CH 7 Suppsol
CH 7 Suppsol
3. Note that p1 = e1 .
4. Note that
n
X n
X
k k
(−1) 2 ek e1n−k − en1 = (−1)k 2k ek e1n−k .
k=2 k=0
1
6. By Exercise 7.48(f) we have
1
FNCn+1 = [tn ]E(t)n+1 .
n+1
But E(t) = 1/H(−t), so
1
FNCn+1 = [tn ]H(−t)−n−1 .
n+1
Now
Note the subtlety of this problem: there is no λ for which the coefficient
Q
of eλ in F (x) is negative for all a < 2. For the generalization to P (xi )
where P (t) is any polynomial satisfying P (0) = 1, see Exercise 7.91(e).
For the even more general (and considerably more difficult) generaliza-
tion when P (t) is an arbitrary power series satisfying P (0) = 1, see
the references to Edrei and Thoma in the solution to Exercise 7.91(e).
9. Open.
2
10. Since ω 2 = 1, the eigenvalues of ω are ±1. But if f 6= 0 and ωf = 2f ,
then f is an eigenvector for the eigenvalue 2. Hence f = 0.
11. (a) We have heλ , hµ i = Mλµ and hhλ , hµ i = Nλµ (as defined in Propo-
sitions 7.4.1 and 7.5.1). Clearly from the definitions we have
Mλµ ≤ Nλµ .
(b) We want to characterize those λ, µ for which every N-matrix with
row sum vector λ and column sum vector µ is a (0, 1)-matrix.
For any λ, µ ⊢ n it is easy to find an N-matrix A = (aij ) with
row(A) = λ, col(A) = µ, and a11 = min{λ1 , µ1 }. Hence a neces-
sary condition is that either λ = h1n i or µ = h1n i. It is easy to
see that this condition is also sufficient.
One could also take logarithms and expand in terms of power sums,
etc.
14. (a) By Corollary 7.7.2 the transition matrix (Rλµ ) between the mµ ’s
and pλ ’s is upper triangular with respect to any linear extension
3
of dominance order, with diagonal entries Rµµ = dµ . An easy
combinatorial argument shows that Rλµ is divisible by dµ . We can
perform integral elementary row operations on the matrix (Rλµ ),
except for multiplying a row by a scalar, without changing the
abelian group generated by the rows. Since dµ divides Rλµ we can
obtain the diagonal matrix (dµ ) by such row operations, and the
proof follows.
(b) The matrix Xn is the transition matrix between the sλ ’s and pµ ’s.
Since the set {sλ }λ⊢n is a basis for ΛnZ (see the first sentence after
the proof of Corollary 7.10.6), the proof follows from (a) and the
definition of Smith normal form.
For some further results along these lines, see C. Bessenrodt, J. B.
Olsson, and R. P. Stanley, J. Algebraic Combinatorics 21 (2005),
163–177; arXiv:math/040311.
15. We have
Y X
(1 + xi )α = exp α log(1 + xi )
i i
XX xni
= exp α (−1)n−1
i n≥1
n
X pn
= exp α (−1)n
n≥1
n
X
= ǫλ αℓ(λ) zλ−1 pλ ,
λ
4
17. For fixed u ∈ G, the number of v ∈ G satisfying uv = vu is (by
definition) #C(u), where C(u) is the centralizer of u. By elementary
group theory, #C(u) = #G/#Ku , where Ku is the conjugacy class of
G containing u. Hence if C(G) denotes the set of conjugacy classes of
G, then
X
#{(u, v) ∈ G : uv = vu} = #C(u)
u∈G
X #G
=
u∈G
#Ku
X X 1
= (#G)
u∈K
#K
K∈C(G)
= (#G)k(G),
5
P Q
20. (a) Let H(t) = hn tn = (1 − xi t)−1 . Then
H(1) − H(−1)
T =
H(1) + H(−1)
P pn P
exp n
− exp (−1)n pnn
= P pn P
exp + exp (−1) n pn
n n
P pn
P pn
exp − exp − n odd
= Pn odd pnn P n
pn
exp n odd n + exp − n odd n
(b) Let
ex − e−x X n x2n+1
tanh x = = (−1) E2n+1 ,
ex + e−x n≥0
(2n + 1)!
T = tanh y
X y 2n+1
= (−1)n E2n+1 .
n≥0
(2n + 1)!
m1 m3 m5
P it follows easily that if λ = h1 3 5 · · · i where
From this
ℓ(λ) = mi = 2m + 1, then
(−1)m E2m+1
[pλ ]T = ,
zλ
and otherwise this coefficient is 0. For the algebraic significance
of this problem, see Exercise 7.64.
6
the vector µ, it follows that the desired scalar product is just the total
number of N-matrices with k rows and with column sums λ1 , λ2 , . . . .
The number of sequences (a1 , . . . , ak ) with sum s is s+k−1
s
. Hence
k λ1 + k − 1 λ2 + k − 1
h(1 + h1 + h2 + · · · ) , hλ i = ··· .
λ1 λ2
and the proof follows. We have obtained the proofs of (a) and
(b) from W. D. Gao, J. Number Theory 56 (1996), 211–213, and
H. Pan, Amer. Math. Monthly 113 (2006), 652–654. The original
paper of P. Erdős, A. Ginzburg, and A. Ziv appeared in Bull.
Research Council Israel 10F (1961), 41–43.
(c) It is not hard to see that if λ = h1m1 2m2 · · · i then
7
(See Problem 85(a).) Let ℓ(λ) = k and λ ⊢ p − 1. By the solution
to (a) the coefficient C of mλ in Fp is
2p − 1 − k (p − 1)!
C= Q .
p−k λi !
Now
(p − 1)!
Q Q
( λi !) ( mi !)
is just the number of partitions of [p−1] with block sizes λ1 , λ2 , . . .
and is hence an integer. Thus
(p − 1)!
Q mλ ∈ Z[p1 , p2 , . . . ].
λi !
2p−1−k
Since p−k
≡ 0 (mod p), the proof follows.
24. (a) By linearity it suffices to do this for a fixed basis uλ . The easiest
choice is uλ = pλ . If λ ⊢ n, then
8
25. Since hhλ , mµ i = δλµ , it follows from Proposition 7.5.1 that hhλ , hµ i =
Nλµ . Hence we want the number of N-matrices A with row and column
sum vector (2, 1n−2, 0, 0, . . . ). If A11 = 2, then subtracting 1 from A11
yields an (n − 1) × (n − 1) permutation matrix, of which there are
2
(n − 1)!. If A11 = 0 there are n−2 2
(n − 4)! matrices. Adding these
two numbers gives (n2 − n + 2)(n − 2)!/4.
Another method: use h2 = 21 (p21 + p2 ). Hence
1 n
hh2 h1n−2 , h2 h1n−2 i = hp1 + p2 p1n−2 , pn1 + p2 p1n−2 i
4
1
= (zh1n i + zh2,1n−2 i ),
4
etc.
27. (a) The matrix of ϕ−1 with respect to the basis {mλ } is the matrix M
of Section 7.4. By a simple result of linear algebra, M and M −1
have the same Jordan block sizes. By Theorem 7.4.4 the matrix
M is upper triangular with 1’s on the main diagonal. Hence the
size of the largest Jordan block of ϕ is the least integer m for
which (M − I)m = 0. Again by Theorem 7.4.4 we have Mλµ = 0
unless µ ≤ λ′ . By Proposition 7.4.1 and the Gale-Ryser theorem
(a basic combinatorial result which everyone should know) the
converse is true, i.e., Mλµ > 0 if µ ≤ λ′ . Since all entries of M are
nonnegative, there is no cancellation in the computation of powers
of M − I. It follows that m is the size of the longest chain in the
poset Par(n), ordered by dominance. Now use Exercise 7.2(f).
(This exercise gives the length of the longest chain, so you need to
add 1 to get the size.) For some further work on chains in Par(n),
see E. Early, Discrete Math. 313 (2013), 2168–2177.
9
(b) Define µ1 , µ2 , . . . by setting µ1 +µ2 +· · ·+µi equal to the number of
elements in the largest union of i chains of Par(n) (with the domi-
nance order). If the nonzero entries of M above the main diagonal
were generic, then a theorem of Gansner and Saks (independently)
shows that the Jordan block sizes of M are µ1 , µ2 , . . . . It seems
plausible that M is “sufficiently generic” for the Gansner-Saks re-
sult to hold for M itself, but we don’t know how to show this. (An
interesting consequence: corank(M − I) (= p(n) − rank(M − I)) is
the size of the largest antichain in Par(n). I don’t know whether
anyone has looked at the problem of determining this size.) Re-
gardless, is there an explicit formula for the numbers µ1 , µ2 , . . . ?
10
for any skew θ and 180◦ rotation θr , and for any partition µ, we
have Kθ,µ = Kθr ,µ .) Let T ′ be the tableau of shape λ whose ith
column consists of the elements of [n] not in column k + 1 − i of
T , arranged in increasing order. For instance, suppose that k = 4,
n = 6, λ = (4, 2), and
1 1 1 3
2 2 2 4
T = 3 3 4 5 .
4 5 6 6
5 6
Then
1 3 4 6
T′ = .
2 5
It is easy to check that the map T 7→ T ′ is a bijection from SSYT
of shape hk n i/λ and content h(k − 1)n i to SYT of shape λ.
(b) We have
X
Khkn i,h(k−1)n ,1n i = Kλ,h1n i Khkn i/λ,h(k−1)n i
λ⊆hk n i
λ⊢n
X 2
= fλ
λ⊆hk n i
λ⊢n
X 2
= fλ .
λ⊢n
λ1 ≤k
′
By Corollary 7.23.12 (using f λ = f λ ), the last expression is equal
to the number of permutations in Sn with no increasing subse-
quence of length k + 1.
11
P
33. Since hµ = λ Kλµ sλ
we have
X X
g(λ)sλ = hµ
λ µ
Y
= (1 − hn )−1 .
n≥1
34. (a) Let E(i) denote the expected number of i’s among all SSYT of
shape λ and largest part at most n, for 1 ≤ i ≤ n. Then
∂ k sλ (x1 ,...,xn )
∂xk1 x1 =···=xn =1
Bλ,n (k) = .
k! sλ (1n )
Thus
X sλ (t + 1, 1n−1 )
Bλ,n (k)tk = ,
k≥0
sλ (1n )
Hence
dλk
Bλ,n (k) = .
sλ (1n )
12
The solution to Problem 87 shows that
Q
f λ/k u∈λ/k (n + c(u))
dλk = .
(d − k)!
2d(d − 1) f λ/(2) d
2Bλ,n (2) + Bλ,n (1) = λ
+ .
n(n + 1) f n
35. See Y. Baryshnikov and D. Romik, Israel J. Math. 178 (2010), 157–186;
arXiv:0709.0498 (Theorem 1). For a simpler approach to counting
f λ/µ for some similar problems including αn , see R. Stanley, Electronic
J. Combinatorics 18 (2011-2), P16.
36. Follows from Theorem 10.3 of J. S. Kim, K.-H. Lee, and S.-J. Oh,
(3,3)
arXiv:1703.10321. (There is a typo in Theorem 10.3: |S2m−1 | should
(3,3)
be |S2m+1 |.) (Private communication from Jang Soo Kim, 30 August
2018.)
39. (a) Note that (b) is a restatement of (a) using the code Cλ of Exer-
cise 7.59. We are also using part (b) of Exercise 7.59 (in the re-
verse form of adding rather than removing a border strip). Hence
13
it suffices to prove (b). Suppose that there are k integers j < b
for which f (j) = 1. Then by definition of a and b, the only pos-
sible values of j for which f (j) = 1 and f (j − n) = 0 are the k
integers j < b for which f (j) = 0, together with the n integers
b + 1, b + 2, . . . , b + n. The only ones which fail to have the desired
property are those of the form j + n where j < b and f (j) = 1.
Thus the number of integers j for which f (j) = 1 and f (j −n) = 0
is (n + k) − k = n.
14
4
2 4 4 4
1 2 2’
1 1 1* 2’
1 1* 1* 1’
3 3 1* 1’ 1’
3 3 3’ 3’ 1’
5 3’ 3’
5
We obtain
X 1 |+(k−1)(|α2 |+|α3 |)+(k−2)(|α4 |+|α5 |)+···+(|α2k−2 |+|α2k−1 |)
Bk (x) = xk|α ,
α1 ,...,α2k−1
15
where ωρλ ∈ Z and d = n!/Hλ , the degree of χλ . Taking traces in
equation (17) yields
n! λ n! λ
χρ = ω .
zρ Hλ ρ
Therefore
Hλ λ
ωρλ = χ
zρ ρ
is an integer for all λ, ρ. The desired result follows easily.
A p-integral formula for Hλ sλ was given by Hanlon, J. Comb.
Theory Series A 47 (1988), 37–70 (Property 3 on page 63).
(b) Immediate from Problem 38, but this is cheating. For an elemen-
tary proof, for a ∈ Λn let a⊥ denote the adjoint to multiplication
by a, i.e., ha⊥ b, ci = hb, aci for all b, c ∈ Λ. It’s easy to check (by
verifying it for a = pλ , b = pµ , and c = pν , and using linearity)
that if we write a as a polynomial a(p1 , . . . , pn ) in p1 , . . . , pn , then
⊥ ∂ ∂ ∂
a =a ,2 ,3 ,... .
∂p1 ∂p2 ∂p3
For a partition ρ, define the differential operator
∂ ∂
Dρ = ··· .
∂pρ1 ∂pρ2
Then
sλ/µ = s⊥
µ sλ
!
X 1 X
= zρ−1 χµ (ρ)1m1 (ρ) 2m2 (ρ) · · · Dρ dλσ pσ ,
ρ
Hλ σ
sλ/µ =
1 X
dλσ zρ−1 χµ (ρ)1m1 (ρ) 2m2 (ρ) · · · (m1 (σ))m1 (ρ) (m2 (σ))m2 (ρ) · · · pσ−ρ .
Hλ σ,ρ
Now the falling factorial (mi (σ))mi (ρ) is divisible by mi (ρ)!. Hence
zρ−1 1m1 (ρ) 2m2 (ρ) · · · (m1 (σ))m1 (ρ) (m2 (σ))m2 (ρ) · · · ∈ Z,
16
so we have
1 X
sλ/µ = gλσ pσ−ρ
Hλ
for some integers gλσ . Now take the coefficient of x1 x2 · · · xn−k
on both sides. The coefficient of x1 x2 · · · xn−k in pν is 0 unless
ν = h1n−k i, in which case the coefficient is (n − k)!. Thus for some
integer g we get
1
f λ/µ = g · (n − k)!,
Hλ
so
Hλ f λ/µ (n)k f λ/µ
g= = ,
(n − k)! fλ
completing the proof.
Is there a simpler proof?
Greta Panova has pointed out that the proof also follows immedi-
ately from Naruse’s formula (Problem 43) for the number of SYT
of skew shape λ/µ. In fact (using notation from Problem 43),
(n)j f λ/µ Y Y
= h(u).
fλ u∈E
E∈(λ/µ)
43. This formula is due to Hiroshi Naruse, 73rd Sém. Lothar. Combin.,
2014; www.emis.de/journals/SLC/wpapers/s73vortrag/naruse.pdf.
It has led to a lot of subsequent work. In particular, a q-analogue ap-
pears in a paper by A. H. Morales, I. Pak, and G. Panova, J. Combin.
Theory, Ser. A 154 (2018), 26–49, arXiv:1512.08348. Morales et al.
have written (at least) three sequels to this paper.
44. This result was conjectured by P. McNamara (after the k = 1 case was
conjectured by S. Assaf and then proved independently by S. Assaf and
R. Stanley) and proved combinatorially by S. Assaf (March, 2009). See
S. Assaf and P. McNamara (with an appendix by T. Lam), J. Comb.
Theory Ser. A 118 (2011) 277–290; arXiv:0908.0345. For a continua-
tion, see T. Lam, A. Lauve, and F. Sottile, Int. Math. Res. Not. IMRN
6 (2011), 1205–1219; arXiv:0908.3714. For a skew Murnaghan-Naka-
yama rule and a q-analogue, see M. Konvalinka, J. Alg. Combinatorics
35 (2012), 519–545; arXiv:1101.5250. For further work in this area,
see V. Tewari and S. van Willigenburg, Advances in Applied Math. 100
(2018), 101–121.
17
45. (a) This result is due to J. N. Bernstein and appears in Macdon-
ald [7.96, Exam. I.5.29.b.5]. See M. Zabrocki, J. Alg. Comb. 13
(2000), 83–101, arXiv:math/9904084, for a host of related results.
(b) If we apply RSK to w, we get precisely those pairs (P, Q) of SYT
with at most n − k columns, and for which the first row of Q is
1, 2, . . . , n − k. Hence
X
fk (n) = f (n−k,λ) f λ .
λ⊢k
By (a),
X X
fk (n) = [x1 · · · xn y1 · · · yk ] (−1)i hn−k+i (x)ei (x)⊥ sλ (x)sλ (y).
i≥0 λ⊢k
46. Let ℓ(µ) = ℓ. The first column of λ consists of 1 and any n − k of the
numbers 2, 3, . . . , ℓ. Hence
ℓ−1
K(k,1n−k ),µ = .
n−k
47. There are various ways to describe P and Q. One elegant description
(though perhaps not the best for proving correctness) is to fill in each
tableau in the order (1, 1), (1, 2), (2, 1), (1, 3), (2, 2), (3, 1), . . . , always
using the least number available that keeps the columns strictly increas-
ing, and ignoring any positions that cannot be filled. For instance, if
m = 4 and n = 3, then the numbers that go into P are 111122223333.
First let P11 = 1, then P12 = 1, then P2,1 = 2, etc. Note that no
number is available for P41 , so we continue with P15 = 2, etc.
18
48. (a) Call an SYT T shiftable if it becomes an SHSYT by pushing the
ith row of T i − 1 squares to the right, for all i ≥ 1. The key fact
is that for each W -equivalence class X, there is a unique shiftable
SYT that is the insertion tableau of some w ∈ X. For further
details, see D. Worley, Ph.D. thesis, M.I.T., 1984 (Theorem 6.2.2).
Worley’s result has never been published.
♣ Has someone else published this result?
(b) One possible example of an “interesting way” is to fix k ≥ 1
and define two permutations u, v ∈ Sn to be Wk -equivalent if
they have the same insertion tableau and the same set of their
first k elements (when written as words). Or perhaps the first
k elements of u (in order) should be the reverse or inverse (after
standardizing) of the first k elements of v.
49. (a) Given w1 w2 · · · wn , insert w1 , w2 , . . . , wn successively into an in-
sertion shifted tableau P as follows. Use ordinary row insertion
as long as a diagonal element (i.e., the first element of some row)
is not bumped. As soon as a diagonal element is bumped, switch
to column insertion. Define a recording shifted tableau Q by in-
serting 1, 2, . . . , n into Q to keep the same shape as P (just as in
ordinary RSK). Moreover, if the new position in P was obtained
by a column-insertion (i.e., if sometime in the bumping process a
diagonal element was bumped) then circle the corresponding ele-
ment of Q. This sets up a bijection between Sn and pairs (P, Q)
of shifted SYT of the same shape λ |= n, and with some subset of
the n − ℓ(λ) nondiagonal elements of Q circled, thereby proving
(2). For instance, if w = 2651743 then P is built up as follows:
19
(b) Equation (3) is a formal consequence of the following facts, which
are not difficult to verify. Let Vn be the complex vector space with
basis {λ : λ |= n}. Define linear transformations Un : Vn → Vn+1
and Dn : Vn → Vn−1 by
X X
Un (λ) = µ+ζ ν
µ ν
√ X X
Dn (λ) = 2 σ+ζ τ,
σ τ
Dn+1 Un − Un−1 Dn = In
X X X
Dn+1 λ = Un−1 λ + ζ λ.
λ|=n+1 λ|=n−1 λ|=n
20
strict plane partitions, Int. Math. Res. Not. (2007), rnm043. For
a generalization, see M. Vuletić, A generalization of MacMahon’s
formula, Trans. Amer. Math. Soc. 361 (2009), 2789–2804.
52. Given a skew SYT of shape λ/2, add 2 to each entry and fill in the
two “missing” squares with 1,2 from left-to-right. This gives a bijection
with SYT of shape λ such that 2 appears in the first row. Thus the
first sum is equal to the number of w ∈ Sn such that under RSK the
insertion tableau has a 2 in the first row. This will be the case if and
only if 2 follows 1 in w (i.e., w −1 (2) > w −1(1)). There are n!/2 such
permutations, so X
f λ/2 f λ = n!/2. (18)
λ⊢n
21
(b) From (a) we get
X
0 = sgn(w)
w∈Sn
X X
= (−1)v(λ) sgn(P ) · sgn(Q)
λ⊢n (P,Q)
X
= (−1)v(λ) Iλ (−1)2 .
λ⊢n
22
Hence
* * + +
X X X X
d(λ)f λ = f λ sλ , sλ/1 , sµ sλ
λ⊢n λ⊢n λ⊢n µ⊢n−1
* * + +
X X
= pn1 , sλ , p1 sµ sλ
λ⊢n µ⊢n−1
* +
X X
= sλ , p1 sµ f λ (since hpn1 , sλ i = f λ )
λ µ⊢n−1
* +
X
= pn1 , p1 sµ .
µ⊢n−1
Both results of this exercise, with different proofs, are due to K. Carde,
J. Loubert, A. Potechin, and A. Sanborn, 2008 REU report (Corol-
lary 6.3), available at
www-users.math.umn.edu/∼reiner/REU/HanConjReport.pdf.
Is it just a coincidence that the sums in (a) and (b) have the same
value?
P
Alternative proof (D. Grinberg, 2021). Let dn = λ⊢n d(λ)f λ . Now,
X X
tn+1 = fµ = (d(λ) + 1)f λ , (20)
µ⊢n+1 λ⊢n
since each f µ equals the sum of the f λ ’s over all λ that are covered by
µ in Young’s lattice, and since each partition λ is covered by exactly
23
d(λ) + 1 partitions. Equation (20) becomes
X X X
tn+1 = (d(λ) + 1)f λ = d(λ)f λ + f λ = dn + tn ,
λ⊢n λ⊢n λ⊢n
Thus
X k2
lim En =
n→∞
k≥1
(k + 1)!
X k(k + 1) − (k + 1) + 1
=
k≥1
(k + 1)!
= e − (e − 1) + (e − 2)
= e − 1.
24
follows that
X
1 2n − 2
v13 = = 5.090678729 · · · .
n≥1
(n − 1)! n − 3
mathoverflow.net/questions/331579.
www.stat.berkeley.edu/∼romik/paperfiles/schensted.pdf.
25
in Proc. Internat. Cong. Math. (Madrid, 2006), vol. 1, European Math-
ematical Society, Zurich, 2007, pp. 545–579. For the more subtle prob-
lem of the limiting shape of bumping paths, see D. Romik and P. Śniady,
Random Struct. Algorithms 48 (2016), 171–182; arXiv:1304.7589.
60. This result was proved for square shapes (but the proof is exactly
the same for rectangles) by D. Romik, Advances in Applied Math. 37
(2006), 501–510;
www.stat.berkeley.edu/∼romik/paperfiles/extremal.pdf.
Perhaps the simplest proof is to consider the inverse map (P, Q) 7→ w.
61. Put x1 = · · · = xi = t and y1 = · · · = yj = 1 and all other xr , ys = 0 in
the Cauchy identity (Theorem 7.12.1). We get
fn (i, j) = [tn ](1 − t)−ij
n + ij − 1
= .
ij − 1
62. By setting xi = yi in (7.44) and comparing with (7.20) we get
X
yn = zλ−1 p2λ .
λ⊢n
Thus
! !
X X 2m1 X 2m2
hyn , yn ixn = tm1 t2m2 · · ·
n≥0 m ≥0
m1 m ≥0
m2
1 2
1 1 1
= √ √ √ ···
1 − 4x 1 − 4x2 1 − 4x3
= P (x, 4)1/2 .
26
63. See J. F. Willenbring, J. Algebra 242 (2001), 691–708. Willenbring’s
proof is based on the representation theory of the orthogonal group.
The formula given here is simpler than Willenbring’s (though of course
equal to it). It can be obtained analogously to Problem 62 (though
more complicated). To begin,P set each xi = yi in (7.44) and P
use (7.20)
2
to get the p-expansion of sµ . For the p-expansion of s2λ use
Exercise 7.28. The equality of Willenbring’s formula with the one of
this exercise can be proved by expanding their logarithms.
64. The symmetric function G ∈ Λ̂R has the desired property if and only
if it has the form G = αF (x1 )F (x2 ) · · · , where α ∈ R, F (x) ∈ R[[x]]
and FP (0) = 1. Equivalently (as is easy to see), log G(x) has the form
c0 + k≥1 ck pk , where ck ∈ R. (See Exercise 7.91 for more on such
series.)
Proof. We may assume
P [why?] that G has constant term 1. Now
assume that log G = k≥1 ck pk . Then, as in Proposition 7.74, we have
!
X Y
G= zλ−1 cλi pλ .
λ i
P P Q
Let f = µ aµ pµ and g = ν bν pν . For any partition ρ let cρ = i cρi .
Then by the orthogonality of the power sums,
* +
X X
hG, f gi = zλ−1 cλ pλ , aµ bν pµ pν
λ µ,ν
X
= aµ bν cµ cν
µ,ν
! !
X X
= aµ cµ bµ cµ
µ µ
= hG, f i · hG, gi.
P −1
Conversely, let I = λ zλ dλ pλ , and suppose that hI, f gi = hI, f i ·
hI, gi for all f, g. In particular,
dµ∪ν = hI, pµ pν i = dµ dν ,
Q
so by iteration dλ = dλi , completing the proof.
27
65. Since Schur functions sλ (x1 , . . . , xn ) are the polynomial characters of
GL(n, C) (Appendix 2), it follows by Weyl’s “unitary trick” that they
are the irreducible characters of the unitary group U(n). Hence
Z
2k 2k
hVn , Vn in = Vn2k Vn2k du
u∈U (n)
Z
= |Vn |4k du.
u∈U (n)
where CT denotes constant term. The value of this constant term was
conjectured (as a special case of a more general conjecture) by F. J.
Dyson to be (kn)!/(2k +1)!n and given an elegant proof (after an earlier
more complicated proof by Gunson and Wilson) by I. J. Good, J. Math.
Phys. 11 (1970), 1884. See I. G. Macdonald, SIAM J. Math. Anal. 13
(1982), 988–1007. For much more on this subject, see the survey by
P. J. Forrester and S. Ole Warnaar, Bull. Amer. Math. Soc. 45 (2008),
489–534.
66. It is clear from Corollary 7.13.8 that
X X
sλ = Lµ mµ ,
λ⊢2n µ⊢2n
28
where U = p1 (i.e., the operator given by multiplication by p1 )
and D = ∂p∂ 1 . (See Exercise 7.24 for similar reasoning.) From this
it is clear that Tn = gn (p1 ), for some polynomial gn ∈ Z[t].
P n
Now let y = n≥0 gn (t) xn! . Then from (21) we have
∂ ∂ ∂y
(t + + t)y = .
∂t ∂t ∂x
a partial differential equation with the initial condition y(0) = 1.
There are various methods for solving this type of equation. For
instance, let y = ez . Then
t + zt + 1 + tzt = zx . (22)
Thus
X xn
f (n) = y|t=0
n≥0
n!
x
= ee −1
X xn
= B(n) ,
n≥0
n!
29
Math. 37 (2006), 404–431; arXiv.math/0510676. For another
bijective proof, see Section 4 of William Y. C. Chen, Eva Y. P.
Deng, Rosena R. X. Du, R. Stanley, and Catherine H. Yan, Trans.
Amer. Math. Soc. 359 (2007), 1555–1575; arXiv.math/0501230.
(b) We have by (23) that
X xm y n x y
hTm , Tn i = e−1−p1 +(1+p1 )e , e−1−p1 +(1+p1 )e
m,n≥0
m! n!
Solutions to (a) and (b) can also be given using induction, working
directly with the operators U and D and avoiding generating functions.
30
This problem is not as contrived as it may first appear. There is a
semisimple algebra Pn , called the partition algebra, whose irreducible
representations σ λ are indexed by (certain) partitions λ, such that
dim σ λ = hTn , sλ i. See P. Martin, J. Knot Theory Ramifications 3
(1994), 51–82; P. Martin, J. Algebra 183 (1996), 319–358; P. Martin
and G. Rollet, Compositio Math. 112 (1998), 237–254; P. Martin and
D. Woodcock, J. Algebra 203 (1998), 91–124; C. Xi, Compositio Math.
119 (1999), 99–109; W. Doran and D. Wales, J. Algebra 231 (2000),
265–330; P. Martin, J. Phys. A 33 (2000), 3669–3695; T. Halverson, J.
Algebra 238 (2001), 502–533.
31
(d) We have g(t) = h(t) = 1/(1 − t), L(t) = t − 12 t2 , Lh−1i (t) =
√
1 − 1 − 2t, and M(t) = t. We get
X xn
g∅ (n)sλ = F (x, p)
n≥0
n!
s !
1 2
= exp −p + 1 − 1 − 2 x + p − p
2
p
= exp 1 − p − (1 − p)2 − 2x .
(e) We have g(t) = 1/(1 − t), h(t) = 1, L(t) = Lh−1i (t) = t, and
M(t) = − log(1 − t). Hence
69. One first shows that ins(w) can be obtained by row inserting an+1 ,
then column inserting an , then row inserting an+2 , then column in-
serting an−1 , etc., ending with a row insertion of a2n followed by a
column insertion of a1 . It can be shown that for each 1 ≤ i ≤ n the
shape increases by the addition of one domino after inserting an+i and
an+1−i , and the proof follows. Alternatively, by Theorem A.1.2.10 we
have P = evac(P ). Now consider the growth diagram for comput-
ing evac(P ) (Figure A1-13), or see Section 3 of R. Stanley, Promotion
and evacuation, Electronic J. Comb. 15(2) (2008–2009). For a good
overview of this topic, see M. Shimozono and D. E. White, Electronic
J. Combinatorics 8(1) (2001), R21.
1 − ζ dλj
pλj (1, ζ, . . . , ζ d−1) = = 0.
1 − ζ λj
32
Thus pλ (1, ζ, . . . , ζ d−1) = 0, and the proof follows (since the pλ ’s for
λ ⊢ n are a basis for ΛnQ ).
For stronger results about sλ (1, ζ, . . . , ζ d−1), note that
X 1 X
sλ (1, ζ, . . . , ζ d−1)sλ (x) = Y = hn (xd1 , xd2 , . . . )
d
λ (1 − xk ) n≥0
k
72. We have X X X
hλ/µ (u) = 1. (24)
u∈λ/µ u∈λ/µ v∈H(u)
33
x−k F (x) = kP (x) + F (x), whence F (x) = kxk P (x)/(1 − xk ). It
is easy to see that
!
X X xk P (x)
k
mk (λ) x = ,
n≥0 λ⊢n
1 − xk
34
78. By the solution to Exercise 7.69(a) we have
X t
X 1 X 1
sλ = exp t pn + p2n/2 .
n≥1
n n≥1
n
n odd n even
35
where µ ranges over all partitions of n with 2r + 1 odd parts and no
even parts. The proof now follows from a routine application of Corol-
lary 5.1.8. The proof for even n is similar, using a simple modification
of Corollary 5.1.8.
This result is due to R. Stanley, J. Combinatorial Theory Ser. A 114
(2007), 436–460 (Theorem 3.1); arXiv:math/0603520.
81. See R. Stanley, J. Combinatorial Theory (A) 114 (2007), 436–460;
arXiv.math/0603520 (Corollary 5.7).
82. This was a conjecture of R. Stanley, presented on June 25, 2003, at the
15th FPSAC meeting in Vadstena, Sweden, and available at
math.mit.edu/∼rstan/transparencies/fpsacproblem.pdf.
37
Hence s(nm ) (x1 , x2 , . . . , xm /y1 , y2 , . . . , yn ) is divisible by x1 +y1 . By
symmetry, s(nm ) (x1 , x2 , . . . , xm /y1 , y2 , . . . , yn ) is divisible by xi +
yj for all 1 ≤ i ≤ m and 1 ≤ j ≤ n. This accounts Q for mn
factors, so s(nm ) (x1 , x2 , . . . , xm /y1 , y2 , . . . , yn ) = c (xi + yj ) for
some constant c. It is easy to see that c = 1, e.g., by considering
the coefficient of xn1 xn2 · · · xnm , completing the proof. This result is
due to D. E. Littlewood and can be found in [7.88, XVIII on page
115].
Bijective proof. Immediate from Exercise 7.42 (with the typo
sλ̃ (y) replaced with sλ̃′ (y)).
(g) This result is due to A. Berele and A. Regev, Advances in Math.
64 (1987), 118–175. A bijective proof was given by J. B. Remmel,
Linear and Multilinear Algebra 28 (1990), 119–154. For another
proof, see [7.96, Exam. I.3.23(4)].
38
(b) See mathoverflow.net/questions/376494 (answer by R. Stan-
ley).
87. Sketch of proof. Write ϑn for ϑ specialized to t = n, where n ∈ P. Note
that
ϑn (pk )(x1 , . . . , xn ) = pk (x1 + 1, . . . , xn + 1).
Hence
ϑn (sλ )(x1 , . . . , xn ) = sλ (x1 + 1, . . . , xn + 1).
Now
aλ+δ (x1 + 1, . . . , xn + 1)
sλ (x1 + 1, . . . , xn + 1) =
aδ (x1 + 1, . . . , xn + 1)
aλ+δ (x1 + 1, . . . , xn + 1)
= .
aδ (x1 , . . . , xn )
By expanding the entries of aλ+δ (x1 + 1, . . . , xn + 1) and using the
multilinearity of the determinant we get (see I. G. Macdonald, Sym-
metric Functions and Hall Polynomials, second ed., Example I.3.10 on
page 47) X
sλ (x1 + 1, . . . , xn + 1) = dλµ sµ , (27)
µ⊆λ
where
λi + n − i
dλµ = det .
µj + n − j 1≤i,j≤n
We can factor out factorials from the numerators of the row entries and
denominators of the column Q entries of the above determinant. These
factorials altogether yield u∈λ/µ (n + c(u)). What remains is exactly
the determinant for f λ/µ /|λ/µ|! given by Corollary 7.16.3, and we ob-
tain
X f λ/µ Y
ϑn (sλ )(x1 , . . . , xn ) = (n + c(u)) sµ (x1 , . . . , xn ).
µ⊆λ
|λ/µ|!
u∈λ/µ
39
for all n ≥ i. Both sides are polynomials in n, so they are equal as
polynomials, and we can replace n with the indeterminate t. Now let
i → ∞.
Is there a more conceptual proof that doesn’t involve the evaluation of
a determinant?
Equation (27) (without the evaluation of the determinant dλµ ) goes
back to A. Lascoux, C. R. Acad. Sci. Paris Sér. A-B 286 (1978), 385–
387. See also I. G. Macdonald, Symmetric Functions and Hall Polyno-
mials, second ed. (Example I.3.10 on pages 47–48). The evaluation of
dλµ is due to R. Stanley. For further aspects of this result, see S. C.
Billey, B. Rhoades, and V. Tewari, Int. Math. Research Not. IMRN
(2019); arXiv:1920.11165 (Section 4).
90. This is the special case of Exercise 7.47(j) where P is both (3 + 1)-free
and (2 + 2)-free. It was shown by M. Guay-Paquet, arXiv:1306.2400,
that this special case actually implies the full conjecture.
For the case I = {{1, 2}, {2, 3}, . . . , {n − 1, n}} (i.e., no two consecu-
tive elements of i1 i2 · · · in are equal), see Exercise 7.47(k). Ben Joseph
claimed to have a proof based on the involution principle for the case
I = {{1, 2, 3}, {2, 3, 4}, . . . , {n − 2, n − 1, n}}, but this was never writ-
ten up. A different proof is due to S. Dahlberg, Sém. Lotharingien de
Combinatoire 82B (2019), Article #59, 12 pp.
40
David Gebhard and Bruce Sagan, J. Algebraic Comb. 13 (2001), 227–
255, have generalized Exercise 7.47(k) to the case I = {{1, 2, . . . , k1 }, {k1 , k1 +
1, . . . , k2 }, {k2 , k2 +1, . . . , k3 }, . . . , {kr , kr +1, . . . , n}}. For further work
on chromatic symmetric functions and their quasisymmetric generaliza-
tion, see the web page
www.symmetricfunctions.com/chromaticQuasisymmetric.htm
of Per Alexandersson.
Similarly we obtain
* +
X
b(m, n) = pn1 , sλ
λ⊢n
= t(n),
P
since e.g. if f ∈ Λn then hpn1 , f i = [x1 x2 · · · xn ]f , while λ⊢n fλ =
t(n) by Corollary 7.13.9. In the same way we obtain
* ! +
X
c(m, n) = sµ p1n−m , pn1 .
µ⊢m
41
∂
multiplication by p1 is adjoint to ∂p1
. Hence
* +
X ∂n−m
c(m, n) = sµ , n−m
pn1
µ⊢m
∂ p1
* +
X
= sµ , (n)n−m pm
1
µ⊢m
= (n)n−m t(m).
Finally,
* ! ! +
X X
d(m, n) = sµ sν , pn1
µ⊢m ν⊢n−m
! !
X X
= [x1 x2 · · · xn ] sµ sν
µ⊢m ν⊢n−m
n
= t(m)t(n − m).
m
42
92. (a) Let
!2
X
Yn = sµ (x)sµ (y) .
µ⊢n
93. Conjectured by Stijn Lievens and Neli Stiolova, and proved by Ron
King in July, 2007, in a manuscript entitled “Notes on certain sums of
Schur functions.”
♣ Can this manuscript be accessed online? Is there another reference?
94. This conjecture is due to S. Sundaram. It has been checked for even
n ≤ 20.
43
97. This result is closely related the saturation conjecture (Problem 96
above) and to the problem of characterizing the possible eigenvalues of
hermitian matrices A, B, A + B. For a nice survey of this area see W.
Fulton, Bull. Amer. Math. Soc. 37 (2000), 209–249; math.AG/9908012.
98. (a) This result follows from the theory of Hall polynomials, not dis-
cussed in EC2. See (4.3) on page 188 of Macdonald, Symmet-
ric Functions and Hall Polynomials, second ed. To complete the
λ
proof, one needs to show that gµν (p) 6= 0 (when p is prime). This
fact follows from a result of F. M. Maley, J. Algebra 184 (1996),
λ
363–371, that gµν (t) has nonnegative coefficients when expanded
in powers of t − 1.
(b) This result (if true) would give an algebraic strenghtening of the
Saturation Conjecture (Exercise 96 above). For a somewhat more
general context, see mathoverflow.net/questions/212368.
99. (a) One method is to note that by the Murnaghan-Nakayama rule we
have χλ ((n)) 6= 0 (if and) only if λ is a hook. But the only hooks
λ with a border strip of size n − 1 (otherwise χλ (n − 1, 1) = 0)
n
are (n) and (1n ). Since χn (µ) = εµ χ1 (µ) = 1 6= 0 for all µ ⊢ n, it
follows that λ = (n) or λ = (1n ).
100. Let µ1 be the size of the largest border strip B1 of λ. Thus µ1 =
h(1, 1) = λ1 + λ′1 − 1, the hook length of square (1,1). Let µ2 be
the size of the largest border strip B2 after we remove B1 from λ.
Thus µ1 = h(2, 2) = λ2 + λ′2 − 3. Continue in this way to obtain
µ = (µ1 , µ2, . . . ). The number of parts of µ is rank(λ). Since each Bi
is unique, there is only one border strip tableau of type µ. Thus by the
Murnaghan-Nakayama rule χλ (µ) = ±1.
101. Given w ∈ Sn , let
44
By the solution to Exercise 7.69(b) we have ϕ(pλ ) = sq(w), where
ρ(w) = λ. Now apply ϕ⊗k to both sides of (7.186).
104. Let λ be a p-core with λ1 = k. Remove from λ all rows such that the
first square (i, 1) of the row satisfies h(i, 1) ≡ h(1, 1) (mod p), where
h(i, j) is the hook length of the square (i, j). One can check that this
sets up a bijection with (p − 1)-cores µ with µ1 ≤ k. Thus if fp (k)
denotes the number of p-cores with largest part k, then
from which the proof follows easily. This result was explained by M.
Vazirani in a conversation at MSRI on March 24, 2008.
45
Thus [why?]
X 1 k−1 1 k−1
uk (n) = hχλ · · · χλ , χλ · · · χλ i
λ1 ,...,λk−1
X 2 k−1 2
λ1 λ (n)
= χ ··· χ ,χ
λ1 ,...,λk−1
* !k−1 +
X
µ 2
= (χ ) , χ(n) .
µ⊢n
By Exercise 7.82(a),
X X
ch (χµ )2 = pµ .
µ⊢n µ⊢n
Hence [why?]
* !∗(k−1) +
X
uk (n) = pµ , hn ,
µ⊢n
where ∗(k −1) denotes the (k −1)th power with respect to ∗. Now
since
pλ ∗ pµ = zµ pµ δλµ ,
P −1
and hn = µ⊢n zµ pµ , finally we get [why?]
X
uk (n) = (zµ )k−1.
µ⊢n
46
Now by Exercise 7.69(a) we have
X 1 X
sλ = pρ(w2 )
λ⊢n
n! w∈Sn
X
= zµ−1 sq(wµ )pµ ,
µ⊢n
47
107. (a) See R. Stanley, Advances in Applied Math. 30 (2003), 283–294;
arXiv.math/0106115 (Theorem 2.2). The proof consists simply
of applying the exponential specialization ex (EC2, pp. 304–306)
to the identity of Exercise 7.27(e). Since this identity has a bi-
jective proof via a skew version of RSK, its exponential special-
ization is therefore just a special case of this bijective proof. A
somewhat different bijective proof was given by Aaron D. Jag-
gard, Electronic J. Combinatorics 12 (2005), R14 (Theorem 3.2);
arXiv.math/0107130.
(b) See R. Stanley, ibid. (Theorem 2.1).
108. (b) See D. White, Advances in Math. 50, 160–186, though there may
be earlier references.
(c) Easy consequence of (b), the isomorphism ϕ, and the Murnaghan-
Nakayama rule.
48
From this we easily get
n
1X
Pn (q) = (q + i − 1)n
n i=1
1
= ((q + n)n+1 − (q)n+1 ) .
n(n + 1)
Hence the left-hand side of (28) is greater than the right. The
reverse inequality holds if a < 0. Hence if (28) holds then a = 0,
and the proof follows.
(c) See R. X. F. Chen and C. M. Reidys, SIAM J. Discrete Math. 30
(2016), 1660–1684, arXiv:1502.07674, and the references therein.
(d) (sketch) As in (a) we obtain
n
X i
Pλ (q) = χhn−i,1 i (µ)(−1)i−1 (q + n − i)n .
i=1
so Q
(1 − (−t)µi )
Pλ (q) = .
1+t tk →(−1)k (q+n−k−1)n
49
It is now not hard to complete the proof using Lemma 9.3 of A.
Postnikov and R. Stanley, J. Combinatorial Theory (A) 91 (2000),
544–597.
For this entire exercise, see R. Stanley, Europ. J. Combinatorics 32
(2011), 937–943; arXiv:0901.2008.
111. (a) Let α = (α1 , . . . , αk ). Define
50
115.(a,b) See B. Joseph, Ph.D. thesis, M.I.T, 2001 (Chapter 3), available
at dspace.mit.edu/handle/1721.1/8225. This proof was never
published.
(c) Immediate from (a) and the definition of the scalar product hfn , sgni.
This result is attributed to Paul D. Hanna, 9 March 2013, in OEIS
A033917.
(1 − q)(1 − q 2 ) · · · (1 − q 2m )
lim
q→−1 (1 − q 2 )m
(1 − q)(1 − q 2 ) · · · (1 − q 2m+1 )
= lim = 2m m!.
q→−1 (1 − q)(1 − q 2 )m
Hence
pm
2 , n = 2m
Rn =
p1 pm
2 , n = 2m + 1.
51
there exists a border strip tableau of shape λ and type (2m ). (This
fact also follows from Problem 108.) Such a border strip tableau
defines a covering of the shape of λ with m (disjoint) dominos.
Moreover, it’s easy to see that the dominos of any covering of
λ with m dominos can be ordered so that they define a border
strip tableau, and the proof follows. (A crucial point in extend-
ing the argument to odd n is that a border strip tableau of type
(2, 2, . . . , 2, 1) always has the same square (1, 1) as the border strip
of size 1. This fact breaks down for skew shapes.)
For a generalization to posets, not involving symmetric functions,
see Theorem 5.1 of R. Stanley, Advances in Applied Math. 34
(2005), 880–902; arXiv:math/0211113.
(c) For the first statement, see Prop. 5.3 of the previous reference,
which in fact is valid for more general labelled posets than Schur
labelled skew shapes.
For the second statement, let λ/µ = 43/2. Then we can place
⌊5/2⌋ = 2 disjoint dominos on the diagram of 43/2, but E(43/2) =
5 and O(43/2) = 4.
(d) Similar to (a)–(c); details omitted.
117. (a) For the case of rectangular shapes, see D. E. White, J. Combina-
torial Theory (A) 95 (2001), 1–38.
(b) This was a conjecture of R. Stanley. For proofs see J. Sjöstrand, J.
Combinatorial Theory, Ser. A 111 (2005), 190–203, arXiv.math/0309231,
and T. Lam, J. Combinatorial Theory Ser. A 107 (2004), 87–115,
arXiv.math/0308265.
118. (a) For any homogeneous symmetric function Y of degree n, hY, pn1 i
is equal to [x1 x2 · · · xn ]Y (the coefficient of x1 x2 · · · xn in Y ). For
any n-vertex graph G, [x1 x2 · · · xn ]XG is equal to the number of
proper colorings of G using the colors 1, 2, . . . , n once each. Hence
hXG , pn1 i = n!, so the proof follows since Fn is a sum of Cn XG ’s.
P
(b) For any n-vertex
P graph G with X G = λ⊢n dλ eλ , Exercise 7.47(g)
asserts that λ⊢n dλ is the number of acyclic orientations of G
ℓ(λ)=k
with k sinks. Hence ch1n i is the total number of acyclic orientations
of n-vertex unit interval graphs (always up to isomorphism) with
52
n sinks. The only such graph is the one with no edges, and it has
one acyclic orientation. Hence ch1n i = 1.
(c) Since h2, 1n−2i is the only partition of n with n − 1 parts, we want
the total number of acyclic orientations with n − 1 sinks of n-
vertex unit interval graphs. Such a graph can have exactly one
edge (with two acyclic orientations having n−1 sinks), or have two
incident edges (with one acyclic orientation having n − 1 sinks).
There are n − 1 n-vertex unit interval graphs with exactly one
edge, and n − 2 with two incident edges. Hence
ch2,1n−2 i = 2(n − 1) + (n − 2) = 3n − 4.
(d) Let the unit interval graph G have vertices 1, 2, . . . , n in the order
of the unit intervals that define it. (The unit intervals are ordered
by the order of their left endpoints.) Let vertex i be adjacent to
di vertices j < i (so d1 = 0). It is easy to see that
n
Y
χG (q) = (q − di ).
i=1
53
of G having v as the only sink is equal to [q]χG (q). Using the
notation of (d) above, it follows that
X
c(n) = n (d2 − 1)(d3 − 1) · · · (dn − 1).
(a1 ,...,an )∈Dn
119. Follows from the solution to Exercise 7.47(f), or equivalently, from The-
orem 3.1 and equation (8) of R. Stanley, Advances in Math. 111 (1995),
166–194. See also T. Y. Chow, arXiv:math/9712229. (The difficulty
rating of this exercise assumes no knowledge of Exercise 7.47(f).)
120. (a) Let M = xa11 · · · xakk be a monomial of degree n, with each ai > 0.
Suppose that M appears in LXdes(w) . Write w as a juxtaposi-
tion (not the product of permutations in Sn ) v1 v2 · · · vk , where
vi has length ai . The partial permutations vi therefore have no
a a
X-descents. For π ∈ Sk let π(M) = x1π(1) · · · xkπ(k) . Then π(M)
appears in the permutation vπ(1) · · · vπ(k) . It follows easily that UX
is a symmetric function.
Moreover, if rj (M) of the bi ’s are equal to j, then the vi ’s of length
j can be permuted in rj (M)! ways. Hence the coefficient of M
in Ux is divisible by r1 (M)! · · · rk (M)!. In other words, UX is
a Z-linear combination of the augemented monomial symmetric
functions m̃λ of Problem 84(c). Now use Problem 85 to deduce
that UX is p-integral.
54
(b) Answer: UX = ωUX .
(c) Conjectured by R. Stanley and proved by I. Gessel (private com-
munication dated 5 November 2021).
Here is a sketch of Gessel’s proof. For any finite multiset M of
positive integers define
(M )
X
UX = LXDes(w) ,
w
Then X X X
log P = g(xk ) = gm xm
k = g m pm ,
k≥1 k,m≥1 m≥0
so !
X
P = exp g m pm . (30)
m≥0
55
sets of words (with disjoint distinct entries) that start with their
smallest entry to words (with no repetitions) with no X-descents:
given a set of such words, we concatenate them in increasing or-
der of their first element. The inverse is that we cut each word
before each left-to-right maximum. We only need to check that
concatenating words doesn’t introduce any new X-descents. This
follows from the property that if (i, j) ∈ X then i > j. Thus when
we exponentiate in equation (30) we recover all words without X-
descents, but now weighted as in the problem.
(d) No. Gessel noted that if X = {(1, 3), (2, 1), (3, 1), (3, 2)}, then
UX = p31 − p2 p1 + p3 .
(e) Equivalent to Problem 119 above.
(f) Expand the right-hand side of equation (11) in terms of the fun-
damental quasisymmetric functions LS . We need to show that the
coefficient of LS is equal to the number of permutations w ∈ Sn
with XDes(w) = S. Now the L-expansion of si,1n−i is given by
X
si,1n−i = LS .
[n−1]
S∈( n−i )
56
(b) It suffices to verify it for f = pi , which is routine.
(c) Follows from (a), (b), and the p-integrality of UX (Problem 120(a)).
This result appears as Problem 7.7 in I. Tomescu, Problems in
Combinatorics and Graph Theory, John Wiley & Sons, Chich-
ester, 1985. The proof given here is due to D. Grinberg, private
communication, 5 April 2022.
57
a semiorder (solution to Exercise 6.19(ddd)). It follows from
the sentence preceding Conjecture 5.1 of R. Stanley, Advances
in Math. 111 (1995), 166–194, that Exercise 7.47(j) is equivalent
to the h-positivity of sfdet(A), where if G has n vertices then A
is the n × n (0, 1)-matrix with the 0’s occupying a certain rotated
Young diagram justified into the lower left-hand corner and lying
below the main diagonal. Such a matrix is totally nonnegative, so
Exercise 7.47(j) is a special case of (d). For another combinatorial
application of the total nonnegativity of A, see the final paragraph
of R. Stanley, J. Combinatorial Theory (A) 74 (1996), 169–172.
125. The concept of set-valued tableau is due to A. Buch, Acta Math. 189
(2002), 37–78, arXiv:math/0004137, who showed (a). For (b,c) see
Lam and Pylyavskyy, ibid. For (d), see Proposition 6 of Shimozono
and Zabrocki, ibid. A further paper of interest is J. Bandlow and J.
Morse, Electronic J. Combinatorics 19 (2012), P39; arXiv:1106.1594.
Somewhat different (yet analogous) formulas appear in T. Hudson, T.
Ikeda, T. Matsumura, and H. Naruse, Advances in Math. 320 (2017),
115–156, arXiv:1504.02828; T. Matsumura, Proc. Japan Acad. Ser.
A Math. Sci. 93 (2017), 82–85, arXiv:1611.06483; and J. S. Kim,
arXiv:2003.00540.
58
the unique linear dependence is L41 = L32 + L2111 . For n = 6 it’s
L6 + L33 = L321 + L3111 . For n = 7, there are two (independent)
relations: L43 = L3211 (a consequence of multiplying the relation
L4 = L211 by L3 ) and L61 + L331 = 2L43 + L322 + L31111 .
127. (a) First proof. Sum equation (13) on all λ ⊢ n. The right-hand side
becomes X
Fco(w) = pn1 .
w∈Sn
Second proof. We can give a purely computational proof, avoiding
the Gessel-Reutenauer result, as follows. By equation (7.191) and
the definition Lhkr i = hr [Lk ] of Exercise 7.89(f), for fixed k we
have X X 1 X k/d
Lhkr i = exp µ(d)pnd . (31)
r≥0 n≥1
nk
d|k
59
and the proof follows.
(b) Similar to the second proof of (a).
(c) Also similar to the second proof of (a). Let
!
Y X
Y = (−1)(k−1)r Lhkr i .
k≥1 r≥0
Now
X X (−1)(k−1)n X k/d
Y = exp µ(d)pnd .
n≥1 k≥1
kn
d|k
Note that
X −1, n = 1
(−1)N/d µ(d) = 2, n = 2
d|N 0, n ≥ 3.
It follows that
X (−1)j−1 1
Y = exp pj1 + pj2
j≥1
j j
= exp (log(1 + p1 ) − log(1 − p2 ))
1 + p1
= ,
1 − p2
and the proof follows.
128. (a) Follows readily from Problem 126 above and the formula for Lα (1m )
preceding Proposition 7.19.12.
60
(b) Note that fj (n) = Lj (1n ). For any f, g ∈ Λ we have
i.e., take the composition of the polynomial f (1n ) with the polyno-
mial g(1n ). Equation (32) is proved by verifying it for f = pλ and
using
the linearity of f [g] with respect to f . Moreover, hk (1n ) =
n
k
(Section 7.5). The proof now follows from the definition of
Lλ in Exercise 7.89.
(c) Follows readily from Problem 127(c) and the formula for Lα (1m )
near the end of Section 7.19. This result is due to J. Fulman,
G. B. Kim, S. Lee, and T. K. Petersen, Electronic J. Comb. 28
(2021), P3.37 (Theorem 1.1). This paper contains numerous other
results related to the joint distribution of descents and signs of
permutations in the symmetric group and hyperoctahedral group.
We
D have E that hpn1 , sBS i = f BS = βn (S). In order to compute
n/2
p2 , sBS , we use the Murnaghan-Nakayama rule (version given
by Corollary 7.17.5 and equation (7.75)). Let D be the unique
domino tiling of BS . Clearly border-strip tableaux of shape BS
and type h2n/2 i correspond to standard Young tableaux of shape
BS/2 , and all have weight (−1)v(BS ) . The proof follows.
Note the curious consequence: if n is even then we can never have
γn (S) = 21 βn (S). Of course this is nontrivial only when βn (S) is
even.
D E
(n−1)/2
(b) Now we must compute p1 p2 , sBS via the Murnaghan-Naka-
yama rule. First remove a border strip of size one (i.e., a corner
square, or a square with no square below it or to the right) from
BS ; then cover the remaining squares with dominos. When we
61
remove a corner square u the diagram BS breaks up into two
border strips BT and BU (one of which is possibly empty, or when
n = 1 both are empty). Only the case when BT (and hence also
BU ) have an even number of squares will contribute to the answer,
in which case we call u an even corner square. If BS has m squares,
then the contribution will be
v(BT )+v(BU ) (n − 1)/2
g(u) := (−1) βm/2 (ST )β(n−m−1)/2 (SU ).
m/2
Thus !
1 X
γn (S) = βn (S) + g(u) ,
2 u
62
(e) The condition on S is equivalent to BS/2 = ∅. Moreover, v(BS ) =
#S. The proof follows easily.
130. Let o be an orbit of the action of Sk on Ck . Let Go (p1 , p2 , . . . ) be
the Frobenius characteristic symmetric function of the action of Sk on
o. Thus o corresponds to an unlabelled structure σ. It follows from
Theorem A2.8 that the action of Skn on n disjoint copies of σ is given
by hn [Go ]. Now it follows directly from the definition of plethysm that
if f (x1 , x2 , . . . ) ∈ Λ̂, then
where o ranges over all orbits of the action of Sm on Cm , and the proof
follows.
See equation (20)c on page 46 of F. Bergeron, G. Labelle, and P. Leroux,
Combinatorial Species and Tree-Like Structures.
131. (a) Suppose that f (n) = β(S, T ). By Corollary 7.23.8 we have β(S, T ) =
hsBS , sBT i. Now
hsBS , sBS i − 2hsBS , sBT i + hsBT , sBT i = hsBS − sBT , sBS − sBT i ≥ 0.
63
132. (a) This result can be deduced from #126, using the fact that a multi-
set permutation (of a totally ordered set) and its standardization
have the same descent set, together with [why?]
X
hα = sS β .
Sβ ⊆Sα
64
(h) Follows from applying ω to Problem 6 and using Problem 132(b)
and part (f) of the present problem.
(i) It is easy to see that the e-expansion of PFn has the form PFn =
Cn en1 +· · · . The proof follows from the definition PFλ = PFλ1 PFλ2 · · · .
(j) Generalizing (i) above, it is not hard to show that
n−1
PFn = Cn en1 − Cn e2 e1n−2 + · · · .
2
Thus if λ ⊢ n, then the coefficient of e2 e1n−2 in PFλ is
ℓ(λ)
1X Y 1 Y
− (λi − 1) · Cλi = − (n − ℓ(λ) Cλi .
2 i=1 2
65
(where the 1 on the right-hand side denotes the identity operator)
that k X k
∂ ∂i
p1 = S(k, i)pi1 i . (33)
∂p1 i=1
∂p 1
∂i
(See Exercise 3.209.) Since s
∂pi1 n
= sn−i , the proof follows.
A rather similar argument, but formulated in terms of represen-
tation theory, is given by Dan Petersen at MathOverflow 284054.
The earliest related reference of which we are aware is A. Goupil
and C. Chauve, Sémin. Lothar. Comb. 54 (2005), B54j; arXiv:math/0503307.
♣ Who first looked at this problem? What are some other refer-
ences?
(b) The value of the character
of this Sn -action on a permutation of
m1
cycle type λ is 2 + m2 . Hence
k
∗k 1 2 ∂2 ∂
(sn + sn−1,1 + sn−2,2 ) = p1 2 + p2 sn .
2 ∂p1 ∂p2
∂ i sn ∂ j sn
We can then use ∂pi1
= sn−i (as before) and ∂pj2
= 2−j sn−2j .
137. Open.
66
SSYT of shape B α such as
223
33
4
26
for n = 8 and S = {2, 3, 5}, simply read the entries from left-to-
right and bottom-to-top. For example above we get the sequence
26433223. This sets up a bijection between sequences u = u1 · · · un
with descent set S and terms xu1 · · · xun of sBα .
(b) Straightforward consequence of EC1, second ed., Exercise 4.40.
141. (a) Let λ ⊢ n. The largest α ∈ Comp(n) in lexicographic order such
P [Lα ]sλ 6= 0 is given by α = λ. It follows that [why?] f =
that
µ≤L λ aµ sµ , where aµ ∈ Z and ≤L denotes lex order. Similarly the
smallest β ∈ Comp(n) in lex order Psuch that [Lβ ]sλ 6= 0 is defined
by [n − 1] − Sβ = Sλ′ . Thus f = ν≥L λ bµ sµ where bµ ∈ Z. Hence
fλ = csλ for some c ∈ Q. Since the sλ ’s form an integral basis, we
must have c = 0 or 1. This result and proof are due to L. Billera.
(b) The smallest example is
67
144. (a) This follows from the fact that for λ ⊢ n, ex(sλ )|t=1 = f λ /n! > 0,
while
1, λ = (1n )
ex (pλ )|t=1 =
0, otherwise.
Here ex denotes the exponential specialization (EC2, pp. 304–306).
68
For every permutation w = a1 · · · an ∈ Sn , there is a unique 1 ≤ k ≤ n
for which u := a1 · · · ak ∈ Ik . For fixed k, the cycle indicator of all such
u is Z̃Ik . For any such u, the cycle indicator of the remaining terms
ak+1 · · · an is (n − k)! hn−k by Exercise 7.111(a). Hence for fixed k, the
cycle indicator of all such w is Z̃Ik (n − k)! hn−k , and the proof follows
by summing on k. This proof is completely analogous to the sketched
proof in the solution to Exercise 1.128(a) of EC1, second ed.
147.(a,b) This is due to Brendan Pawlowski. See MathOverflow #254782.
(c) Take n = 4 and the three partitions to be 12-3-4, 13-2-4, and
14-2-3. Take the three characters to be trivial. We get
f = p41 + 3p21 p2 + 3p1 p3 + p4 = 8s4 + 5s31 − s22 + s211 .
·pi1 +···+ik −k+1 xi11 · · · xikk ha1 −i1 (x1 ) · · · hak −ik (xk ).
Q
Note that (aj −1)ij −1 (aj −ij )! = (aj −1)!. Divide by (aj −1)! and
sum on i1 , . . . , ik ≥ 1 and a1 , . . . , ak ≥ 0 to complete the proof.
69
(b) This result is due to Miriam Farber in 2015. The s-expansion
uses the Schur function expansion of hi hj and the Murnaghan-
Nakayama rule. The h-expansion uses the s-expansion and the
Jacobi-Trudi identity. Are there more conceptual proofs?
(c) G2,2,2 = 8s4 + 5s31 − s22 + s211
(d) This conjecture is due to M. Farber.
(e) Farber has a few more sporadic results and conjectures.
Hf = {w ∈ G : w · f = f },
70
153. There are many approaches. One way is to note that h2 = 21 (p21 + p2 ).
Hence
1
h2 [hn ] = (h2n + hn (x21 , x22 , . . . )).
2
Now
X 1
hn (x21 , x22 , . . . ) = Q
n≥0
(1 − x2i )
1
= Q
(1 − xi )(1 + xi )
! !
X X
= hj (−1)k hk ,
j≥0 k≥0
whence !
2n
X
1
h2 [hn ] = h2n + (−1)k hk h2n−k .
2
k=0
This result has been extended e.g. to h3 [hn ] (see for instance S. P. O.
Plunkett, Canad. J. Math. 24 (1972), 541–552), but becomes increas-
ingly unmanageable for h4 [hn ], h5 [hn ], etc.
P
154. Since e21 = i,j xi xj and
X Y
en = (1 + xi ),
n≥0
we have X Y
en [e21 ] = (1 + xi xj ).
n≥0 i,j
71
Taking the degree 2n part gives
X
en [e21 ] = sλ (x)sλ′ (x).
λ⊢n
155. Follows from the fact that the operation g 7→ g[f ] is a (continuous) ring
homomorphism and the formula
X X pn
hn tn = exp . (34)
n≥0 n≥1
n
See Lemma 2.3 of I. Gessel and Y. Zhuang, Adv. Math. 375 (2020),
107370; arXiv:2001.00654.
Note that the exponential specialization of equation (16) is equivalent
to ea+b = ea eb .
P P
156. (a) Answer. Let F (x) = an xn and let F (x)h−1i = bn xnPbe its
compositional inverse. Then the plethystic inverse of f is bn pn1
(easy to prove e.g. from the fact that pn1 [pm mn
1 ] = p1 ).
(b) Answer. Define δ : P → Z by δ(n) = δ1n (the Kronecker delta).
Note that δ is the identity for ∗, i.e., F ∗ δ = δ ∗ F = F for all
F . Since a1 6= 0, the function an possesses a unique Dirichlet
inverse bn , i.e., a ∗ b = δ. (For instance, if an = 1 for all n
then bn = µ(n), the number-theoretic
P Möbius function.) Then
the plethystic inverse of f is n≥1 bn pn .
157. See S. Sundaram, The plethystic inverse of the odd Lie representations
Lie2n+1 , arXiv:2003.10700.
158. Let Eij be the matrix in Mat(n, C) with a 1 in the (i, j)-position and
0’s elsewhere, as in Appendix A2, following Theorem A2.4. If A =
diag(θ1 , . . . , θn ) then AEij = θi Eij . Hence the eigenvalues of A acting
on Mat(n, C) are just θ1 , . . . , θn , n times each, so the character of the
action is just n(x1 + · · · + xn ) = ns1 (x1 , . . . , xn ).
72