Pattern Avoidance, Statistical Mechanics and Computational Complexity
Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 23121 “Pattern Avoidance, Statistical Mechanics and Computational Complexity”.
Keywords and phrases:
algorithms, counting and sampling, modeling, permutation patterns, statistical physics.Seminar:
March 19–24, 2023 – https://www.dagstuhl.de/231212012 ACM Subject Classification:
Information systems Data structures ; Theory of computation Formal languages and automata theory ; Mathematics of computing Combinatoric problems ; Theory of computation Algebraic complexity theory ; Computing methodologies Modeling and simulationCopyright and License:
1 Executive Summary
Miklós Bóna (University of Florida – Gainesville, US)
David Bevan (University of Strathclyde – Glasgow, GB)
István Miklós (ELKH – Budapest, HU)
License:
Creative Commons BY 4.0 International license © Miklós Bóna, David Bevan, and István Miklós
The Dagstuhl Seminar took place from March 19, 2023 to March 24, 2023. It had 36 participants, who were researchers in theoretical computer science, combinatorics, and statistical mechanics. The aftermath of COVID made the planning of the seminar more challenging than usual; for instance, researchers from China, Australia and New Zealand were still extremely reluctant to travel. However, in the end we succeeded in bringing together a geographically diverse group of researchers. The participants came from 12 countries, from Canada, the Czech Republic, Denmark, Finland, France, Germany, Hungary, Iceland, Italy, Turkey, the United Kingdom, and the United States. The seminar featured 21 talks, four of which were hour-long talks, and two open problem sessions.
Several collaborative projects have been started. For example, David Bevan started a collaboration with Mathilde Bouvel on the scaling limit of permutation classes avoiding a pattern with extremal first or last point. Jessica Striker, Mathilde Bouvel and Rebecca Smith started working on the open questions in Striker’s talk on six-vertex configurations. Colin Defant, Rebecca Smith, Miklós Bóna and Justin Troyka discussed new observations on pattern avoiding permutations whose squares are also pattern avoiding. Jessica Striker and Sergi Elizalde started working together on promotion in cylindric tableaux. Natasha Blitvić and Sergi Elizalde explored why counting permutations avoiding a pattern seems to yield moment sequences, and how to interpret that phenomenon.
The open problem sessions were especially successful. In earlier seminars, we held one open problem session. However, this time there was so much interest in presenting open problems that we decided to hold two open problem sessions. Six families of open questions were presented at each of them.
Numerous participants expressed their pleasure with the seminar and its sequence of talks. The prevailing view was that while the participants came from three different fields, they were all open to the other two fields, and therefore, they all learned about results that they would not have learned otherwise. Therefore, we have all the reasons to believe that the seminar was a success, and we would like to repeat something similar sometime in the future. We have even discussed specific plans for a possible future seminar.
2 Table of Contents
3 Overview of Talks
3.1 Saturation for permutation matrices
Benjamin Aram Berendsohn (FU Berlin, DE)
License:
Creative Commons BY 4.0 International license © Benjamin Aram Berendsohn
Main reference: Benjamin Aram Berendsohn: “An exact characterization of saturation for permutation matrices”. Combinatorial Theory, 3(1), 2023.
A 0-1 matrix contains a 0-1 matrix pattern if we can obtain from by deleting rows and/or columns and turning arbitrary 1-entries into 0s. The saturation function for a 0-1 matrix pattern indicates the minimum number of 1s in an 0-1 matrix that does not contain , but where changing any 0-entry into a 1-entry creates an occurrence of .
Saturation for 0-1 matrices was introduced by Brualdi and Cao [arXiv 2020]. Fulek and Keszegh [SIAM J. Discret. Math. 2021] started a systematic study, and showed that each pattern has a saturation function that is either bounded or linear. They found large classes of patterns with linear saturation function, but only a single pattern with bounded saturation function.
Subsequently, Geneson [Electron. J. Comb. 2021] showed that almost all permutation matrices have bounded saturation functions. In this talk, we outline how to complete the classification of permutation matrices using a construction based on oscillations in indecomposable permutation matrices.
3.2 Mesh patterns in random permutations
David Bevan (University of Strathclyde – Glasgow, GB)
License:
Creative Commons BY 4.0 International license © David Bevan
Joint work of: David Bevan, Jason Smith
We say that the likelihood of a mesh pattern is the asymptotic probability that a random permutation contains an occurrence of the pattern. In this talk we investigate the likelihood of a variety of patterns, determining their values for every vincular pattern. For bivincular patterns, the Small Anchors Theorem distinguishes between those patterns whose likelihood equals zero, those whose likelihood is positive but less than 1, and those whose likelihood equals 1. We also determine the (rational) likelihood of any bivincular pattern formed of what we call anchored trees. Other bivincular patterns, such as the small ascent and small descent, have irrational likelihoods, whose values can be established using the Chen–Stein method.
3.3 Combinatorial moment sequences and permutation patterns
Natasha Blitvic (Queen Mary University of London, GB)
License:
Creative Commons BY 4.0 International license © Natasha Blitvic
Joint work of: Natasha Blitvic, Mohammed Slim Kammoun, Einar Steingrimsson
Take your favorite integer sequence. Is it a sequence of moments of some positive Borel measure on the real line? The necessary and sufficient condition for a real sequence to be a moment sequence was determined by Hamburger over a hundred years ago: namely, the Hankel matrices must all be positive semidefinite. In practice, when dealing with combinatorial sequences, positivity can be difficult to evaluate. In fact, starting with a given sequence, it can be surprisingly tricky to predict (or intuit) whether it will turn out to be a moment sequence. For example, take to count the permutations on letters avoiding the consecutive permutation pattern 123 and the permutations avoiding the consecutive pattern 132. Only one of these is a moment sequence – can you predict which one?
In [1], we present a combinatorial framework, in the form of a fourteen-parameter continued fraction, that turns a hard question (that of establishing positivity) into a much easier one (that of decomposing combinatorial statistics into certain elementary building blocks). It builds on the rich tradition of work on combinatorial interpretations of continued fractions (see references in [1]). Applied to permutation patterns, the framework allows us to classify all (vincular) permutation patterns of length three according to whether they give rise to moment sequences.
While several teams of researchers in this area believe that avoiders of classical permutation patterns uniformly give moment sequences (see the Open Problem presented by this author at the same conference), consecutive permutation patterns, as per the example given above, are significantly worse behaved. Nevertheless, in [2], we identify the “correct lens” through which consecutive permutation patterns appear to enjoy analogous positivity properties. This positivity result is still conjectural but, thanks to enumerative results in [2], is strongly supported by numerical evidence.
References
- [1] N. Blitvić and E. Steingrímsson, Permutations, Moments, Measures, Transactions of the American Mathematical Society, Vol. 374, Number 8, August 2021, pp. 5473–5509.
- [2] N. Blitvić, S. M. Kammoun, E. Steingrímsson,A new perspective on positivity in (consecutive) permutation patterns, Proceedings of the FPSAC 2023, July 17-21, Davis CA.
3.4 Non-uniform permutations biased according to their records
Mathilde Bouvel (LORIA – Nancy, FR)
License:
Creative Commons BY 4.0 International license © Mathilde Bouvel
Joint work of: Nicolas Auger, Mathilde Bouvel, Cyril Nicaud, Carine Pivoteau
In this talk, we study a non-uniform distribution on permutations (of any given size), where the probability of a permutation is proportional to where denotes the number of records (a.k.a. left-to-right maxima). The motivation for defining this model of non-uniform random permutations is the analysis of algorithms. Indeed, when analyzing algorithms working on arrays of numbers (modeled by permutations), the uniform distribution on the set of possible inputs is usually assumed. However, the actual data on which these algorithms are used is rarely uniform, and often displays a bias towards “sortedness”. Our model has this bias towards “sortedness” while remaining tractable from the point of view of the analysis of algorithms. Our results on this model are of three types. First, we exhibit several efficient random samplers of permutations under this distribution. Second, we analyze the behavior of some classical permutation statistics, some of which with applications to the analysis of algorithms. Finally, we describe the “typical shape” of permutations in our model, by means of their (deterministic) permuton limit.
3.5 On the problem of Hertzsprung and similar problems
Anders Claesson (University of Iceland – Reykjavik, IS)
License:
Creative Commons BY 4.0 International license © Anders Claesson
Main reference: Anders Claesson: “From Hertzsprung’s problem to pattern-rewriting systems”, Algebraic Combinatorics, 5(6):1257–1277, 2022.
Drawing on a problem posed by Hertzsprung in 1887 (sometimes called the -kings problem), we say that a permutation contains the Hertzsprung pattern if there is factor of that differ only by a constant from in the sense that there is a factor such that . Using a combination of the Goulden-Jackson cluster method and the transfer-matrix method we determine the joint distribution of occurrences of any set of Hertzsprung patterns, thus substantially generalizing earlier results by Jackson et al. on the distribution of ascending and descending runs in permutations. We apply our results to the problem of counting permutations up to pattern-replacement equivalences, and using pattern-rewriting systems – a new formalism similar to the much studied string-rewriting systems – we solve a couple of open problems raised by Linton et al. in 2012.
3.6 Permutations and Exclusion Processes
Sylvie Corteel (Université Paris Cité, FR)
License:
Creative Commons BY 4.0 International license © Sylvie Corteel
We will review results on the combinatorics of the exclusion process which is a classical model in statistical physics. We will explain why permutations and the pattern 31-2 appear when we study the exclusion process with open boundaries. We will then propose a series of open problems on the combinatorics of more general processes.
3.7 On complex roots of the independence polynomial
Péter Csikvári (Alfréd Rényi Institute of Mathematics – Budapest, HU)
License:
Creative Commons BY 4.0 International license © Péter Csikvári
Joint work of: Ferenc Bencs, Péter Csikvári, Piyush Srivastava, Jan Vondrák
The independence polynomial of a graph is the generating polynomial of all its independent sets. Formally, given a graph , its independence polynomial is given by , where the sum is over all independent sets of . The independence polynomial has been an important object of study in both combinatorics, statistical physics and computer science. In particular, the algorithmic problem of estimating for a fixed positive on an input graph is a natural generalization of the problem of counting independent sets, and its study has led to some of the most striking connections between computational complexity and the theory of phase transitions. More surprisingly, the independence polynomial for negative and complex values of also turns out to be related to problems in statistical physics and combinatorics. In particular, the locations of the complex roots of the independence polynomial of bounded degree graphs turn out to be very closely related to the Lovász local lemma, and also to the questions in the computational complexity of counting. In this talk we give new geometric criteria for establishing zero-free regions as well as for carrying out semi-rigorous numerical explorations. We then provide several examples of the (rigorous) use of these criteria, by establishing new zero-free regions. Joint work with Ferenc Bencs, Piyush Srivastava and Jan Vondrák.
3.8 The complexity of computing immanants
Radu Curticapean (IT University of Copenhagen, DK)
License:
Creative Commons BY 4.0 International license © Radu Curticapean
Main reference: Radu Curticapean: “A full complexity dichotomy for immanant families”, CoRR, Vol. abs/2102.04340, 2021.
Immanants are matrix functions that generalize determinants and permanents. Given an irreducible character of for some partition of n, the immanant associated with is a sum-product over permutations in , much like the determinant, but with playing the role of .
Hartmann showed in 1985 that immanants can be evaluated in polynomial time for sign-ish characters. More precisely, for a partition of n with s parts, let count the boxes to the right of the first column in the Young diagram of . The immanant associated with can be evaluated in time.
Since this initial result, complementing hardness results have been obtained for several families of immanants derived from partitions with unbounded . This includes permanents, immanants associated with hook characters, and other classes. In this talk, we complete the picture of hard immanant families: Under a standard assumption from parameterized complexity, we rule out polynomial-time algorithms for well-behaved immanant families with unbounded . For immanant families in which even grows polynomially, we establish hardness for #P and VNP.
3.9 Three Topics in Pattern Avoidance
Colin Defant (MIT – Cambridge, US)
License:
Creative Commons BY 4.0 International license © Colin Defant
Joint work of: Colin Defant, Amanda Burcroff, Noah Kravitz, Ashwin Sah
This talk will survey three topics related to pattern avoidance, each motivated by an interesting question:
-
1.
Given a class of objects and a set of patterns from , what is the smallest size of an object in that contains all of the patterns in ? We will focus on recent developments in which is either a class of words/permutations or a class of trees. The discussion of words/permutations is mostly taken from the survey article [9] as well as the more recent articles [6, 11]. The discussion of trees is taken from my article [8], which was written with Noah Kravitz and Ashwin Sah.
-
2.
How does permutation pattern avoidance interact with the group structure of the symmetric group? The first part of this topic will concern pattern-avoiding permutations with particular cycle types; the second part will concern permutations whose powers are required to avoid a pattern. This portion of the talk will draw from the articles [1, 3, 10, 2, 4, 5].
-
3.
If your socks come out of the laundry all mixed up, how should you sort them? We will discuss a novel foot-sorting algorithm that uses feet to attempt to sort a sock ordering; one can view this algorithm as an analogue of Knuth’s stack-sorting algorithm for set partitions. This part of the talk is based on my article [7], which was written with Noah Kravitz.
References
- [1] K. Archer and S. Elizalde, Cyclic permutations realized by signed shifts. J. Comb., 5 (2014), 1–30.
- [2] K. Archer and C. Graves, Pattern-restricted permutations composed of 3-cycles. Discrete Math., 345 (2022).
- [3] M. Bóna and M. Cory, Cyclic permutations avoiding pairs of patterns of length three. Discrete Math. Theor. Comput. Sci., 21 (2019).
- [4] M. Bóna and R. Smith, Pattern avoidance in permutations and their squares. Discrete Math., 342 (2019), 3194– 3200.
- [5] A. Burcroff and C. Defant, Pattern-avoiding permutation powers. Discrete Math., 343 (2020).
- [6] Z. Chroman, M. Kwan, and M Singhal, Lower bounds for superpatterns and universal sequences. J. Combin. Theory Ser. A, 182 (2021).
- [7] C. Defant and N. Kravitz, Foot-sorting for socks. arXiv:2211.02021.
- [8] C. Defant, N. Kravitz, and A. Sah, Supertrees. Electron. J. Combin., 27 (2020).
- [9] M. Engen and V. Vatter, Containing all permutations. Amer. Math. Monthly, 128 (2021), 4–24.
- [10] B. Huang, An upper bound on the number of -avoiding cyclic permutations. Discrete Math., 342 (2019), 1762–1771.
- [11] Z. Hunter, An asymptotically tight lower bound for superpatterns with small alphabets. To appear in Comb. Theory.
3.10 Walks in simplices, cylindric tableaux, and asymmetric exclusion processes
Sergi Elizalde (Dartmouth College – Hanover, US)
License:
Creative Commons BY 4.0 International license © Sergi Elizalde
We describe bijections between three classes of combinatorial objects that have appeared in different contexts: lattice walks in simplicial regions as introduced by Mortimer–Prellberg (in a previous Dagstuhl Seminar), standard cylindric tableaux as introduced by Gessel–Krattenthaler and Postnikov, and sequences of states in the totally asymmetric simple exclusion process. Our perspective gives new insights into these objects, providing a vehicle to translate enumerative results and certain symmetries from one setting to another. As an example, we use a cylindric analogue of the Robinson–Schensted correspondence to give an alternative bijective proof of a recent result of Courtiel, Elvey Price and Marcovici relating forward and backward walks in simplices.
3.11 Fighting fish and pattern avoiding permutations
Luca Ferrari (University of Firenze, IT)
License:
Creative Commons BY 4.0 International license © Luca Ferrari
Joint work of: Lapo Cioni, Luca Ferrari, Corentin Henriet
Fighting fish are combinatorial objects recently introduced by Duchi, Guerrini, Rinaldi and Schaeffer. They are polyomino-like objects which can branch out of the plane into independent substructures. The main motivation for considering such structures lies in their remarkable probabilistic properties. In particular, it is known that the average area of fighting fish having semiperimeter is of order , which is a rather non-standard behaviour. The previously mentioned authors have discovered a lot of interesting combinatorics related to fighting fish. In particular, they have shown that the number of fighting fish of semiperimeter is given by , which is the same as the number of (West)-two-stack sortable permutations of size . This result spurred much research to better understand the relationships between these objects (and others also counted by the same sequence). Wenjie Fang was able to describe a bijection between two-stack-sortable permutations and fighting fish which accounts for the above enumerative result (and also preserves a lot of other statistics). However, his bijection is recursive, and no direct bijection is known yet. In my talk I will present a general construction which maps any permutation to a certain labelled tree, which in turn encodes a unique fighting fish. Such a construction is not bijective in general, but it becomes a bijection when restricted to two-stack-sortable permutations, thus defining the (almost) direct bijection that was missing. As a matter of fact, this construction is equivalent to Fang’s one (in other words, it is a more direct version of the recursive procedure of Fang). Our hope would then be to use our construction to understand what the parameter area (on fighting fish) is on permutations, but we have not been successful yet. We have however some partial results, such as a description of those permutations (of fixed size) whose associated fighting fish has minimum area.
The sequence enumerating fighting fish with respect to semiperimeter also counts another class of permutations, namely those avoiding the two vincular patterns 3-1-4-2 and 2-41-3. Such permutations have been investigated by Claesson, Kitaev and Steingrimsson, in particular they provide a bijection with so-called -trees. These are trees whose recursive structure encodes somehow more naturally the recursive structures of fighting fish. This leads us to think that this class of permutations could be more useful to have a better combinatorial understanding of the area of fighting fish.
3.12 Length-4 Pattern Avoidance in Inversion Sequences
Carina Letong Hong (University of Oxford, GB)
License:
Creative Commons BY 4.0 International license © Carina Letong Hong
Joint work of: Carina Letong Hong, Rupert Li
Main reference: Letong Hong, Rupert Li: “Length-Four Pattern Avoidance in Inversion Sequences”, Electron. J. Comb., Vol. 29(4), 2022.
Pattern avoidance for permutations is a robust and well-established branch of enumerative combinatorics since the systematic study of Simeon and Schmidt in 1985. This talk summarizes recent progress on pattern avoidance in inversion sequences, including Mansour and Shattuck (2015), Corteel, Martinez, Savage, and Weselcouch (2016), Mansour and Yildirim (2022), and Testar (2022). Their work completely enumerated length-3 pattern avoidance except the case 120.
Recently, we completely classified all eight length-4 Wilf equivalences: 1011 = 1101 = 1110, 2110 = 2101 = 2011, 0221 = 0212, 0312 = 0321, 1102 = 1012, 2201 = 2210, 2301 = 2310, 3201 = 3210 = 3012. This talk mentions key lemmas that help establish the proofs that can be generalized to avoidance of longer patterns. Furthermore, there are four length-4 patterns whose enumeration appears in the OEIS by computer experiments: in addition to 0012 conjectured by Lin and Ma and proved by Chern, we resolve the cases 0000 and 0111 by proving the formulas for general 00…0 and 01…1 cases, giving bijections to bounded-degree label-increasing trees, and give a conjecture for 0021 which is then subsequently solved by Chern, Fu, and Lin and Mansour in 2022.
3.13 What makes permutation patterns hard to match?
Vít Jelínek (Charles University – Prague, CZ)
License:
Creative Commons BY 4.0 International license © Vít Jelínek
Joint work of: Vít Jelínek, Michal Opler, Jakub Pekárek
Permutation Pattern Matching (or PPM) is a fundamental decision problem in the study of permutations. Its input is a pair permutations P (the “pattern”) and T (the “text”), and the goal is to determine whether P is contained in T. While PPM is NP-hard on general inputs, it often becomes tractable when P or T are restricted to a proper hereditary permutation class.
In my talk, I will present some results and conjectures that attempt to describe the boundary between tractable and hard cases of such restrictions of PPM and other related problems. Specifically, I will focus on the relationships between these three topics: computational complexity of PPM restricted to a given permutation class; structural properties of a permutation class, such as the presence of large grid-like substructures; and the growth of width parameters, like tree-width or grid-width, within a given permutation class.
3.14 Pattern avoidance: algorithmic connections
László Kozma (FU Berlin, DE)
License:
Creative Commons BY 4.0 International license © László Kozma
Already from the beginnings of the field, pattern-avoidance has been studied in tandem with algorithmic applications. For instance, Knuth’s study of permutation-patterns was motivated by connections to stack-sorting. In this talk I will survey results from the last few years on two related lines of work: (1) the study of algorithms, in various models of computation, for detecting, counting, or enumerating patterns, and (2) the study of pattern-avoidance as a source of algorithmic “easiness”: how pattern-avoidance of the input affects the complexity of seemingly unrelated algorithmic tasks.
3.15 Sorting Genomes by Prefix Double-Cut-and-Joins
Anthony Labarre (Gustave Eiffel University – Marne-la-Vallée, FR)
License:
Creative Commons BY 4.0 International license © Anthony Labarre
Joint work of: Guillaume Fertin, Géraldine Jean, Anthony Labarre
A double cut-and-join (DCJ for short) is an operation that replaces two edges u, v and w, x in a graph with either u, x, v, w or u, w, v, x. This operation is of interest in a biological context, as it generalises several other well-studied mutations that are known to happen in genomes, e.g. (possibly signed) reversals or (block-)transpositions.
I consider two different graph models for representing genomes – namely, paths and perfect matchings – and study DCJs under the “prefix restriction”, which forces one of the cut edges to contain the first element of the genome. The talk focuses on sorting problems using these operations, which is a popular approach to reconstructing evolutionary scenarios between species, but also has applications in the field of interconnection network design, from which the prefix restriction originates. I will present some recent results on sorting genomes using variants of prefix DCJs using both models. Namely:
-
new lower bounds on sorting genomes using prefix DCJs or prefix reversals;
-
a polynomial-time algorithm for sorting signed genomes by prefix DCJs; and
-
a 3/2-approximation algorithm for sorting unsigned genomes by prefix DCJs.
The latter algorithm is the first polynomial-time approximation algorithm with a ratio smaller than 2 for a prefix sorting problem not known to be in P.
3.16 Computational complexity of counting and sampling
István Miklós (ELKH – Budapest, HU)
License:
Creative Commons BY 4.0 International license © István Miklós
Joint work of: Carina Letong Hong, István Miklós
Whenever we can ask if a certain mathematical object with prescribed properties exists, we can also ask how many such objects exist and how to generate a random one. We can also talk about the computational complexity of these counting and sampling problems, that is, how the running time of computer programs solving these problems increases with the input size. It turns out that counting and sampling are equally hard for a large class of computational problems. Equal hardness also frequently holds for estimating weighted sums and sampling from a distribution proportional to these weights. For example, in statistical physics, these problems are sampling from the Boltzmann distribution and estimating the partition function. In this talk, we give an overview of sampling and counting complexity, then we will focus on the most powerful approach to sampling, the Markov chain Monte Carlo method.
3.17 Scaling Limits of Some Restricted Permutations
Erik Slivken (University of North Carolina Wilmington, US)
License:
Creative Commons BY 4.0 International license © Erik Slivken
Joint work of: Borga, Jacopo; Duchi, Enrica; Hoffman, Christopher; Rizzolo, Douglas;
Suppose we take a large permutation that is chosen uniformly at random and conditioned to satisfy some restriction. What does this permutation look like? The answer depends on the choice of restriction and how one decides to scale the permutation. We introduce a few scaling limits that prove useful in answering this type of question for a variety of restrictions, especially in the case of pattern-avoiding permutations. We will explore what various scaling limits say about these objects and some associated statistics (like the number of fixed points of the permutation)
3.18 Two new bijections on six-vertex configurations
Jessica Striker (North Dakota State University – Fargo, US)
License:
Creative Commons BY 4.0 International license © Jessica Striker
Joint work of: Daoji Huang, Jessica Striker
The six-vertex model is an exactly solvable model in statistical mechanics that has been widely studied by both physicists and combinatorialists for its many lovely properties.
In this talk in two parts, we first describe joint work with Daoji Huang [2] giving a bijection between alternating sign matrices (a combinatorial manifestation of six-vertex configurations) and totally symmetric self-complementary plane partitions in the reduced, 1432-avoiding case. Finding such a bijection in full generality has been an open problem for nearly 40 years; it will be interesting to see whether this new sub-bijection may lead to further (positive or negative) results on a full bijection.
We then introduce a symmetrized version of the six-vertex model that adapts nicely from the square lattice to arbitrary 4-regular graphs embedded in a disk. By modifying certain vertex configurations, we transform these to nearly planar bipartite graphs that have regions corresponding to dimer covers of hexagonal lattices. Our underlying motivation and main result is a bijection between equivalence classes of these graphs and 4-row tableaux in such a way that promotion corresponds to rotation, yielding a web basis for . This is joint work with Christian Gaetz, Oliver Pechenik, Stephan Pfannerer, and Joshua Swanson [1].
References
- [1] C. Gaetz, O. Pechenik, S. Pfannerer, J. Striker, J. Swanson, Rotation-invariant web bases from hourglass plabic graphs (Preprint).
- [2] D. Huang and J. Striker, A pipe dream perspective on totally symmetric self-complementary plane partitions, https://arxiv.org/abs/2303.10463 (Preprint).
3.19 Extremal theory of vertex- and edge-ordered graphs
Gábor Tardos (Alfréd Rényi Institute of Mathematics – Budapest, HU)
License:
Creative Commons BY 4.0 International license © Gábor Tardos
Turán-type extremal graph theory has been generalized in many directions. In this talk I survey the extremal theories of vertex- and edge-ordered graphs. In the vertex-ordered case the vertices of the host graph are linearly ordered and we only forbid a subgraph with a specified vertex order. As in the classical extremal graph theory, we are still looking for the maximal number of edges in a host graph on vertices avoiding the forbidden subgraph. The analogous extremal theory for edge ordered graphs was introduced recently in a paper of Gerbner, Methuku, Nagy, Pálvölgyi, T., Vizer (2023). In contrast, the vertex ordered theory has a much richer history going back to related extremal matrix problems studied by Füredi and Hajnal in 1992.
Both theories are rich in specific results: the extremal functions of some small forbidden ordered graphs. Some of these results found applications in combinatorial geometry. Other specific forbidden patterns lead to interesting open problems.
Another direction is to find analogues of general results from classical extremal graph theory. The analogues of the Erdős-Stone-Simonovits theorem has been found in both theories: the key is to find the “correct” version of the chromatic number that applies. For vertex-ordered graphs, this is the simple notion of interval chromatic number, for edge-ordered graphs, however, the corresponding notion is surprisingly rich.
In the classical (unordered) theory we have a very simple dichotomy: forests have linear extremal functions, while other graphs have far-from-linear extremal functions. The search for the analogue of this simple observation yielded several nice results, conjectures and open problems about vertex- and edge-ordered graphs.
3.20 Pattern-avoiding affine permutations
Justin Troyka (California State University – Los Angeles, US)
License:
Creative Commons BY 4.0 International license © Justin Troyka
Joint work of: Neal Madras, Justin M. Troyka
An affine permutation of size is a bijection satisfying certain properties, including that for all . The affine permutations of size have been much studied as a Coxeter group, but our perspective is pattern avoidance. To have a finite set to count, we can require also that for each ; such we call a bounded affine permutation. We give the asymptotic number of bounded affine permutations of size that avoid ; in particular, they have the same growth rate as the ordinary permutations avoiding . We also show several results about affine permutation classes with the property that every element is a shift of the infinite direct sum of an ordinary permutation, from which we obtain exact enumerations for several affine permutation classes. This talk covers joint work with Neal Madras, published in 2021 in Discrete Math. Theor. Comput. Sci. and in Ann. Comb. Our work, especially the boundedness condition, is motivated by the fruitful concept of periodic boundary conditions in statistical physics.
References
- [1] N. Madras and J. M. Troyka. “Bounded affine permutations I. Pattern avoidance and enumeration”. Discrete Math. Theor. Comput. Sci. 22(2) (2021): #1.
- [2] N. Madras and J. Troyka. “Bounded affine permutations II. Avoidance of decreasing patterns”. Ann. Comb. 25 (2021): 1007–1048.
3.21 Exploring Permutation Classes with TileScope
Henning Ulfarsson (Reykjavik University, IS)
License:
Creative Commons BY 4.0 International license © Henning Ulfarsson
Joint work of: Henning Ulfarsson, Michael Albert, Christian Bean, Anders Claesson, Émile Nadeau, Jay Pantone
In the world of combinatorics, there are numerous sets of objects that are in a one-to-one correspondence with sets of permutations possessing specific properties, commonly characterized by pattern avoidance. This talk will delve into the TileScope algorithm and demonstrate its usefulness in comprehending permutation sets avoiding a finite list of patterns. Additionally, we will examine the algorithm’s output, including polynomial counting formulas, systems of equations, uniform random generation, and more. Finally, we will highlight the algorithm’s ability to discover bijections automatically, examine the atomicity of permutation classes, and preview planned future advancements. Visit www.permpal.com to see successful applications of the algorithm in action.
3.22 Generating Tree Method and Pattern Avoiding Inversion Sequences
Gökhan Yildirim (Bilkent University – Ankara, TR)
License:
Creative Commons BY 4.0 International license © Gökhan Yildirim
Joint work of: Gökhan Yildirim, Ilias Kotsireas, Toufik Mansour
An inversion sequence of length is an integer sequence such that for each . We use to denote the set of inversion sequences of length . Any word of length over the alphabet is called a pattern. For a given pattern , we use to denote the set of all -avoiding inversion sequences of length .
Pattern-avoiding inversion sequences were systematically studied first by Mansour and Shattuck [2] for the patterns of length three with non-repeating letters and by Corteel et al. [1] for repeating and non-repeating letters. Since then, researchers have obtained several interesting results for these combinatorial objects.
We provide an algorithmic approach based on generating trees for enumerating the pattern-avoiding inversion sequences. First, by using this algorithmic approach, we determine the generating trees for many pattern classes such as . Then we obtain enumerating formulas for them through generating functions and the kernel method.
G. Yıldırım was partially supported by TUBITAK-Ardeb 120F352.
References
- [1] S. Corteel, M.A. Martinez, C.D. Savage and M. Weselcouch.Patterns in inversion sequences I. Discrete Math. Theor. Comput. Sci. 18 (2), 2016.
- [2] T. Mansour and M. Shattuck. Pattern avoidance in inversion sequences. Pure Math. Appl. 25 (2), 157–176, 2015.
4 Open problems
4.1 (More on) Combinatorial moment sequences and permutation patterns
Natasha Blitvic (Queen Mary University of London, GB)
License:
Creative Commons BY 4.0 International license © Natasha Blitvic
Joint work of: Natasha Blitvic, Einar Steingrimsson
Several years ago, a strange idea was hatched by a probabilist and a combinatorialist, drawing on intuition from noncommutative probability and the types of constructions found there. Namely, could the sequences arising from the study of classical permutation patterns be moment sequences of probability measures on the real line? Here was our central conjecture. Given a classical permutation pattern , let be the generating function of the number of occurrences of in permutations on letters, that is,
Conjecture.
For any permutation pattern , there is some real interval containing the origin, such that for any in that interval, is a moment sequence of some probability measure on the real line.
Given we (still) have very little numerical data, let alone very few examples of permutation patterns for which has a known expression (see the references in [1] for the two known examples of vincular patterns for which is available), this might be seen as a bold conjecture. Remarkably, independently and around the same time but motivated by the numerical aspects, Tony Guttmann and Andrew Elvey Price were conjecturing the above for , that is, focusing on the suspected positivity of the avoiders of classical permutation patterns. Moreover, these appeared to give moments of probability measures on the positive real line.
For sequences counting avoiders of classical permutation patterns, some explicit results are available, from which positivity can be deduced using a variety of techniques [3], as well as more data thanks to state-of-the-art numerical algorithms developed for this type of enumeration (see [4] and the references therein). However, we are still far from resolving this conjecture, even in the case. (Interestingly, see [2] for a non-trivial “consecutive pattern analogue” of the conjecture.) To tackle the general version given above, two distinct flavors of combinatorial results would be helpful:
-
Explicit distributional results, that is closed or semi-closed expressions for , for some examples of classical permutation patterns.
-
Improved algorithms to enumerate the distributions of the number of occurrences of a given classical permutation pattern, in order to test the above conjecture.
References
- [1] N. Blitvić and E. Steingrímsson, Permutations, Moments, Measures, Transactions of the American Mathematical Society, Vol. 374, Number 8, August 2021, pp. 5473–5509.
- [2] N. Blitvić, S. M. Kammoun, E. Steingrímsson, A new perspective on positivity in (consecutive) permutation patterns, Proceedings of FPSAC 2023, July 17-21, Davis CA.
- [3] A. Bostan, A. Elvey Price, A. J. Guttmann, and J.-M. Maillard. Stieltjes moment sequences for pattern-avoiding permutations. Electronic Journal of Combinatorics 27.4 (2020), P4.20.
- [4] N. Clisby, A. R. Conway, A. J. Guttmann, and Y. Inoue, Classical Length-5 Pattern-Avoiding Permutations, Electronic Journal of Combinatorics 29.3 (2022), P3.14.
4.2 Distribution of sets of descent tops and descent bottoms on permutations avoiding patterns of length 4
Alexander Burstein (Howard University – Washington, US)
License:
Creative Commons BY 4.0 International license © Alexander Burstein
We conjecture the -Wilf equivalence classes and -Wilf equivalence classes of permutation patterns of length 4. Specifically, we conjecture that the nontrivial (i.e. non-singleton) -Wilf equivalence classes in are , , , , , and the only nontrivial -Wilf equivalence class in is . This has been verified for avoiders of size up to 10.
The conjectures in this note concern the distribution of some descent-related statistics on some pattern-avoiding permutation classes.
For basic definitions regarding patterns in permutations, we refer to Bevan [3]. We will need the following additional definitions, the first of which refines Wilf-equivalence, and the second defines additional descent-related statistics.
Definition 1.
Let be a permutation statistic. We say that patterns and are -Wilf-equivalent if there is a bijection for all that preserves the statistic, i.e. .
Definition 2.
Given a permutation , and a position such that , we call a descent of , a descent top of , and a descent bottom of . Likewise, if , then we call an ascent of , an ascent bottom of , and an ascent top of .
Notation 3.
For a permutation , we define the following sets (which can also be thought of as permutation statistics):
-
, the descent set of ,
-
, the descent top set of ,
-
, the descent bottom set of .
We also define the sets , , of ascents, ascent bottoms, and ascent tops of similarly.
It is straightforward to show that patterns and are both -Wilf-equivalent and -Wilf equivalent, but not -Wilf equivalent. Indeed, define maps as follows. Given a nonempty permutation , we can write for some . Then let
and if or or . Then
West [8], Stankova [7], and Bóna [5] together established the Wilf-equivalence classes of permutation patterns of length 4. Later, some of the Wilf-equivalences were shown to have the same distribution of various permutation statistics. For example, Bloom [4] showed that patterns and are -Wilf-equivalent.
The principal motivation for our conjectures comes from the following. A Dumont permutation of the first kind is a permutation of an even length such that . Burstein and Jones [6] and Archer and Lauderdale [2] together conjectured Wilf-equivalences of patterns of length 4 on Dumont permutations of the first kind. We generalize this by claiming that those are exactly the nontrivial -Wilf equivalences for patterns of length 4 on all permutations.
Conjecture 4.
The non-singleton -Wilf equivalence classes for permutation patterns of length 4 are:
-
,
-
,
-
,
-
,
-
.
Each of the remaining 12 patterns of length 4 is in a -Wilf-equivalence class by itself. For some of the above patterns, we have an even stronger conjecture.
Conjecture 5.
Patterns , , are -Wilf equivalent.
It is easy to see by comparing the descent tops and descent bottoms of the patterns themselves that this is the only nontrivial -Wilf equivalence class for patterns of length 4.
Conjecture 5 can be restated by partitioning the set of all values in each permutation into four mutually disjoint parts.
-
, the set of descent run tops of ,
-
, the set of descent run bottoms of ,
-
, the set of descent run middles of ,
-
, the set of ascent run middles of . This includes ascent run middles of together with if and if .
Conjecture 6.
Patterns , , are -Wilf equivalent.
References
- [1] M. Albert, PermLab, https://www.cs.otago.ac.nz/PermLab.
- [2] K. Archer, L.-K. Lauderdale, personal communication, 2019.
- [3] D. Bevan, Permutation patterns: basic definitions and notation, arXiv:1506.06673.
- [4] J. Bloom, A refinement of Wilf-equivalence for patterns of length 4, J. Combin. Theory, Ser. A 124 (2014), 166–177.
- [5] M. Bóna, Permutations avoiding certain patterns; The case of length 4 and generalizations, Discrete Math. 175 (1997), 55–67.
- [6] A. Burstein, O. Jones, Enumeration of Dumont permutations avoiding certain four-letter patterns, Discrete Math. and Theor. Comp. Sci., 22:2 (2021), #7.
- [7] Z. Stankova, Forbidden subsequences, Discrete Math. 132 (1994), 291–316.
- [8] J. West, Permutations with restricted subsequences and stack-sortable permutations, Ph.D. Thesis, MIT, 1990.
4.3 A curious mesh pattern
Anders Claesson (University of Iceland – Reykjavik, IS)
License:
Creative Commons BY 4.0 International license © Anders Claesson
I would like to bring attention to a particular mesh pattern. It is of length 3 and enumerating the permutations avoiding it is an open problem. Moreover, this pattern shares some features with the Hertzsprung patterns, yet it does not fall into that category.
Are there nontrivial mesh-patterns other than the Hertzsprung patterns for which there is a rational function such that
It appears that the answer is yes.
Conjecture 1.
It holds that
This conjecture is based on computing the numbers for :
At the time of writing this sequence is not in the OEIS.
4.4 Universal Set Partitions
Colin Defant (MIT – Cambridge, US)
License:
Creative Commons BY 4.0 International license © Colin Defant
In 2000, Klazar introduced a natural notion of pattern containment/avoidance for set partitions [1, 2]. Let be one of the following pairs of phrases:
-
(set partition, set partition);
-
(set partition, noncrossing partition);
-
(set partition, nonnesting partition);
-
(noncrossing partition, noncrossing partition);
-
(nonnesting partition, nonnesting partition).
For each positive integer , what is the smallest size of an that contains all ’s of size as patterns?
References
- [1] M. Klazar, Counting pattern-free set partitions I: a Generalization of Stirling numbers of the second kind. European J. Combin., 21 (2000), 367–378.
- [2] M. Klazar, Counting pattern-free set partitions II: noncrossing and other hypergraphs. Electron. J. Combin., 7 (2000).
4.5 Two conjectures on quasi-kernels
Péter L. Erdös (Alfréd Rényi Institute of Mathematics – Budapest, HU)
License:
Creative Commons BY 4.0 International license © Péter L. Erdös
Let be (finite or infinite) directed graph. An independent vertex subset is a quasi-kernel (also known as semi-kernel) iff for each point there is a path of length at most from some point of to Similarly, the independent vertex subset is a quasi-sink, iff for each point there is a path of length at most from to some point of .
It is a well-known fact, that every finite (table-tennis) tournament has a (single-point) quasi-kernel (quasi-sink). In 1973 the following nice generalization was proved:
Theorem 1 (V. Chvátal – L. Lovász [1]).
Every finite directed graph contains a quasi-kernel (quasi-sink).
In 1976 the following conjecture was stated:
Conjecture 2 (P.L. Erdős – L. A. Székely).
Assume that in the finite digraph for each vertex the indegree Then there exists a quasi-kernel with the property For example the disjoint union of oriented ’s satisfies this with equality.
Theorem 1 does not hold in case of infinite directed graphs: for example if denotes the directed graph of all integers where each edge is directed “upwards”, clearly there is nor quasi-kernel neither quasi-sink. However its vertex set can be easily partitioned into two subsets, such that one spanned sub-tournament contains a quasi-kernel, while the other one contains a quasi-sink.
Conjecture 3 (P.L. Erdős – L. Soukup (2008) [2]).
Every (countable) infinite directed graph can be partitioned into two vertex classes, such that one spanned subgraph contains a quasi-kernel, while the other one contains a quasi-sink.
References
- [1] V. Chvátal – L. Lovász: Every directed graph has a semi-kernel, Lecture Notes in Math 411 (1974), 175.
- [2] P.L. Erdős – L. Soukup: Quasi-kernels and quasi-sinks in infinite graphs, to appear in Disc. Math (2008), 1–18.
4.6 Sorting by parallel block reversals
Vít Jelínek (Charles University – Prague, CZ)
License:
Creative Commons BY 4.0 International license © Vít Jelínek
Joint work of: Vít Jelínek, Michal Opler, Jakub Pekárek
Suppose that we are given a sequence of numbers, which we want to sort into ascending order by using the following iterative procedure: in each round, we partition the current sequence arbitrarily into disjoint blocks of entries in consecutive positions, not necessarily of the same length, and then in a single step we reverse the order of entries within each block. What is the smallest number of rounds needed to sort any input of length ? Equivalently: what is the smallest number such that any permutation of length can be obtained by composing layered permutations? A counting argument shows that rounds are sometimes needed, and I can show that rounds suffice, so the problem is to close this gap.
4.7 Füredi-Hajnal limits of permutations
Jan Kyncl (Charles University – Prague, CZ)
License:
Creative Commons BY 4.0 International license © Jan Kyncl
Joint work of: Josef Cibulka, Jan Kynčl
Füredi–Hajnal limits of permutations
A binary matrix is a matrix with entries from the set . We say that a binary matrix contains a binary matrix if can be obtained from by removal of some rows, some columns, and changing some -entries to -entries. If does not contain , we say that avoids . A -permutation matrix is a binary matrix with exactly one -entry in every row and one -entry in every column.
The Füredi–Hajnal conjecture, proved by Marcus and Tardos, states that for every permutation matrix , there is a (smallest) constant such that for every , every binary matrix with at least -entries contains .
The proof by Marcus and Tardos [3] implies the upper bound for every -permutation matrix . Fox [2] improved the upper bound to . Our current best upper bound is [1].
For the lower bound, Fox [2] gave a randomized construction showing that for every , there are -permutation matrices with .
For random -permutation matrices, we can prove that asymptotically almost surely [1]. In particular, we can prove subexponential upper bounds for so-called scattered permutation matrices and a few specific examples of non-scattered permutation matrices. However, there are still many cases where we do not have better than exponential upper bound on .
A two-diagonal matrix is a binary matrix whose all -entries lie on two parallel diagonals, which may be arbitrarily far apart.
Let be -permutation matrix contained in a two-diagonal matrix. Is ? Is polynomial in ?
References
- [1] J. Cibulka and J. Kynčl, Better upper bounds on the Füredi–Hajnal limits of permutations (2019), arXiv:1607.07491v3.
- [2] J. Fox, Stanley–Wilf limits are typically exponential (2013), arXiv:1310.8378v1.
- [3] A. Marcus and G. Tardos, Excluded permutation matrices and the Stanley–Wilf conjecture, J. Combin. Theory Ser. A 107(1) (2004), 153–160.
4.8 Number of Successful Pressing sequences of black-and-white lines
István Miklós (ELKH – Budapest, HU)
License:
Creative Commons BY 4.0 International license © István Miklós
Main reference: Eliot Bixby, Toby Flint, István Miklós: “Proving the Pressing Game Conjecture on Linear Graphs”, CoRR, Vol. abs/1303.6799, 2013.
Let a line graph L be given whose vertices are colored by black and white. Black vertices can be pressed. Pressing a black vertex has an effect that the black vertex is deleted, the neighbors of the black vertex change color and become neighbors (when there are two neighbors). A successful press- ing sequence of L is a permutation of its vertices such that the vertices can be pressed in that order and the result is the empty graph (that is, the last step must be pressing the remaining single black vertex). The open question is the computational complexity of counting the success- ful pressing sequences of a black-and-white line graph. That is, is there a polynomial running time algorithm to compute this number or is the problem #P-complete? It is also an interesting problem to prove rapid mixing of an irreducible Markov chain on successful pressing sequences, see Bixby et al. (that paper also tells the motivation of the problem, which is actually a genome rearrangement problem).
References
- [1] Bixby, E, Flint, T, Miklós, I. . Proving the Pressing Game Conjec- ture on Linear Graphs. Involve, 9(1):41–56. 2016.
4.9 Particle systems for the longest pattern-avoiding subsequences for permutations
Gökhan Yildirim (Bilkent University – Ankara, TR)
License:
Creative Commons BY 4.0 International license © Gökhan Yildirim
The longest increasing subsequence problem for permutations can be rephrased as the longest 21-avoiding subsequence. This leads us to generalize the problem to the longest -avoiding subsequence for any given pattern [1, 2].
Hammersley’s interacting particle process on the unit interval [0,1] corresponds to the longest 21-avoiding subsequence. This particle process is in KPZ universality class. It provides an efficient algorithm to numerically understand the distributional properties of the longest 21-avoiding subsequence problem under the uniform measure(21-case is solved theoretically).
Can we find particle processes corresponding to the longest -avoiding subsequence for a given pattern ? Specifically for patterns of length 3 except 321, which is known [3].
References
- [1] R. P. Stanley. Increasing and Decreasing Subsequences and Their Variants. Proceedings of the International Congress of Mathematicians, Madrid, Spain, 2006, pp. 545–579.
- [2] M. H. Albert. On the length of the longest subsequence avoiding an arbitrary pattern in a random permutation. Random Struct. Algorithms 31 (2007) 227–238
- [3] A. Atalik, H. S. M. Erol, G. Yıldırım, and M. Yilmaz. Variations on Hammersley’s interacting particle process. Discrete Math. Lett. 7 (2021) 34–39.
4.10 Linear temporal spanners in temporal cliques
Victor Zamaraev (University of Liverpool, GB)
License:
Creative Commons BY 4.0 International license © Victor Zamaraev
A temporal graph is a pair , where is a simple undirected graph and is a function that assigns to every edge of a finite non-empty set of natural numbers. The temporal graph is simple if (1) every edge of is assigned exactly one time label, i.e., for every ; and (2) no two edges get assigned the same time label. Without loss of generality, we will assume that if is simple, then is a bijection between and . For this problem we focus only on simple temporal graphs.
A temporal -path or a temporal path from to in is a path in such that , where .
The temporal graph is temporally connected if each vertex can reach every other vertex by a temporal path. A temporal graph is a temporal subgraph of if is a subgraph of and is the restriction of to the edges of . Furthermore, if and is temporally connected, then is called a temporal spanner of .
Problem 1.
Let be an arbitrary simple temporal clique on vertices, i.e. , where is a complete graph on vertices. Is it true that has a temporal spanner with edges?
It is known that any temporal clique on vertices has a temporal spanner with edges [1]. Whether this bound is order optimal or not is open.
References
- [1] Arnaud Casteigts, Joseph G. Peters, Jason Schoeters. Temporal cliques admit sparse spanners. Journal of Computer and System Sciences, 121, p. 1–17, 2021
5 Participants
-
Benjamin Aram Berendsohn – FU Berlin, DE
-
David Bevan – University of Strathclyde – Glasgow, GB
-
Natasha Blitvic – Queen Mary University of London, GB
-
Miklós Bóna – University of Florida – Gainesville, US
-
Mathilde Bouvel – LORIA – Nancy, FR
-
Robert Brignall – The Open University – Milton Keynes, GB
-
Alexander Burstein – Howard University – Washington, US
-
Parinya Chalermsook – Aalto University, FI
-
Anders Claesson – University of Iceland – Reykjavik, IS
-
Sylvie Corteel – Université Paris Cité, FR
-
Péter Csikvári – Alfréd Rényi Institute of Mathematics – Budapest, HU
-
Radu Curticapean – IT University of Copenhagen, DK
-
Colin Defant – MIT – Cambridge, US
-
Sergi Elizalde – Dartmouth College – Hanover, US
-
Péter L. Erdös – Alfréd Rényi Institute of Mathematics – Budapest, HU
-
Luca Ferrari – University of Firenze, IT
-
Sylvie Hamel – University of Montréal, CA
-
Carina Letong Hong – University of Oxford, GB
-
Vít Jelínek – Charles University – Prague, CZ
-
László Kozma – FU Berlin, DE
-
Jan Kyncl – Charles University – Prague, CZ
-
Anthony Labarre – Gustave Eiffel University – Marne-la-Vallée, FR
-
István Miklós – ELKH – Budapest, HU
-
Torsten Mütze – University of Warwick – Coventry, GB
-
Michal Opler – Czech Technical University – Prague, CZ
-
Lara K. Pudwell – Valparaiso University, US
-
Erik Slivken – University of North Carolina Wilmington, US
-
Rebecca Smith – The College at Brockport, US
-
Jessica Striker – North Dakota State University – Fargo, US
-
Gábor Tardos – Alfréd Rényi Institute of Mathematics – Budapest, HU
-
Bridget Tenner – DePaul Uniersity – Chicago, US
-
Justin Troyka – California State University – Los Angeles, US
-
Henning Ulfarsson – Reykjavik University, IS
-
Gökhan Yildirim – Bilkent University – Ankara, TR
-
Sorrachai Yingchareonthawornchai – Aalto University, FI
-
Victor Zamaraev – University of Liverpool, GB