are listed below: (r, s, u, e, f) = (1, 3,1,11, 5), (1,4,1,11, 7), (1, 9,1,11, 5), (1,10,1,11, 7), (5, 2,1,11, 7), (5, 3,1,11, 5), (5, 8,1,11, 7), (5, 9,1,11, 5), (7, 3,1,11, 5), (7,4,1,11, 7), (7, 9,1,11, 5), (7,10,1,11, 7), (11,, 2,1,11, 7), (11, 3,1,11, 5), (11, 8,1,11, 7), (11, 9,1,11, 5). 542 Ars Math. Contemp. 16 (2019) 445-463 Note that in each case we have u = 1, so the restriction of p to Ker p is the identity automorphism of Ker p. However, further computations show that, for other n, there do exist examples with u =1. For even numbers n, by Lemma 5.3, the involutory automorphism 7 of Dn taking a ^ a-1, b ^ ab transposes the smooth skew morphisms of Dn with kernels {a2, b) or {a2,ab). Thus, to complete the classification of smooth skew morphisms of Dn, it suffices to determine the smooth skew morphisms of Dn with kernel Ker p = {a2,b). Theorem 5.7. Let Dn be the dihedral group of order 2n, where n > 8 is an even number. If p is a smooth skew morphism of Dn with Ker p = {a2 ,b), then p belongs to one of the following two families of skew morphisms: (I) skew morphisms of order k defined by -,2 iu 2iu+2r + l 'p(a2i) = p(a2i+1) = a p(ba2i) = ba2iu+2s, Kp(ba2i+1) = ba2r+2s+2iu+1 and 'n(a2i) = 1, n(a2i+1) = e, n(ba2i) = 1, kn(ba2i+1) = e, (5.8) where r, s, u, k, e are nonnegative integers satisfying the following conditions (a) r,s G Zn/2 and u G Z*n/2, (b) k is the smallest positive integer such that rr (u, k) = 0 (mod n/2) and st(u, k) = 0 (mod n/2), (c) e G Z*k such that e ^ 1 (mod k) and e2 = 1 (mod k), (d) ue-1 = 1 (mod n/2), (e) rT(u, e — 1) = u — 2r — 1 (mod n/2) and st (u, e — 1) = — u + 2r + 1 (mod n/2). (II) skew morphisms of order 2(e — 1) defined by p(a2i) = a2 p(a2i+1) = ba2r-2iu+1, p(ba2i) = ba2s+2iu, p(ba2i+1) = a2r-2s-2iu+1 and n(a2i) = 1, n(a2i+1) = e, n(ba2i ) = 1, ,n(ba2i+1 ) = e, (5.9) where r, s, u, e are nonnegative integers satisfying the following conditions (a) r,s G Zn/2, u G Z*n/2 and e > 1 is an odd number, (b) ue-1 = -1 (mod n/2), (c) st(u, e — 1) = u + 2r +1 (mod n/2), (d) rp(u, e — 1) = sA(u, e — 1) — 1 (mod n/2). Proof. First suppose that p is a smooth skew morphism of Dn with Ker p = {a2, b). By Theorem 4.9, the induced skew morphism p of Dn / Ker p is the identity permutation and N.-E. Wang et al.: Smooth skew morphisms of dihedral groups 543 the restriction of y to Ker y = (a2, b) is an automorphism of Ker y. It follows that there exist integers r, s, u G Zn/2 and I G Z2 such that y(a) = bV+2r, y(b) = ba2s and y(a2) = a2u. Assume that n(a) = e (mod k), where k = |y| denotes the order of y. Since b G Ker y, n(b) = 1 (mod k). By Theorem 4.9, the power function n: Dn ^ Zk is a group homomorphism from Dn to the multiplicative group ZI, so e-1 = n(a-1) = n(b-1ab) = n(a) = e (mod k), and hence e2 = 1 (mod k). It follows that n(a2i) = n(a2ib) = 1 and n(a2i+1) = n(a2i+1b) = e. Since y has skew type 2, e = 1 (mod k). To proceed we distinguish two cases: Case (I): I = 0. In this case, we have Then Similarly, y(a) = a1+2r, y(b) = ba2s and y(a2) = a2u. y(a2i) = y(a2)4 = a2iu, y(ba2i) = y(b)y(a2)® = ba2iu+2s. y(a2i+1) = y(a2ia) = y(a2)V(a) = a2iu+2r+1, y(ba2i+1) = y(ba2ia) = y(b)y(a2i)y(a) = ba2r+2s+2i"+1. Hence, the skew morphism has the form given by (5.8). Using induction it is easy to prove that yj (a) = a1+2rT and yj (b) = ba2sT where j is a positive integer and t(u, j) = ^j=1 ui-1. Since Dn = (a, b), k = |y| is the smallest positive integer such that yk (a) = a and yk (b) = b, which implies that rT(u, k) = 0 (mod n/2) and st(u, k) = 0 (mod n/2). Moreover, we have a1+2r+2"e = y(a)ye(a2) = y(aa2) = y(a2a) = y(a2)y(a) = a1+2r+2", so ue 1 = 1 (mod n/2). Furthermore, since a2u = y(a2) = y(a)ye(a) = a1+2r a1+2rT = a2+2r+2rT , we obtain r(t(u,e) + 1) = u - 1 (mod n/2). (5.10) 544 Ars Math. Contemp. 16 (2019) 445-463 Similarly, p(a)pe(b) = p(ab) = p(ba-1) = p(b)p(a-1) = p(b)p(a-2a) = p(b)p(a-2)p(a). By the above formula we have p(a)pe(b) = a1+2r ba2sT ("'e) = ba-1-2r+2sT ("'e) and p(b)p(a-2)p(a) = ba1+2r+2s-2". Consequently, upon substitution we obtain s(t(u, e) — 1) = — u + 2r +1 (mod n/2). Recall that ue-1 = 1 (mod n/2), so t(u, e) = t(u, e — 1) + ue-1 = t(u, e — 1) + 1 (mod n/2). Upon substitution the equations (5.10) and (5.11) are reduced to rT(u, e — 1) = u — 2r — 1 (mod n/2), st(u, e — 1) = —u + 2r +1 (mod n/2). Case (II): I = 1. In this case we have Then p(a) = ba1+2r, p(b) = ba2s and p(a2) = a2u. p(a2i) = a2iu, p(ba2i) = p(b)p(a2i) = ba2s+2iu. Similarly, p(a2i+1) = p(a2ia) = a2i"ba1+2r = ba2r-2iu+1 p(ba2i+1) = p(b)p(a2i)p(a) = a2r-2s-2iu+1. Hence p has the form (5.9). Using induction it is easy to derive the following formula (5.11) p j (b)= ba2sT ("'j) and pj (a) = 2rp(«,j)-2sA(«,j) + 1 if j is even, ba2rp("'j)+2s"A("'j-1)+1, if j is odd, where t, p and A are the functions defined by (5.2) and (5.3). Since p(a) = ba1+2r and Dn = (a, ba1+2r}, k = |p| = |Oa |. Thus, k is the smallest positive integer such that rp(u, k) = sA(u, k) (mod n/2). N.-E. Wang et al.: Smooth skew morphisms of dihedral groups 545 In particular, since elements from the cosets (a) and b(a) alternate in the orbit Oa, k is even, and hence e is odd. Thus, a2u = p(a2) = p(a)pe (a) = p(a)pe (a) = a2rp(u'e)-2r+2suX(u'e-1). Consequently, we obtain rp(u, e) + suA(u, e — 1) = r + u (mod n/2). (5.12) Furthermore, we have ba1+2r+2ue = p(a)pe(a2) = p(aa2) = p(a2a) = p(a2)p(a) = a2uba1+2r = ba2r-2u+1, so ue-1 = —1 (mod n/2). Similarly a-1-2r+2sT (u'e) = p(a)pe(b) = p(ab) = p(ba-2a) = p(b)p(a-2)p(a) = a1+2r-2s+2u. Hence st(u, e) = 1 + 2r + u — s (mod n/2). (5.13) Recall that ue-1 = —1 (mod n/2), so t(u, e) = t(u, e — 1) — 1 (mod n/2), p(u, e) = p(u, e — 1) — 1 (mod n/2). Upon substitution the equations (5.12) and (5.13) are reduced to rp(u, e — 1) + suA(u, e — 1) = 2r + u (mod n/2), (5.14) st(u, e — 1) = 2r + u +1 (mod n/2). (5.15) Subtracting we then get rp(u, e — 1) = sA(u, e — 1) — 1 (mod n/2). Finally, note that 2(e-1) P(u, 2(e — 1))= ^ (—u)2(e-1) i=1 e- 1 e- 1 = + ^E(-u)i-1 = 0 (mod n/2), i=1 i=i and e- 1 u2i A(u, 2(e - 1)) = £> i=1 (e-1)/2 (e-1)/2 = E u2(i-1) + ue-1 E u2(i-1) = 0 (mod n/2), i=1 i=1 546 Ars Math. Contemp. 16 (2019) 445-463 Hence, rp(u, 2(e - 1)) = sA(u, 2(e - 1)) (mod n/2). The minimality of k yields k | 2(e — 1). But e — 1 < k, which forces k = 2(e — 1). Conversely, in each case for any quadruple (r, s, u, e) satisfying the numerical conditions, it is straightforward to verify that ( of the given form is a smooth skew morphism of Dn with Ker ( = (a2, b) and n is the associated power function. In particular, from the choices of the parameters it is easily seen that distinct quadruples (r, s, u, e) give rise to different skew morphisms of Dn, as required. □ Remark 5.8. Let ( be any skew morphism from (II) of Theorem 5.7. Note that the orbit of ( containing a also contains ba2r+1, so the orbit Oa generates Dn. Clearly, it is closed under taking inverses. Therefore, such skew morphisms give rise to the e-balanced regular Cayley maps of Dn, which were first classified by Kwak, Kwon and Feng [17]. References [1] M. Bachraty and R. Jajcay, Powers of skew-morphisms, in: J. Sirdn and R. Jajcay (eds.), Symmetries in Graphs, Maps, and Polytopes, Springer, Cham, volume 159 of Springer Proceedings in Mathematics & Statistics, 2016 pp. 1-25, doi:10.1007/978-3-319-30451-9_1, papers from the 5th SIGMAP Workshop held in West Malvern, July 7 - 11, 2014. [2] M. Bachraty and R. Jajcay, Classification of coset-preserving skew-morphisms of finite cyclic groups, Australas. J. Combin. 67 (2017), 259-280, https://ajc.maths.uq.edu.au/ pdf/67/ajc_v67_p25 9.pdf. [3] M. Conder, R. Jajcay and T. Tucker, Regular Cayley maps for finite abelian groups, J. Algebraic Combin. 25 (2007), 259-283, doi:10.1007/s10801-006-0037-0. [4] M. Conder, R. Jajcay and T. Tucker, Regular ¿-balanced Cayley maps, J. Comb Theory Ser. B 97 (2007), 453-473, doi:10.1016/j.jctb.2006.07.008. [5] M. D. E. Conder, R. Jajcay and T. W. Tucker, Cyclic complements and skew morphisms of groups, J. Algebra 453 (2016), 68-100, doi:10.1016/j.jalgebra.2015.12.024. [6] M. D. E. Conder and T. W. Tucker, Regular Cayley maps for cyclic groups, Trans. Amer. Math. Soc. 366 (2014), 3585-3609, doi:10.1090/s0002-9947-2014-05933-3. [7] K. Hu, Theory of skew morphisms, 2012, preprint. [8] K. Hu and Y. S. Kwon, Regular Cayley maps and skew morphisms of dihedral groups: a survey, in preparation. [9] R. Jajcay and R. Nedela, Half-regular Cayley maps, Graphs Combin. 31 (2015), 1003-1018, doi:10.1007/s00373-014- 1428-y. [10] R. Jajcay and J. Sirdn, Skew-morphisms of regular Cayley maps, Discrete Math. 244 (2002), 167-179, doi:10.1016/s0012-365x(01)00081-4. [11] I. Kovdcs and Y. S. Kwon, Regular Cayley maps on dihedral groups with the smallest kernel, J. Algebraic Combin. 44 (2016), 831-847, doi:10.1007/s10801-016-0689-3. [12] I. Kovdcs and Y. S. Kwon, Classification of reflexible Cayley maps for dihedral groups, J. Comb. Theory Ser. B 127 (2017), 187-204, doi:10.1016/j.jctb.2017.06.002. [13] I. Kovdcs and Y. S. Kwon, private communication, 2018. [14] I. Kovdcs, D. Marusic and M. Muzychuk, On G-arc-regular dihedrants and regular dihedral maps, J. Algebraic Combin. 38 (2013), 437-455, doi:10.1007/s10801-012-0410-0. N.-E. Wang et al.: Smooth skew morphisms of dihedral groups 547 [15] I. Kovdcs and R. Nedela, Decomposition of skew-morphisms of cyclic groups, Ars Math. Con-temp. 4 (2011), 329-349, doi:10.26493/1855-3974.157.fc1. [16] H. Kurzweil and B. Stellmacher, The Theory of Finite Groups: An Introduction, Universitext, Springer-Verlag, New York, 2004, doi:10.1007/b97433. [17] J. H. Kwak, Y. S. Kwon and R. Feng, A classification of regular t-balanced Cayley maps on dihedral groups, European J. Combin. 27 (2006), 382-393, doi:10.1016/j.ejc.2004.12.002. [18] J. H. Kwak and J.-M. Oh, A classification of regular t-balanced Cayley maps on dicyclic groups, European J. Combin. 29 (2008), 1151-1159, doi:10.1016/j.ejc.2007.06.023. [19] Y. S. Kwon, A classification of regular t-balanced Cayley maps for cyclic groups, Discrete Math. 313 (2013), 656-664, doi:10.1016/j.disc.2012.12.012. [20] J.-M. Oh, Regular t-balanced Cayley maps on semi-dihedral groups, J. Comb Theory Ser. B 99 (2009), 480-493, doi:10.1016/j.jctb.2008.09.006. [21] Y. Wang and R. Q. Feng, Regular balanced Cayley maps for cyclic, dihedral and generalized quaternion groups, Acta Math. Sin. 21 (2005), 773-778, doi:10.1007/s10114-004-0455-7. [22] K. Yuan, Y. Wang and J. H. Kwak, Enumeration of skew-morphisms of cyclic groups of small orders and their corresponding Cayley maps, Adv. Math. (China) 45 (2016), 21-36. [23] J.-Y. Zhang, Regular Cayley maps of skew-type 3 for abelian groups, European J. Combin. 39 (2014), 198-206, doi:10.1016/j.ejc.2014.01.006. [24] J.-Y. Zhang, A classification of regular Cayley maps with trivial Cayley-core for dihedral groups, Discrete Math. 338 (2015), 1216-1225, doi:10.1016/j.disc.2015.01.036. [25] J.-Y. Zhang, Regular Cayley maps of skew-type 3 for dihedral groups, Discrete Math. 338 (2015), 1163-1172, doi:10.1016/j.disc.2015.01.038. [26] J.-Y. Zhang and S. Du, On the skew-morphisms of dihedral groups, J. Group Theory 19 (2016), 993-1016, doi:10.1515/jgth-2016-0027. ARS MATHEMATICA CONTEMPORANEA ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 16 (2019) 549-561 https://doi.org/10.26493/1855-3974.1657.d75 (Also available at http://amc-journal.eu) A q-queens problem VI. The bishops' period Seth Chaiken * Computer Science Department, The University at Albany (SUNY), Albany, NY 12222, U.S.A. Christopher R. H. Hanusaf Department of Mathematics, Queens College (CUNY), 65-30 Kissena Blvd., Queens, NY 11367-1597, U.S.A. Thomas Zaslavsky Department of Mathematical Sciences, Binghamton University (SUNY), Binghamton, NY 13902-6000, U.S.A. Received 27 March 2018, accepted 22 August 2018, published online 31 March 2019 The number of ways to place q nonattacking queens, bishops, or similar chess pieces on an n x n square chessboard is essentially a quasipolynomial function of n (by Part I of this series). The period of the quasipolynomial is difficult to settle. Here we prove that the empirically observed period 2 for three to ten bishops is the exact period for every number of bishops greater than 2. The proof depends on signed graphs and the Ehrhart theory of inside-out polytopes. Keywords: Nonattacking chess pieces, Ehrhart theory, inside-out polytope, arrangement of hyperplanes, signed graph. Math. Subj. Class.: 05A15, 00A08, 05C22, 52C07, 52C35 * Chaiken and Zaslavsky thank the very hospitable Isaac Newton Institute for facilitating their work on this project. tHanusa gratefully acknowledges support from PSC-CUNY Research Awards PSCOOC-40-124, PSCREG-41-303, TRADA-42-115, TRADA-43-127, and TRADA-44-168. E-mail addresses: sdc@cs.albany.edu (Seth Chaiken), chanusa@qc.cuny.edu (Christopher R. H. Hanusa), zaslav@math.binghamton.edu (Thomas Zaslavsky) Abstract ©® This work is licensed under https://creativecommons.org/licenses/by/4.0/ 550 Ars Math. Contemp. 16 (2019) 445-463 1 Introduction The famous n-Queens Problem is to count the number of ways to place n nonattacking queens on an n x n chessboard. That problem has been solved only for small values of n; there is no real hope for a complete solution. In this series of papers we treat a more general problem wherein we place q identical pieces like the queen or bishop on an n x n square board and we seek a formula for u(q; n), the number of ways to place them so that none attacks another. The piece may be any one of a large class of traditional and fairy chess pieces called "riders", which are distinguished by the fact that their moves have unlimited distance. We proved in Part I [4] that in each such problem the number of solutions, times a factor of q!, is a quasipolynomial function of n; that is, q!u(q; n) is given by a cyclically repeating sequence of polynomials in n and q, the exact polynomial depending on the residue class of n modulo some number p called the period of the function; and furthermore that each coefficient of the quasipolynomial is a polynomial function of q. Here we prove that for three or more bishops the period is always exactly 2.1 This period was previously observed by Kotesovec for 3 < q < 10 as a result of his extensive computations for five to ten bishops, added to previous work by Fabel for three and four bishops (see [10, pp. 126-129] for q < 6 and [11, pp. 234-241, 254-257] for q < 10). The number of nonattacking placements of q unlabelled bishops on an n x n board is denoted by uB(q; n). The number for labelled bishops is therefore q!uB(q; n). Theorem 1.1. For q > 3, the quasipolynomial q!uB(q; n) involved in counting the nonattacking positions of q bishops on an n x n board has period equal to 2. For q < 3 the period is 1 . To get our results we treat non-attacking configurations as integral lattice points z := (zi,..., zq), zj = (xj, yj), in a 2q-dimensional inside-out polytope (see Section 2). The Ehrhart theory of inside-out polytopes (from [3]) implies quasipolynomiality with polynomials of degree 2q and that the period divides the least common multiple of the denominators of the coordinates of vertices of the inside-out polytope. We find the structure of these coordinates explicitly: in Lemma 4.4 we show that a vertex of the bishops' inside-out polytope has each zj G {0,1}2 or zj = (2, 2). From that, along with a formula from Part III [6] for the coefficient of n2q-6 that implies the period is even if q > 3, Theorem 1.1 follows directly. One reason to want the period is a computational method for discovering u(q; n). To find it (for a fixed number q of pieces) one can count solutions as n ranges from 1 up to some upper limit N and interpolate the counting quasipolynomial from the resulting data. That can be done if one knows the degree of the quasipolynomial, which is 2q by [4, Lemma 2.1], and the period, for which there is no known general formula; then N = 2qp suffices (since the leading term is n2q/q! by general Ehrhart theory; see [4, Lemma 2.1]). Evidently, knowing the period is essential to knowing the right value of N, if the formula is to be considered proven. In general, for a particular rider piece and number q it is very hard to find the period; its value is known only for trivial pieces or very small values of q. In contrast, Theorem 1.1 gives the exact period for bishops, and it follows that to find the exact number of placements of q bishops it suffices to compute only 4q values of the counting function. The reader may ask why we do not seek the complete formula for bishops placements in terms of both n and q. Remarkably, there is a simple such formula, due in essence to 1 This paper was originally announced as Part V, in Parts I and II. S. Chaiken et al.: A q-queens problem. VI. The bishops' period 551 Arshon in a nearly forgotten paper [2] and completed by Kotesovec [11, pp. 244, 254257]. We restate this expression in Part V [8]. The trouble is that it is not in the form of a quasipolynomial, so that, for instance, we could not use it to obtain the number of combinatorial types of nonattacking configuration, which by [4, Theorem 5.3] is its evaluation at n = -1. We cannot even deduce the period from the Arshon formula.2 So there is reason to seek the general quasipolynomial q!uB(q; n) for every number q. The simple reason we do not seek to do so is that we have not found a way to do it. That remains an open problem whose solution would reveal the full character of the dependence of uB(q; n) on its two arguments. This has not yet been discovered for any rider—other than the mathematically trivial rook. After necessary mathematical background in the next two sections, we prove Theorem 1.1 in Section 4, applying the geometry of the inside-out polytope for bishops and the properties of signed graphs, which we introduce in Sections 2 and 3, respectively. We conclude with research questions. For the benefit of the authors and readers, we append a dictionary of the notation in this paper. 2 Essentials from Parts I and II We build upon the counting theory of previous parts as it applies to the square board, from Part II [5]. We summarize essential aspects here. First, we specialize our notation to q nonattacking bishops B on a square board. We assume that q > 0. The full expression for the number of nonattacking configurations of unlabelled bishops is wB(q; n) = Yo(n)n2q + Yi(n)n2q-1 + Y2(n)n2q-2 +-----+ Y2q(n)n0, where each coefficient Yi (n) varies periodically with n, and for labelled pieces the number is oB(q; n), which equals q!uB(q; n). (The coefficients also depend on q but we suppress that in the notation because only the variation with n concerns us here.) The n x n board consists of the integral points in the interior (n + 1)(0,1)2 of an integral multiple (n + 1)[0,1]2 of the unit square B = [0,1]2 c R2, or equivalently, the 1/(n + 1)-fractional points in (0,1)2. Thus, the board consists of the points z = (x, y) for integers x, y = 1, 2,..., n. A move is the difference between a new position and the original position. The bishop has moves given by all integral multiples of the vectors (1,1) and (1, -1), which are called the basic moves. (Note that for a move m = (c, d), the slope d/c contains all necessary information and can be specified instead of m itself.) A bishop in position z = (x, y) may move to any location z + ^m with ^ G Z and a basic move m, provided that location is on the board. A configuration is the vector (z1, z2,..., zq) of positions of all q bishops. The constraint on a configuration is that no two pieces may attack each other, or to say it mathematically, when there are pieces at positions zi and zj, then zj - zi is not a multiple of any basic move m. The object on which our theory relies is the inside-out polytope (P, aB), where P is the hypercube [0,1]2q and AB is the move arrangement for bishops. The move arrangement is a finite set of hyperplanes whose members are the move hyperplanes or attack hyperplanes, := {z G R2q : (yj - yi) = ±(xj - xi)}. 2Stanley in [12, Solution to Exercise 4.42] says the period is easily obtained from Arshon's formula, which has one form for even n and another for odd n; but we think it is not that easy. 552 Ars Math. Contemp. 16 (2019) 445-463 Each attack hyperplane contains the configuration points z = (zi, z2,..., zq) G Z2q in which bishops i and j attack each other. (The pieces in a configuration are labelled 1 through q to enable effective description.) The intersection lattice of A is the set of all intersections of subsets of the move arrangement, ordered by reverse inclusion. These intersection subspaces are the heart of our method. 3 Signed graphs The signed graph we employ to describe an intersection subspace efficiently is a special case of the slope graph from [4, Section 3.3]. The fact that the bishops' two slopes are ±1 makes it possible to apply the well-developed theory of signed graphs. A graph is r = (N, E), with node set N and edge set E. It may have multiple edges but not loops. A 1-forest is a graph in which each component consists of a tree together with one more edge; thus, each component contains exactly one circle. A spanning 1-forest is a spanning subgraph (it contains all nodes) that is a 1-forest. The notation ejj means the edge has end nodes vj and vj. A signed graph, Z = (N, E, a), is a graph in which each edge e is labelled a(e) = + or -. In a signed graph, a circle (cycle, circuit) is called positive or negative according to the product of its edge signs. A signed circuit is either a positive circle or a connected subgraph that contains exactly two circles, both negative. A node v is homogeneous if all incident edges have the same sign. We generally write q := |N | because the nodes correspond to the bishops in a configuration. Let c(Z) denote the number of components of a signed (or unsigned) graph and £(Z) := |E| - |N| + c(Z), the cyclomatic number of the underlying unsigned graph. The incidence matrix of Z is the |N| x |E| matrix H(Z) (H is "Eta") such that, in the column indexed by edge e, the elements are n(v, e) = ±1 if v is an endpoint of e and = 0 if it is not, with the signs chosen so that, if vj and vj are the endpoints, then n(vj, e)n(vj, e) = —a(e) [13, Section 8A]. That is, in the column of a positive edge there are one +1 and one —1, while in the column of a negative edge there are two +1's or two — 1's. The rank of Z is the rank of its incidence matrix. From [13, Theorem 5.1(j)] we know a formula for the rank: rk(Z) = |N| — b(Z), where b(Z) is the number of components in which there is no negative circle. This rank function applied to spanning subgraphs makes amatroid G(Z) on the edge set of Z [13]. An unsigned graph r acts as if it is an all-positive signed graph; therefore its incidence matrix has rank rk(T) = |N| — c(T) where c(T) is the number of components and the corresponding matroid G(T) := G(+r) is the cycle matroid of r. From this and [13, Theorem 8B.1] we also know that H(Z) has full column rank if and only if Z contains no signed circuit and it has full row rank if and only if every component of Z contains a negative circle. A signed graph that has both of these properties is necessarily a 1-forest in which every circle is negative. A positive clique in Z is a maximal set of nodes that are connected by positive edges; equivalently, it is the node set of a connected component of the spanning subgraph Z+ formed by the positive edges. A negative clique is similar. Either kind of set is called a signed clique. We call them "cliques" (in a slight abuse of terminology) because the signed cliques of a graph do not change if we complete the induced positive subgraph on a positive clique, and similarly for a negative clique. A homogeneous node v gives rise to a singleton signed clique with the sign not represented by an edge at v; if v is isolated it gives rise to S. Chaiken et al.: A q-queens problem. VI. The bishops' period 553 two singleton cliques, one of each sign. The number of positive cliques in T is c(T+) and the number of negative cliques is c(T-). Let A(T) := {Ai,..., Ac(z+)} and B(T) := {Bi,..., Bc(z-)} (read "Alpha" and "Beta") be the sets of positive and negative cliques, respectively. Since each node of T is in precisely one positive and one negative clique, we can define a bipartite graph C(T), called the clique graph of T, whose node set is A(T) U B(T) and whose edge set is N, the endpoints of the edge v being the cliques A g A(T) and B g B(T) such that v G A n B. Let us call an edge e redundant if T \ e (T with e deleted) has the same signed cliques as does T, and call T irredundant if it has no redundant edges, in other words, if each signed clique has just enough edges of its sign to connect its nodes. A signed graph is irredundant if and only if both T+ and T- are forests. For example, a signed forest is irredundant. Any signed graph can be reduced to irredundancy with the same signed cliques by pruning redundant edges one by one. Lemma 3.1. If T is a signed graph with q nodes, then |A(T)| + |B(T)| = 2q - [rk(T+) + rk(T-)]. If T is irredundant, then |A(T)| + |B(T)| = 2q -|E| = q + c(T) - £(T). In particular, a signed tree has q +1 signed cliques. Proof. The first formula follows directly from the general formula for the rank of a graph. If T is irredundant, T+ is a forest with |A(T)| components and T- is a forest with |B(T)| components. Therefore, |A(T)| + |B(T)| = 2q - |E| = q - £(T) + c(T). A more entertaining proof is by induction on the number of inhomogeneous nodes. Define g(T) := |A(T)| + |B(T)| - 2q + |E| = |A(T)| + |B(T)| - q - c(T) + £(T). If all nodes are homogeneous, obviously g(T) = 0. Otherwise, let v be an inhomogeneous node. Split v into two nodes, v+ and v-, incident respectively to all the positive or negative edges at v. The new graph has one less inhomogeneous node, two more signed cliques (a positive clique {v- } and a negative clique {v+}), one more node, and the same number of edges, hence the same value of g as does T. Thus, by induction, g = 0. □ 4 Proof of the bishops' period We are now prepared to prove Theorem 1.1. We already proved in [6, Theorem 3.1] that the coefficients y» (n) are constant (as functions of n) for i < 6 and that y6 (n) has period 2. Thus it will suffice to prove that the denominator of the inside-out polytope (B, aB) for q bishops divides 2. (In fact, what we prove is the stronger result stated in Lemma 4.4.) To do this, we find the denominators of all vertices explicitly by analyzing all sets of 2q equations that determine a point. We use the polytope [0,1]2q for the boundary inequalities and the move arrangement AB for the equations of attack. We use a fundamental fact from linear algebra. Lemma 4.1. The coordinates z = (xj, y») belong to a vertex of the inside-out polytope if and only if there are k attack equations and 2q - k boundary equations that uniquely determine those coordinates. 554 Ars Math. Contemp. 16 (2019) 445-463 We assume the q bishops are labelled Bi,..., Bq. A configuration of bishops is described by a point z = (z1, z2,..., zq) G R2q, where zj = (xj, yi) is the normalized plane coordinate vector of the ith bishop B^ that is, xj,yj G (0,1) and the position of Bj is (n + 1)zj. The bishops constraints are that z should not lie in any of the q(q - 1) bishops hyperplanes, H+ : Xj - yj = xj - yj, H- : Xj + yj = Xj + yj, (4.1) where i = j. The corresponding equations are the bishops equations and a subspace U defined by a set of bishops equations is a bishops subspace. The boundary equations of [0,1]2q have the form xj = 0 or 1 and yj =0 or 1. We generalize the boundary constraints; we call any equation of the form xj = cj G Z or yj = dj G Z a fixation. We call any point of R2q determined by m bishops equations and 2q - m fixations a lattice vertex. (The term "fixation" was used in Part IV [7] only for a boundary equation; here it means any equation that fixes one coordinate at an integral value.) The first step is to find the dimension of a bishops subspace. We do so by means of a signed graph E® with node set N := {v1, v2,..., vq} corresponding to the bishops Bj and their plane coordinates zj = (xj,yj) and with edges corresponding to the bishops hyperplanes. For a hyperplane H+ we have a positive edge e+ and for a hyperplane H-we have a negative edge e-. Thus, EB is a complete signed link graph: it has all possible edges (barring loops, of which we have no need) of both signs. For each bishops subspace U we have a spanning subgraph E(U) whose edges correspond to the bishops hyperplanes that contain U. (This is nothing other than the slope graph defined in [4, Section 3.3], except that it has extra nodes to make up a total of q.) Then U is the intersection of all the hyperplanes whose corresponding edges are in E(U). Lemma 4.2. For any S C with corresponding signed graph Y. C E®, codim P| S = rk(E+) + rk(E-). For a bishops subspace U, dim U = |A(E(U))| + |B(E(U))| and codim U = rk(E(U) + ) + rk(E(U)-). Proof. We begin with S by looking at a single sign. Adjacent edges ej, e^fc of sign e in E, corresponding to Hj and HEjk, imply the third positive edge because the hyperplanes' equations imply that of Hfk. Consequently we may replace E(Ee) by a spanning tree of each e-signed clique without changing the intersection subspace. Call the revised graph E'. Being irredundant, it has 2q - (|A(E)| + |B(E)|) edges by Lemma 3.1. As each hyperplane reduces the dimension of the intersection by at most 1, we conclude that codim p| S < 2q - (|A(E)| + |B(E)|). On the other hand it is clear that A® intersects in the subspace {(z,z,...,z) : z G R2}; thus, 2q - 2 = codi^p| A®. The corresponding signed graph E®, when reduced to irredundancy, consists of a spanning tree of each sign; in other words, it has 2q - 2 edges. One can choose the irredundant reduction of EB to contain E'; it follows that every hyperplane of S must reduce the dimension of the intersection by exactly 1 in order for the reduced EB to correspond to a 2-dimensional subspace of R2. Therefore, codim p| S = |E(E')| = 2q - (|A(E)| + |B(E)|) = rk(E+) + rk(E-). The dimension formula for U follows by taking S := {H G A® : H D U}. □ S. Chaiken et al.: A q-queens problem. VI. The bishops' period 555 Defining the rank of an arrangement A of hyperplanes to be the codimension of its intersection yields a matroid whose ground set is A. The matroid's rank function encodes the linear dependence structure of the bishops arrangement AB. The complete graph of order q is Kq. Proposition 4.3. The matroid of the hyperplane arrangement AB is isomorphic to G(Kq ) e G(Kq ). Proof. The rank of S C A®, corresponding to E C E®, is the codimension of p| S, which by Lemma 4.2 equals rk(E+) + rk(E-). The matroid this implies on E(EB) is the direct sum of G(E+) and G(E-). Both E+ and E- are unsigned complete graphs. The proposition follows. □ Now we return to the analysis of a lattice vertex z. A point is strictly half integral if its coordinates have least common denominator 2; it is weakly half integral if its coordinates have least common denominator 1 or 2. A weak half integer is an element of 1Z; a strict half integer is a fraction that, in lowest terms, has denominator 2. Lemma 4.4. A point z = (z\,z2,... ,zq) G determined by a total of 2q bishops equations and fixations, is weakly half integral. Furthermore, in each zi, either both coordinates are integers or both are strict halfintegers. Consequently, a vertex of the bishops' inside-out polytope ([0,1]2q, A®) has each zi g {0,1}2 or zi = (2,1). Proof. For the lattice vertex z, find a bishops subspace U such that z is determined by membership in U together with dim U fixations. Suppose vi,vj G Ak, a positive clique in E(U); then xi - yi = xj - yj; thus, the value of xi - yi is a constant ak on Ak. Similarly, xi + yi is a constant bl on each negative clique Bl. Now replace E(U) by an irredundant subgraph E with the same positive and negative cliques. The edges of E within each clique are a tree. The total number of edges is 2q -(|A(E(U))| + |B(E(U))|); this is the number of bishops equations in the set determining z. The remaining |A(E(U))| + |B(E(U))| equations are fixations. Write CU for the clique graph C(E) = C(E(U)). Let tCu be the graph CU with each edge vi replaced by two edges called vf and V. If we (arbitrarily) regard x as - and y as +, this is a signed graph. We defined ak and bl in terms of the xi and yi. We now reverse the viewpoint, treating the a's and b's as independent variables and the x's and y's as dependent variables. This is possible because, if Ak,Bl are the endpoints of vi in CU,then xi-yi = ak and xi+yi = bl, so xi = x(ak + bi) and yi =-(-ak + bi); 2 in matrix form, where x = [xi]q=1, y = j x 1 "H(-CU)T" a y = 2 H(+Cu)t b 2 = 2 H(TCu)1 (4.2) = ak |A(Z(u))| and b |B(Z(u))| 1 j - L j j=l>~~ L"kJk=1 -----= LblJl = 1 are column vectors and H(eCU) is the incidence matrix of CU with, respectively, all edges positive for q 556 Ars Math. Contemp. 16 (2019) 445-463 e = + (with - and + at the A and B ends) and all edges negative for e = - (with + at both ends). Thus, the first coefficient matrix is the transposed incidence matrix of +CU written with a particular ordering of the edges. Fixing a total of |A(Z(U))| + |B(Z(U))| variables xil,... andyj1,... should determine all the values xi, yi,..., xq,yq. The fixations of z correspond to edges in +CU so we may treat a choice of fixations as a choice of edges of +CU, where fixing xi or yi corresponds to choosing the edge vf or v\. We need to know what kind of edge set the fixations correspond to. Let denote the spanning subgraph of +CU whose edges are the chosen edges. The fixation equations can be written in matrix form as M1 = 2 yj i = 2 (4.3) x ii where the fixation edges are vf,... with endpoints Akl,Bll,... and j,... with endpoints Ak* ,Bi>,...; the fixations are xir = cr and yjs = ds; c = [cr] ^ and d = [ds] ^ are column vectors (with r + s = |A(Z(U))| + |B(Z(U))|, the total number of fixations); and M is an (|A(Z(U))| + |B(Z(U))|) x (|A(Z(U))| + |b(Z(U))|) matrix representing the relationships between the a's and b's and the fixed variables: xi1 yji " 1 •• 0 ••• " 0 •• -1 ••• A(Z(U)) M := 1 •• 0 ••• 0 •• 1 ••• B(Z(U)) The rows of M are indexed by the signed cliques and the columns are indexed by the fixations. The column of a fixation involving a node vi, whose endpoints in CU are Ak and Bi, has exactly two nonzero entries, one in row Ak and one in row Bt, whose values are, respectively, 1,1 for an x-fixation and -1,1 for a y-fixation. Thus, each column has exactly two nonzero elements, each of which is ±1. Consequently, M is the incidence matrix of a signed graph, in fact, M = H(Wz). M must be nonsingular since the fixed x's and y's uniquely determine the a's and b's (because they determine z). It follows (see Section 3) that the fixation equations for z are a set corresponding to a spanning 1-forest in in which every circle is negative. This 1-forest is There is choice in the selection of but it is not completely arbitrary. Let Jz be the set of nodes vi such that zi is integral; consider Jz as a subset of E(CU). As fixations must be integral, E(Wz) must be a subset of ±Jz. As fixations are arbitrary integers, may be any spanning 1-forest of +CU that is contained in ± Jz and whose S. Chaiken et al.: A q-queens problem. VI. The bishops' period 557 circles are negative. Thus we have found the graphical form of the equations of a lattice vertex. Example 4.5. For an example, suppose there are three positive and four negative cliques, so A(Z(U)) = {Ai,A2,As} and B(E(U)) = {Bi, B2, B3, B4}, and eight nodes, N = jvi,..., v8}, with the clique graph CU shown in Figure 1. • B4 Figure 1: The clique graph CU. An example of a suitable 1-forest Ç is shown in Figure 2. It corresponds to fixations xi = ci, y2 = di, X3 = c2, X4 = C3, y5 = ¿2, xr = C4, yr = ¿3. The incidence matrix is M := H(Vz) Xi X3 X4 X7 y2 y5 yr 1 0 0 0 -1 0 0 Ai 0 1 1 0 0 -1 0 A2 0 0 0 1 0 0 -1 A3 1 1 0 0 0 0 0 Bi 0 0 1 0 1 0 0 B2 0 0 0 0 0 1 0 B3 0 0 0 1 0 0 1 B4 Every column has two nonzeros. The equations of the fixations in matrix form are M1 ai Xi Ci a2 X3 c2 a3 X4 c3 bi = 2 Xr =2 c4 62 y2 di 63 y5 ¿2 64 yr where the q's and dj 's are any integers we wish in the lemma (but in the application to 558 Ars Math. Contemp. 16 (2019) 445-463 Theorem 1.1 they will be 0's and 1's). The solution is ai = xi - X3 + X4 - y2 = ci - C2 + C3 - di, «2 = -xi + X3 + X4 - y2 = -ci + C2 + C3 - di, a3 = X7 - yr = C4 - d3, bi = xi + X3 - X4 + y2 = ci + C2 - C3 + di, 62 = xi - X3 + X4 + y2 = ci - C2 + C3 + di, 63 = -xi + X3 + X4 - y2 + 2y5 = -ci + c2 + c3 - di + 2d2, 64 = xr + yr = c4 + d3, and the unfixed variables are ai + 62 X2 = -2- = ci - c2 + c3, a2 + b3 , , j 1 j X5 = -2- = -ci + c2 + c3 - di + d2, a3 + 63 -ci + c2 + c3 + c4 - di + 2d2 - d3 X6 = —2~ =-2-, -ai + 6i , , yi =-2-= c2 - c3 + di, -«2 + 6i , , y3 = -2-= ci - c3 + di, -«2 + 62 , , y4 = —2— = ci - c2 + di, -a3 + 63 -ci + c2 + c3 - c4 - di + 2d2 + d3 y6 = —=-2-• Observe that x6 and y6 are the only possibly fractional coordinates and their difference, x6 - y6 = a3 = c4 - d3, is integral; therefore, either z6 is integral, or both x6 and y6 are half integers and z6 = (i, i) if z G [0,1]2q. We are now prepared to prove Lemma 4.4. We need a result from (e.g.) [9], which can be stated: S. Chaiken et al.: A q-queens problem. VI. The bishops' period 559 Lemma 4.6. The solution of a linear system with integral constant terms, whose coefficient matrix is the transpose of a nonsingular signed-graph incidence matrix, is weakly halfintegral. Proof. The way in which this is contained in [9] is explained in [1, p. 197]. □ Since M is the incidence matrix of a signed graph, and since the constant terms in Equation (4.3), being twice the fixed values, are even integers, the a's and b's are integers by Lemma 4.6. The remaining x's and y's are halves of sums or differences of a's and b's, so they are weak half-integers. The exact formula is obtained by substituting Equation (4.3) into Equation (4.2): l-i T H (tCuY(M-l) (4.4) □ Theorem 1.1 is an immediate corollary of Lemma 4.4. 5 Open questions 5.1 Coefficient periods We proved that je (n) is the first coefficient that depends on n, having period 2. We guess that every coefficient after je(n) also has period 2. 5.2 Subspace structure We have not been able to find a complete formula for all q. By our method, that would need a general structural analysis of all subspaces, which is too complicated for now. We propose the following problem: Give a complete description of all subspaces, for all q, in terms of signed graphs. That is, we ask for the slope matroid (see [4, Section 7.3]). The signed-graphic frame matroid G(Z) ([13, Theorem 5.1], corrected and generalized in [15, Theorem 2.1]), while simpler than the slope matroid, perhaps could help find a description of the latter. 5.3 Similar two-move riders The slope matroid for the bishop is simple compared to those for other riders. We wonder if riders with two slopes that are related by negation (that is, the basic moves are symmetrical under reflection in an axis), or negation and inversion (that is, the basic moves are perpendicular), may be amenable to an analysis that uses the bishops analysis as a guide. 5.4 Other two-move riders We expect that finding formulas for any rider with only two basic moves is intrinsically easier than for riders with more than two and can be done for all such riders in a comprehensive though complicated manner. 560 Ars Math. Contemp. 16 (2019) 445-463 Dictionary of notation b(Z) # of signed-graph components with no negative circle (p. 552) c(r), c(Z) # of components of a graph (p. 552) c(Z± )..................# of positive or negative cliques (p. 553) d/c slope of a line or move (p. 551) (c, d) coordinates of a move vector m (p. 551) cj, di ...................fixation equation constants (p. 554) e edge of a (signed) graph (p. 552) ej edge of a signed graph with sign e and end nodes vj, vj (p. 554) g(Z)....................function on a signed graph (p. 553) k, l indices in the clique graph (p. 555) m = (c, d) basic move (p. 551) n ......................size of a square board oB(q; n) # of nonattacking labelled configurations (p. 551) p period of a quasipolynomial (p. 550) q ......................# of pieces on a board (p. 550) q # of nodes in a (signed) graph (p. 552) r, s indices of fixations (p. 556) uB(q; n) ................# of nonattacking unlabelled configurations (p. 550) v node in a signed graph (p. 552) z = (x, y), zi = (xi, yi) piece positions (p. 551) a, b....................clique vectors (p. 555) c, d fixation vectors (p. 556) x, y x, y coordinate vectors of a configuration (p. 555) z = (z\,... ,zq ) ........a configuration in R2q (p. 554) Yi (n) coefficient of uB (p. 551) e sign of an edge (p. 554) £ ......................cyclomatic number (p. 552) a sign function of the signed graph S (p. 552) rk rank of the incidence matrix of a (signed) graph (p. 552) Ak,Bl .................positive, negative cliques (p. 552) C(Z) clique graph (p. 553) CU = C(Z(U)) clique graph (p. 555) E......................edge set of a graph (p. 552) G matroid on ground set E (p. 552) Jz set of vertices zi in the configuration z such that zi is integral (p. 556) Kq.....................complete graph (p. 555) M incidence matrix H(Wz) (p. 556) N node set of a graph (p. 552) aB.....................move arrangement of bishops B (p. 551) B board polygon [0,1]q (p. 551) bishops hyperplane (p. 550) (P, A) .................inside-out polytope (p. 551) S subarrangement (p. 554) U subspace in the intersection lattice of an arrangement (p. 554) S. Chaiken et al.: A q-queens problem. VI. The bishops' period 561 R......................real numbers Z integers B bishop (p. 551) A(Z), B(Z).............sets of positive, negative cliques (p. 552) r graph (p. 552) H incidence matrix (read "Eta") of a (signed) graph (p. 552) Z......................signed graph (p. 552) Z(U) signed graph of the bishops subspace U (p. 554) subgraph for a vertex z (p. 556) References [1] G. Appa and B. Kotnyek, A bidirected generalization of network matrices, Networks 47 (2006), 185-198, doi:10.1002/net.20108. [2] S. E. Arshon, Resheniye odnoy kombinatornoy zadachi, Mat. Prosveshchenie Ser. 1 8 (1936), 24-29, http://mi.mathnet.ru/eng/mp694. [3] M. Beck and T. Zaslavsky, Inside-out polytopes, Adv. Math. 205 (2006), 134-162, doi:10.1016/ j.aim.2005.07.006. [4] S. Chaiken, C. R. H. Hanusa and T. Zaslavsky, A q-queens problem. I. General theory, Electron. J. Combin. 21 (2014), #P3.33 (28 pages), https://www.combinatorics.org/ojs/ index.php/eljc/article/view/v21i3p33. [5] S. Chaiken, C. R. H. Hanusa and T. Zaslavsky, A q-queens problem. II. The square board, J. Algebraic Combin. 41 (2015), 619-642, doi:10.1007/s10801-014-0547-0. [6] S. Chaiken, C. R. H. Hanusa and T. Zaslavsky, A q-queens problem. III. Nonattacking partial queens, submitted, arXiv:1402.4886 [math.CO]. [7] S. Chaiken, C. R. H. Hanusa and T. Zaslavsky, A q-queens problem. IV. Attacking configurations and their denominators, submitted, arXiv:1807.04741 [math.CO]. [8] S. Chaiken, C. R. H. Hanusa and T. Zaslavsky, A q-queens problem. V. Some of our favorite pieces: Queens, bishops, rooks, and nightriders, under revision, arXiv:1609.00853 [math.CO]. [9] D. S. Hochbaum, N. Megiddo, J. Naor and A. Tamir, Tight bounds and 2-approximation algorithms for integer programs with two variables per inequality, Math. Programming Ser. B 62 (1993), 69-83, doi:10.1007/bf01585160. [10] V. Kotesovec, Non-Attacking Chess Pieces, self-published online book, 3rd edition, 2011, http://www.kotesovec.cz/math.htm. [11] V. Kotesovec, Non-Attacking Chess Pieces, self-published online book, 6th edition, 2013, http://www.kotesovec.cz/math.htm. [12] R. P. Stanley, Enumerative Combinatorics, Volume 1, volume 49 of Cambridge Studies in Advanced Mathematics, Cambridge University Press, Cambridge, 2nd edition, 2012. [13] T. Zaslavsky, Signed graphs, Discrete Appl. Math. 4 (1982), 47-74, doi:10.1016/ 0166-218x(82)90033-6. [14] T. Zaslavsky, Erratum: "Signed graphs", Discrete Appl. Math. 5 (1983), 248, doi:10.1016/ 0166-218x(83)90047-1. [15] T. Zaslavsky, Biased graphs. II. The three matroids, J. Comb. Theory Ser. B 51 (1991), 46-72, doi:10.1016/0095-8956(91)90005-5. ARS MATHEMATICA CONTEMPORANEA ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 16 (2019) 563-583 https://doi.org/10.26493/1855-3974.793.2a9 (Also available at http://amc-journal.eu) Classification of some reflexible edge-transitive embeddings of complete bipartite graphs Jin Ho Kwak Mathematics, Beijing Jiaotong University, Beijing, 100044, P.R. China Young Soo Kwon Mathematics, Yeungnam University, Kyeongsan, 712-749 Republic of Korea Received 8 January 2015, accepted 28 February 2019, published online 21 April 2019 In this paper, we classify some reflexible edge-transitive orientable embeddings of complete bipartite graphs. As a by-product, we classify groups r such that (i) r = XY for some cyclic groups X = (x) and Y = (y) with X n Y = {1r} and (ii) there exists an automorphism of r which sends x and y to x-1 and y-1, respectively. Keywords: Complete bipartite graphs, reflexible edge-transitive embedding. Math. Subj. Class.: 05C10, 05C30 1 Preliminaries A map is a 2-cell embedding of a graph G in a compact, connected surface. A map is called orientable or nonorientable according to whether the supporting surface is orientable or nonorientable. In this paper, we only consider orientable maps. For a simple connected graph G, an arc of G is an ordered pair (u,v) of adjacent vertices in G. The set of all arcs in G is denoted by D(G). An orientable map M can be described by a pair (G; R), where G is the underlying graph of M and R is a permutation of the arc set D(G) whose orbits coincide with the sets of arcs emanating from the same vertex. The permutation R is called the rotation of the map M. For given two maps M1 = (G1; R1) and M2 = (G2; R2), a map isomorphism 0: M1 ^ M2 is a graph isomorphism 0: G1 ^ G2 such that ^R1 (u, v) = R20(u, v) for any arc (u, v) in G1. Furthermore if M1 = M2 = M, 0 is called a map automorphism of M. The set of all map automorphisms of M denoted by Aut( M) is a group under the composition operation, and it is called the automorphism group of M. For a map M = (G; R), E-mail addresses: jinkwak@postech.ac.kr (Jin Ho Kwak), ysookwon@ynu.ac.kr (Young Soo Kwon) Abstract ©® This work is licensed under https://creativecommons.org/licenses/by/4.0/ 564 Ars Math. Contemp. 16 (2019) 445-463 the group Aut(M) acts semi-regularly on the arc set D(G), so | Aut(M)| < 2|E(G)|. If this bound is attained, then Aut(M) acts regularly on the arc set, and the map is called a regular map or a regular embedding. The map M is said to be vertex-transitive or edge-transitive if Aut(M) acts transitively on V(G) or E(G), respectively. For an orientable embedding M of a bipartite graph G, if the set of partite set preserving map automorphisms acts transitively on E(G) then we call M an edge-transitive map or an edge-transitive embedding satisfying the Property (P) in this paper. For a map M = (G; R), if M and M-1 = (G; R-1) are isomorphic, M is called reflexible. Classifying highly symmetric embeddings of graphs in a given class is an interesting problem in topological graph theory. In recent years, there has been particular interest in the regular embeddings of complete bipartite graphs Kn,n by several authors [1, 2, 4, 5, 6, 7, 8, 10]. The reflexible regular embeddings and self-Petrie dual regular embeddings of Kn n have been classified by the authors [7]. Recently, G. Jones has completed the classification of regular embeddings of Kn n [5] and the authors have classified nonorientable regular embeddings of Kn n [8]. In [3], Graver and Watkins classified edge-transitive maps on closed surfaces into fourteen types. In this paper, we classify reflexible edge-transitive embeddings of Km,n satisfying the Property (P) which correspond to types 1 or 2 among 14 types. The following theorem is the main result in this paper. Theorem 1.1. For any integers m = 2 apa 1 • • • pa'p-Y • • • pT/ and n = 2bp11 • • • p^ q+11 • • • q+g9 (prime decompositions) with gcd(m, n) = 2cpi1 • • • pf and a < b, the number (up to isomorphism) of reflexible edge-transitive embeddings of Km,n satisfying the Property (P) is 1 if both m and n are odd; 2f (1 + pi1) • • • (1 + p^) if exactly one of m and n is even, namely, only n is even; A(a, b)2f+g+£(1 + pi1) • • • (1 + pCe) if both m and n are even, where 1 if (a,b) = (1,1), 2 if (a,b) = (1, 2), 4 if (a, b) = (2, 2) or (1, k) with k > 3, 10 if (a, b) = (2, 3), 12 if (a, b) = (2, k) with k > 4, 28 if (a, b) = (3, 3), 40 if (a, b) = (3, 4), 36 if (a, b) = (3, k) with k > 5, 20(1 + 2 °-2) if a = b > 4, 20 + 18 • 2°-2 if b - 1 = a > 4, 20 + 16 • 2 °-2 if b - 2 > a > 4. Our paper is organized as follows. In the next section, we consider some relations between edge-transitive embeddings of Km,n satisfying the Property (P) and products of two cyclic groups. In Section 3, we classify reflexible edge-transitive embeddings of Km,n satisfying the Property (P) when at least one of m and n is odd. In Section 4, for even integers m and n, the classification of reflexible edge-transitive embeddings of Km,n satisfying the Property (P) is given. In the final section, we classify groups r satisfying the conditions: J. H. Kwak and Y. S. Kwon: Classification of some reflexible edge-transitive embeddings ... 565 (i) r = XY for some cyclic groups X = (x) and Y = (y) with X n Y = {1r} and (ii) there exists an automorphism of r which sends x and y to x-1 and y-1. 2 (m, n)-bicyclic triples in Aut(Km,n) Regular embeddings of the complete bipartite graphs Kn,n are related to groups r with two generators satisfying some conditions [4]. Using this relation, G. Jones classify regular embeddings of Kn n [5]. Similarly, we aim to find a relation between edge-transitive embeddings of Km,n satisfying the Property (P) and groups with two generators satisfying some conditions in this section. In [4], G. Jones et al. showed that any finite group r is isomorphic to Aut(M) for some regular embedding M of Kn,n if and only if r has cyclic subgroups X = (x) and Y = (y) of order n such that: (i) r = xy (ii) X n Y = {1r} and (iii) there is an automorphism a of r transposing x and y. They call the triple (r, x, y) satisfying these conditions the n-isobicyclic triple. In this relation, x and y correspond to rotations of M around two fixed adjacent vertices u and v, respectively. The automorphism a corresponds to the half-turn reversing the edge uv. For two n-isobicyclic triples (r1, x1, y1) and (r2, x2, y2), two corresponding regular embeddings M1 and M2 are isomorphic if and only if there exists a group isomorphism from r1 to r2 given by x1 ^ x2 and y1 ^ y2. Using this, one can show that the regular embedding M induced by n-isobicyclic triple (r, x, y) is reflexible if and only if there exists an automorphism ft of r which sends x and y to x-1 and y-1, respectively. (For more information, the reader is referred to [4].) Note that one can define an embedding of Kn n by using the first and second conditions of n-isobicyclic triple, and the induced map is edge-transitive map satisfying the Property (P) even though the third condition of n-isobicyclic triple is not satisfied. Conversely, any edge transitive embedding of Kn n satisfying the Property (P) is isomorphic to some induced map by such a triple (r, x, y). One can show that for different positive integers m and n, an edge-transitive embedding of Km,n satisfying the Property (P) can also be represented by a similar triple. For a group r containing cyclic subgroups X = (x) of order n and Y = (y) of order m, the triple (r, x, y) is called (m, n)-bicyclic if it satisfies: (i) r = XY and (ii) X n Y = {1r}. For any (m, n)-bicyclic triple (r, x, y), one can define an embedding of Km,n by a similar way to define an embedding of Kn n using n-isobicyclic triple. We denote this embedding by M(r,x,y). One can see that M(r, x, y) is an edge-transitive embedding of Km,n satisfying the Property (P). Furthermore the following result holds. Lemma 2.1 ([9]). Let m, n be two positive integers (not necessarily distinct). (1) Any edge-transitive embedding M of Km,n satisfying the Property (P) is isomorphic to M(r, x, y) for some (m, n)-bicyclic triple (r, x, y). 566 Ars Math. Contemp. 16 (2019) 445-463 (2) For two (m, n)-bicyclic triples (Ti, xi, yi) and (r2, x2, y2), two edge-transitive em-beddings M(Ti, x1, y1) and M(r2, x2, y2) are isomorphic if and only if there exists a group isomorphism from r1 to r2 given by x1 ^ x2 and y1 ^ y2. For any (m, n)-bicyclic triple (r, x, y), there exists a subgroup H of the automorphism group Aut(Km,n) such that: (i) H is isomorphic to r and (ii) x and y in r correspond to elements in H which cyclically permute vertices in the partite sets of size n and m, respectively. Hence it suffices to deal with such (m, n)-bicyclic triples in Aut(Km,n) to classify edge-transitive embeddings of Km,n satisfying the Property (P). For any positive integer m, denote the set {0,1,..., m - 1} by [m]. Let V = {0,1, ..., (m - 1)} U {0', 1', .. ., (n - 1)'} = [m] U [n]' be the vertex set of Km,n as partite sets, and let D = {(i, j'), (j',i) : 0 < i < m - 1 and 0 < j < n - 1} be the arc set, where (i, j') is the arc emanating from i to j' and (j', i) denotes its inverse. We denote the symmetric group on [m] and [n]' by S and S', respectively. Let S0 and SO be their stabilizers of 0 and 0', respectively. Note that Aut(Km,n) is isomorphic to S x S' when m = n; S I Z2 when m = n. We identify integers 0,1, 2,... with their residue classes modulo m or n according to the context. Let (r, x, y) be an (m, n)-bicyclic triple such that r is a subgroup of Aut(Km n). Now there exists an automorphism ^ G Aut(Km,n) such that x0 = = a(0' 1' ••• (n - 1)') and y0 = = fi(0 1 ••• m - 1), where a G S0 and fi G SO. For any a G S0 and fi G SO, let xa = a(0' 1' ••• (n - 1)') and yg = fi(0 1 ••• m - 1). From now on, we only consider triples ((xa, yg}, xa, yg) as candidates of (m, n)-bicyclic triples. Lemma 2.2 ([9]). For any a G S0 and fi G SO, 1. the group (xa, yg} acts transitively on the edge set of Km,n and 2. the triple ((xa, yg},xa,yg) is (m, n)-bicyclic if and only if | (xa, yg} | = mn. By Lemma 2.2, we need to characterize a G S0 and fi G SO satisfying | (xa, yg} | = mn to classify edge-transitive embeddings of Km,n satisfying the Property (P). To do this, we denote ETm,„ = {(a, fi) : a G so, fi G SO and | (xa, yg} | = mn}. Note that for any (a, fi) G ETm,n, ((xa, yg}, xa, yg) is an (m, n)-bicyclic triple and hence M((xa, yg}, xa, yg) is an edge-transitive embedding of Km,n satisfying the Property (P). Conversely for any edge-transitive embedding M of Km,n satisfying the Property (P), there exists (a, fi) G ETm,n such that M is isomorphic to M((xa, yg}, xa, yg). J. H. Kwak and Y. S. Kwon: Classification of some reflexible edge-transitive embeddings ... 567 Remark 2.3. (1) For any (a, ft) e ETm,„, (xa,Vl3) = {xdvl I i e [nL j e [m]} = {y|xd | i e [n}, j e [m]}. Hence in many cases, if a satisfies some properties then ft also satisfies the same properties and vice versa. (2) Note that for different positive integers m and n and for an orientable embedding M of Km,n, any automorphism of M is partite set preserving. Let m = n be odd and let M be an orientable edge-transitive embedding of Kn,n. If a subgroup r of Aut(M) acts regularly on the edge set then |r| = m2 is odd and hence there exists no partite set reversing element in r. Hence for odd n, every edge-transitive embedding of Kn,n is an edge-transitive embedding of Kn,n satisfying the Property (P). On the other hand, for even n, we do not know whether the above statement is true or not. The next lemma shows that for different (ai,fti), (a2,ft2) e ETm,n, two induced edge-transitive embeddings are non-isomorphic. Lemma 2.4 ([9]). For any (a1, ft1), (a2, ft2) e ETm,n, the induced edge-transitive em-beddings M((xdi ,vp1) , xdi ,vp1) and M((xd2 ,vi2) ,xd2 ,vi2) are isomorphic if and only if (ai,fti) = (a2,ft2). By Lemma 2.4, distinct pairs in ETm,n give non-isomorphic edge-transitive embeddings of Km,n and the number of edge-transitive embeddings of Km,n satisfying the Property (P) equals to the cardinality | ETm,n |. But for distinct pairs (a1,ft1), (a2,ft2) e ETm,n, two groups (xdi ) and (xd2 , Vi2) may possibly be isomorphic. We do not know a necessary and sufficient condition for (xdi, vi) — (xd2, vi2). So we propose the following problem. Problem 2.5. For any positive integers m and n and for any (a1, ft1), (a2, ft2) e ETm,n, find a necessary and sufficient condition for (xdi, vi) — (xd2, vi2). From now on, we aim to characterize the set ETm,n. Note that for any (a, ft) e ETm,n, the stabilizers (xd, vi)0 and (xd, vi)0/ are cyclic groups (xd) of order n and (vi) of order m, respectively. Lemma 2.6. For any (a, ft) e ETm,n, (a) and (ft) are cyclic groups of order |{a®(1) : i e [n]}| and |{ft®(1') : i e [m}}|, the lengths of the orbit containing 1 and 1', respectively. Furthermore they are divisors of n and m, respectively. Proof. Let d1 = |{a®(1) : i e [n}}| and d2 = |{ft®(1') : i e [m}}|. Now d1 and d2 are divisors of the orders |(xd)| = n and |(vi)| = m, respectively. Note that adi (1) = 1 and v-1xd Vl (0) = 0, which implies that, as a conjugate of xdi, v-1xdi Vi belongs to the vertex stabilizer (xd, Vi)0 = (xd). Since d1 is a divisor of n, v-1xdi Vi = xddi for some r e [n] such that gcd(r, n) = 1, where gcd(r, n) is the greatest common divisor of r and ^. Now, 568 Ars Math. Contemp. 16 (2019) 445-463 suppose to the contrary that |(a)| = d1. Then there exists k e [m] such that adl (k) = k. Let q be the largest element in [m] such that adl (q) = q. On the other hand, (q) = xradl (q) = y-1x% yp(q) = y-1x% (q + 1) = y-1(q + 1) = q, a contradictory to ardl (q) = q. Therefore |(a)| = d1. Similarly, one can show that K£)| = d2. □ For any (a, ft) e ETm,n, it follows from Lemma 2.6 that the length of each cycle in a (ft, resp.) is a divisor of the length d1 (d2, resp.) of the cycle containing 1 (1', resp.). From now on we denote i', [n]' and ft(i') simply by i, [n] and ft(i) for any i' e [n]', respectively. The following lemma is related to a characterization of the set ETm 3, then both m and d2 are even; (3) if m(n, resp.) is even then a (P, resp.) is parity preserving. Furthermore there exists s, t G [m] such that a(2k) = 2kt, a(2k + 1) = 2kt + 2s + 1 and 2t2 = 2; (4) if both di and d2 are at least 3 then they are divisors of gcd(m, n). Proof. (1): Let di = 1 and d2 > 2. By Lemma 2.10, a(1) = —1 (mod d2). Since a is the identity, 1 = — 1 (mod d2). By the assumption d2 > 2, d2 = 2. By Lemma 2.6, d2 is a divisor of m, and hence m is even. (2): Let di > 3. By lemma 2.10, P(k) = —k (mod di), which implies that the order d2 of P is even. Since d2 is a divisor of m, m is also even. (3): Let m be even. If di = 1 then a is the identity and hence a is parity preserving. If di =2 then a-i = a and a(k) = a(k — 1 + 1) = a(k — 1) + a(1) = a(k — 2) + 2a(1) = • • • = ka(1) for all k G [m]. Since a2(1) = a(a(1)) = (a(1))2 = 1 and m is even, a(1) should be odd. Hence a is parity preserving. Assume that di > 3. Then, d2 is even by (2). Since a(k) = —k (mod d2), a is parity preserving. 570 Ars Math. Contemp. 16 (2019) 445-463 For any 2k G [m], a(2k) = a(2(k - 1)) + a(2) = a(2(k - 2)) + 2a(2) = • • • = ka(2) and a(2k + 1) = a(2(k - 1) + 1) + a(2) = • • • = a(1) + ka(2). Let a(1) = 2s + 1 and a(2) = 2t. Now a(2k) = ka(2) = 2kt and a(2k + 1) = ka(2) + a(1) = 2kt + 2s + 1. Note that for any 2k G [m], a(1) + a(2k) = a(2k + 1) = a-1(2k) + a(1). Hence a-1(2k) = a(2k), namely, a2(2k) = 2k. So we have a2(2) = a(2t) = 2t2 = 2. (4): Let d1; d2 > 3. Now all of d1; d2, m and n are even by (2). Hence there exist s, t G [m] such that a(2k) = 2kt, a(2k +1) = 2kt + 2s +1 and 2t2 =2 by (3). Since d1 is even and a2i(1) = a2i-1(2s + 1) = a2i-2(2st + 2s + 1) = • • • = 2is(t + 1) + 1, d1 is the smallest positive integer such that d1s(t+1) = 0 (mod m) byLemma2.6. Hence d1 is a divisor of m and consequently a divisor of gcd(m, n). Similarly d2 is a divisor of gcd(m, n). □ 3 At least one of m and n is odd In this section, we classify reflexible edge-transitive embeddings of Km,n satisfying the Property (P) when at least one of m and n is odd. Note that when at least one of m and n is odd, any orientable edge-transitive embedding of Km,n is an edge-transitive embedding satisfying the Property (P). In [9], the second author counted | RETm,n | when both m and n are odd as follows. Theorem 3.1 ([9]). If both m and n are odd then | RETm,n | = 1, namely, there exists only one reflexible edge-transitive embedding of Km,n satisfying the Property (P) up to isomorphism. In the next theorem, we count | RETm,n | when exactly one of m and n is odd. By symmetry, we assume that m is odd. Theorem 3.2. Let m = p^1 • • • pT p7+ • • • P^f (prime factorization) be odd and n = 2bp11 • • • p^ q^j+j1 • • • q^9 (prime factorization) be even. Let gcd(m, n) = p1 • • • p^ with c > 1 for any i = 1,..., L. Now | RETm,„ | = 2f (1+ p!1 ) ••• (1+ pc/), namely, there exist 2f (1 + p1) • • • (1 + p^) reflexible edge-transitive embeddings of Km,n satisfying the Property (P) up to isomorphism. Proof. Let (a, 3) G RETm,n and let d1 = |(a)| and d2 = |(,0)|. Suppose that d1 > 3. Then both d2 and m are even by Lemma 2.11(2), which is a contradiction. Hence d1 = 1 or 2. Furthermore for any k G [m], a(k) = a-1(k - 1) + a(1) = a(k - 1) + a(1) = • • • = ka(1). J. H. Kwak and Y. S. Kwon: Classification of some reflexible edge-transitive embeddings ... 571 Let a(1) = r. Now a(k) = rk and a2(1) = a(r) = r2 = 1 (mod m). Since n is even, P is parity preserving and there exists s, t G [n] such that P(2k) = 2kt, P(2k + 1) = 2kt + 2s + 1 and 2t2 = 2 for any 2k G [n] by Lemma 2.11(3). If 2t = 2 then the length of the orbit containing 2 is 2 and hence d2 is even. But it can not happen because m is odd. Hence for any 2k G [n], P(2k) = 2k, P(2k + 1) = 2k + 2s + 1 and for any i G [m], Pj(1) = Pi-1(2s + 1) = Pi-2(2s + 2s + 1) = • • • = 2is +1. Therefore d2 is the smallest positive integer such that 2d2s = 0 (mod n), which implies that d2 is a divisor of n, and hence d2 is a divisor of gcd(m, n) = pi1 • • • pC. If r = 1 (mod p"i) for some i = 1,2,..., i, then the fact a(1) = r = —1 (mod d2) implies that pj can not be a divisor of d2. Hence pbi should divide s, namely, s = 0 (mod pbi). If r = —1 (mod p^3) for some j = 1, 2,...,i, then s = x • pb3(mod p^) for some x with 0 < x < pj — 1 because d2 is a divisor of gcd(m, n). Therefore, for any j = 1,..., i, the pair (r (mod p^3), s (mod p3)) is (1,0) or ( —1, x • p^-Cj) for some x with 0 < x < pCj — 1. Because d2 | gcd(m,n), we have 2s = 0 (mod 2b) and for any k = 1,2,... ,g, s = 0 (mod q£+fck). Since r2 = 1 (mod m), r = ±1 (mod p^3) for any j = 1, 2,... f. Conversely for any r G [m] and s G [n] satisfying the conditions (i) for any j = 1,...,i, the pair (r (mod p^3 )),s (mod p^)) is (1,0) or ( —1, x • pj3 -C3) for some integer x with 0 < x < pC — 1, (ii) 2s = 0 (mod 2bqb;+11 • • • qb/+gs) and (iii) for any j = 1, 2,... f, r = ±1 (mod pa++3), define a(k) = rk for any k G [m] and P(2t) = 2t, P(2t + 1) = 2t + 2s + 1 for any 2t G [n]. Note that a G S0 and p G SO. Let d1 = ||. Now d1 = 1 or 2 depending on the value of r and d2 is the smallest positive integer satisfying 2d2 s = 0 (mod n). Note that d2 divides gcd(m,n) and r = —1 (mod d2). For any i G [n], let a(i) = P(i) and b(i) = aj(1) = rj. For the first case, let i be even. Now a(i) = P(i) = i and b(i) = aj(1) = 1. For any 2t G [n], P (2t + i) = 2t + i and Pb(i)(2t) + a(i) = P(2t) + P(i) = 2t + i and P(2t + 1 + i) = 2t + i + 2s +1 and Pb(i)(2t + 1) + a(i) = P(2t + 1) + P(i) = 2t + 2s + 1 + i. Hence P(t + i) = Pb(i)(t) + a(i) for any t G [n]. For any k G [m], aj(k) = k and a°(i)(k + b(i)) — 1 = k. 572 Ars Math. Contemp. 16 (2019) 445-463 Hence a®(k) = aa(i)(k + b(x)) — 1 for any k G [m]. For the remaining case, let i be odd. Now a(i) = P(i) = i + 2s and b(i) = a®(1) = r = —1 (mod d2). For any 2t G [n], P (2t + i) = 2t + i + 2s and Pb(i)(2t) + a(i) = P-1(2t) + P(i) = 2t + i + 2s and P (2t + 1 + i) = 2t + i +1 and Pb(i)(2t + 1) + a(i) = P-1(2t + 1) + P (i) = 2t +1 — 2s + i + 2s = 2k + i + 1. Hence P(t + i) = Pb(i)(t) + a(i) for any t G [n]. For any k G [m], a®(k) = rk and aa(i)(k + b(i)) — 1 = a(k + r) — 1 = rk + r2 — 1 = rk. Hence a4(k) = aa(i)(k + b(i)) — 1 for any k G [m]. By Lemma 2.7, (a,P) G ETm,n. Furthermore one can easily check that a-1( —k) = —a(k) for any k G [m] and P-1( — t) = —P(t) for any t G [n]. Hence (a, P) G RETm,n by Lemma 2.8. Therefore | RETm,„ | = 2f (1+ p!1 ) ••• (1+ pc/ ). □ 4 Both m and n are even In this section, we classify reflexible edge-transitive embeddings of Kmf satisfying the Property (P) when both m and n are even, and consequently prove Theorem 1.1. For the classification, we give the following lemma. Lemma 4.1. Let m and n be even and let a G So and P G SO with d1 = |(a}| and d2 = |(P}|. Now (a, P) G RETm,n if and only if a and P are defined by a(2k) = 2kt1 and a(2k + 1) = 2kt1 + 2s1 + 1 for any 2k G [m] and P(2k) = 2kt2 and P(2k +1) = 2kt2 +2s2 + 1 for any 2k G [n] for some quadruple (s1,t1; s2,t2) G [mm] x [m] x [f ] x [f ] satisfying the following conditions; (i) d1 | gcd(m, n) and d2 | gcd(m,n); (ii) 2t2 = 2 (mod m) and 2t2 = 2 (mod n); (iii) 2(s1 + 1) = 0 (mod d2), 2(t1 + 1) = 0 (mod d2), 2(s2 + 1) = 0 (mod d1), and 2(t2 + 1) = 0 (mod d1); (iv) 2(s1 + 1)(t1 — 1) = 0 (mod m) and2(s2 + 1)(t2 — 1) = 0 (mod n). J. H. Kwak and Y. S. Kwon: Classification of some reflexible edge-transitive embeddings ... 573 Proof. Assume that 2ti = 2, namely, ti = 1. Then a(2k) = 2k and a(2k + 1) = 2k + 2s1 + 1 for any 2k G [m]. Since for any i G [n], a4(2k +1) = 2k + 2is1 + 1, d1 is the smallest positive integer such that 2d1s1 = 0 (mod m). Now assume that 2t1 = 2. Then d1 should be even because a2 (2) = 2t 1 = 2. Since for any 2i G [n] and for any 2k G [m], a2i(2k + 1) = 2k + 2is1(t1 + 1) + 1, d1 is the smallest positive even integer such that d1s1(t1 + 1) = 0 (mod m). Similarly one can show that d2 is the smallest positive integer such that 2d2s2 = 0 (mod n) if t2 = 1; and the smallest positive even integer such that d2«2(t2 + 1) = 0 (mod n) if ¿2 = 1. For any i G [n], let a(i) = ft(i) and b(i) = a4(1). For the first case, let i be even. Then a(i) = ft(i) = it2 = —i (mod d1) and b(i) = a4(1) = is1(t1 + 1) + 1 = 1 (mod d2). For any 2 k G [n], ft(2k + i) = 2kt2 + it2 and ft b(i)(2k) + a(i) = ft(2k) + ft (i) = 2kt2 + it2 and ft (2k + 1 + i) = 2kt2 + it2 + 2s2 + 1 and ft b(i)(2k + 1) + a(i) = ft (2k + 1) + ft(i) = 2kt2 + 2s2 + 1 + ¿¿2- Hence ft(k + i ) = ftb(i) (k) + a(i) for any k G [n]. For any 2k G [m], a4 (2k) = 2k and a°(i)(2k + b(i)) — 1 = a-i(2k + is1(t1 + 1) + 1) — 1 = (2k + is1(t1 + 1) — is1(t1 + 1) + 1) — 1 = 2k and a4(2k + 1) = 2k + is1(t1 + 1) + 1, and a°(i)(2k + 1 + b(i)) — 1 = a-i(2k + is1(t1 + 1) + 2) — 1 = (2k + is1(t1 + 1) + 2) — 1 = 2k + is 1 (t 1 + 1) + 1. Hence a4(k) = aa(i)(k + b(i)) — 1 for any k G [m]. For the remaining case, let i be odd. Now a(i) = ft(i) = (i — 1)t2 + 2s2 + 1 = —i (mod d1) and b(i) = a4(1) = (i — 1)s1(t1 + 1) + 2s1 + 1 = —1 (mod d2). For any 2k G [n], ft(2k + i) = 2kt2 + (i — 1)t2 + 2s2 + 1 and ftb(i)(2k) + a(i) = ft-1(2k) + ft(i) = 2kt2 + (i — 1)t2 + 2s2 + 1 and ft(2k +1 + i) = (2k + i +1)t2 and ft b(i)(2k + 1) + a(i) = ft-1(2k + 1) + ft(i) = (2kt2 — 2s2t2 + 1) + (i — 1)t2 + 2S2 + 1 = (2k + i + 1)t2 — 2(s2 + 1)(t2 — 1) = (2k + i + 1)t2- 574 Ars Math. Contemp. 16 (2019) 445-463 Hence ft(k + i) = ftb(i)(k) + a(i) for any k G [n]. For any 2k G [m], a4 (2k) = 2kii and a°(i)(2k + b(i)) - 1 = a-i(2k + (i - 1)s1(t1 + 1) + 2Si + 1) - 1 = (2k + (i - 1)si(ti + 1) + 2si)ti - (i + 1)si(ti + 1) + 2si = 2kti - 2si(ti + 1) + 2siti + 2si = 2kti and aft2k + 1) = 2kti + (i - 1)si(ti + 1) + 2si + 1 and a°(i)(2k + 1 + b(i)) - 1 = a-i(2k + (i - 1)si(ti + 1) + 2si +2) - 1 = (2k + (i - 1)si(ti + 1) + 2si + 2)ti - 1 = 2kti + (i - 1)si(ti + 1) + 2si + 1 + 2(si + 1)(ti - 1) = 2kti + (i - 1)si(ti + 1) + 2si + 1. Hence aftk) = a°(i)(k + b(i)) - 1 for any k G [m]. By Lemma 2.7, (a, ft) G ETm,n. Furthermore one can easily check that a-i(-k) = -a(k) forany k G [m] and ft-i(-k) = -ft(k) for any k G [n]. Hence (a, ft) G RETm,n by Lemma 2.8. Since m and n are even, both a and ft are parity preserving. For any 2k G [m], a(2k) = a(2(k - 1)) + a(2) = a(2(k - 2)) + 2a(2) = ••• = ka(2) and a(2k + 1) = a(2(k - 1) + 1) + a(2) = a(2(k - 2) + 1) + 2a(2) = • • • = a(1) + ka(2). Let a(1) = 2si + 1 and a(2) = 2ti for some si,ti G [f]. Then a(2k) = 2kti and a(2k +1) = 2kti + 2si + 1 forany 2k G [m]. Note that for any 2k G [m], a(1) + a(2k) = a(2k +1) = a-i(2k) + a(1). Hence a-i(2k) = a(2k), namely, a2 (2k) = 2k. It implies that a2(2) = a(2ti) = 2t2 = 2 (mod m). Assume that 2ti = 2, namely, ti = 1. Then by Lemma 2.6, the order |(a}| is the smallest positive integer di such that adl (1) = adl-i(2si + 1) = adl-2(2si + 2si + 1) = • • • = 2disi + 1 = 1. Now assume that 2ti = 2. Then the order |(a}| is even and it is the smallest positive even integer di such that adl (1) = adl-i(2si + 1) = adl-2(2siti + 2si + 1) = adl -3(2siti + 4Si + 1) = adl-4(4siti + 4si + 1) = • • • = disi(ti + 1) + 1 = 1. Hence di is a divisor of m and consequently a divisor of gcd(m, n). By a similar reason, there exist s2, t2 G [§ ] such that ft(2k) = 2kt2 and ft(2k + 1) = 2kt2 + 2s2 + 1 for any 2k G [n]. Furthermore 2t2 = 2 (mod n) and d2 is a divisor of gcd(m,n). By Lemma 2.10, a(1) = 2si + 1 = -1 (mod d2), namely, 2(si + 1) = 0 (mod d2) and a(2) = 2ti = -2 (mod d2), namely, 2(ti + 1) = 0 (mod d2). Similarly it holds that 2(s2 + 1) = 2(t2 + 1) = 0 (mod di). Note that 2ti = a(2) = a-i(1) + a(1) = (-2siti + 1) + 2si + 1. Hence 2(si + 1)(ti-1) = 0 (mod m). By a similar reason, it holds that 2(s2+1)(t2-1) = 0 (mod n). □ J. H. Kwak and Y. S. Kwon: Classification of some reflexible edge-transitive embeddings ... 575 For even m and n, let Q(m, n) be the set of quadruples (si, ti; s2, t2) € [§] x [§] x [y ] x [y] satisfying the conditions in Lemma 4.1. By Lemma 4.1, the classification of reflexible edge-transitive embeddings of Km§ satisfying the Property (P) is equivalent to the classification of Q(m, n), and the number | RETm,n | equals to the cardinality |Q(m, n)|. In this section, let m = • • • pa/ p"^1 • • • p";+/ and n = 2bp11 • • • pb/ qa+i1 • • • q^+g (prime decompositions) and let gcd(m, n) = 2Cp1 • • • pc/ with cj > 1 for any i = 1,..., Without any loss of generality, assume that a < b, namely, a = c. By Chinese Remainder Theorem, it suffices to consider quadruples ( s 1, 11 ; s2,t2) modulo prime powers dividing m and n, respectively. So we have the following lemma. Lemma 4.2. Fora quadruple (s1,t1; s2 ,t2) € [§ ] x [§] x [y] x [y], (s1,t1; s2,t2) belongs to Q(m, n) if and only if: (1) for i = 1,...,£, (s1 (mod p"* ),t1 (mod p"* ); s2 (mod pbi ),t2 (mod pbi )) is one of (-1, -1; -1, -1), (-1, -1; y • pbi-Ci, 1), (x • p"i-Ci, 1; -1, -1) and (0,1;0,1), where x, y = 0,1,... ,pC* - 1; (2) for any j = 1, 2,..., f, (s1 (mod pa£> ),t1 (mod p"j )) is (0,1) or (-1, -1); (3) for any k =1, 2,..., g, (s2 (mod q£b++fc ), ¿2 (mod qb++fc )) is (0,1) or (-1, -1); (4) (s1 (mod 2a),t1 (mod 2a); s2 (mod 2b),t2 (mod 2b)) belongs to Q(2a, 2b). Proof. Assume that (s1,t1; s2,t2) belongs to Q(m,n). Then t2 = 1 (mod y ) and¿2 = 1 (mod § ). (1): First let us consider the quadruple modulo p"* and pbi for i = 1,..., Note that t1 = ±1 (mod pa ) and ¿2 = ±1 (mod pbi ). If t1 = -1 (mod pa ), then s1 should be -1 modulo p"* to satisfy 2(s1 + 1)(t1 - 1) = 0 (mod p"*). By similar reason, if t2 = -1 (mod pbi ), then s2 = -1 (mod pbi ). Let (s1,t1) = (-1, -1) (mod p"*). Since d1 is the smallest positive even integer satisfying d1s1(t1 + 1) = 0 (mod m), p4 does not divide d1. If t2 = -1 (mod pbi ) then s2 should be -1 modulo pbi. If t2 = 1 (mod pbi ), then s2 = y • pbi-Ci (mod pbi) for some y = 0,1,... ,pC* - 1 because d2 | gcd(m, n). By a similar reason, one can say that if (s2,t2) = (-1,-1) (mod pbi), then (s1,t0 = (-1, -1) or (x • p"i-Ci, 1) (mod p"* ) for some x = 0,1,..., pC* - 1. Let (s1,t1) = (0,1) (mod p"*). By the condition (iii) in Lemma 4.1, p4 does not divide d2. Note that if t2 = 1 then d2 is the smallest positive integer satisfying 2d2 s2 = 0 (mod n), and if t2 = 1 then d2 is the smallest positive even integer such that d2s2(t2 + 1) = 0 (mod n). Hence s2 = 0 or t2 = -1 modulo pbi, which implies that (s2,¿2) = (0,1) or (-1, -1) (mod pbi). Let t1 = 1 (mod p"* ) and s1 =0 (mod p"* ). One can see that pj divides d1. By the condition (iii) in Lemma 4.1, t2 = -1 (mod pbi ) and s2 = -1 (mod pbi ). 576 Ars Math. Contemp. 16 (2019) 445-463 Therefore (si (mod ),ti (mod ); (mod pbi(mod pbi)) = (-1, -1; -1, -1), (-1, -1; y ■ p^, 1), (x ■ pf-Ci, 1; -1, -1) or (0,1; 0,1), where x, y = 0,1,... ,pjp - 1. (2): For any j = 1,2,...,/, t1 = ±1 (mod p^3 ). If t1 = 1 (mod p^3 ) then s1 = 0 (mod p^+j3 ) because p^+j does not divide d1. If t1 = -1 (mod p^3 ) then si = -1 (mod p+++j ) to satisfy 2(s1 + 1)(t1 - 1) = 0 (mod p;++j ). (3): By the similar reason with (2), for any k = 1,2, ...,g, (s2 (mod q++fcfc), t2 (mod qb++fck)) is (0,1) or (-1,-1). (4): If a quadruple (s1,t1; s2,t2) G [n] x [n] x [m] x [m] satisfies all conditions in Lemma 4.1, then it also satisfies these conditions modulo 2° and 2b. Hence (s1 (mod 2°), t1 (mod 2°); s2 (mod 2b),t2 (mod 2b)) G Q(2°, 2b). By Chinese Remainder Theorem, one can show that if (1), (2), (3) and (4) hold, then (s1,t1; S2,t2) GQ(m,n). □ Corollary 4.3. The number ofreflexible edge-transitive embeddings of Km,n satisfying the Property (P) up to isomorphism is 2f+ p^) ■ ■ ■ (1 + pf )|Q(2°, 2b)|. Proof. By Lemma 4.2, the number of reflexible edge-transitive embeddings of Km n satisfying the Property (P) up to isomorphism is (2 + 2p1 ) ■ ■ ■ (2 + 2p?)2f 2g|Q(2°, 2b)| = 2f+g+£(1 + pi1 ) ■ ■ ■ (1 + p?)|Q(2°, 2b)|. □ By Lemma 4.2, it suffices to classify Q(2°, 2b) to classify reflexible edge-transitive embeddings of Km n satisfying the Property (P). Let P(2) = {(0,1)} and for a 2-power 2° (a > 1), let P (2°) be the set of all pairs (s,t) G [2°-1] x [2°-1] satisfying the conditions: (i) 2t2 = 2 (mod 2°) and (ii) 2(s + 1)(t - 1) = 0 (mod 2°). For any (s, t) G P(2°)\{(0,1)}, let d(s, t) be the smallest positive even number d such that ds(t +1) = 0 (mod 2°) and let e(s, t) be the largest number 2j with 2j < 2° satisfying 2(s +1) = 0 (mod 2j) and 2(t + 1) = 0 (mod 2j). Let d(0,1) = 1 and e(0,1) = 2. Now we have the following lemma. Lemma 4.4. For 2-powers 2° (a > 1) and 2b (b > 1), a quadruple (s1,t1; s2,t2) belongs to Q(2°, 2b) f and only if (s1, t1; s2, t2) satisfies the conditions (a) (s1,t1) G P(2°) and (s2,t2) G P(2b), (b) d(s1,t1) < e(s2,t2) and d(s2,t2) < e(s1,t1). J. H. Kwak and Y. S. Kwon: Classification of some reflexible edge-transitive embeddings ... 577 Proof. The conditions (i) and (ii) in the definition of P(2°) correspond to the conditions (ii) and (iv) in Lemma 4.1. Suppose that d(si,ti) < e(s2,t2) and d(s2,t2) < e(s1,t1). Since d(s1,t1) < 2° and e (S2,t2) < 2b, d(s1,t1) divides gcd(2°, 2b), the minimum of 2° and 2b. Similarly d(s2,t2) also divides gcd(2°, 2b). Furthermore it holds that 2(si + 1) = 0 2(ti + 1) = 0 2(s2 + 1) = 0 2(t2 + 1) = 0 (mod d(s2,¿2)), (mod d(s2,¿2)), (mod d(s1 ,t1)) (mod d(s1 ,t1)). and Therefore the conditions (i) and (iii) in Lemma 4.1 hold, and hence (s1, t1; s2,t2) belongs to <2(2°, 2b). Let (s1, t1; s2,t2) belong to Q(2°, 2b). Now the condition (iii) in Lemma 4.1 is equivalent to the condition d(s1,t1) < e(s2,t2) and d(s2,t2) < e(s1,t1). □ By Lemma 4.4, the calculation of d(s, t) and e(s, t) for each (s, t) G P(2°) is helpful to calculate |Q(2°, 2b)|. The following lemma gives full list of (s,t) G P(2°) and corresponding d(s,t) and e(s, t). Lemma 4.5. Fora 2-power 2° (a > 1), the set {(s, t, d(s, t), e(s, t)) : (s,t) G P (2°)} is the following: {(0,1,1, 2), (1,1, 2, 4)}, {(0,1,1, 2), (1,1, 4, 4), (2,1, 2, 2), (3,1, 4,4), (1, 3, 2,4), (3, 3, 2, 8)}, {(0,1,1, 2), (2°-2 - 1, 2°-2 - 1, 4, 2°-1), (2°-1 - 1, 2°-2 - 1, 4, 2°-1), (2°-2 - 1, 2°-1 - 1, 2, 2°-1), (2°-1 - 1, 2°-1 - 1, 2, 2°)} U {(x, 1, 2°-1,4), (x, 2°-2 + 1, 2°-1,4) : x = 1, 3,..., 2°-1 - 1} U{(2^, 1, 2' I — i — 1 2) : i = 1,... ,a - 2, y = 1, 3,..., 2 I — i— 1 - 1} if a = 2 if a = 3 if a > 4. Proof. Let (s,t) G P(2°). For a = 2, t should be 1 and both s = 0 and s = 1 satisfy the conditions for (s, t) G P(2°). Hence (s,t, d(s,t), e(s,t)) = (0,1,1,2) or (1,1,2,4). Let a = 3. Then t = 1 and t = 3. If t = 1, then s = i for some i = 0,1,2,3. If t = 3, then s = 1 or s = 3. In any possible pair (s, t), one can easily calculate d(s,t) and e(s, t). Now assume that a > 4. Then t = 1, 2°-2 - 1, 2°-2 + 1 or 2°-1 - 1. For t = 1, any number 0,1, 2,..., 2°-1 - 1 is possible for s to satisfy the condition (ii) in the definition of P(2°). Note that if (s,t) = (0,1), then (d(0,1),e(0,1)) = (1, 2). One can easily show that if (s,t) = (x, 1) for any x = 1, 3,..., 2°-1 - 1 then (d(s,t), e(s,t)) = (2°-1,4). , 2° - 1 , then If (s, t) = (2iy, 1) for any i = 1,..., a - 2 and for any y = 1, 3, (d(s, t), e(s, t))j= (2a-i_1, 2). For t = 2° 2 - 1, both s = 2° 2 - 1 and s = 2° 1 - 1 satisfy the conditions for (s, t) G P(2°). If (s, t) = (2°-2 - 1, 2°-2 - 1) or (2°-1 - 1,2°-2 - 1) then we have (d(s, t), e(s, t)) = (4, 2°-1). Let t = 2°-2 + 1. Then any number s = 1, 3,..., 2°-1 - 1 satisfies the condition (ii) in the definition of P(2°). For any (s,t) = (x, 2°-2 + 1) with x = 1,3,..., 2°-1 - 1, we have (d(s,t),e(s,t)) = (2°-1,4). 578 Ars Math. Contemp. 16 (2019) 445-463 For the final case, let t = 2°-1 -1. Then s = 2°-2-1 or 2°-1 -1. If (s,t) = (2°-2-1, 2°-1 - 1) then we have (d(s,t),e(s,t)) = (2,2a-1); if (s,t) = (2°-1 - 1, 2°-1 - 1) then (d(s, t), e(s, t)) = (2, 2°). □ Theorem 4.6. For any 2-powers 2° and 2b with a < b, the number |Q(2°, 2b) | ofreflexible edge-transitive embeddings of Km,n satisfying the Property (P) up to isomorphism is the following: |Q(2a, 1 if (a, b) = (1,1), 2 if (a, b) = (1, 2), 4 if (a, b) = (2, 2) or (1, k) with k > 3, 10 if (a, b) = (2, 3), 12 if (a, b) = (2, k) with k > 4, 28 if (a, b) = (3, 3), 40 if (a, b) = (3, 4), 36 if (a, b) = (3, k) with k > 5, 20(1 + 2°-2 ) if a = b > 4, 20 + 18 • 2°-2 if b - 1 = a > 4, 20 + 16 • 2°-2 if b - 2 > a > 4. Proof. By Lemma 4.4, it suffices to find all (si, ti; s2, t2) satisfying the conditions (a) (si,ti) GP (2°) and (s2,t2) eP (2b), (b) d(si,ti) < e(s2,t2) and d(s2,t2) < e(si,ti). ByLemma4.5, one can get all the lists of (si, ti; s2,t2) satisfying the conditions as Table 1. □ Proof of Theorem 1.1. For odd m and n, the number | RETm,n | of reflexible edge-transitive embeddings of Km n up to isomorphism is 1 by Theorem 3.1. When exactly one of m and n is odd, then the number | RETm n | is counted in Theorem 3.2. Assume that both m and n are even. Let m = 2°pa1 P°2 ■ ■ ■ PTp°+T ■ ■ ■ Pl+i and n = 2bp11 p22 ■ ■ ■ pb/ q°++H11 ■ ■ ■ q+g9 (prime decompositions) and let gcd(m, n) = 2cpc11 p22 ■ ■ ■ p^ with c > 1 for any i = 1,..., I. Without any loss of generality, assume that a < b, namely, a — c. By Corollary 4.3, the number | RETm,n | = |Q(m, n)| is 2f+g+^(1+ p11)... (1+ p? )|Q(2°, 2b)|. Theorem 4.6 completes the proof. □ J. H. Kwak and Y. S. Kwon: Classification of some reflexible edge-transitive embeddings ... 579 Table 1: All lists of Q(2°, 2b). (a b) <2(2°, 2b) (1,1) (0,1 0,1) (1, 2) (0,1 0,1), (0,1; 1,1) (1, > 3) (0,1 (0,1 0,1), (0,1; 2b-2,1), (0,1; 2b-2 - 1, 2b-1 - 1), 2b-1 - 1, 2b-1 - 1) (2, 2) (0,1 0,1), (0,1; 1,1), (1,1; 0,1), (1,1; 1,1) (2, 3) (0,1 (1,1 0,1), (0,1; 2,1), (0,1; 1, 3), (0,1; 3, 3), (1,1; 0,1), (1,1; 1,1), 2,1), (1,1; 3,1), (1,1; 1, 3), (1,1;3, 3) (2, > 4) (0,1 (0,1 (1,1 (1,1 0,1), (0,1; 2b-2,1), (0,1; 2b-2 - 1, 2b-1 - 1), 2b-1 - 1,2b-1 - 1), (1,1;0,1), (1,1;2b-3,1), (1,1;2b-2,1), 3 ■ 2b-3,1), (1,1; 2b-2 - 1, 2b-2 - 1), (1,1; 2b-1 - 1, 2b-2 - 1), 2b-2 - 1, 2b-1 - 1), (1,1; 2b-1 - 1, 2b-1 - 1) (3, 3) (0 or 2,1; 0,1), (0 or 2,1; 2,1), (0 or 2,1; 1, 3), (0 or 2,1; 3, 3), (1 or 3,1; 1,1), (1 or 3,1; 3,1), (1 or 3,1; 1, 3), (1 or 3,1; 3,3), (1 or 3, 3; 0,1), (1 or 3, 3; 1,1), (1 or 3, 3; 2,1), (1 or 3, 3; 3,1), (1 or 3, 3; 1, 3), (1 or 3, 3; 3, 3) (3, 4) (0 or 2,1; 0,1), (0 or 2,1; 4,1), (0 or 2,1; 3, 7), (0 or 2,1; 7, 7), (1 or 3,1; 3, 3), (1 or 3,1; 7, 3), (1 or 3,1; 3, 7), (1 or 3,1; 7, 7); (1, 3; x, 1), x = 0, 2, 4, 6; (3, 3; s2,t2), (s2,t2) eP (24) (3, > 5) (0 or 2,1; 0,1), (0 or 2,1;2b-2,1); (0 or 2,1; x, 2b-1 - 1), x = 2b-2 - 1 or 2b-1 - 1; (1 or 3,1; x, y), x, y = 2b-2 - 1 or 2b-1 - 1; (1, 3 (1, 3 (3, 3 (3, 3 i ■ 2b-3,1), i = 0,1, 2, 3; x, y), x, y = 2b-2 - 1 or 2b-1 - 1; i ■ 2b-4,1), i = 0,1,..., 7; x, y), x, y = 2b-2 - 1 or 2b-1 - 1 (> 4, > a) (0 or 2°-2,1; x,y), (x, y) = (0,1), (2b-2,1), (2b-2 - 1, 2b-1 - 1) or (2b-1 - 1, 2b-1 - 1); (2x, 1; 2b-2 - 1, 2b-1 - 1), (2x, 1; 2b-1 - 1, 2b-1 - 1), x = 1, 2,..., 2°-2 - 1 (x = 2°-3); (x, 1 or 2°-2 + 1; y, z), x= 1, 3,..., 2°-1 - 1, y, z = 2b-2 - 1 or 2b-1 - 1; (2°- 2 - 1 or 2°-1 - 1, 2°-2 - 1 or 2°-1 - 1; x, y), x, y = 2b-2 - 1 or 2b-1 - 1; (2°- 2 - 1, 2°-1 - 1; i ■ 2b-°, 1), i = 0,1,..., 2°-1 - 1; Only when a = b: (2°-2-1 or 2°-1-1, 2°-2-1; x, 1 or 2b-2+1), x =1, 3,..., 2b-1-1; Only when a = b: (2°-2 - 1, 2°-1 - 1; x, 2b-2 + 1), x =1, 3,..., 2b-1 - 1; Only when a = b or b = a + 1 : (2°-1 - 1, 2°-1 - 1; x, 1), x = 0,1,..., 2b-1 - 1; Only when a = b or b = a + 1 : (2°-1 - 1, 2°-1 - 1; x, 2b-2 + 1), x =1, 3,..., 2b-1 - 1; Only when b > a + 2: (2°-1 - 1, 2°-1 - 1; i ■ 2b-a-1,1), i = 0,1,..., 2° - 1 580 Ars Math. Contemp. 16 (2019) 445-463 5 Classification of some groups In this section, we aim to consider a presentation of the group (xa, yp} for any (a, P) G RETm,n. And we give some sufficient conditions and necessary conditions for (xai, yp1} and (xa2, yp2} to be isomorphic for any (ai, Pi), (a2, P2) G RETm,n. For any positive integers m and n, a group r such that (i) r = XY for some cyclic groups X = (x} of order n and Y = (y} of order m with X n Y = {1r} and (ii) there exists an automorphism of r which sends x and y to x-1 and y-1, respectively, is isomorphic to (xa, yp} for some (a, P) G RETm,n. For our convenience, call a group r satisfying the conditions (i) and (ii) in the above sentence a reflexible product of two cyclic groups of order m and n. Now to classify reflexible products of two cyclic groups of order m and n, it suffices to consider (xa, yp}, where (a, P) G RETm,n. Note that for any integers i, j and for any (a, P) G RETm,n, yi xj = xpi(j)yaj (i) yp xa = xa yp . For example, ypxa = xa(1)ya(1) and ypx^ = xa(2)y? (1) For odd integers m and n, since RETm,n = {(id, id)}, there is a unique reflexible product of two cyclic groups of order m and n up to isomorphism, namely, an abelian group Zm x Zn. Let m = pi1 pa2 • • • pTv7+ • • • v7+ (prime factorization) be odd and n = 2bp11 p22 • • • pb/ q^+L1 • • • qb++s9 (prime factorization) be even. Let gcd(m,n) = p1 p22 ••• pc/ with ci > 1 for any i = 1,...,£ Now | RETm,„ | = 2f (1 + p11) • • • (1 + pc/) by Theorem 3.2. Note that for any (a, P) G RETm,n and for any integer k, a(k) = rk, P(2k) = 2k, P(2k + 1) = 2k + 1 + 2s for some integers r G [m] and s G [n] satisfying r2 = 1 (mod m), 2s = 0 (mod 2bqb++11 • • • q^j+g) and for any j = 1, 2,..., I, s = 0 (mod pjj) if r = 1 (mod pi); s = z • pbj Cj (mod pbj) for some integer z with 0 < z < pC — 1 if r = — 1 (mod pi). Let us denote such a and P by ar and Ps. Considering commuting rule i j pVj) (i) ypxa = xa (j)y/3(), one can check that the centralizer of (xa;, yps} is {x2Jiryps : i G [2] , j(r — 1) = 0 (mod m)} = (x;;r,y^} where k is the smallest positive integer j satisfying j(r — 1) = 0 (mod m). This implies that for any (an, PS1), (a^, P^) G RETm,„, if two groups (x^, ypS1} and (x^, yps2} are isomorphic, then r1 = r2. Note that yps xar = x^1^(1) = xa:+1yps and yps x^; = xa;(2)ya;(1) = x^ yps. J. H. Kwak and Y. S. Kwon: Classification of some reflexible edge-transitive embeddings ... 581 In fact, the above two equations determine the whole commuting rules. For any u G [m] and v G [n], if v is even, then y^ = y^, and if v is odd, then „« xv = xv-1yu x = xv-1y"-1x2s+1yr yps xar = xar yps x«r = xar y,Ss xar y,Ss = xv-1+2sy«-1x yr = xv-1+2s y«-2x2s + 1y2r = xar x«r y,Ss = xar xar y,Ss = xv-1+4syu-2x y2r = = xv + 2wsyMr = xar y,Ss x"r y,Ss = = xar y,Ss . For any v G [n] with gcd(v, n) = 1, xar = xar y,Ss = xar = xar because v is odd, where v-1 is an integer satisfying vv-1 = 1 (mod n). For any s1, s2 G [n] with gcd(s1, n) = gcd(s2, n), one can choose v G [n] satisfying that gcd(v, n) = 1 and v-1s1 = s2 (mod n). Therefore for any (ari , ftsi), (ar2 , fts2) G RETm,n, if r1 = r2 and gcd(s1, n) = gcd(s2, n) then (x„ri, yAi) is isomorphic to (x„r2, y^). This means that the number of non-isomorphic reflexible product of two cyclic groups of order m and n is at most 2f (2 + c1) • • • (2 + q). So any reflexible product of two cyclic groups of order m and n is isomorphic to (x, y | xn = ym = 1, yx = x2s+1yr, yx2 = x2y) for some r G [m] and s G [n] satisfying r2 = 1 (mod m), 2s = 0 (mod 2bq^1 • • • q^+g9) and for any j = 1, 2, ...,£, s = 0 (mod pj) if r = 1 (mod ); s = pj-Cj (mod pj) for some integer z = 0,1,..., Cj if r = —1 (mod p^3). Conversely, assume that for some (ari , ftsi), (ar2 , fts2) G RETm,n, (xa , y^ ) is isomorphic to (x^2, y^). Let ^: (xa^ , y^) ^ (x«r2, y^S2) be an isomorphism such ->-ri / o f-Jsi / \ ur2 > o H s that ^(x^ri) = ^ and^(y^si) = y^s2. For the remaining case, let m = 2>r pa2 • • • pa^pV+Y • • • pV++| and n = 2bp1i p22 • • • p^ qV+1i • • • qb++s9 (prime decompositions) with gcd(m, n) = 2cp1ip22 • • • , where 1 < a < b and cj > 1 for any i = 1,..., For any (a, ft) G RETm,n and for any integer k, a(2k) = 2kt1, a(2k + 1) = 2kt1 + 2s1 + 1, ft(2k) = 2kt2 and ft(2k + 1) = 2kt2 + 2s2 + 1 for some (s1, t1; s2, t2) G Q(m, n). Let a and ft be such permutations. Note that yflx = x^(1)ya(1) = x2s2 + 1y2si + 1 y^ xa = xa(2)y;2(1) = x^ y2si(ii+1)+1, y2 xa = xa2(1) y;(2) = xas2(t2+1)+1y2ti and 2 2 fl2(2) a2(2) 2 2 / 't* - ryt^ \ 1 O! k ' - 1 for any i — 1,..., £. Then r is isomorphic to (x, y | xn — ym — 1, yx — x2s+1yr, yx2 — x2y} for some r G [m] and s G [f ] satisfying r2 = 1 (mod m), 2s = 0 (mod 26q+1i • • • ), and for any j — 1, 2,..., £, s = 0 (mod ) if r = 1 (mod p"3), s = pj3 Cj(mod pj3) for some z — 0,1,..., Cj if r = — 1 (mod p"3). J. H. Kwak and Y. S. Kwon: Classification of some reflexible edge-transitive embeddings ... 583 (3) Let m = 2>r • • • • • • Pa/ and n = 2bp11 • • • q^1 • • • q^+g9 (prime factorization) with gcd(m,n) = 2cp11 p22 • • • , where 1 < a < b and c > 1 for any i = 1,... ,£ Now r is isomorphic to (x, y | xn = ym = 1, yx = x2s2+1y2si + 1, yx2 = x2t2y2si(tl+1)+1, y2x = x2s2(t2+1)+1y2ti, y2x2 = x2y2} for some (s1,t1; s2,t2) G Q(m, n). For any positive integers m and n and for any (a, fi), (a', fi') G RETm,n, we do not know a necessary and sufficient condition for (xa, yg} ~ (xa/, yg/}. So we propose the following problem. Problem 5.2. For any positive integers m and n and for any (a, fi), (a', fi') G RETm,n, find a necessary and sufficient condition for (xa, yg} ~ (xa/, yg/}. Consequently calculate the number of reflexible products of two cyclic groups of order m and n up to isomorphism. References [1] S.-F. Du, G. Jones, J. H. Kwak, R. Nedela and M. Skoviera, Regular embeddings of Kn,n where n is a power of 2. I: Metacyclic case, European J. Combin. 28 (2007), 1595-1609, doi:10.1016/j.ejc.2006.08.012. [2] S.-F. Du, G. Jones, J. H. Kwak, R. Nedela and M. Skoviera, Regular embeddings of Kn,n where n is a power of 2. II: The non-metacyclic case, European J. Combin. 31 (2010), 1946-1956, doi:10.1016/j.ejc.2010.01.009. [3] J. E. Graver and M. E. Watkins, Locally finite, planar, edge-transitive graphs, Mem. Amer. Math. Soc. 126 (1997), no. 601, doi:10.1090/memo/0601. [4] G. Jones, R. Nedela and M. Skoviera, Complete bipartite graphs with a unique regular embedding, J. Comb. Theory Ser. B 98 (2008), 241-248, doi:10.1016/j.jctb.2006.07.004. [5] G. A. Jones, Regular embeddings of complete bipartite graphs: classification and enumeration, Proc. Lond. Math. Soc. 101 (2010), 427-453, doi:10.1112/plms/pdp061. [6] G. A. Jones, R. Nedela and M. Skoviera, Regular embeddings of Kn,n where n is an odd prime power, European J. Combin. 28 (2007), 1863-1875, doi:10.1016/j.ejc.2005.07.021. [7] J. H. Kwak and Y. S. Kwon, Regular orientable embeddings of complete bipartite graphs, J. Graph Theory 50 (2005), 105-122, doi:10.1002/jgt.20097. [8] J. H. Kwak and Y. S. Kwon, Classification of nonorientable regular embeddings of complete bipartite graphs, J. Comb. Theory Ser. B 101 (2011), 191-205, doi:10.1016/j.jctb.2011.03.003. [9] Y. S. Kwon, Classification of reflexible edge-transitive embeddings of Km,n for odd m,n, East Asian Math. J. 25 (2009), 533-541, https://ynmath.jams.or.kr/jams/ download/KCI_FI001404071.pdf. [10] R. Nedela, M. Skoviera and A. Zlatos, Regular embeddings of complete bipartite graphs, Discrete Math. 258 (2002), 379-381, doi:10.1016/s0012-365x(02)00539-3. ARS MATHEMATICA CONTEMPORANEA ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 16 (2019) 585-608 https://doi.org/10.26493/1855-3974.1651.e79 (Also available at http://amc-journal.eu) A Carlitz type result for linearized polynomials* Bence Csajbok t MTA-ELTE Geometric and Algebraic Combinatorics Research Group, ELTE Eötvös Loránd University, Budapest, Hungary, Department of Geometry, 1117 Budapest, Pazmany P. stny. 1/C, Hungary Giuseppe Marino Dipartimento di Matematica e Fisica, Universita degli Studi della Campania "Luigi Vanvitelli", Viale Lincoln 5,1-81100 Caserta, Italy and Dipartimento di Matematica e Applicazioni "Renato Caccioppoli", Universita degli Studi di Napoli "Federico II", Via Cintia, Monte S.Angelo I-80126 Napoli, Italy Olga Polverino Dipartimento di Matematica e Fisica, Universita degli Studi della Campania "Luigi Vanvitelli", Viale Lincoln 5, I-81100 Caserta, Italy Received 21 March 2018, accepted 9 October 2018, published online 30 April 2019 For an arbitrary q-polynomial f over Fqn we study the problem of finding those q-polynomials g over Fqn for which the image sets of f (x)/x and g(x)/x coincide. For n < 5 we provide sufficient and necessary conditions and then apply our result to study maximum scattered linear sets of PG(1, q5). Keywords: Linearized polynomial, linear set, direction. Math. Subj. Class.: 11T06, 51E20 * The research was supported by the Italian National Group for Algebraic and Geometric Structures and their Applications (GNSAGA - INdAM). ^The first author is supported by the Janos Bolyai Research Scholarship of the Hungarian Academy of Sciences. The first author acknowledges the support of OTKA Grant No. K 124950. E-mail addresses: csajbokb@cs.elte.hu (Bence Csajbok), giuseppe.marino@unicampania.it, giuseppe.marino@unina.it (Giuseppe Marino), olga.polverino@unicampania.it (Olga Polverino) Abstract ©® This work is licensed under https://creativecommons.org/licenses/by/4.0/ 586 Ars Math. Contemp. 16 (2019) 445-463 1 Introduction Let Fqn denote the finite field of qn elements where q = ph for some prime p. For n > 1 and s | n the trace and norm over Fqs of elements of Fqn are defined as Trqn/qs (x) = x + xqS +-----+ xq" s and Nqn/qs (x) = x1+qS+ hq" s, respectively. When s = 1 then we will simply write Tr(x) and N(x). Every function f: Fqn ^ Fqn can be given uniquely as a polynomial with coefficients in Fqn and of degree at most qn - 1. The function f is Fq -linear if and only if it is represented by a q-polynomial, that is, n-1 f (x) = Y «¿xqi (1.1) ¿=0 with coefficients in Fqn. Such polynomials are also called linearized. If f is given as in (1.1), then its adjoint (w.r.t. the symmetric non-degenerate bilinear form defined by (x, y) = Tr(xy)) is n-1 f (x) := Y «i"xqn-i, ¿=0 i.e. Tr(xf (y)) = Tr(yf(x)) for any x, y G Fqn. The aim of this paper is to study what can be said about two q-polynomials f and g over Fqn if they satisfy Im (M) = Im (g^) , (1.2) where by Im(f (x)/x) we mean the image of the rational function f (x)/x, i.e. {f (x)/x : x G Fqn }. For a given q-polynomial f, the equality (1.2) clearly holds with g(x) = f (Ax)/A for each A g Fq„. It is less obvious that (1.2) holds also for g(x) = f (Ax)/A, cf. [2, Lemma 2.6] and the first part of [8, Section 3], see also the proof of [18, Theorem 3.3.9]. When one of the functions in (1.2) is a monomial then the answer to the question posed above follows from McConnel's generalization [25, Theorem 1] of a result due to Carlitz [7] (see also Bruen and Levinger [6]). Theorem 1.1 ([25, Theorem 1]). Let p denote a prime, q = ph, and 1 < d a divisor of q — 1. Also, let F: Fq ^ Fq be a function such that F(0) = 0 and F(1) = 1. Then q-1 q-1 (F(x) — F(y)) d = (x — y) d for all x, y G Fq if and only if F (x) = xpj for some 0 < j < h and d | pj — 1. Indeed, when the function F of Theorem 1.1 is Fq -linear, we easily get the following corollary (see Section 2 for the proof, or [16, Corollary 1.4] for the case when q is an odd prime). Corollary 1.2. Let g(x) and f (x) = axq , q = ph, be q-polynomials over Fqn satisfying Condition (1.2). Denote gcd(k, n) by t. Then g(x) = ftxq with gcd(s, n) = t for some ft with Nqn/qt (a) = Nqn/qt (ft). Another case for which we know a complete answer to our problem is when f(x) = Tr(x). B. Csajbok et al.: A Carlitz type result for linearized polynomials 587 Theorem 1.3 ([8, Theorem 3.7]). Let f (x) = Tr(x) and let g(x) be a q-polynomial over Fqn such that Im(f (x)/x) = Im(g(x)/x). Then g(x) = Tr(Ax)/A for some A G Fq„. Note that in Theorem 1.3 we have f (x) = f (x) and the only solutions for g are g(x) = f (Ax)/A, while in Corollary 1.2 we have (up to scalars) y(n) different solutions for g, where y is the Euler's totient function. The problem posed in (1.2) is also related to the study of the directions determined by an additive function. Indeed, when f is additive, then Im(f (x)/x) = ( f (x) - f (y) : x = y, x, y G Fqn I x - y is the set of directions determined by the graph of f, i.e. by the point set Gf := {(x, f (x)) : x G Fqn} c AG(2, qn). Hence, in this setting, the problem posed in (1.2) corresponds to finding the Fq-linear functions whose graph determines the same set of directions. The size of Im(f (x)/x) (for any f, not necessarily additive) was studied extensively. When f is Fq-linear the following result holds. Theorem 1.4 ([1, 3]). Let f be a q-polynomial over Fqn, with maximum field of linearity qn — 1 qn-1 + 1 < | Im(f (x)/x)| < Fq. Then q - 1 The classical examples which show the sharpness of these bounds are the monomial functions xqS, with gcd(s, n) = 1, and the Tr(x) function. However, these bounds are also achieved by other polynomials which are not "equivalent" to these examples (see Section 2 for more details). Two Fq-linear polynomials f (x) and h(x) of Fqn [x] are equivalent if the two graphs Gf and Gh are equivalent under the action of the group rL(2, qn), i.e. if there exists an element y G rL(2, qn) such that Gj = Gh. In such a case, we say that f and h are equivalent (via y) and we write h = fv. It is easy to see that in this way we defined an equivalence relation on the set of q-polynomials over Fqn. If f and g are two q-polynomials such that Im(f (x)/x) = Im(g(x)/x), then Im(fv(x)/x) = Im(gv(x)/x) for any admissible y G rL(2, qn) (see Proposition 2.6). This means that the problem posed in (1.2) can be investigated up to equivalence. For n < 4, the only solutions for g in problem (1.2) are the trivial ones, i.e. either g(x) = f (Ax)/x or g(x) = f (Ax)/x (cf. Theorem 2.8). For the case n = 5, in Section 4, we prove the following main result. Theorem 1.5. Let f (x) and g(x) be two q-polynomials over Fq5, with maximum field of linearity Fq, such that Im(f (x)/x) = Im(g(x)/x). Then either there exists y G TL(2, q5) suchthat fv(x) = axqi and gv(x) = ^xqj with N(a) = N(P) for some G {1, 2, 3,4}, or there exists A G F*5 such that g(x) = f (Ax)/A or g(x) = f (Ax)/A. Finally, the relation between Im(f (x)/x) and the linear sets of rank n of the projective line PG(1, qn) will be pointed out in Section 5. As an application of Theorem 1.5 we get a criterium of PrL(2, q5)-equivalence for linear sets in PG(1, q5) and this allows us to prove 588 Ars Math. Contemp. 16 (2019) 445-463 that the family of (maximum scattered) linear sets of rank n and of size (qn - 1)/(q - 1) in PG(1, qn) found by Sheekey in [27] contains members which are not-equivalent to the previously known linear sets of this size. 2 Background and preliminary results Let us start this section by the following immediate corollary of Theorem 1.4. Proposition 2.1. If Im(f (x)/x) = Im(g(x)/x) for two q-polynomials f and g over Fqn, then their maximum fields of linearity coincide. Proof. Let Fqm and Fqk be the maximum fields of linearity of f and g, respectively. Suppose to the contrary m < k. Then | Im(g(x)/x)| < (qn — 1)/(qk — 1) < qn-fc+1 + 1 < qn-m + 1 < | Im(f (x)/x)|, a contradiction. □ Now we are able to prove Corollary 1.2. Proof. The maximum field of linearity of f (x) is Fqt, thus, by Proposition 2.1, g(x) has to be a qf -polynomial as well. Then for t > 1 the result follows from the t = 1 case (after substituting q for qf and n/t for n) and hence we can assume that f (x) and g(x) are strictly Fq-linear. By (1.2), we note that g(1) = azq -1, for some z0 G F*„. Let F(x) := g(x)/g(1), then F is a q-polynomial over Fqn, with F(0) = 0 and F(1) = 1. Also, from (1.2), for each x G F*„ there exists z G F*„ such that F(x) / z ,zo qk-1 This means that for each x G F*„ we get N (^Xr) = 1. By Theorem 1.1 (applied to the q-polynomial F with d = q - 1 | qn - 1 and using the fact that F is additive) it follows that F(x) = xpj for some 0 < j < nh. Then Proposition 2.1 yields p = qs with gcd(s, n) = 1. We get the first part of the statement by putting ft = g(1). Then from the assumption (1.2) it is easy to deduce N(a) = N(ft). □ We will use the following definition. Definition 2.2. Let f and g be two equivalent q-polynomials over Fqn via the element ^ G rL(2, qn) represented by the invertible matrix a b c d and with companion automorphism a of Fqn. Then g(xx)): x G V} = { £ d)(f (x) : x G V H ( d : x G Fq^ . (2.1) Let Kj(x) = axff + bf (x)ff and Hj(x) = cxff + df (x)ff. B. Csajbok et al.: A Carlitz type result for linearized polynomials 589 Proposition 2.3. Let f and g be q-polynomials over Fqn such that g = fv for some 1, then q2 divides q +1 - k and hence k = q +1, or k = q2 + q + 1. In the former case i = j = n = 2 and m = 4, or i = j = 2 and n = m = 3, or i = 3, j = 1, m = 4 and n = 2, or i = 3, j = 1 and m = n = 3, or m =1, i = 2, j = 4 and n = 3. In the latter case i = 3 and n = m = j =4. Then (4.6) follows. To prove (4.7) we follow the previous approach with d = q4 + q3 + q2 + q +1. We obtain E «*«'«m an3a?4 = E bibq€bf, where the summation is on the quintuples (i, j, m, n, r) with elements taken from {1,2, 3, 4} such that Li,j,m,n,r := (q4 - 1) + (qj+1 - q) + (qm+2 - q2) + (qn+3 - q3) + (qr+4 - q4) is divisible by q5 - 1. Then Li,j,m,n,r — Ki,3/,m/,n/,r/ (m°d q 1), where Kj,m',n',r' = (q' -1) + (q3 - q) + (qm - q2) + (qn - q3) + (qr - q4), 5 596 Ars Math. Contemp. 16 (2019) 445-463 such that j ' = j + 1, m' = m + 2, n' = n + 3, r' = r + 4 (mod 5) with j' G {0, 2, 3, 4}, m' G {0,1, 3, 4}, n' G {0,1, 2, 4}, r' G {0,1, 2, 3}. (4.9) For q = 2 and q = 3 we can determine by computer those quintuples (i, j', m', n', r') for which Kiij/im/i„/ir/ is divisible by q5 - 1 and hence (4.7) follows. So we may assume q > 3. Then 3 - q2 - q3 - q4 = (q - 1) + (1 - q) + (1 - q2) + (1 - q3) + (1 - q4) < K •/ , , , < (q4 - 1) + (q4 - q) + (q4 - q2) + (q4 - q3) + (q3 - q4) = 3q4 - 1 - q - q2, and hence Lij,m,n,r is divisible by q5 - 1 if and only if Kj im',n',r' = 0. It follows that qj + qj' + qm' + q"' + qr' = 1 + q + q2 + q3 + q4. (4.10) For h G {0,1, 2, 3,4} let ch denote the number of elements in the multiset {i, j', m', n', r'} which equals h. So 4 Y chqh = 1 + q + q2 + q3 + q4 h=0 for some 0 < ch < 5 with J2t=o ch = 5. We cannot have c0 = 5 since q > 1. If cj = 5 for some 1 < i < 4 then the left hand side of (4.10) is not congruent to 1 modulo q, a contradiction. It follows that ch < 4. Thus for q > 3 (4.10) holds if and only if ch = 1 for h = 0,1,2, 3,4 and we have to find those quintuples (i, j', m', n', r') for which i G {1, 2,3,4}, {i, j', m', n', r'} = {0,1, 2, 3,4} and (4.9) are satisfied. This can be done by computer and the 44 solutions yield (4.7). □ 4.1 Proof of Theorem 1.5 Proof. Since f has maximum field of linearity Fq, we cannot have ai = a2 = a3 = a4 = 0. If three of {a1, a2, a3, a4} are zeros, then f (x) = a0x + ajxqi, for some i G {1, 2, 3,4}. Hence with y represented by ( 1 0 ^ y-a0/aj 1/aj J we have fv(x) = xqi. Then Proposition 2.6 and Corollary 1.2 give gv(x) = where = 1 and j G {1,2,3,4}. Now, we distinguish three main cases according to the number of zeros among {a1, a2, a3, a4}. Two zeros among {a\,a2,a3,a4} Applying Proposition 4.3 we obtain a0 = b0. The two non-zero coefficients can be chosen in six different ways, however the cases a1a2 = 0 and a1a3 = 0 correspond to a3a4 = 0 and a2a4 = 0, respectively, since Im(f (x)/x) = Im(f (x)/x). Thus, after possibly interchanging f with f , we may consider only four cases. First let 4 f (x) = a0x + a1xq + a4xq , a^4 = 0. B. Csajbok et al.: A Carlitz type result for linearized polynomials 597 2 Applying Proposition 4.3 we obtain 0 = 62. Since 6i64 = 0, from (4.4) we get 62 = 63 = 0 and hence (4.7) gives N(ai) + N(a4) = N(bi) + N(b4). Also, from (4.2) we have N(ai) N(a4) = N(6i) N(&4). It follows that either N(ai) = N(61 ) and N(a4) = N(64), or N(ai) = N(64) and N(a4) = N(6i). In the first case 6i = a^-1 for some A G F*5 and by (4.2) we get g(x) = f (Ax)/A. In the latter case 6i = 0,4 Aq-1 for some A G F*5 and by (4.2) we get g(x) = f (Ax)/A. Now consider f (x) = aixq + a3xq , 0103 = 0. Applying Proposition 4.3 and arguing as above we have either 62 = 64 = 0 or 61 = 63 = 0. In the first case from (4.6) we obtain a>1+q2+q3 = 6?63+q2+q3 and together with (4.4) this yields N(a1) = N(61) and N(a3) = N(63). In this case g(x) = 2 4 f (Ax)/A for some A G F*5 .If 61 = 63 = 0, then in g (x) the coefficients of xq and xq are zeros thus applying the result obtained in the former case we get Ag(x) = f (Ax) and hence after substituting y = Ax and taking the adjoints of both sides we obtain g(y) = f (^y)/^, where ^ = A-1. The cases 2 2 3 f (x) = a1xq + a2xq and f (x) = a2xq + a3xq can be handled in a similar way, applying Equations (4.2) - (4.7) of Proposition 4.3. One zero among {a^, a2, a3, a4} Since Im(f (x)/x) = Im(f (x)/x), we may assume ai =0 or a2 = 0. First suppose a1 = 0. Then by (4.2) either b1 =0 or b4 = 0. In the former case putting together Equations (4.3), (4.4), (4.5) we get N(a*) = N(6j) for i G {2,3,4} and hence there exists A g F*5 such that g(x) = f (Ax)/A. If a1 = b4 = 0, then in F,„ : u G U \{0}}. One of the most natural questions about linear sets is their equivalence. Two linear sets LU and LV of PG(1, qn) are said to be PrL-equivalent (or simply equivalent) if there is an element in PrL(2, qn) mapping LU to LV. In the applications it is crucial to have methods to decide whether two linear sets are equivalent or not. This can be a difficult problem and some results in this direction can be found in [8, 12]. If LU and LV are two equivalent Fq-linear sets of rank n in PG(1, qn) and f is an element of rL(2, qn) which induces a collineation mapping LU to LV, then LUv = LV. Hence the first step to face with the equivalence problem for linear sets is to determine which Fq-subspaces can define the same linear set. For any q-polynomial f (x) = J2"=-0 ajxqi over Fqn, the graph Gf = {(x,f (x)): x G Fqn} is an Fq-vector subspace of the 2-dimensional vector space V = Fqn x Fqn and the point set Lf := LGf = {((x,f (x))>F,n : x G Fgn } is an Fq-linear set of rank n of PG(1, qn). In this context, the problem posed in (1.2) corresponds to find all Fq-subspaces of V of rank n (cf. [8, Proposition 2.3]) defining the linear set Lf. The maximum field of linearity of f is the maximum field of linearity of Lf, and it is well-defined (cf. Proposition 2.1 and [8, Proposition 2.3]). Also, by the Introduction (Section 1), for any q-polynomial f over Fqn, the linear sets Lf, Lfx (with fA(x) := f (Ax)/A for each A G F*„) and L^ coincide (cf. [2, Lemma 2.6] and the first part of [8, Section 3]). If f and g are two equivalent q-polynomials over Fqn, i.e. Gf and Gg are equivalent w.r.t. the action of the group rL(2, qn), then the corresponding Fq-linear sets Lf and Lg of PG(1, qn) are PrL(2, qn)-equivalent. The converse does not hold (see [12] and [8] for further details). The relation between the problem posed in (1.2) and the equivalence problem of linear sets of the projective line is summarized in the following result. Proposition 5.1. Let Lf and Lg be two Fq-linear sets of rank n of PG(1, qn). Then Lf and Lg are PrL(2, qn)-equivalent if and only if there exists an element f G rL(2, qn) such that Im(fv(x)/x) = Im(g(x)/x). □ B. Csajbok et al.: A Carlitz type result for linearized polynomials 605 Linear sets of rank n of PG(1, qn) have size at most (qn — 1)/(q — 1). A linear set Lu of rank n whose size achieves this bound is called maximum scattered. For applications of these objects we refer to [26] and [19]. Definition 5.2 ([15, 22]). A maximum scattered Fq -linear set Lu of rank n in PG(1, qn) is of pseudoregulus type if it is PrL(2, qn)-equivalent to L f with /(x) = xq or, equivalently, if there exists an element p G GL(2, qn) such that Lu * = i((x,xq )>Fq„ : x G F*n }. By Proposition 5.1 and Corollary 1.2, it follows Proposition 5.3. An Fq-linear set L f of rank n of PG(1, qn) is of pseudoregulus type if and only if /(x) is equivalent to xqi for some i with gcd(i, n) = 1. □ For the proof of the previous result see also [20]. The known pairwise non-equivalent families of q-polynomials over Fqn which define maximum scattered linear sets of rank n in PG(1, qn) are 1. /s (x) = xqS, 1 < s < n — 1, gcd(s, n) = 1 ([4, 11]), 2. gSi<5(x) = JxqS + xqn-s, n > 4, Nqn/q(J) / {0,1}1, gcd(s, n) = 1 ([23] for s = 1, [24, 27] for s = 1), 3. hSj(5(x) = JxqS + xqs+n/2, n G {6, 8}, gcd(s,n/2) = 1, Nq„/q„/2 (J) G {0,1}, for the precise conditions on J and q see [9, Theorems 7.1 and 7.2]2, 4. kb(x) = xq + xq3 + bxq5, n = 6, with b2 + b =1, q = 0, ±1 (mod 5) ([10]). Remark 5.4. All the previous polynomials in cases 2, 3, and 4 above are examples of functions which are not equivalent to monomials but the set of directions determined by their graph has size (qn — 1)/(q — 1), i.e. the corresponding linear sets are maximum scattered. The existence of such linearized polynomials is briefly discussed also in [16, p. 132]. For n = 2 the maximum scattered Fq-linear sets coincide with the Baer sublines. For n = 3 the maximum scattered linear sets are all of pseudoregulus type and the corresponding q-polynomials are all GL(2, q3)-equivalent to xq (cf. [21]). For n = 4 there are two families of maximum scattered linear sets. More precisely, if Lf is a maximum scattered linear set of rank 4 of PG(1, q4), with maximum field of linearity Fq, then there exists p G GL(2, q4) such that either /v(x) = xq or /(x) = Jxq + xq3, for some J G F*4 with Nq4/q(J) G {0,1} (cf. [13]). It is easy to see that Lf1 = Lfs for any s with gcd(s, n) = 1, and / is equivalent to / if and only if j G {i, n — i}. Also, the graph of gSja is GL(2, qn)-equivalent to the graph of gn_Sia-i. In [23, Theorem 3] Lunardon and Polverino proved that lSm and Lf1 are not PrL(2, qn)-equivalent when q > 3, n > 4. This was extended also for q = 3 [10, Theorem 3.4]. Also in [10], it has been proven that for n = 6,8 the linear sets Lf1, , , s, and Lkb are pairwise non-equivalent for any choice of s, s', J, J', b. In this section we prove that one can find for each q > 2 a suitable J such that LS2,5 of PG(1, q5) is not equivalent to the linear sets LS1^ of PG(1, q5) for each ^ g F*5, with Nq5/q (m) G {0,1}. In order to do this, we first reformulate Theorem 1.5 as follows. 1 This condition implies q = 2. 2Also here q > 2, otherwise the linear set defined by hs,g is never scattered. 606 Ars Math. Contemp. 16 (2019) 445-463 Theorem 5.5 (Theorem 1.5). Let f (x) and g(x) be two q-polynomials over Fq5 such that Lf = Lg. Then either Lf = Lg is of pseudoregulus type or there exists some A G F*5 such that g(x) = f (Ax)/A or g(x) = f (Ax)/A holds. From [27, Theorem 8] and [24, Theorem 4.4] it follows that the family of Fq-subspaces , s G {1,n - 1}, gcd(s, n) = 1, contains members which are not rL-equivalent to the previously known Fq-subspaces defining maximum scattered linear sets of PG(1, qn). Our next result shows that the corresponding family LSs,5 of linear sets contains (at least for n = 5) examples which are not PrL-equivalent to the previously known maximum scattered linear sets. Theorem 5.6. Let (x) = Sxq2 + xq3 for some S G F*5 with N(S)5 = 1. Then LS2,5 is not PrL(2, q5)-equivalent to any linear set Lg and hence it is a new maximum scattered linear set. Proof. Suppose, contrary to our claim, that is PrL(2, q5)-equivalent to a linear set . From Proposition 5.1 and Theorem 5.5, taking into account that is not of pseudoregulus type, it follows that there exist p G rL(2, q5) and A g F*5 such that either (g2,5)v(x) = 5i,m(Ax)/A or (g2,a)v(x) = gi,M(Ax)/A. This is equivalent to say that there exist a, P, A, B, C, D G Fq5 with AD — BC = 0 and a field automorphism t of Fq5 such that ABA A xT A _ 1 lY z . : x G F„^ = M q ^ q4 : z G F„5 C D J ^ (x)Ty ' ^ V«zq + • q where N(a) = N(P) and aP = 0. We may substitute xT by y, then 2 3 2 3 4 2 3 a(Ay + B£Tyq + Byq )q + p(Ay + B£Tyq + Byq )q = Cy + D£Tyq + Dyq for each y G Fq5. Comparing coefficients yields C = 0 and aAq + pBq T = 0, (5.1) 4 PBq = D£T, (5.2) aBq ¿qT = D, (5.3) 4 aBq + pAq = 0. (5.4) Conditions (5.2) and (5.3) give Bq4-q = ¿(q+1)T a/p. (5.5) On the other hand from (5.4) we get Aq = —Bq3 aq2/Pq2 and substituting this into (5.1) we have Bq3-q4 = ¿«4t pq2+1/aq2+1. (5.6) Equations (5.5) and (5.6) give N(P/a) = N(¿)2t and N(a/P)2 = N(¿)T, respectively. It follows that N(¿)5t = 1 and hence N(¿)5 = 1, a contradiction. □ B. Csajbok et al.: A Carlitz type result for linearized polynomials 607 6 Open problems We conclude the paper by the following open problems. 1. Is it true also for n > 5 that for any pair of q-polynomials f (x) and g(x) of Fqn [x], with maximum field of linearity Fq, if Im(f (x)/x) = Im(g(x)/x) then either there exists ^ € rL(2, qn) such that fv(x) = axqi and gv(x) = ftxqj with N(a) = N(ft) and gcd(i, n) = gcd(j, n) = 1, or there exists A € Fq„ such that g(x) = f (Ax)/A or g(x) = f (Ax)/A? 2. Is it possible, at least for small values of n > 4, to classify, up to equivalence, the q-polynomials f (x) € Fqn [x] such that | Im(f (x)/x)| = (qn - 1)/(q - 1)? Find new examples! 3. Is it possible, at least for small values of n, to classify, up to equivalence, the q-polynomials f(x) € Fqn [x] such that | Im(f(x)/x)| = qn-1 + 1? Find new examples! 4. Is it possible, at least for small values of n, to classify, up to equivalence, the q-polynomials f (x) € Fqn [x] such that in the multiset {f (x)/x : x € F*„ } there is a unique element which is represented more than q - 1 times? In this case the linear set Lf is an i-club of rank n and when q = 2, then such linear sets correspond to translation KM -arcs cf. [14] (a KM-arc, or (q + t, t)-arc of type (0, 2, t), is a set of q +1 points of PG(2,2n), such that each line meets the point set in 0, 2 or in t points, cf. [17]). Find new examples! 5. Determine the equivalence classes of the set of q-polynomials in Fq4 [x]. 6. Determine, at least for small values of n, all the possible sizes of Im(f (x)/x) where f (x) € Fqn [x] is a q-polynomial. References [1] S. Ball, The number of directions determined by a function over a finite field, J. Comb. Theory Ser. A 104 (2003), 341-350, doi:10.1016/j.jcta.2003.09.006. [2] D. Bartoli, M. Giulietti, G. Marino and O. Polverino, Maximum scattered linear sets and complete caps in Galois spaces, Combinatorica 38 (2018), 255-278, doi:10.1007/ s00493-016-3531-6. [3] A. Blokhuis, S. Ball, A. E. Brouwer, L. Storme and T. Szonyi, On the number of slopes of the graph of a function defined on a finite field, J. Comb. Theory Ser A 86 (1999), 187-196, doi:10.1006/jcta.1998.2915. [4] A. Blokhuis and M. Lavrauw, Scattered spaces with respect to a spread in PG(n, q), Geom. Dedicata 81 (2000), 231-243, doi:10.1023/a:1005283806897. [5] G. Bonoli and O. Polverino, Fq-linear blocking sets in PG(2,q4), Innov. Incidence Geom. 2 (2005), 35-56, http://www.iig.ugent.be/online/2Z volume-2-article-2-online.pdf. [6] A. Bruen and B. Levinger, A theorem on permutations of a finite field, Canad. J. Math. 25 (1973), 1060-1065, doi:10.4153/cjm-1973-113-4. [7] L. Carlitz, A theorem on permutations in a finite field, Proc. Amer. Math. Soc. 11 (1960), 456459, doi:10.2307/2034798. [8] B. Csajb6k, G. Marino and O. Polverino, Classes and equivalence of linear sets in PG(1, qn), J. Comb. Theory Ser A 157 (2018), 402-426, doi:10.1016/j.jcta.2018.03.007. 608 Ars Math. Contemp. 16 (2019) 445-463 [9] B. Csajbok, G. Marino, O. Polverino and C. Zanella, A new family of MRD-codes, Linear Algebra Appl. 548 (2018), 203-220, doi:10.1016/j.laa.2018.02.027. [10] B. Csajbok, G. Marino and F. Zullo, New maximum scattered linear sets of the projective line, Finite Fields Appl. 54 (2018), 133-150, doi:10.1016/j.ffa.2018.08.001. [11] B. Csajbok and C. Zanella, On scattered linear sets of pseudoregulus type in PG(1, q*), Finite Fields Appl. 41 (2016), 34-54, doi:10.1016/j.ffa.2016.04.006. [12] B. Csajbok and C. Zanella, On the equivalence of linear sets, Des. Codes Cryptogr. 81 (2016), 269-281, doi:10.1007/s10623-015-0141-z. [13] B. Csajbok and C. Zanella, Maximum scattered Fq-linear sets of PG(1,q4), Discrete Math. 341 (2018), 74-80, doi:10.1016/j.disc.2017.07.001. [14] M. De Boeck and G. Van de Voorde, A linear set view on KM-arcs, J. Algebraic Combin. 44 (2016), 131-164, doi:10.1007/s10801-015-0661-7. [15] G. Donati and N. Durante, Scattered linear sets generated by collineations between pencils of lines, J. Algebraic Combin. 40 (2014), 1121-1134, doi:10.1007/s10801-014-0521-x. [16] F. Gologlu and G. McGuire, On theorems of Carlitz and Payne on permutation polynomials over finite fields with an application to x+ L(x), Finite Fields Appl. 27 (2014), 130-142, doi:10.1016/j.ffa.2014.01.004. [17] G. Korchmaros and F. Mazzocca, On (q + t)-arcs of type (0,2,t) in a Desarguesian plane of order q, Math. Proc. Cambridge Philos. Soc. 108 (1990), 445-459, doi:10.1017/ s0305004100069346. [18] M. Lavrauw, Scattered Spaces With Respect to Spreads, and Eggs in Finite Projective Spaces, Ph.D. thesis, Eindhoven University of Technology, Eindhoven, 2001, https://search. proquest.com/docview/304739268. [19] M. Lavrauw, Scattered spaces in Galois geometry, in: A. Canteaut, G. Effinger, S. Huczynska, D. Panario and L. Storme (eds.), Contemporary Developments in Finite Fields and Applications, World Scientific Publishing, Hackensack, NJ, pp. 195-216, 2016, doi:10.1142/9762, papers based on the 12th International Conference on Finite Fields and Their Applications (Fq12) held at Skidmore College, Saratoga Springs, NY, July 2015. [20] M. Lavrauw, J. Sheekey and C. Zanella, On embeddings of minimum dimension of PG(n, q) x PG(n,q), Des. Codes Cryptogr. 74 (2015), 427-440, doi:10.1007/s10623-013-9866-8. [21] M. Lavrauw and G. Van de Voorde, On linear sets on a projective line, Des. Codes Cryptogr. 56 (2010), 89-104, doi:10.1007/s10623-010-9393-9. [22] G. Lunardon, G. Marino, O. Polverino and R. Trombetti, Maximum scattered linear sets of pseudoregulus type and the Segre variety Sn,n, J. Algebraic Combin. 39 (2014), 807-831, doi:10.1007/s10801-013-0468-3. [23] G. Lunardon and O. Polverino, Blocking sets and derivable partial spreads, J. Algebraic Com-bin. 14 (2001), 49-56, doi:10.1023/a:1011265919847. [24] G. Lunardon, R. Trombetti and Y. Zhou, Generalized twisted Gabidulin codes, J. Comb. Theory Ser. A 159 (2018), 79-106, doi:10.1016/j.jcta.2018.05.004. [25] R. McConnel, Pseudo-ordered polynomials over a finite field, Acta Arith. 8 (1963), 127-151, doi:10.4064/aa-8-2-127-151. [26] O. Polverino, Linear sets in finite projective spaces, Discrete Math. 310 (2010), 3096-3107, doi:10.1016/j.disc.2009.04.007. [27] J. Sheekey, A new family of linear maximum rank distance codes, Adv. Math. Commun. 10 (2016), 475-488, doi:10.3934/amc.2016019. ARS MATHEMATICA CONTEMPORANEA ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 16 (2019) 609-623 https://doi.org/10.26493/1855-3974.1681.4ec (Also available at http://amc-journal.eu) Embedding of orthogonal Buekenhout-Metz unitals in the Desarguesian plane of order q2 Gábor Korchmáros , Alessandro Siciliano Dipartimento di Matematica, Informatica ed Economía, Universita degli Studi della Basilicata, Viale dell'Ateneo Lucano 10 - 85100 Potenza (Italy) Received 19 April 2018, accepted 18 February 2019, published online 5 June 2019 A unital, that is a 2-(q3 + 1 , q +1,1) block-design, is embedded in a projective plane n of order q2 if its points are points of n and its blocks are subsets of lines of n, the point-block incidences being the same as in n. Regarding unitals U which are isomorphic, as a block-design, to the classical unital, T. Szonyi and the authors recently proved that the natural embedding is the unique embedding of U into the Desarguesian plane of order q2. In this paper we extend this uniqueness result to all unitals which are isomorphic, as block-designs, to orthogonal Buekenhout-Metz unitals. Keywords: Unital, embedding, finite Desarguesian plane. Math. Subj. Class.: 51E05, 51E20 1 Introduction A unital is a set of q3 + 1 points equipped with a family of subsets, each of size q + 1, such that every pair of distinct points are contained in exactly one subset of the family. In Design Theory, such subsets are usually called blocks so that unitals are 2-(q3 +1, q +1,1) block-designs. A unital U is embedded in a projective plane n of order q2, if its points are points of n, its blocks are subsets of lines of n and the point-block incidences being the same as in n. Sufficient conditions for a unital to be embeddable in a projective plane are given in [21]. Computer aided searches suggest that there should be plenty of unitals, especially for small values of q, but those embeddable in a projective plane are quite rare, see [3, 6, 27]. Very recently, the GAP package UnitalSz was released [25]. This package contains methods for the embeddings of unitals in the finite projective plane. E-mail addresses: gabor.korchmaros@unibas.it (Gabor Korchmaros), alessandro.siciliano@unibas.it (Alessandro Siciliano) Abstract ©® This work is licensed under https://creativecommons.org/licenses/by/4.0/ 610 Ars Math. Contemp. 16(2019)609-623 In the finite Desarguesian projective plane of order q2, a unital arises from a unitary polarity: the points of the unital are the absolute points, and the blocks are the non-absolute lines of the polarity. This unital is called classical unital. The following result comes from [23]. Theorem 1.1. Let U be a unital embedded in PG(2, q2) which is isomorphic, as a blockdesign, to a classical unital. Then U is the classical unital of PG(2, q2). Buekenhout [11] constructed unitals in any translation planes with dimension at most two over their kernel by using the Andre/Bruck-Bose representation. Buekenhout's work was completed by Metz [24] who was able to prove by a counting argument that when the plane is Desarguesian then Buekenhout's construction provides not only the classical unital but also non-classical unitals in PG(2, q2) for all q > 2. These unitals are called Buekenhout-Metz unitals, and they are the only known unitals in PG(2, q2). With the terminology in [5], an orthogonal Buekenhout-Metz unital is a Buekenhout-Metz unital arising from an elliptic quadric in Buekehout's construction. In this paper, we prove the following result: Main Theorem. Let U be a unital embedded in PG(2, q2) which is isomorphic, as blockdesign, to an orthogonal Buekenhout-Metz unital. Then U is an orthogonal Buekenhout-Metz unital. Our approach is different from that adopted in [23]. Our idea is to exploit two different models of PG(2, q2) in PG(5, q), one of them is a variant of the so-called GF(q)-linearrep-resentation. We start off with a representation of a non-classical Buekenhout-Metz unital given in one of these models of PG(2, q2), then we exhibit a linear collineation of PG(5, q) that takes this representation to a representation of a classical unital in the other model of PG(2, q2). At this point to finish the proof we only need some arguments from the proof of Theorem 1.1 together with the characterization of the orthogonal Buekenhout-Metz unitals due to Casse, O'Keefe, Penttila and Quinn [12, 29]. 2 Preliminary results The study of unitals in finite projective planes has been greatly aided by the use of the Andre/Bruck-Bose representation of these planes [1, 9, 10]. Let PG(4, q) denote the projective 4-dimensional space over the finite field GF(q), and let E be some fixed hyperplane of PG(4, q). Let N be a line spread of E, that is a collection of q2 + 1 mutually skew lines of E. We consider the following incidence structure: the points are the points of PG(4, q) not in E, the lines are the planes of PG(4, q) which meet E in a line of N and incidence is defined by inclusion. This incidence structure is an affine translation plane of order q2 which is at most two-dimensional over its kernel. It can be completed to a projective plane n(N) by the addition of an ideal line whose points are the elements of the spread N. Conversely, any translation plane of order q2 with GF(q) in its kernel can be modeled this way [9]. Moreover, it is well known that the resulting plane is Desarguesian if and only if N is a Desarguesian spread [10]. Our first step is to outline the usual representation of PG(2, q2) in PG(5, q) due to Segre [30] and Bose [7]. While such representation is usually thought of in a projective setting, algebraic dimensions are more amenable to an introductory discussion of it, so we will mainly take a vector space approach along all this section. G. Korchmaros and A. Siciliano: Embedding of orthogonal Buekenhout-Metz unitals 611 Look at GF(q2) as the two-dimensional vector space over GF(q) with basis {1, e}, so that every x e GF(q2) is uniquely written as x = x0 + x^, for x0,xi e GF(q). Then the vectors (x, y, z) of V(3, q2) are viewed as the vectors (x1, x2, y1, y2, z1, z2) of V(6, q) where x = xo + xie, y = yo + eyi and z = zo + ezi. Therefore the points of PG(2, q2) are two-dimensional subspaces in V(6, q), and hence lines of PG(5, q), the five-dimensional projective space arising from V(6, q). Such lines are the members of a Desarguesian line-spread S of PG(5, q) which gives rise to a pointline incidence structure n(S) where points are the elements of S, and lines are the three-dimensional subspaces of PG(5, q) spanned by two elements of S, incidence being inclusion. Obviously, n(S) ~ PG(2, q2), and n(S) is the GF(q)-linear representation of PG(2, q2) in PG(5, q). Since PG(5, q) is naturally embedded in PG(5, q2), we also have an embedding of PG(2,q2) in PG(5,q2) via n(S). Actually, we will use a different embedding of PG(2, q2) in PG(5, q2) which is more suitable for computation. In V(6, q2), let V be the set of all vectors (x, xq, y, yq, z, zq) with x, y, z e GF(q2). With the usual sum and multiplication by scalars from GF(q), V is a six-dimensional vector space over GF(q). On the other hand, V(6, q) is naturally embedded in V(6, q2). Therefore, the question arises whether there exists an invertible endomorphism of V(6, q2) that takes V to V(6, q). The affirmative answer is given by the following proposition. Proposition 2.1. V is linearly equivalent to V(6, q) in V(6, q2). Proof. Write V(6, q) as the direct sum W(i) © W(2) © W(3), with W(i) = {(a, b, 0, 0, 0, 0) : a, b e GF(q)} W(2) = {(0, 0, a, b, 0, 0) : a, b e GF(q)} W(3) = {(0, 0, 0, 0, a, b) : a, b e GF(q)}. Clearly, each W(i) is isomorphic to V(2, q) = {(a, b) : a, b e GF(q)}. Take a basis {ui, u2} of V(2, q) together with a Singer cycle a of V(2, q). Since a has two distinct eigenvalues, both in GF(q2) \ GF(q), we find two linearly independent eigenvectors vi, v2 that form a basis for V(2, q2). Such a basis {vi, v2} is called a Singer basis with respect to V(2, q) [15]. In this context, V(2, q) = {xvi + xqv2 : x e GF(q2)} [14]. Applying this argument to W(i) with i = 1, 2, 3, gives a Singer basis {v(i), v(i)} of W(i) such that W(i) = {xv(° + xqv(i) : x e GF(q2)}. In this basis we have V(6, q) = {xv(i) + xqv(i) + yv(2) + yqv(2) + zv(3) + zqv(3) : x, y, z e GF(q2)}. (2.1) Now, the result follows from the fact that the change from any basis of V(6, q2) to the basis {v(i), v(i) : i = 1,2,3} is carried out by an invertible endomorphism over GF(q2). □ We call the vector space V the cyclic representation of V(6, q) over GF(q2). 612 Ars Math. Contemp. 16(2019)609-623 To state Proposition 2.1 in terms of projective geometry, let PG(5, q) denote the projective space arising from V(6, q). Also, let PG(V) = {(v)q : v e V} be the five-dimensional projective space whose points are the one-dimensional GF(q)-subspaces spanned by vectors in VV . Corollary 2.2. PG(VV) isprojectively equivalent to PG(5, q) in PG(5, q2). We call the the projective space PG(V) the cyclic representation of PG(5, q) over GF(q2). Recall that a 2 x 2 q-circulant (or Dickson) matrix over GF(q2) is a matrix of the form _ /d? ¿2 D = U d? with d?, d2 e GF(q2). Let B denote the basis {v(i), v(i) : i = 1, 2,3} of V. Proposition 2.3. In the basis B, the matrix associated to any endomorphism of V is of the form /ill Di2 dis\ ( D21 D22 D23 ) , (2.2) \i31 D32 D33/ where Dj is a 2 x 2 q-circulant matrix over GF(q2). Proof. It is easily seen that any matrix of type (2.2) is associated to an endomorphism of V. Conversely, take an endomorphism t of V(6, q2) and let T = (tj), tj e GF(q2), be the matrix of t in the basis B. For a generic array x = (x, xq, y, yq, z, zq) e V, / • \ T x4 , for k = 1,..., 6. ifc,iX + tk,2Xq + ifc,3y + tfc,4yq + tk,5z + tfc,6Zq V . ) If y = z = 0, a necessary condition for Tx4 G is (tfc,iX + tfc,2Xq)q = tfc+1,iX + tfc + 1,2Xq , for k = 1,3,5, that is, (tk,2 - tfc + 1,1)X + (tk,1 - tk + 1,2)Xq = 0, for k = 1,3,5 and for all x g GF(q2). This shows that the polynomial in x of degree q on the left hand side of the last equation has at least q2 roots. Therefore, it must be the zero polynomial. Hence tk+1,1 = t\ 2 and tk+1,2 = t\ 1, for k =1, 3,5. To end the proof, it is enough to repeat the above argument for x = z = 0 and then for x = y = 0. □ Next we exhibit quadratic forms on V(6, q2) which induce quadratic forms on V^. The vector space V (2n, q) has precisely two (nondegenerate) quadratic forms, and they differ by their Witt-index, that is the dimension of their maximal totally singular subspaces; G. Korchmaros and A. Siciliano: Embedding of orthogonal Buekenhout-Metz unitals 613 see [22, 32]. These dimensions are n - 1 and n, and the quadratic form is elliptic or hyperbolic, respectively. In terms of the associated projective space PG(2n - 1, q), the elliptic (resp. hyperbolic) quadratic form defines an elliptic (resp. hyperbolic) quadric of PG(2n - 1, q). Fix a basis {1, e} for GF(q2) over GF(q), and write x = x0 + exi, for x G GF(q2) with x0, x1 G GF(q). Here, e is taken such that e2 = £ with £ a nonsquare in GF(q) for q odd, and that e2 + e = s with s G C1 and s = 1 for q even, where C1 stands for the set of elements in GF(q) with absolute trace 1. Furthermore, Tr denotes the trace map x G GF(q2) ^ x + xq G GF(q). Proposition 2.4. Let a, p G GF(q2) satisfy the following conditions: {4aq+1 + (,0q — p)2 is nonsquare in GF(q), for q odd, aq+7(,0q + P)2 G C0 with p G GF(q2) \ GF(q), for q even, where C0 stands for the set of elements in GF(q), q even, with absolute trace 0. Let Qa,p be the quadratic form on V (6, q2) given by Qa,ß (xi,x2,yi,y2,zi,z2) = 5q X1Z2 + ¿X2Z1 + a^Y2 + aq 5q Y22 + Tr(^ß)Y1Y2, (2.3) with 5 = e or 5 = 1 according as q is odd or even. then the restriction Qa,p of Qa,p on V defines an elliptic quadratic form on V. Proof. Two cases are treated separately according as q is odd or even. If q is odd, let denote the symmetric bilinear form on V(6, q2) associated to Qa,p. The matrix of ba^ in the canonical basis is Ba,ß — O2 O2 E O2 Aa,ß O2 E O2 O2 with E 0 eq e 0 E and A a,ß 2ae Tr(eß) Tr(eß) 2aq eq A straightforward computation shows that Ba,ß induces a symmetric bilinear form on . Let Qa,ß denote the resulting quadratic form on ^. Since det Aaß — 4aq+1 + (ßq - ß)2 is nonsquare in GF(q), it follows that Qa,ß is nondegenerate. Hence Qaß is nondegenerate, as well. Let H be the four-dimensional subspace {(x,xq, 0,0, z, zq) : x, z G GF(q2)} of V^. Then the restriction of Qaß on H is a hyperbolic quadratic form, as L1 — {(x, xq, 0,0,0,0) : x G GF(q2)} and L2 — {(0,0,0,0, z, zq) : z G GF(q2)} are totally isotropic subspaces with trivial intersection. The orthogonal space of H with respect to baß is L — {(0,0, y, yq, 0,0) : y G GF(q2)}. By [22, Proposition 2.5.11], Qa,ß is elliptic if and only if the restriction of Qa,ß on L is elliptic, that is, Tr(aey2 + eßyq+1)— 0 (2.4) 614 Ars Math. Contemp. 16(2019)609-623 has no solution y G GF(q2) other than 0. Write y = yo + eyi, a = ao + eai and P = bo + ebi with yo, yi, ao, ai, bo, bi G GF(q). As eq = —e and e2 = £, we have yq = yo - eyi = y2 - Cy2 y2 + Cy? + 2eyoyi y2q = y? + Cy? - 2eyoyi aey2 = e(2aoyoyi + ai(y? + Cy2)) + e(ao(y? + Cy2) + 2eaiyoyi) aq eq y2q e(2aoyoyi + ai(y2 + Cy2)) - e(ao(y2 + Cy2) + 2£aiyoyi), whence Moreover, Tr(aey2) = 2£(2aoyoyi + ai^ + £y2)). Tr(eßyq+i) = 2£bi(y2 - Cy2). Then Equation (2.4) has a nontrivial solution y G GF(q2) if and only if (yo, yi) = (0,0) with yo, yi G GF(q) is a solution of (ai + bi)y2 + 2aoyoyi + C(ai - bi)y2 = 0. (2.5) By a straightforward computation, (2.5) occurs if and only if 4aq+i + (Pq — P)2 = u2 for some u G GF(q). But the latter equation contradicts our hypothesis. Therefore, Equation (2.4) has no nontrivial solution in GF(q2) and hence Qa,| is elliptic. For q even, the above approach still works up to some differences due to the fact that the well known formula solving equations of degree 2 fails in even characteristic. For completeness, we give all details. If q is even, the restriction of Qa,p on V is a quadratic form Qa,p on V, and the matrix of the associated bilinear form b| is /O2 O2 EN = ( O2 O2 \ E O2 O2, where E 0 1 1 0 and A ß 0 Tr(ß) Tr(ß) 0 Since ß G GF(q), a straightforward computation shows that the radical of bß is trivial, which gives Qa,ß is nonsingular. As for the odd q case, the orthogonal space of H with respect to bß is L. Therefore, Qa,ß is elliptic if and only if Tr(ay2 + ßyq+i) = 0 (2.6) 2 y has no nontrivial solution y G GF(q2). G. Korchmaros and A. Siciliano: Embedding of orthogonal Buekenhout-Metz unitals 615 As before, let y = yo + eyi, a = ao + eai and ft = 60 + e61 with yo, yi, ao, «1, bo, 61 € GF(q). As eq = e +1 and e2 = e + s, with s € C1, we have yq = yo + yi + eyi yq+1 = y2 + yoyi + sy2 2 2 2 2 y = yo + syi + eyi y2q = yi + (s + i)y2 + eyi ay2 = aoy° + s(ao + ai)y2 + e(aoy° + ai y° + (s + 1)ai y2) aq y2q = aoy° + s(ao + ai)y° + (aoy2 + aiy° + (s + 1)aiy°) + e(aoy2 + aiy° + (s + 1)aiy2), Tr(ay2) = ao y2 + aiy° + (s + 1)aiy2, whence and TT(ßyq+i) = 6i(y2 + yoyi + sy2). Therefore, Equation (2.6) has a nontrivial solution in GF(q2) if and only if («1 + bi)y2 + bi yoyi + (ao + ai + s«i + sbi)y2 = 0. Assume y = y0 G GF(q) is a nontrivial solution of (2.6). Then ai = bi. This gives (ßq + ß)2 a2 + ai + s 6 Cl' a contradiction since -u + a0 c C — +--6 Co. ai ai Assume that y = yo + ey1 € GF(q2), with y1 = 0, is a solution of (2.6). Then yoy-1 is a solution of (ai + 6i)X2 + 61X + ao + ai + s(ai + 61) = 0, (2.7) where 61 = 0. Let Y = (ai + 6i)6-1X. Replacing X by Y in (2.7) gives Y2 + Y + d = 0 where 2 2 2 2 ao + aiao + sa2 a! + ai ao + ai d =-6o-+ + +s. Here, d 6 C1 by a0 + ai au + sa2 aq+1 _ € Co. 2 b0 (ßq + ß) This shows that Equation (2.7) has no nontrivial solution in GF(q). Hence Equation (2.6) has no nontrivial solution in GF(q2), as well. Therefore Qa,ß is elliptic. □ Let Qa,ß stand for the elliptic quadric in PG(V) defined by the quadratic form Qa,ß on V. Then the coordinates of the points of PG(V^) that lie on Qa,ß satisfy the equation Sq XZq + ¿Xq Z + aSY2 + aq 5q Y2q + Tr(Sß)Yq+i = 0, (2.8) with S = e or S =1 according as q is odd or even. 616 Ars Math. Contemp. 16 (2019) 445-463 3 The GF(q)-linear representation of Buekenhout-Metz unitals In the light of Proposition 2.1, we introduce another incidence structure n( (x, xq, y, yq, z, zq) By Proposition 2.1, < is the field reduction of V(3, q2) over GF(q) in the basis jv(i),v(i),i = 1, 2, 3} of V(6, q2). The points of PG(2, q2) are mapped by < to the two-dimensional GF(q)-subspaces of V of the form {(Ax, Aqxq, Ay, Aqyq, Az, Aqzq) : A G GF(q2)}, for x, y, z G GF(q2), and hence lines of PG(V). Such lines form a line-spread S of PG(V). By Proposition 2.1 and Corollary 2.2, S is projectively equivalent to S in PG(5, q2). Hence, S is also a De-sarguesian line-spread of PG(V). Therefore, in PG(5, q2) n((L^) in E. Furthermore, Equation (3.2) defines an algebraic hypersurface of degree four of PG(5, q). A straightforward, though tedious, calculation shows that Equation (3.2) is precisely the algebraic hypersurface provided by Polverino in [28]. As elliptic quadrics in PG(VF) are projectively equivalent, some linear collineation ra of PG(f) takes ). The answer is negative by d1d2 = 0 and Proposition 3.2. This implies that r0,f and ra,f are Buekenhout representations of unitals of PG(2, q2) and that they are not projectively equivalent. In particular, this provides a new proof for the existence of non-classical unitals embedded in PG(2, q2). 620 Ars Math. Contemp. 16(2019)609-623 It is clear that the image STa of the Desarguesian line-spread S under the linear collineation ra is a Desarguesian line-spread and it defines the GF(q)-linear representation n(STa) of PG(2, q2). 4 The proof of the Main Theorem In our proof the models of PG(2, q2) treated in Section 3 play a role. Two of them arose from Desarguesian line-spreads of PG(U) denoted by S and STa respectively, the third was the Andre/Bruck-Bose model n(N) in the 4-dimensional subspace A. In PG(2, q2) consider a unital U isomorphic, as a block-design, to an orthogonal Buekenhout-Metz unital Ua,p with a = 0. It is known [2, 17] that Ua,p has a special point which is the unique fixed point of the automorphism group of Ua,p. Hence the automorphism group of U fixes a unique point of U. Up to a change of the homogeneous coordinate system in PG(2, q2), the special point of Ua,p is P» = ((1,0,0)}q2 and the tangent line of Ua,p at P» is L»: Z = 0. Up to a linear collineation, P» G U is the fixed point of the automorphism group of U and L» is the tangent to U at P». Therefore, U and Ua,p share P» and L». We interpret the isomorphism between U and Ua,p in each of the above three models of PG(2, q2). The representation U = {U(P) : P G U} of U in n(S) is isomorphic, as a block-design, to Ua,p = {U(P) : P G Ua,p}. The Buekenhout representation U = |JPeU (U(P) n A) of U in n(N) is isomorphic, as a block-design, to Ua,p = UPeua a (U(P) n A). Here, by Proposition 3.6, Ua,p is the cone ra,p. This gives that the representation U = {L g STa : L n A c U} of U in n(p}. From Proposition 3.8, the lines which are the points of ^ partition the elliptic quadric Qa,p = Q0ap. On the other hand, from Remark 3.5, ¿2o,p is partitioned by lines which are the points of the classical unital U0,p in n((P») is a regulus of PG(U) whose lines are in 5. Under U, these reguli correspond to Baer sublines of PG(2, q2) through P». This yields that the points of U on each of the q2 secant lines to U form a Baer subline through P». By the characterization of such unitals of PG(2, q2) G. Korchmaros and A. Siciliano: Embedding of orthogonal Buekenhout-Metz unitals 621 given in [12, 29], we may conclude that U is a Buekenhout-Metz unital. By definition, the Buekenhout representation U of U is a cone that project an ovoid O from a point of <(PTO) not in O. Here an ovoid is a set of q2 + 1 points in a 3-dimensional subspace of A no three of which are collinear. To conclude the proof we only need to prove that O is an elliptic quadric. Since the ovoids in PG(3, q) with odd q are elliptic quadrics, see [4, 26], we assume q = 2h. In PG(3,2h), there are known two ovoids, up to projectivities, namely the elliptic quadric which exist for h > 1, and the Tits ovoid which exists for odd h > 3; see [18, Chapter 10]. Let Q be the 3-dimensional subspace of A containing O. Note that O = Q n U .Set to be the plane Q n E. Then meets O exactly in the point O n <(PTO), and it is a simple matter to show that contains only one line <(P) of N. Also, <(P) is distinct from 4>(P). Let a1,... ,aq denote the further planes of Q through <(P). As these planes are lines of n(N) through the point <(P), each of them meets U in 1 or q +1 points. This holds true for O. It is well known [19, Section 12.3] that in a finite Desarguesian projective plane through any point off a unital there are exactly q + 1 tangent lines, that is, lines of the plane that intersects the unital in exactly one point. In terms of the unital U this property states that there is only one plane among a1,..., aq that meets O in exactly one point. Let a1 denote this plane. Then the block aj n O of U, for i = 2,..., q, is the intersection of aj with a regulus in PG(t^). Since that regulus does not contain <(P), the block aj n O is a conic Cj of «j, for i = 2,..., q. Thus the blocks aj n O, for i = 2,..., q, are q — 1 conics that partition all but two points of O. By [8, Theorem 5] O is an elliptic quadric. References [1] J. Andre, Uber nicht-Desarguessche Ebenen mit transitiver Translationsgruppe, Math. Z. 60 (1954), 156-186, doi:10.1007/bf01187370. [2] R. D. Baker and G. L. Ebert, On Buekenhout-Metz unitals of odd order, J. Comb. Theory Ser. A 60 (1992), 67-84, doi:10.1016/0097-3165(92)90038-v. [3] J. Bamberg, A. Betten, C. E. Praeger and A. Wassermann, Unitals in the Desarguesian projective plane of order 16, J. Statist. Plann. Inference 144 (2014), 110-122, doi:10.1016/j.jspi. 2012.10.006. [4] A. Barlotti, Un'estensione del teorema di Segre-Kustaanheimo, Boll. Un. Mat. Ital. Serie 3 10 (1955), 498-506, http://www.bdim.eu/item?id=BUMI_1955_3_10_4_4 9 8_0. [5] S. Barwick and G. Ebert, Unitals in Projective Planes, Springer Monographs in Mathematics, Springer, New York, 2008, doi:10.1007/978-0-387-76366-8. [6] A. Betten, D. Betten and V. D. Tonchev, Unitals and codes, Discrete Math. 267 (2003), 23-33, doi:10.1016/s0012-365x(02)00600-3. [7] R. C. Bose, On a representation of the Baer subplanes of the Desarguesian plane PG(2, q2) in a projective five dimensional space PG(5, q), in: Colloquio Internazionale sulle Teorie Com-binatorie, Tomo I, Accademia Nazionale dei Lincei, Rome, 1976 pp. 381-391, proceedings of a conference held in Rome, September 3- 15, 1973. [8] M. R. Brown, C. M. O'Keefe and T. Penttila, Triads, flocks of conics and Q- (5, q), Des. Codes Cryptogr. 18 (1999), 63-70, doi:10.1023/a:1008376900914. [9] R. H. Bruck and R. C. Bose, The construction of translation planes from projective spaces, J. Algebra 1 (1964), 85-102, doi:10.1016/0021-8693(64)90010-9. 622 Ars Math. Contemp. 16(2019)609-623 [10] R. H. Bruck and R. C. Bose, Linear representations of projective planes in projective spaces, J. Algebra 4 (1966), 117-172, doi:10.1016/0021-8693(66)90054-8. [11] F. Buekenhout, Existence of unitals in finite translation planes of order q2 with akernel of order q, Geom. Dedicata 5 (1976), 189-194, doi:10.1007/bf00145956. [12] L. R. A. Casse, C. M. O'Keefe and T. Penttila, Characterizations of Buekenhout-Metz unitals, Geom. Dedicata 59 (1996), 29-42, doi:10.1007/bf00181524. [13] D. B. Chandler, The sizes of the intersections of two unitals in PG(2, q2), Finite Fields Appl. 25 (2014), 255-269, doi:10.1016/j.ffa.2013.10.001. [14] B. N. Cooperstein, External flats to varieties in PG(Mn,n(GF(q))), Linear Algebra Appl. 267 (1997), 175-186, doi:10.1016/s0024-3795(97)80049-3. [15] N. Durante and A. Siciliano, Non-linear maximum rank distance codes in the cyclic model for the field reduction of finite geometries, Electron. J. Combin. 24 (2017), P2.33, https:// www.combinatorics.org/ojs/index.php/eljc/article/view/v2 4i2p33. [16] R. H. Dye, Spreads and classes of maximal subgroups of GLn(q), SLn(q), PGLn(q) and PSLn(q), Ann. Mat. PuraAppl. 158 (1991), 33-50, doi:10.1007/bf01759298. [17] G. L. Ebert, On Buekenhout-Metz unitals of even order, European J. Combin. 13 (1992), 109117, doi:10.1016/0195-6698(92)90042-x. [18] J. W. P. Hirschfeld, Finite Projective Spaces of Three Dimensions, Oxford Mathematical Monographs, Oxford University Press, New York, 1985. [19] J. W. P. Hirschfeld, Projective Geometries over Finite Fields, Oxford Mathematical Monographs, Oxford University Press, New York, 2nd edition, 1998. [20] J. W. P. Hirschfeld and G. Korchmaros, Arcs and curves over a finite field, Finite Fields Appl. 5 (1999), 393-408, doi:10.1006/ffta.1999.0260. [21] A. M. W. Hui and P. P. W. Wong, On embedding a unitary block design as a polar unital and an intrinsic characterization of the classical unital, J. Comb Theory Ser. A 122 (2014), 39-52, doi:10.1016/j.jcta.2013.09.007. [22] P. Kleidman and M. Liebeck, The Subgroup Structure of the Finite Classical Groups, volume 129 of London Mathematical Society Lecture Note Series, Cambridge University Press, Cambridge, 1990, doi:10.1017/cbo9780511629235. [23] G. Korchmaros, A. Siciliano and T. Szonyi, Embedding of classical polar unitals in PG(2, q2), J. Comb Theory Ser. A 153 (2018), 67-75, doi:10.1016/j.jcta.2017.08.002. [24] R. Metz, On a class of unitals, Geom. Dedicata 8 (1979), 125-126, doi:10.1007/bf00147935. [25] G. P. Nagy and D. Mezofi, UnitalSZ - a GAP package, Version 0.5, 23 March 2018, https: //nagygp.github.io/UnitalSZ/. [26] G. Panella, Caratterizzazione delle quadriche di uno spazio (tridimensionale) lineare sopra un corpo finito, Boll. Un. Mat. Ital. Serie 3 10 (1955), 507-513, http://www.bdim.eu/ item?id=BUMI_1955_3_10_4_5 0 7_0. [27] T. Penttila and G. F. Royle, Sets of type (m, n) in the affine and projective planes of order nine, Des. Codes Cryptogr. 6 (1995), 229-245, doi:10.1007/bf01388477. [28] O. Polverino, Linear representation of Buekenhout-Metz unitals, Discrete Math. 267 (2003), 247-252, doi:10.1016/s0012-365x(02)00618-0. [29] C. T. Quinn and R. Casse, Concerning a characterisation of Buekenhout-Metz unitals, J. Geom. 52 (1995), 159-167, doi:10.1007/bf01406836. [30] B. Segre, Teoria di Galois, fibrazioni proiettive e geometrie non desarguesiane, Ann. Mat. Pura Appl. 64 (1964), 1-76, doi:10.1007/bf02410047. G. Korchmaros and A. Siciliano: Embedding of orthogonal Buekenhout-Metz unitals 623 [31] J. Singer, A theorem in finite projective geometry and some applications to number theory, Trans. Amer. Math. Soc. 43 (1938), 377-385, doi:10.2307/1990067. [32] D. E. Taylor, The Geometry of the Classical Groups, volume 9 of Sigma Series in Pure Mathematics, Heldermann Verlag, Berlin, 1992. [33] J. A. Thas, Semipartial geometries and spreads of classical polar spaces, J. Comb. Theory Ser. A 35 (1983), 58-66, doi:10.1016/0097-3165(83)90026-2. ARS MATHEMATICA CONTEMPORANEA ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 16 (2019) 625-639 https://doi.org/10.26493/1855-3974.1605.43f (Also available at http://amc-journal.eu) The dimension of the negative cycle vectors of signed graphs Alex Schaefer *, Thomas Zaslavsky Binghamton University (SUNY), Department of Mathematical Sciences, Binghamton, NY 13902-6000, U.S.A. Received 16 February 2018, accepted 7 March 2019, published online 6 June 2019 A signed graph is a graph r with edges labeled "+" and "-". The sign of a cycle is the product of its edge signs. Let SpecC(r) denote the list of lengths of cycles in r. We equip each signed graph with a vector whose entries are the numbers of negative k-cycles for k € SpecC(r). These vectors generate a subspace of R1 SPecG(r)1. Using matchings with a strong permutability property, we provide lower bounds on the dimension of this space; in particular, we show for complete graphs, complete bipartite graphs, and a few other graphs that this space is all of R1 SpecG(r)|. Keywords: Signed graph, negative cycle vector, permutable matching. Math. Subj. Class.: 05C22, 05C38 1 Introduction A signed graph E is a graph r whose edges have sign labels, either "+" or "-". The sign of a cycle in the graph is the product of the signs of its edges. Write c-(E) for the number of negative cycles of length l in E and collect these numbers in the negative cycle vector c-(E) = (c-, c-,..., c€ Rn-2, where n is the order of E. We are interested in the structure of the collection NCV(r) of all negative cycle vectors of signings of a fixed underlying simple graph r. The negative cycle numbers are of interest for several reasons. Ours is that, while the structure of a signed graph is more complex than that of an unsigned graph, much of that complexity is traceable to the distribution of negative cycles. We think negative cycle vectors are a step towards better understanding of those cycles. Beyond this, negative cycle numbers have been an object of interest since the first days of signed graph theory. When * Present address: University of Kansas, Department of Mathematics, Lawrence, KS 66045-7594, U.S.A. E-mail addresses: alex.scha4@ku.edu (Alex Schaefer), zaslav@math.binghamton.edu (Thomas Zaslavsky) Abstract ©® This work is licensed under https://creativecommons.org/licenses/by/4.0/ 626 Ars Math. Contemp. 16 (2019) 445-463 signed graphs were introduced by Harary [2] to be applied to a problem in social psychology by Cartwright and Harary [1], one of their concerns was to measure how unbalanced a signed graph is. One measure they proposed was the proportion of negative cycles, i.e., [ J2i cr (£)] / [J21 ci (T)], where c; denotes the total number of l-cycles in the graph. This proportion is hard to calculate even for signed complete graphs, since the number of cycles can be exponential in the order n and the negative cycle numbers are also complicated. There are at least three natural questions raised by the existence of the collections NCV(r). Most simply, since any set of points in M"r2 lies in a smallest subspace, what subspace do they span? That is the question we address here. The cycle spectrum SpecC(r) is the list of lengths of cycles in r. The finite set NCV(r) generates a subspace of M"r2 that is contained in the subspace RNCv(T) consisting of all vectors that are 0 in the coordinates that correspond to cycle lengths not in the cycle spectrum of r. We develop a general approach to the dimension question in terms of "permutable matchings" (see Section 2.3) that allows us to prove that, for r = Kn, Km,n, and the Petersen graph, NCV(r) spans RsPecC(r); it also gives us a lower bound on dimension for the Heawood graph and one other graph family. We also solve a few examples with an ad hoc method. Knowing the span of the negative cycle vectors, what is their convex hull? In [5] and [8] Popescu and Tomescu gave inequalities bounding the numbers of negative cycles in a signed complete graph, which may be a step towards the answer for Kn (see Section 5). A related question: Do the facets of the convex cone generated by NCV(r) have combinatorial meaning? The ultimate question: Which vectors in the convex hull are actually the vectors of signed graphs? Kittipassorn and Meszaros [3], inspired by the theory of two-graphs from finite group theory and geometry (see [7]) gave strong restrictions on the number of negative triangles in a signed Kn. This is a step towards the answer for Kn. We discuss these questions further in Section 5. Our work was originally focused on complete graphs and complete bipartite graphs. Those cases and others led the first author to the following conjecture, to which we do not know any counterexample. Conjecture 1.1 (Schaefer, 2015). For any graph r, dimNCV(T) = | SpecC(T)|, the number of different lengths of cycles in r. 2 Background 2.1 Graphs A graph is a pair r = ( V, E), where V = [v\,... ,vn} is a finite set of vertices and E is a finite set of unordered pairs of vertices, called edges. Our graphs are all unlabeled, simple, and undirected. Thus, all cycle lengths are between 3 and n. The cycle spectrum SpecC(r) is the set of cycle lengths that appear in r. The number of cycles of length l in r is c; = c; (r). The cycle vector of r is c(r) = (c3, c4,..., cn); sometimes we omit the components that correspond to lengths l not in the cycle spectrum. The number of cycle lengths in r, | SpecC(r)|, is clearly fundamental since dimNCV(r) < | SpecC(r)|. A. Schaefer and T. Zaslavsky: The dimension of the negative cycle vectors of signed graphs 627 2.2 Signed graphs A signed graph is a triple E = (V, E, a) where r = (V, E) is a graph, called the underlying graph of E, and a: E ^ {+, -} is the sign function. Two signed graphs are isomorphic if there is an isomorphism of underlying graphs that preserves edge signs. The sign of a cycle is the product of the signs of its edges; a signed graph in which every cycle is positive is called balanced. The negative edge set E- is the set of negative edges of E and the negative subgraph is E- = (V, E-), the spanning subgraph of negative edges. We sometimes write rN for r signed so that N is its set of negative edges. Switching E means choosing a vertex subset X C V and negating all the edges between X and its complement. Switching yields an equivalence relation on the set of all signings of a fixed underlying graph. If E2 is isomorphic to a switching of Ei, we say that Ei and E2 are switching isomorphic. This relation is an equivalence relation on signed graphs; we denote the equivalence class of E by [E]. A signed graph is balanced if and only if it is switching isomorphic to the all-positive graph. Signed graphs that are switching isomorphic, like those in Figure 1, have the same negative cycle vector. The negative cycle vector of E is c-(E) = (c-(E), c-(E),..., c-(E)), where c- = c- (E) is the number of negative cycles of length l. As with c(r), we may omit the components of c- (E) that correspond to lengths l not in the cycle spectrum. Also, we may write either c- (E) or c- (a), the latter when only the signature a is varying. Figure 1: Two switching equivalent signings of K6, with the same negative cycle vector (10,18, 36, 36). Solid lines are positive, dashed lines are negative. The negation of E is —E = (V, E, —a), in which the sign of every edge is negated. Sometimes E and — E are switching isomorphic, e.g., when E is bipartite or when it is a signed complete graph whose negative subgraph is self-complementary. 2.3 Permutable matchings A matching in r is a set M of pairwise nonadjacent edges; it is perfect if V(M) = V. A matching M—or any other edge set—is permutable if some subgroup of the automorphism group of r acts on the edges of M as the symmetric group S|M |. We base our results largely on permutable matchings, having noticed their utility for complete and complete bipartite graphs. The advantage of permutability is that, in counting negative cycles using a permutable matching, any two equicardinal subsets belong to the same number of negative cycles of each length. That makes it feasible to calculate the numbers in the vectors we use to estimate the dimension of NCV(r). Our introduction of permutable matchings led to the question: Which graphs have per- 628 Ars Math. Contemp. 16(2019)609-623 mutable matchings? That has been investigated by Schaefer and Swartz in [6]; they find large families of examples. On the other hand, there are only a few kinds of graph with permutable perfect matchings; Schaefer and Swartz determine them all. 3 Rank and dimension The dimension of NCV(T) is the rank of the matrix whose rows are the negative cycle vectors of all signatures of r. The columns of this matrix that correspond to lengths k e {3,4,..., n} \ SpecC(r) are all zero; thus, we may ignore them. Since the rank cannot be greater than | SpecC(r)|, if we produce a submatrix of that rank we have proved that dimNCV(r) = | SpecC(r)|. That is what we now endeavor to do with the aid of a permutable matching. Even if permutable matchings fail to reach the spectral upper bound, they imply a lower bound. However, we are happy to say that in our three main examples, permutable matchings solve the dimension problem. The rank of a matrix A is written rk(A). 3.1 Any negative edge set We begin with the most general calculation. Given a signed graph rN with an arbitrary negative edge set N C E, how many negative cycles are there of each length? For X C N let fi(X) = the number of l-cycles that intersect N precisely in X. We get a formula for f by Mobius inversion from gl (X) = the number of l-cycles that contain X, since gi(X )= £ fi(Y), xcy C N which implies that fl(X )= £ (-1)|YHX|g(Y). X CY CN The number of negative l-cycles is the number of l-cycles that intersect N in an odd number of edges; therefore, c-(rN )= £ fi(X )= ££ (-i)|Y|-|X|gi(Y) XCN, |X | odd XCY CN, |X| odd = £ gi(Y) £ (-i)|Y|-|X| YCN XCY, |X| odd = £ (—2)|y |-1gi(Y). (3.1) 0=Y CN This applies to every underlying graph r. 3.2 A matrix calculation Now assume we have a graph r of order n together with m unbalanced sign functions a1,..., am in addition to the all-positive function a0 = +. To avoid redundancy we want the associated signed graphs to be switching nonisomorphic. For instance, choosing more than half the edges at a vertex to be negative is switching equivalent to choosing fewer than A. Schaefer and T. Zaslavsky: The dimension of the negative cycle vectors of signed graphs 629 half, so we would not want the negative edge set to contain more than 1 deg(v) of the edges incident with any vertex v. We construct the matrix of the negative cycle vectors of all signings as and their negatives, with columns segregated by parity. The rows are one for +r (i.e., a0 = +), then m rows for the unbalanced signatures s ) C5 (am) C5 C3 — c-(ai) C5 — c—(ai) c5 (am) c3 \ c3 — c- (am) c5 — c- (am) if l is even. 00 c55 (ai) c5(ai) c5 (am) c5 (am) 0 0 c- (ai) c- (ai) (am) c- (am) (3.2) / The last column in the left half is that of n — 1 or n depending on whether n is even or odd; in the right half it is that of n or n — 1, respectively. Row operations reduce this matrix to 0 c3 (ai) 0 c55 (ai) c5 (am) c5 (am) c3 c5 00 \ 0 0 c- (ai) c- (ai) (am) c- (am) \ (3.3) Ignoring the first row of zeros, this is a block matrix A U O codd(r) o O R) The middle row codd(r), consisting of the odd-cycle numbers of r, corresponds to —r. The upper left block U is the matrix of negative odd-cycle vectors of the unbalanced signatures as, and the lower right block R is the matrix of negative even-cycle vectors of the same signatures. We infer the fundamental fact that: Lemma 3.1. The rank of the negative cycle matrix (3.2) equals the sum of the ranks of U and R. O and codd = 0, so only R needs to be considered. codd (r), For a bipartite graph U c c 0 630 Ars Math. Contemp. 16(2019)609-623 3.3 Permutable negative matchings Henceforth we assume we have chosen a fixed permutable matching Mm of m edges in r. For each s = 1,2,..., m we choose a submatching Ms C Mm of s edges and we define the signature as as that of the signed graph rMs. (It does not matter which Ms we use, because Mm is permutable.) This generates a matrix of negative cycle vectors as in (3.2). Permutability implies that gl (Y) depends only on |Y| so we may define Gl (k) = gl (Y) for any one k-edge subset Y C Mm. Then (3.1) becomes -(Fm, ) = ¿ (-2)k-1 (¡W) = ¿ (—2)k-1 Gkk)(s)k, (3.4) kk! where (x)k denotes the falling factorial, (x)k = x(x -1) • • • (x - [k -1]). We may let k run up to n in the second summation because if k > s, the falling factorial equals 0. Formula (3.4) gives c-(rMs) as a polynomial function p;(s) without constant term, of degree d; where d; is the largest integer k for which G;(k) > 0; that is, d; is the largest size of a submatching of Mm that is contained in some cycle of length l. We leave d; undefined if no l-cycle intersects Mm. Clearly, d; < m. (This method works equally well for subsets of any permutable edge set N in any graph. It is easy to see that there are only three possible kinds of permutable set: a matching, a subset of the edges incident to a vertex, and the three edges of a triangle. In Kn a permutable set of edges at a vertex is useless since then the entire matrix (3.2) has rank 1. We have not seen a graph where a triangle's edges might help find the dimension.) A column of U or R is not all zero if and only if it corresponds to a cycle length l for which there exists an l-cycle in r that intersects Mm. Such a column contains m values of the polynomial p; (s). Since p; has degree at most m and no constant term, these values determine p; completely. Now a nonzero column in U or R for cycle length l looks like this: /pi(1)\ Pi(2) Wm)Z f a¡1dl + ai2dl + • • • \aimdl + —J (3.5) since pi is a polynomial of degree d;; here = (-2)dl 1G;(d;)/d;!. Moreover, d; = ^(l) > 0 for a nonzero column, where we define ^(l) = max |C; n Mm|, (3.6) Ci maximized over all l-cycles Cl. Define ¿odd to be the number of distinct degrees d; for odd lengths l whose column in U is not zero, and let 4ven be the number of distinct degrees d; for even lengths whose column in R is not zero. If some values of d; for, e.g., odd lengths l happen to be equal, they are counted only once. Thus, ¿odd may be less than the number of nonzero columns. The number of distinct polynomial degrees represented in the columns of U is ¿odd, and similarly for R the number is ¿even. Let Aodd be the set of distinct degrees d; counted by ¿odd, and similarly for Aeven. c A. Schaefer and T. Zaslavsky: The dimension of the negative cycle vectors of signed graphs 631 Lemma 3.2. The rank of U is at least ¿odd and that of R is at least 4ven. The rank of ( U ) is rk(U) + 1 if there is an odd length l such that an l-cycle exists \Codd J in r but no l-cycle intersects Mm. Proof. In U choose one column of each different degree dl. Divide by the leading coefficient ai, which is necessarily nonzero; this does not affect the rank. Now add columns of the form (s^)^ for every d = 1,2,..., m that is not in Aodd. Column operations allow us to eliminate the lower-degree terms of the column (3.5), leaving a Vandermonde matrix with 1d in the top row and md in the bottom row of column d for each d = 1,2,..., m, the rank of which is m. Now reverse the column operations; the rank remains the same, so the columns of U must have full column rank. The same reasoning applies to R. The extra 1 in the rank of | U | arises from the fact that, under the assumption, it has \Codd J a column that is zero in U but is nonzero in codd. □ 3.4 Theorems Lemma 3.2 yields our principal general theorem. Given a matching Mm and a cycle length l € SpecC(r), define ^(l) by Equation (3.6). Theorem 3.3. Let Mm be a permutable m-matching in r. Then |{m(1) : odd l € SpecC(r)}| + |{^(l) > 0 : even l € SpecC(r)}| < dim NCV(r) < | SpecC(r) |. ^ Suppose that all values ^(l) for even lengths l € SpecC(r) are distinct and positive, and all values ^(l) for odd lengths l € SpecC(r) are distinct. Then NCV(r) spans RSpecC(r). Proof. The first part follows directly from Lemma 3.2 since dim NCV(r) > rk(A) = rk ( U\ + rk(R) > ¿odd + ¿even. Vcodd ) Moreover, if there is an odd length l such that ^(l) = 0, then rk ( U ) = rk(U) + 1 > \Codd ) ¿even + 1; that explains why we do not exclude ^(l) = 0 from being counted in the odd-length part of (3.7). In the second part, ¿even = the number of even cycle lengths in r and ¿odd or (if some odd l € SpecC(r) has ^(l) = 0) ¿odd + 1 = the number of odd cycle lengths in r. Then the left-hand side of Formula (3.7) equals | SpecC(r) |. □ There is a simpler statement that applies to graphs with a permutable matching that is sufficiently omnipresent, i.e., meeting the condition of Theorem 3.4. Given m, define Vodd(m) = the number of odd lengths l < 2m in SpecC(r), +1 if there is an odd cycle length l > 2m, and define veven(m) = the number of even lengths l < 2m in SpecC(r), +1 if there is an even cycle length l > 2m. 632 Ars Math. Contemp. 16(2019)609-623 Theorem 3.4. Suppose Mm is a permutable m-matching in r and for every length l G SpecC(r) there exists a cycle C; such that |C; n Mm| = min(m, |l/2j). Then dimNCV(r) > Vodd(m) + Veven(m). The hypothesis can be lessened since, if there is any cycle length l > 2m, it suffices to have one length l > 2m for which there is a C; with |C; n Mm | = m. Proof. The hypotheses imply that '|_l/2j if l < 2m, if l > 2m. We count the number of distinct values for odd and even cycle lengths. For odd l we get (l - 1)/2 if l G SpecC(r) and l < 2m, and we get m if and only if there exists a cycle length l > 2m. The total is vodd(m). The computation of veven(m) is similar. The values of ^(l) in Theorem 3.3 are the same as those of unless there is a cycle length for which no l-cycle intersects Mm; but that is ruled out by our hypotheses. Theorem 3.4 follows. □ A connected graph is bipancyclic if it is bipartite with vertex classes of size p and q and has a cycle of every even length from 4 to 2 min(p, q). (This extends the usual definition, which assumes p = q.) This is the bipartite analog of pancyclicity, in which the graph has a cycle of every length from 3 to n, the order of the graph. Corollary 3.5. Assume r is pancyclic and has a permutable m-matching Mm, and for every l with 3 < l < n there is an l-cycle C; with |C; n Mm| = min(m, |_l/2j). Then dim NCV(r) = n - 2 if 2m > n - 1, n - 2 > dim NCV(r) > 2m - 1 if 2m < n - 2. Assume r is bipancyclic and has vertex class sizes p, q with p < q, and it has a permutable m-matching Mm such that for every k with 2 < k < p there is a 2k-cycle C2k with |C2k n Mm| = min(m, k). Then dim NCV(r) = p - 1 if m = p, p - 1 > dimNCV(r) > m - 1 if m < p - 1. The hypotheses can be lessened in the same way as those of Theorem 3.4. Proof. If r is pancyclic, vodd counts all the numbers 3, 5,..., 2m - 1 plus 1 for 2m +1 if n > 2m, and veven counts the numbers 4, 6,..., 2m - 2 plus 1 for 2m since n > 2m. Thus {(m) + (m - 1) = 2m - 1 if n > 2m, (m - 1) + (m - 1) = 2m - 2 if n = 2m. The conclusion follows easily. If r is bipancyclic, then veven = m - 1 and the conclusion follows easily. □ A. Schaefer and T. Zaslavsky: The dimension of the negative cycle vectors of signed graphs 633 The two most complete graphs are easy consequences of any of the preceding results, but especially of Corollary 3.5. Corollary 3.6. For a complete graph Kn with n > 3, dimNCV(Kn) = n - 2. For a complete bipartite graph Kp,q with p, q > 2, dimNCV(Kp,q) = min(p, q) - 1. 4 Examples 4.1 The complete graph Our original example was Kn. The biggest permutable edge set is a perfect or near-perfect matching. This turns out to be "perfect" for our purposes. But first, let us see the negative cycle vectors of all signings of small complete graphs. The vectors for K3 are (0), (1) (from the balanced and unbalanced triangle). The vectors for K4 are (0,0), (2, 2), (4,0) (the all-positive graph, one negative edge, and two nonadjacent negative edges). Here are the vectors for K5: (0, 0, 0), (3, 6, 6), (4, 8, 8), (5,10, 6), (6, 8, 4), (7, 6, 6), (10, 0,12); and for K6: (0, 0, 0, 0), (10,18, 36, 36), (10, 26, 36, 28), (12, 20,40, 24), (4,12, 24, 24), (8, 24,40, 32), (8, 24,48, 32), (10, 30, 36, 20), (6,18, 36, 36), (10, 22, 36, 28), (14, 18, 36, 36), (16,12, 48, 24), (8, 20, 32, 24), (12, 24, 24, 32), (12, 24, 32, 32), (20,0, 72, 0). The number of switching isomorphism classes of complete graphs grows super-expo-nentially [4]. Since two signed graphs which yield different vectors must belong to different classes, one naturally wonders about the converse property, that the vector uniquely identifies a switching class. This is true up through K7 but false for K8: see Figure ?? below (found by Gary Greaves, whose assistance we greatly appreciate). Thus when n = 8 there are fewer vectors than classes; for n > 8 see Question 5.5. Now we compute the function Gi of Section 3.3. Consider the signed Kn's whose negative edges are s nonadjacent edges, for 0 < s < |_n/2j. It is straightforward to compute gi. For a fixed k > 1 and set Y with |Y| = k, we need to form an l-cycle using Y and l - k other edges. (Since Y is a matching, we know that l > 2k.) So we choose l - 2k of the remaining n - 2k vertices, and then create our cycle as follows: imagine contracting the edges in Y; the resultant vertices, together with the other l - 2k vertices, will form an l - k-cycle in the contracted graph (which will eventually give an l-cycle in Kn). Cyclically order these l - k "vertices"; this orders the vertices in our actual cycle while ensuring the 634 Ars Math. Contemp. 16(2019)609-623 Figure 2: Two switching inequivalent signings of K8 with the same negative cycle vector (28,108, 336, 848,1440,1248). edges from Y remain. There are (l k2 1)! ways to do this. Then, we expand the contracted edges to regain them; there are 2 ways to do this for each edge. So we have «!-2k-' whence G<(k>=(n:»)(' -k - i)!2k-1 By Equation (3.4), c- (s) is a polynomial in s of degree d = |_l/2j and the general formula is c W= ^ (0 (:4)k-^ n : ^ C : k : ^ For example, c-(s) = s(n — 2) and c-(s) = s(n2 + 5n + 8) — 2s2. This formula for c-(s) demonstrates that the degrees d of the odd polynomials are all distinct, and the same for the even polynomials; consequently our main Theorem 3.3 itself implies that the matrix of negative cycle vectors c- (s) has full rank n — 2. Alternatively, in Kn with a maximum matching, Aodd = {3, 5,...} (odd numbers up to n) and Aeven = {4,6,...} (even numbers up to n). So, by Lemma 3.2, for Kn the ranks of U and R are [n/2] — 1 and |_n/2j — 1, respectively, which sum to n — 2. 4.2 Complete bipartite graphs We now examine Kp,q, which always has p < q. We use a maximum matching Mp, i.e., we set m = p. To get c- (Kp,q) we compute g21, where the subscript is now 2l because all cycles have even length. Call the two independent vertex sets A = {a 1,..., ap} and B = {b1,..., bq}. For a fixed k-edge set Y = {a4l bj1,..., aikbjk} C Mp, where k < l, we need to form a 2l-cycle using Y and 2l — 2k other vertices. Fix one edge y1 G Y, say y1 = ail bj1. Choose l — k of the remaining p — k vertices from A, in order, in one of (p — k)_k ways; l — k of the remaining q — k vertices from B, also in order, in one of (q — k)_k ways; and shuffle the sequences together as (aifc+1, bjfc+1,..., ail, bjz). Insert Y into this 2(l — k)-sequence A. Schaefer and T. Zaslavsky: The dimension of the negative cycle vectors of signed graphs 635 by inserting yi before aifc+1, which we may do because each Y edge must be between an A vertex and a B vertex; treating the resulting sequence as cyclically ordered, which can be done in only one way since the A neighbor of yi appears after y1; then ordering Y \ jyi} in one of (k - 1)! ways as (y2,..., yk); and finally inserting y2,..., yk anywhere into the cycle in one of '[2(Z - k) + 1] + [k - 1] - - k - T [2(Z - k) + 1] - 1 ) \ k - 1 ways. Note that when those edges are inserted into the cycle, there is only one way to orient each edge. The net result is that /2Z — k — 1 Gi(k) = 921 (Y) = (p - k),_fc(q - k),_fc • (k - 1)! i jfc- -Then by Equation (3.4), for 2 < Z < p, c-(s) = m(s)k(—2k— (p-k)i-k(q-k)i-k(2Z-^. This explicit formula for the negative cycle vectors c-(s), with Theorem 3.3, implies that dim NCV(Kp,q) = p = min(p, q). 4.3 The Petersen graph Next we consider the Petersen graph P, which has four cycle lengths, 5, 6, 8, and 9, so dim NCV(P) < 4. It lacks a permutable 4-matching. In fact: Theorem 4.1. A 3-regular graph that is arc transitive cannot have a permutable 4-matching. Proof. By [6, Theorem 1.1] an arc-transitive graph with a permutable m-matching, where m > 4, must have degree at least m. □ The Petersen graph does have a permutable 3-matching, in fact, two kinds. The first kind consists of alternate edges of a C6. In the language of Theorem 3.3, we must compute ^(Z) = | max{C n M3}| for each cycle length. We find with little difficulty that ^(5) = 2, ^(6) = 3, ^(8) = 2, and ^(9) = 3. Therefore |Aodd| = 2 and |Aeven| = 2, whence, despite only having a 3-matching, we can deduce that dim NCV(P) = 4. We even know the negative cycle vectors corresponding to negative 0-, 1-, 2-, and 3-submatchings and the negated signatures; they are (in order of matching size) (0,0,0, 0), (4,4, 8,12), (6, 6, 8,10), (6,10,0,10) (12,0,0, 20), (8,4, 8, 8), (6, 8, 8,10), (6,10,0,10). The bottom vector in each column corresponds to the negated signing. The second kind of permutable 3-matching consists of three edges at distance 3. The first matching type also is three equally spaced edges in a C9, but not every such subset of a C9 is also a set of alternating edges of a C6; the other such subsets are 3-matchings of the second kind. This second kind generates negative cycle vectors from negated submatchings and the corresponding negated sign functions whose dimension is only 3, not 4, since with this matching the negated signatures are switching isomorphic to unnegated signatures. This shows that not all permutable m-matchings in a graph are equally useful. 636 Ars Math. Contemp. 16 (2019) 445-463 4.4 The Heawood graph The Heawood graph H is bipartite and has five cycle lengths, 6, 8, 10, 12, and 14, so dimNCV(H) < 5. It has a permutable 3-matching, indeed three different kinds, for instance alternate edges of a 6-cycle. Using that 3-matching we find that ^(6) = 3, ^(8) = 2, ^(10) = 3, ^(12) = 3, and ^(14) = 3. These are two different values, thus dimNCV(H) > 2. The results for the other two kinds of permutable 3-matching are the same except that ^(6) = 2. In every case ^ has two values. Our matching method, in principle, cannot prove more because H has no permutable 4-matching (see Theorem 4.1). Nonetheless we suspect the dimension equals | SpecC(H) |. 4.5 Other graphs with permutable perfect matchings, and the cube Schaefer and Swartz found all graphs that have a permutable perfect matching. Besides Kn and Kp,p they are the hexagon C6, the octahedron graph O3, and three general examples: the join Kp V Kp of a complete graph with its complement, the matching join Kp Y Kp obtained from two copies of Kp by inserting a perfect matching between the two copies, and the matching join Kp Y Kp, obtained by hanging a pendant edge from each vertex of Kp. Our treatment of them leads us to one other family, the cyclic prisms Cp □ K2. 4.5.1 The simple four Trivially, dimNCV(C6) = 1 = | SpecC(C6)|. It is easy to verify by hand that O3 satisfies the conditions of Corollary 3.5, so dimNCV(O3) = | SpecC(O3)| = 4. As for Kp Y Kp, since the pendant edges contribute nothing to cycles, SpecC(Kp Y Kp) = SpecC(Kp) and NCV(Kp Y Kp) = NCV(Kp); thence dimNCV(Kp Y Kp) = | SpecC(Kp Y Kp)| = p. It is also easy to show that Kp V Kp satisfies the conditions of Corollary 3.5. Thus, dimNCV(Kp V Kp) = | SpecC(Kp V )| = 2p. 4.5.2 The matching join of two complete graphs This graph, Y Kp, is pancyclic, but its permutable matchings are peculiar. One kind is any matching in a Kp. A maximum matching M^j in has ^(l) = min(p, |j/2j), hence dimNCV(Kp Y Kp) > p by reasoning similar to that for Kp. The matching M^7 that joins the copies of prevents a permutable matching from having edges in both copies. The only other permutable matchings are subsets of M^7. This matching only generates |p/2j switching nonisomorphic signatures since negating a subset of Mp7 switches to negating the complementary subset. By itself, therefore, choosing our grand matching Mm to be M^ does not give a better lower bound than p. Nonetheless we feel the dimension is likely to be n — 2 = 2p — 2. A. Schaefer and T. Zaslavsky: The dimension of the negative cycle vectors of signed graphs 637 The smallest case, K3 Y K3, is the triangular prism. There are four cycle lengths; the cycle count vector is (c3, c4, c5, c6) = (2,3,6,3). The required dimension can be found directly. There are four unbalanced signatures; see Figure 3. The negative cycle vectors are linearly independent so dim NCV(K3 Y K3) = | SpecC(v) |, in agreement with Conjecture 1.1. (a) (0, 2,4, 2) (b) (1,1, 3, 2) (c) (2, 0, 6, 0) (d) (2, 2, 2, 2) Figure 3: The four unbalanced switching classes of the prism K3 Y K3 and their negative cycle vectors. As for permutable matchings in the triangular prism, M^ gives ^(3) = 0, ^(4) = ^(5) = ^(6) = 2, thus dim NCV(K3 Y K3) > 3, less than the true value. A strange permutable matching gives the right dimension. Choose M2 to consist of one edge from each triangle, not both in a C4. Then ^(3) = ^(4) = 1 and ^(5) = ^(6) = 2, so by Theorem 3.3, dimNCV(K3 Y K3) = 4, the exact value. This example and the Petersen graph demonstrate that useful permutable matchings need not be perfect matchings. 4.5.3 Prisms, with cube The triangular prism lends support to our belief that dimNCV(Kp Y Kp) = 2p - 2. However, it is atypical since it is also a prism, the Cartesian product Cp □ K2 with p = 3. Prisms with p > 3 do not have permutable perfect matchings but they make good examples, especially the next case, the cube Q3 = C4 □ K2. It is bipartite and has only three cycle lengths: 4, 6, and 8. Three unbalanced signatures whose negative cycle vectors are linearly independent are <7i, with one negative edge, e. It has cr (o^) = (2,8,4); 02, with a second negative edge, parallel to e and sharing a quadrilateral with it. It has cr(o2) = (2,12,4); 03, with a second negative edge, also parallel to e but not in a common quadrilateral. It has cr (03) = (2,4,2). Thus, dimNCV(Q3) = | SpecC(Q3)|, again agreeing with Conjecture 1.1. 5 Questions Here are what we consider the principal open questions concerning negative cycle numbers and vectors. The purpose is to find connections between the structure of r and the signed cycle structure of signatures of r. We list them in order of increasing refinement. Complete 638 Ars Math. Contemp. 16(2019)609-623 graphs seems to be the simplest example with interesting properties so we recommend them as the first object of study, except of course in Question 5.1. 5.1 Dimension Resolve Conjecture 1.1. If it is false, can dim NCV(r) be determined in terms of structural properties of r? 5.2 Cone The zero vector is the most obvious negative cycle vector of every graph. That suggests looking at the convex cone generated by NCV(r). In particular, we wonder whether the facets or edges of that cone have combinatorial meaning. 5.3 Polytope The convex hull conv NCV(r) is a natural object of interest, and in particular its facets, which represent the complete set of inequalities satisfied by all negative cycle vectors. Almost nothing is known about these inequalities even for Kn. We looked at complete graphs of orders up to 6 but they were too small to suggest a conjecture. If E is a signed Kn with frustration index m = l(E) < n/2, the negative cycle numbers for lengths l < n/2 (approximately) must satisfy bounds found by Popescu and Tomescu [5, Corollary 1]; the lower bounds occur when E- is an m-edge star and the upper bounds when E- is an m-edge matching. Since the bounds depend on the frustration index, they do not appear to constrain conv NCV(r), but perhaps something relevant can be made of them. 5.4 Characterization The negative cycle numbers of a signed Kn, E, must satisfy divisibility conditions found by Popescu and Tomescu [5, Section 4]. Aside from that and the work of Kittpassorn and Meszaros [3] on c- (E)—that is, sizes of n-vertex two-graphs—it is not known which integral vectors in conv NCV(Kn) can be negative cycle vectors. Surely, a characterization will be difficult if not impossible. We know of no partial results for other graphs. 5.5 Collapsing pairs Concerning Gary Greaves' counterexample mentioned in Section 4.1, we propose: Conjecture 5.1. For every n > 8 there are pairs of switching nonisomorphic signed Kn 's that have the same negative cycle vector In a related question, we ask whether the number In of switching isomorphism types of signed complete graphs [4] is asymptotic to the number |NCV (Kn)| of negative cycle vectors of those graphs; that is, whether |NCV (Kn)|/In ^ 1. If not, does it approach 0? 5.6 Conclusion Evidently, there is much to discover before we can say the negative cycles in signed graphs are well understood. A. Schaefer and T. Zaslavsky: The dimension of the negative cycle vectors of signed graphs 639 References [1] D. Cartwright and F. Harary, Structural balance: a generalization of Heider's theory, Psychol. Rev. 63 (1956), 277-293, doi:10.1037/h0046049. [2] F. Harary, On the notion of balance of a signed graph, Michigan Math. J. 2 (1953-54), 143-146, doi:10.1307/mmj/1028989917. [3] T. Kittipassorn and G. Meszaros, Frustrated triangles, Discrete Math. 338 (2015), 2363-2373, doi:10.1016/j.disc.2015.06.006. [4] C. L. Mallows and N. J. A. Sloane, Two-graphs, switching classes and Euler graphs are equal in number, SIAM J. Appl. Math 28 (1975), 876-880, doi:10.1137/0128070. [5] D. R. Popescu and I. Tomescu, Negative cycles in complete signed graphs, Discrete Appl. Math. 68 (1996), 145-152, doi:10.1016/0166-218x(95)00010-o. [6] A. Schaefer and E. Swartz, Graphs that contain multiply transitive matchings, submitted, arXiv:1706.08964 [math.CO]. [7] J. J. Seidel, A survey of two-graphs, in: Colloquio Internazionale sulle Teorie Combinatorie, Tomo I, Accademia Nazionale dei Lincei, Rome, pp. 481-511, 1976, proceedings of the Con-vegni Lincei, No. 17, held in Rome, September 3 - 15, 1973. [8] I. Tomescu, Sur le nombre des cycles negatifs d'un graphe complet signe, Math. Sci. Humaines 53 (1976), 63-67, http://www.numdam.org/item/MSH_197 6_5 3_6 3_0. /^creative ^commor ARS MATHEMATICA CONTEMPORANEA ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 16 (2019) 641 https://doi.org/10.26493/1855-3974.1842.e16 (Also available at http://amc-journal.eu) Corrigendum to: On zero sum-partition of Abelian groups into three sets and group distance magic labeling Sylwia Cichacz Faculty of Applied Mathematics, AGH University of Science and Technology, Al. Mickiewicza 30, 30-059 Kraków, Poland Received 31 October 2018, accepted 25 January 2019, published online 7 June 2019 In the paper [1] by me, Theorem 4.4 is stated incorrectly and contradicts Theorem 4.5. Therefore, Theorem 4.4 should have been stated as follows: Theorem 4.4. Let G = Kni,n2,n3 be a complete tripartite graph such that 1 < ni < n2 < n3 and n = ni + n2 + n3. The graph G is a group distance magic graph if and only if (n2 > 1 and ni + n2 + n3 = 2p for some positive integer p) or (ni = 2 and n2 > 2). In the previous version in the proof for ni + n2 + n3 = 2p the case ni = 2 and n2 > 2 is not considered. The statement follows directly from Theorem 4.5. Let ni + n2 + • • • + nt = n and G = Kni,„2,...,„t. In the introduction is stated that G is r-distance magic if and only if r has the CSP(t)-property. It is not true. It should be stated that G is r-distance magic if and only if for the partition n = ni + n2 + • • • + nt of n there is a partition of r into pairwise disjoint subsets Ai, A2,..., At, such that |Aj| = n4 and for some v G r, J2aeA a = v for 1 < i < t. References [1] S. Cichacz, On zero sum-partition of Abelian groups into three sets and group distance magic labeling, Ars Math. Contemp. 13 (2017), 417-425, doi:10.26493/1855-3974.1054.fcd. E-mail address: cichacz@agh.edu.pl (Sylwia Cichacz) ©® This work is licensed under https://creativecommons.Org/licenses/by/4.0/ ARS MATHEMATICA CONTEMPORANEA Author Guidelines Before submission Papers should be written in English, prepared in ETEX, and must be submitted as a PDF file. The title page of the submissions must contain: • Title. The title must be concise and informative. • Author names and affiliations. For each author add his/her affiliation which should include the full postal address and the country name. If avilable, specify the e-mail address of each author. Clearly indicate who is the corresponding author of the paper. • Abstract. A concise abstract is required. The abstract should state the problem studied and the principal results proven. • Keywords. Please specify 2 to 6 keywords separated by commas. • Mathematics Subject Classification. Include one or more Math. Subj. Class. codes -see http://www.ams.org/msc. After acceptance Articles which are accepted for publication must be prepared in ETEX using class file amcjoucc.cls and the bst file amcjoucc.bst (if you use BibTEX). If you don't use BibTEX, please make sure that all your references are carefully formatted following the examples provided in the sample file. All files can be found on-line at: https://amc-journal.eu/index.php/amc/about/submissions/#authorGuidelines Abstracts: Be concise. As much as possible, please use plain text in your abstract and avoid complicated formulas. Do not include citations in your abstract. All abstracts will be posted on the website in fairly basic HTME, and HTME can't handle complicated formulas. It can barely handle subscripts and greek letters. Cross-referencing: All numbering of theorems, sections, figures etc. that are referenced later in the paper should be generated using standard ETEX \label{... } and \ref{... } commands. See the sample file for examples. Theorems and proofs: The class file has pre-defined environments for theorem-like statements; please use them rather than coding your own. Please use the standard \begin{proof} ... \end{proof} environment for your proofs. Spacing and page formatting: Please do not modify the page formatting and do not use \medbreak, \bigbreak, \pagebreak etc. commands to force spacing. In general, please let ETeX do all of the space formatting via the class file. The layout editors will modify the formatting and spacing as needed for publication. Figures: Any illustrations included in the paper must be provided in PDF format, or via ETeX packages which produce embedded graphics, such as TikZ, that compile with PdfETEX. (Note, however, that PSTricks is problematic.) Make sure that you use uniform lettering and sizing of the text. If you use other methods to generate your graphics, please provide .pdf versions of the images (or negotiate with the layout editor assigned to your article). xxv ARS MATHEMATICA CONTEMPORANEA Subscription Yearly subscription: 150 EUR Any author or editor that subscribes to the printed edition will receive a complimentary copy of Ars Mathematica Contemporánea. Subscription Order Form Name: .............................. E-mail: .............................. Postal Address: ...................... I would like to subscribe to receive ...... copies of each issue of Ars Mathematica Contemporanea in the year 2019. I want to renew the order for each subsequent year if not cancelled by e-mail: □ Yes □ No Signature: Please send the order by mail, by fax or by e-mail. By mail: Ars Mathematica Contemporanea UP FAMNIT Glagoljaska 8 SI-6000 Koper Slovenia By fax: +386 5 611 75 71 By e-mail: info@famnit.upr.si xxvi Printed in Slovenia by IMEJTISKARNE